Skip to main content

Advertisement

The Interplay between Compression and Security for Image and Video Communication and Adaptation over Networks

  1. We propose a joint encryption and compression (JEC) scheme with emphasis on application to video data. The proposed JEC scheme uses the philosophy of distributed source coding with side information to reduce t...

    Authors: M. A. Haleem, K. P. Subbalakshmi and R. Chandramouli

    Citation: EURASIP Journal on Information Security 2008 2007:098374

    Content type: Research Article

    Published on:

  2. A novel syntax-compliant encryption primitive and an efficient syntax-compliant JPEG 2000 encryption scheme are presented in this paper. The syntax-compliant encryption primitive takes, as input, syntax-compli...

    Authors: Yang Yang, Bin B. Zhu, Shipeng Li and Nenghai Yu

    Citation: EURASIP Journal on Information Security 2008 2007:056365

    Content type: Research Article

    Published on:

  3. JPEG2000 encryption has become a widely discussed topic and quite a number of contributions have been made. However, little is known about JPEG2000 compression parameters and their influence on the security an...

    Authors: Dominik Engel, Thomas Stütz and Andreas Uhl

    Citation: EURASIP Journal on Information Security 2008 2007:094565

    Content type: Research Article

    Published on:

  4. We introduce the concept of joint source coding, channel coding, and secrecy. In particular, we propose two practical joint schemes: the first one is based on error-correcting randomized arithmetic codes, whil...

    Authors: Enrico Magli, Marco Grangetto and Gabriella Olmo

    Citation: EURASIP Journal on Information Security 2007 2007:079048

    Content type: Research Article

    Published on:

  5. A novel encryption model for digital videos is presented. The model relies on the encryption-compression duality of certain types of permutations acting on video frames. In essence, the proposed encryption pro...

    Authors: Daniel Socek, Spyros Magliveras, Dubravko Ćulibrk, Oge Marques, Hari Kalva and Borko Furht

    Citation: EURASIP Journal on Information Security 2007 2007:052965

    Content type: Research Article

    Published on: