Linear quadtree compression scheme for image encryption

被引:0
|
作者
Natl Defense Management Coll, Taipei, Taiwan [1 ]
机构
来源
Signal Process Image Commun | / 4卷 / 279-290期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] Joint Lossless Image Compression and Encryption Scheme Based on CALIC and Hyperchaotic System
    Zhang, Miao
    Tong, Xiaojun
    Wang, Zhu
    Chen, Penghui
    ENTROPY, 2021, 23 (08)
  • [42] Parallel Quadtree Approach for Image Compression using Wavelets
    Nejad, Hamed Vahdat
    Deldari, Hossein
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 14, 2006, 14 : 396 - 399
  • [43] Faster fractal image compression using quadtree recomposition
    Jackson, DJ
    Mahmoud, W
    Stapleton, WA
    Gaughan, PT
    IMAGE AND VISION COMPUTING, 1997, 15 (10) : 759 - 767
  • [44] Concatenated Image Compression and Encryption
    Alshaya, Abdulaziz
    Komies, Saleh
    2021 4TH INTERNATIONAL SYMPOSIUM ON ADVANCED ELECTRICAL AND COMMUNICATION TECHNOLOGIES (ISAECT), 2021,
  • [45] IMAGE COMPRESSION VIA IMPROVED QUADTREE DECOMPOSITION ALGORITHMS
    SHUSTERMAN, E
    FEDER, M
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 1994, 3 (02) : 207 - 215
  • [46] Image compression using fixed length quadtree coding
    Lin, TW
    ICSP '96 - 1996 3RD INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, PROCEEDINGS, VOLS I AND II, 1996, : 970 - 973
  • [47] Quadtree based transform coding for multispectral image compression
    Lee, J
    STILL-IMAGE COMPRESSION II, 1996, 2669 : 42 - 50
  • [48] An enhanced fractal image compression based on quadtree partition
    Farhadi, G
    ISPA 2003: PROCEEDINGS OF THE 3RD INTERNATIONAL SYMPOSIUM ON IMAGE AND SIGNAL PROCESSING AND ANALYSIS, PTS 1 AND 2, 2003, : 213 - 216
  • [49] Novel image authentication scheme based on quadtree segmentation
    Tsai, P
    Hu, YC
    Chang, CC
    IMAGING SCIENCE JOURNAL, 2005, 53 (03): : 149 - 162
  • [50] An Efficient Scheme for Joint Compression and Encryption
    Qiu, Lirong
    Yu, Yang
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2014, 17 (5-6): : 539 - 548