Motivated by the work of Uehara et al., an improved method to recover DC coefficients from AC coefficients of DCT-transformed images is investigated in this work, which finds applications in cryptanalysis of selective multimedia encryption. The proposed under/over-flow rate minimization (FRM) method employs an optimization process to get a statistically more accurate estimation of unknown DC coefficients, thus achieving a better recovery performance. It was shown by experimental results based on 200 test images that the proposed DC recovery method significantly improves the quality of most recovered images in terms of the PSNR values and several state-of-the-art objective image quality assessment (IQA) metrics such as SSIM and MS-SSIM
Multimedia communication in real time requires fast and reliable transmission of large amounts of da...
The expansion of technology has made several simple ways to manipulate the original content. This ha...
A compression-encryption method is described where a unique symmetric key is automatically generated...
Motivated by the work of Uehara et al., an improved method to recover DC coefficients from AC coeffi...
Motivated by the work of Uehara et al. [1], an im-proved method to recover DC coefficients from AC c...
A general method for recovering missing DCT coefficients in DCT-transformed images is presented in t...
A general method for recovering missing DCT coefficients in DCT-transformed images is presented in t...
The advancement of cryptography and cryptanalysis has driven numerous innovations over years. Among ...
When encryption and authentication techniques are applied to image or video data, sometimes it is ad...
Recovering unknown, missing, damaged, distorted or lost information in DCT coefficients is a common ...
We propose a new simple method of DC feature extraction that enables to speed up and decrease storag...
We present a reversible watermarking scheme which achieves perfect restoration of both the embedded ...
We investigate in this paper several possible methods to improve the performance of the bit-shifting...
The advent of digital multimedia and worldwide area networks such as the Internet facilitates effic...
Print ISBN: 978-1-4577-0841-1International audienceThis paper presents an image, then a video, compr...
Multimedia communication in real time requires fast and reliable transmission of large amounts of da...
The expansion of technology has made several simple ways to manipulate the original content. This ha...
A compression-encryption method is described where a unique symmetric key is automatically generated...
Motivated by the work of Uehara et al., an improved method to recover DC coefficients from AC coeffi...
Motivated by the work of Uehara et al. [1], an im-proved method to recover DC coefficients from AC c...
A general method for recovering missing DCT coefficients in DCT-transformed images is presented in t...
A general method for recovering missing DCT coefficients in DCT-transformed images is presented in t...
The advancement of cryptography and cryptanalysis has driven numerous innovations over years. Among ...
When encryption and authentication techniques are applied to image or video data, sometimes it is ad...
Recovering unknown, missing, damaged, distorted or lost information in DCT coefficients is a common ...
We propose a new simple method of DC feature extraction that enables to speed up and decrease storag...
We present a reversible watermarking scheme which achieves perfect restoration of both the embedded ...
We investigate in this paper several possible methods to improve the performance of the bit-shifting...
The advent of digital multimedia and worldwide area networks such as the Internet facilitates effic...
Print ISBN: 978-1-4577-0841-1International audienceThis paper presents an image, then a video, compr...
Multimedia communication in real time requires fast and reliable transmission of large amounts of da...
The expansion of technology has made several simple ways to manipulate the original content. This ha...
A compression-encryption method is described where a unique symmetric key is automatically generated...