Martin, K.[Karl],
Lukac, R.[Rastislav],
Plataniotis, K.N.[Konstantinos N.],
Efficient encryption of wavelet-based coded color images,
PR(38), No. 7, July 2005, pp. 1111-1115.
Elsevier DOI
0505
BibRef
Caldelli, R.[Roberto],
Filippini, F.[Francesco],
Barni, M.[Mauro],
Joint near-lossless compression and watermarking of still images for
authentication and tamper localization,
SP:IC(21), No. 10, November 2006, pp. 890-903.
Elsevier DOI
0701
Image authentication; Near-lossless JPEG; Digital watermarking;
Tamper localization; Remote sensing; Medical imagery
BibRef
Li, W.H.[Wei-Hai],
Yuan, Y.[Yuan],
A New Blind Attack Procedure For Dct-based Image Encryption With
Spectrum Learning,
IJIG(7), No. 3, July 2007, pp. 481-496.
0707
BibRef
Shreyamsha Kumar, B.K.,
Patil, C.R.[Chidamber R.],
JPEG image encryption using fuzzy PN sequences,
SIViP(4), No. 4, November 2010, pp. 419-427.
WWW Link.
1101
BibRef
Watanabe, O.[Osamu],
Fukuhara, T.[Takahiro],
Kiya, H.[Hitoshi],
Codestream-Based Identification of JPEG 2000 Images with Different
Coding Parameters,
IEICE(E95-D), No. 4, April 2012, pp. 1120-1129.
WWW Link.
1204
BibRef
Iida, K.[Kenta],
Kiya, H.[Hitoshi],
Robust Image Identification without Visible Information for JPEG Images,
IEICE(E101-D), No. 1, January 2018, pp. 13-19.
WWW Link.
1801
BibRef
And:
Robust image identification with secure features for JPEG images,
ICIP17(4342-4346)
IEEE DOI
1803
Databases, Discrete cosine transforms, Feature extraction,
Image coding, Quantization (signal), Robustness, Transform coding,
SNSs
BibRef
Iida, K.[Kenta],
Kiya, H.[Hitoshi],
Robust Image Identification with DC Coefficients for Double-Compressed
JPEG Images,
IEICE(E102-D), No. 1, January 2019, pp. 2-10.
WWW Link.
1901
BibRef
Kobayashi, H.[Hiroyuki],
Imaizumi, S.[Shoko],
Kiya, H.[Hitoshi],
A Robust Identification Scheme for JPEG XR Images with Various
Compression Ratios,
PSIVT15(38-50).
Springer DOI
1602
BibRef
Imaizumi, S.[Shoko],
Fujiyoshi, M.[Masaaki],
Kiya, H.[Hitoshi],
Aoki, N.[Naokazu],
Kobayashi, H.[Hiroyuki],
A Key Derivation Scheme for Hierarchical Access Control to JPEG 2000
Coded Images,
PSIVT11(II: 180-191).
Springer DOI
1111
BibRef
Hashimoto, N.[Noriaki],
Imaizumi, S.[Shoko],
Fujiyoshi, M.[Masaaki],
Kiya, H.[Hitoshi],
Hierarchical encryption using short encryption keys for scalable access
control of JPEG 2000 coded images,
ICIP08(3116-3119).
IEEE DOI
0810
BibRef
Imaizumi, S.[Shoko],
Fujiyoshi, M.[Masaaki],
Abe, Y.[Yoshito],
Kiya, H.[Hitoshi],
Collusion Attack-Resilient Hierarchical Encryption of JPEG 2000
Codestreams with Scalable Access Control,
ICIP07(II: 137-140).
IEEE DOI
0709
BibRef
Imaizumi, S.,
Watanabe, O.,
Fujiyoshi, M.,
Kiya, H.,
Generalized Hierarchical Encryption of JPEG 2000 Codestreams for Access
Control,
ICIP05(II: 1094-1097).
IEEE DOI
0512
BibRef
Fujiyoshi, M.,
Saitou, W.,
Watanabe, O.,
Kiya, H.,
Hierarchical Encryption of Multimedia Contents for Access Control,
ICIP06(1977-1980).
IEEE DOI
0610
BibRef
Watanabe, O.[Osamu],
Iida, T.[Tomonori],
Fukuhara, T.[Takahiro],
Kiya, H.[Hitoshi],
Identification of JPEG 2000 images in encrypted domain for digital
cinema,
ICIP09(2065-2068).
IEEE DOI
0911
BibRef
Kishore, B.,
Kumar, B.K.S.[B.K. Shreyamsha],
Patil, C.R.[Chidamber R.],
FPGA based simple and fast JPEG encryptor,
RealTimeIP(10), No. 3, September 2015, pp. 551-559.
Springer DOI
1509
BibRef
Naik, K.[Kshiramani],
Pal, A.K.[Arup Kumar],
Design of a cryptosystem for DCT compressed image using Arnold
transform and fractional Fourier transform,
IJCVR(5), No. 3, 2015, pp. 335-346.
