Selective image encryption using JBIG

被引:0
|
作者
Pfarrhofer, R [1 ]
Uhl, A
机构
[1] CTI, Sch Telemat & Network Engn, A-9020 Klagenfurt, Austria
[2] Salzburg Univ, Dept Comp Sci, A-5020 Salzburg, Austria
来源
COMMUNICATIONS AND MULTIMEDIA SECURITY | 2005年 / 3677卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Selective encryption techniques of JBIG encoded visual data are discussed. We are able to show attack resistance against common image processing attacks and replacement attacks even in case of restricting the amount of encryption to 1% - 2% of the data. The low encryption effort required is due to the exploitation of the interdependencies among resolution layers in the JBIG hierarchical progressive coding mode.
引用
收藏
页码:98 / 107
页数:10
相关论文
共 50 条
  • [31] Efficient Fingerprint Image Protection Principles using Selective JPEG2000 Encryption
    Draschl, Martin
    Haemmerle-Uhl, Jutta
    Uhl, Andreas
    2016 FIRST INTERNATIONAL WORKSHOP ON SENSING, PROCESSING AND LEARNING FOR INTELLIGENT MACHINES (SPLINE), 2016,
  • [32] FPGA Implementation of a Novel Technique for Selective Image Encryption
    Goel, Anish
    Chaudhari, Kaustubh
    2016 2ND INTERNATIONAL CONFERENCE ON FRONTIERS OF SIGNAL PROCESSING (ICFSP), 2015, : 15 - 19
  • [33] Outsourcing chaotic selective image encryption to the cloud with steganography
    Xiang, Tao
    Hu, Jia
    Sun, Jianglin
    DIGITAL SIGNAL PROCESSING, 2015, 43 : 28 - 37
  • [34] Image decomposition for selective encryption and flexible network services
    Scopigno, RM
    Belfiore, S
    GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2004, : 2302 - 2307
  • [35] Overview on selective encryption of image and video: Challenges and perspectives
    Massoudi A.
    Lefebvre F.
    De Vleeschouwer C.
    MacQ B.
    Quisquater J.-J.
    EURASIP Journal on Information Security, 2008 (1):
  • [36] Selective video Encryption using Sattolo's Encryption technique
    Malladar, Rohit
    Kunte, Sanjeev
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, COMMUNICATION, COMPUTER AND OPTIMIZATION TECHNIQUES (ICEECCOT), 2016, : 268 - 273
  • [37] Medical Image Encryption Using Modified Identity Based Encryption
    Purnamasari, Dian Neipa
    Sudarsono, Amang
    Kristalina, Prima
    EMITTER-INTERNATIONAL JOURNAL OF ENGINEERING TECHNOLOGY, 2019, 7 (02) : 524 - 536
  • [38] Optical image encryption using an optimally designed encryption key
    Nomura, T
    Javidi, B
    Mikan, S
    Morimoto, Y
    CLEO(R)/PACIFIC RIM 2001, VOL II, TECHNICAL DIGEST, 2001, : 492 - 493
  • [39] Watermarking JBIG2 text region for image authentication
    Pamboukian, SVD
    Kim, HY
    de Queiroz, RL
    2005 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), VOLS 1-5, 2005, : 1333 - 1336
  • [40] Optical image encryption using interferometer
    Kim, JY
    Kim, KJ
    Seo, DH
    Kim, SW
    Park, SJ
    Kim, SJ
    OPTICAL PATTERN RECOGNITION XI, 2000, 4043 : 364 - 371