Computer Science ›› 2014, Vol. 41 ›› Issue (6): 84-88.doi: 10.11896/j.issn.1002-137X.2014.06.017
Previous Articles Next Articles
FU Yong,YI Xiao-wei and MA Heng-tai
[1] 史元春,徐光祐,高原.中国多媒体技术研究[J].中国图像图形学报,2010,15(7):1023-1041 [2] 文昌辞,王沁,苗晓宁,等.数字图像加密综述[J].计算机科学,2012,39(12):6-9 [3] Zhou L,Chao H C,Vasilakos A V.Joint forensics-schedulingstrategy for delay-sensitive multimedia applications over heterogeneous networks[J].IEEE Journal on Selected Areas in Communications,2011,29(7):1358-1367 [4] Yu H H.Scalable streaming media authentication[C]∥Communications,2004IEEE International Conference on.IEEE,2004,4:1912-1916 [5] 顾国生,韩国强,王宁,等.一种保持码流结构的JPEG2000加密算法[J].计算机科学,2007,34(11):222-223 [6] Yan S,Lin Q.Partial encryption of JPEG2000images based on EBCOT[C]∥Intelligent Control and Information Processing (ICICIP),2010International Conference on.IEEE,2010:472-476 [7] 邓绍江,李艳涛,张岱固,等.一种基于混沌的JPEG2000图像加密算法[J].计算机科学,2009,36(5):273-275 [8] Hong S C,Li C T,Chen H K,et al.A high speed and high security encryption scheme for JPEG2000using a chaotic system[C]∥Fuzzy Systems and Knowledge Discovery (FSKD),2011Eighth International Conference on.IEEE,2011,4:2150-2153 [9] Stutz T,Uhl A.Complexity analysis of the Key-dependentWavelet Packet Transform for JPEG2000encryption[C]∥201219th IEEE International Conference on Image Processing (ICIP).IEEE,2012:2633-2636 [10] Nakachi T,Toyoshima K,Tonomura Y,et al.Layered Multicast Encryption of Motion JPEG2000Code Streams for Flexible Access Control[J].IEICE Transactions on Information and Systems,2012,95(5):1301-1312 |
No related articles found! |
|