DOI Link
1509
BibRef
Gu, G.S.[Guo-Sheng],
Ling, J.[Jie],
Xie, G.[Guobo],
Li, Z.[Zheng],
A chaotic-cipher-based packet body encryption algorithm for JPEG2000
images,
SP:IC(40), No. 1, 2016, pp. 52-64.
Elsevier DOI
1601
Chaotic cipher
BibRef
He, J.,
Huang, S.,
Tang, S.,
Huang, J.,
JPEG Image Encryption with Improved Format Compatibility and File
Size Preservation,
MultMed(20), No. 10, October 2018, pp. 2645-2658.
IEEE DOI
1810
cryptography, data compression, decoding, image coding,
compressed images, JPEG standard,
bitstream
BibRef
Liang, H.H.[Hai-Hua],
Zhang, X.P.[Xin-Peng],
Cheng, H.[Hang],
Huffman-code based retrieval for encrypted JPEG images,
JVCIR(61), 2019, pp. 149-156.
Elsevier DOI
1906
Image retrieval, Encrypted JPEG image, Quantization table,
Huffman code, Confidentiality, Integrity, Format compatibility
BibRef
Itier, V.,
Puteaux, P.,
Puech, W.[William],
Recompression of JPEG Crypto-Compressed Images Without a Key,
CirSysVideo(30), No. 3, March 2020, pp. 646-660.
IEEE DOI
2003
Transform coding, Image coding, Encryption, Quantization (signal),
Discrete cosine transforms, Q-factor, JPEG compression,
recompression
BibRef
He, H.J.[Hong-Jie],
Yuan, Y.[Yuan],
Ye, Y.[Yuyun],
Tai, H.M.[Heng-Ming],
Chen, F.[Fan],
Chosen plaintext attack on JPEG image encryption with adaptive key
and run consistency,
JVCIR(90), 2023, pp. 103733.
Elsevier DOI
2301
JPEG bitstream encryption, Chosen plaintext attack,
Adaptive encryption key, ACCs encryption
BibRef
Li, P.Y.[Pei-Ya],
Sun, Z.F.[Ze-Fan],
Situ, Z.H.[Zhen-Hui],
He, M.L.[Mei-Ling],
Song, T.T.[Ting-Ting],
Joint JPEG Compression and Encryption Scheme Based on Order-8-16
Block Transform,
ITS(24), No. 7, July 2023, pp. 7687-7696.
IEEE DOI
2307
Encryption, Image coding, Transform coding, Discrete cosine transforms,
Rate-distortion, Transforms, Costs, security analysis
BibRef
Ye, X.[Xi],
Zhang, Y.S.[Yu-Shu],
Xiao, X.L.[Xiang-Li],
Yi, S.[Shuang],
Lan, R.[Rushi],
Usability Enhanced Thumbnail-Preserving Encryption Based on Data
Hiding for JPEG Images,
SPLetters(30), 2023, pp. 793-797.
IEEE DOI
2307
Encryption, Usability, Transform coding, Recording, Entropy,
Image coding, Privacy, Reversible data hiding,
visual privacy protection
BibRef
Qin, C.[Chuan],
Hu, J.C.[Jin-Chuan],
Li, F.Y.[Feng-Yong],
Qian, Z.X.[Zhen-Xing],
Zhang, X.P.[Xin-Peng],
JPEG Image Encryption With Adaptive DC Coefficient Prediction and RS
Pair Permutation,
MultMed(25), 2023, pp. 2528-2542.
IEEE DOI
2307
Encryption, Transform coding, Cryptography,
Discrete cosine transforms, Security, Streaming media, Histograms,
RS pair permutation
BibRef
Yuan, Y.[Yuan],
He, H.J.[Hong-Jie],
Yang, Y.L.[Yao-Ling],
Mao, N.X.[Ning-Xiong],
Chen, F.[Fan],
Ali, M.[Muqadar],
JPEG image encryption with grouping coefficients based on entropy
coding,
JVCIR(97), 2023, pp. 103975.
Elsevier DOI
2312
JPEG image encryption, Permutation encryption, Classification permutation,
Modulo encryption, Undivided RSV, Coefficients group
BibRef
Yuan, Y.[Yuan],
He, H.J.[Hong-Jie],
Yang, Y.L.[Yao-Lin],
Amirpour, H.[Hadi],
Timmerer, C.[Christian],
Chen, F.[Fan],
JPEG Image Encryption With DC Rotation and Undivided RSV-Based AC
Group Permutation,
MultMed(27), 2025, pp. 1-15.
