Skip to content

Advertisement

The Interplay between Compression and Security for Image and Video Communication and Adaptation over Networks

  1. Content type: Research Article

    A novel syntax-compliant encryption primitive and an efficient syntax-compliant JPEG 2000 encryption scheme are presented in this paper. The syntax-compliant encryption primitive takes, as input, syntax-compli...

    Authors: Yang Yang, Bin B. Zhu, Shipeng Li and Nenghai Yu

    Citation: EURASIP Journal on Information Security 2008 2007:056365

    Published on:

  2. Content type: Research Article

    We propose a joint encryption and compression (JEC) scheme with emphasis on application to video data. The proposed JEC scheme uses the philosophy of distributed source coding with side information to reduce t...

    Authors: M. A. Haleem, K. P. Subbalakshmi and R. Chandramouli

    Citation: EURASIP Journal on Information Security 2008 2007:098374

    Published on:

  3. Content type: Research Article

    JPEG2000 encryption has become a widely discussed topic and quite a number of contributions have been made. However, little is known about JPEG2000 compression parameters and their influence on the security an...

    Authors: Dominik Engel, Thomas Stütz and Andreas Uhl

    Citation: EURASIP Journal on Information Security 2008 2007:094565

    Published on:

  4. Content type: Research Article

    We introduce the concept of joint source coding, channel coding, and secrecy. In particular, we propose two practical joint schemes: the first one is based on error-correcting randomized arithmetic codes, whil...

    Authors: Enrico Magli, Marco Grangetto and Gabriella Olmo

    Citation: EURASIP Journal on Information Security 2007 2007:079048

    Published on:

  5. Content type: Research Article

    A novel encryption model for digital videos is presented. The model relies on the encryption-compression duality of certain types of permutations acting on video frames. In essence, the proposed encryption pro...

    Authors: Daniel Socek, Spyros Magliveras, Dubravko Ćulibrk, Oge Marques, Hari Kalva and Borko Furht

    Citation: EURASIP Journal on Information Security 2007 2007:052965

    Published on: