Selective Image Encryption Using JBIG.
Roman PfarrhoferAndreas UhlPublished in: Communications and Multimedia Security (2005)
Keyphrases
- image encryption
- image encryption scheme
- data encryption standard
- security analysis
- image compression
- chaotic maps
- authentication scheme
- encryption algorithms
- wireless communication
- cosine transform
- lossless compression
- image scrambling
- image encryption algorithm
- lossy compression
- compression algorithm
- secret sharing scheme
- low cost
- secret sharing