IEEE DOI
2501
Encryption, Transform coding, Cryptography, Codes, Image coding,
Standards, Transforms, AC group permutation, block features,
undivided RSV
BibRef
Chai, X.L.[Xiu-Li],
Wang, Y.J.[Yin-Jing],
Chen, X.H.[Xiu-Hui],
Gan, Z.H.[Zhi-Hua],
Zhang, Y.S.[Yu-Shu],
TPE-GAN: Thumbnail Preserving Encryption Based on GAN With Key,
SPLetters(29), 2022, pp. 972-976.
IEEE DOI
2205
Ciphers, Encryption, Usability, Training, Privacy, Image coding,
Visualization, CycleGan, deep learning, image encryption, privacy and usability
BibRef
Wen, W.Y.[Wen-Ying],
Jiang, Q.Y.[Qi-Yu],
Huang, H.G.[Hai-Gang],
Zhang, Y.S.[Yu-Shu],
Fang, Y.M.[Yu-Ming],
TPE-DF: Thumbnail Preserving Encryption via Dual-2DCS Fusion,
SPLetters(31), 2024, pp. 1039-1043.
IEEE DOI
2405
Visualization, Histograms, Encryption, Image reconstruction,
Usability, Privacy, Cloud computing, 2D compressive sensing,
thumbnail preserving encryption
BibRef
Zhang, Y.S.[Yu-Shu],
Zhou, W.T.[Wen-Tao],
Zhao, R.[Ruoyu],
Zhang, X.P.[Xin-Peng],
Cao, X.C.[Xiao-Chun],
F-TPE: Flexible Thumbnail-Preserving Encryption Based on Multi-Pixel
Sum-Preserving Encryption,
MultMed(25), 2023, pp. 5877-5891.
IEEE DOI
2311
BibRef
Chai, X.L.[Xiu-Li],
Ma, Y.K.[Ya-Kun],
Wang, Y.J.[Yin-Jing],
Gan, Z.H.[Zhi-Hua],
Zhang, Y.S.[Yu-Shu],
TPE-ADE: Thumbnail-Preserving Encryption Based on Adaptive Deviation
Embedding for JPEG Images,
MultMed(26), 2024, pp. 6102-6116.
IEEE DOI
2404
Encryption, Transform coding, Ciphers, Privacy, Usability,
Cryptography, Visualization, Thumbnail-preserving encryption,
low-resolution image retrieval
BibRef
Orlowski, A.[Arkadiusz],
Chmielewski, L.J.[Leszek J.],
Color Visual Cryptography with Completely Randomly Coded Colors,
CAIP19(I:589-599).
Springer DOI
1909
BibRef
Ting, J.,
Wong, K.,
Ong, S.,
Format-Compliant Perceptual Encryption Method for JPEG XT,
ICIP19(4559-4563)
IEEE DOI
1910
Encryption, JPEG XT, HDR, format-compliant
BibRef
Maqbool, S.[Saqib],
Ahmad, N.[Nisar],
Muhammad, A.[Aslam],
Enriquez, A.M.M.[A.M. Martinez],
Simultaneous Encryption and Compression of Digital Images Based on
Secure-JPEG Encoding,
MCPR16(145-154).
Springer DOI
1608
BibRef
Hofbauer, H.[Heinz],
Unterweger, A.[Andreas],
Uhl, A.[Andreas],
Encrypting only AC coefficient signs considered harmful,
ICIP15(3740-3744)
IEEE DOI
1511
DCT; Encryption; coefficient signs; security
BibRef
Korshunov, P.[Pavel],
Ebrahimi, T.[Touradj],
Scrambling-based tool for secure protection of JPEG images,
ICIP14(3423-3425)
IEEE DOI
1502
Decoding
BibRef
Pinto, M.[Michael],
Puech, W.[William],
Subsol, G.[Gerard],
Protection of JPEG compressed e-comics by selective encryption,
ICIP13(4588-4592)
IEEE DOI
1402
AES
BibRef
Chen, B.[Brenden],
Chandran, V.[Vinod],
Robust Image Hashing Using Higher Order Spectral Features,
DICTA10(100-104).
IEEE DOI
1012
robust to JPEG, etc.
BibRef
Ahmed, F.,
Siyal, M.Y.,
Abbas, V.U.,
A Perceptually Scalable and JPEG Compression Tolerant Image Encryption
Scheme,
PSIVT10(232-238).
IEEE DOI
1011
Reconstruct encryped image even after JPEG compression.
BibRef
Zhu, B.B.,
Yang, Y.[Yang],
Li, S.P.[Shi-Peng],
JPEG 2000 Syntax-Compliant Encryption Preserving Full Scalability,
ICIP05(III: 636-639).
IEEE DOI
0512
BibRef
Watanabe, O.,
Nakazaki, A.,
Kiya, H.,
A fast image-scramble method using public-key encryption allowing
backward compatibility with jpeg2000,
ICIP04(V: 3435-3438).
IEEE DOI
0505
BibRef
Chapter on OCR, Document Analysis and Character Recognition Systems continues in
Video Encryption, Video Cryptography, Authentication .