• No results found

A detailed evaluation of format-compliant encryption methods for JPEG XR-compressed images

N/A
N/A
Protected

Academic year: 2020

Share "A detailed evaluation of format-compliant encryption methods for JPEG XR-compressed images"

Copied!
20
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Figure 1 The JPEG XR parsing and decoding process [10].
Figure 2 Averaged filesizes when encrypting the Kodak IDB images with random level shift encryption.
Figure 3 Flow graph for the transforms DCT-II, DST-II, Yeung-I, and Yeung-II used for transform-based encryption [4].
Figure 5 Image quality and filesizes for alternative transforms (Kodak IDB).
+7

References

Related documents

The degree of resistance exhibited after 1, 10 and 20 subcultures in broth in the absence of strepto- mycin was tested by comparing the number of colonies which grew from the

The ethno botanical efficacy of various parts like leaf, fruit, stem, flower and root of ethanol and ethyl acetate extracts against various clinically

A lightweight Table Driven Source Routing (TDSR) protocol can maintain more network topology information than Distance Vector (DV).. To facilitate source routing and also

This paper presents the results from the study of the physical (gas permeability as well as chloride diffusion coefficient) and mechanical properties (tensile and compressive

Finally, HRM issues, even when strategic, are considered by top management to strategy implementation phase and not strategy formulation phase (Russ et al. , 1998) study

t In patients who lacked (liastolic murmurs, apical systolic murmurs of only Grade 2 or higher intensity were cOflsi(lered as

Objectives: Primary surgery in patients with complete unilateral and bilateral cleft lip and palate restricts transverse and sagittal maxillary growth.. Additional surgical