Perceptual encryption of JPEG compressed images using DCT coefficients and splitting of DC coefficients into bitplanes

MI Khan, V Jeoti, MA Khan - 2010 International Conference on …, 2010 - ieeexplore.ieee.org
Perceptual Encryption is required in many of the multimedia content preview application.
There is always a need of an efficient technique that reduces the overhead of encryption in …

Recovering missing coefficients in DCT-transformed images

S Li, A Karrenbauer, D Saupe… - 2011 18th IEEE …, 2011 - ieeexplore.ieee.org
A general method for recovering missing DCT coefficients in DCT-transformed images is
presented in this work. We model the DCT coefficients recovery problem as an optimization …

An improved DC recovery method from AC coefficients of DCT-transformed images

S Li, JJ Ahmad, D Saupe… - 2010 IEEE International …, 2010 - ieeexplore.ieee.org
Motivated by the work of Uehara et al.[1], an improved method to recover DC coefficients
from AC coefficients of DCT-transformed images is investigated in this work, which finds …

Content fragile watermarking for H. 264/AVC video authentication

K Ait Sadi, A Guessoum, A Bouridane… - International Journal of …, 2017 - Taylor & Francis
Discrete cosine transform is exploited in this work to generate the authentication data that
are treated as a fragile watermark. This watermark is embedded in the motion vectors. The …

Crypto‐Compression of Videos

C Bergeron, W Hamidouche… - Multimedia Security 2 …, 2022 - Wiley Online Library
This chapter addresses the emerging security issues by providing a state of the art of partial,
perceptual and selective encryption approaches. It presents recent work in the field of video …

A new perceptual assessment methodology for selective HEVC video encryption

N Sidaty, W Hamidouche… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Video data security is one of the most research topic in the recent years. It is widely used in
the multimedia applications such as video-conferencing, Video on Demand and Pay-TV …

A secure online image trading system for untrusted cloud environments

K Munadi, F Arnia, M Syaryadhi, M Fujiyoshi, H Kiya - SpringerPlus, 2015 - Springer
In conventional image trading systems, images are usually stored unprotected on a server,
rendering them vulnerable to untrusted server providers and malicious intruders. This paper …

A content-based image retrieval system for visually protected image databases

K Munadi, F Arnia, M Syaryadhi… - 2015 Asia Pacific …, 2015 - ieeexplore.ieee.org
This paper presents a content-based image retrieval mechanism for visually protected
image databases. Visual protection is provided as a means to prevent illegal use of a …

Perceptual encryption of digital images and videos

S Li - Perceptual Digital Imaging: Methods and Applications, 2012 - api.taylorfrancis.com
Digital images and videos are so ubiquitous nowadays that it would be difficult to live without
them in the heavily digitized and networked world. Various digital devices, such as digital …

[PDF][PDF] Perceptible content retrieval in DCT domain and semi-fragile watermarking technique for perceptible content authentication

C Atupelage, K Harada - WSEAS Transactions on Signal Processing, 2008 - Citeseer
Digital watermarking was commenced to copyright protection and ownership verification of
multimedia data. However the evolution of the watermark focused on different security …