References
- ElGamal, T. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory, 1985, 31, 469–472.
- Rivest, R. L., Shamir, A. and Adleman, L. M. A method for obtaining digital signature and public-key cryptosystems. Commun. ACM, 1978, 21, 120–126.
- Chang, C. C., Hwang, M. S. and Chen, T. S. A new encryption algorithm for image cryptosystems. J. Syst. Software, 2001, 58, 83–91.
- Chang, C. and Liu, J. L. An image encryption scheme based on quadtree compression scheme. Proc. Int. Computer Symposium, Taiwan, 1994, 230–237.
- Chen, T. S., Chang, C. C. and Hwang, M. S. A virtual image cryptosystem based upon vector quantization. IEEE Trans. Image Process., 1998, 7, 1485–1488.
- Droogenbroeck, M. Partial encryption of image for real-time applications. Proc. Fourth IEEE Benelux Signal Processing, 2004, 11–15.
- Cheng, H. and Li, X. Partial encryption of compressed images and videos. IEEE Trans. Signal Process., 2000, 48, 2439–2451.
- Martin, K., Lukac, R. and Plataniotis, K. N. Efficient encryption of wavelet-based coded color images. Pattern Recognition, 2005, 38, 1111–1115.
- Yip, K. W. and Ng, T. S. Partial-encryption technique for intellectual property protection of FPGA-based products. IEEE Trans. Cons. Electr., 2000, 46, 183–190.
- Gersho, A. and Gray, R. M. Vector Quantization and Signal Compression, 1992 (Kluwer Academic, Dordrecht).
- Linde, Y., Buzo, A. and Gray, R. M. An algorithm for vector quantizer design. IEEE Trans. Commun., 1980, 28, 84–95.
- Diffie, W and Hellman, M. E. New directions in cryptography. IEEE Trans. Inform. Theory, 1976, 22, 644–654.
- Petitcolas, F. A., Anderson, R. J. and Kuhn, M. G. Information hiding—a survey. Proc. IEEE, 1999, 87, 1062–1078.