1 JOHNSON M , ISHWAR P , PRABHAKARAN V , et al . On compressing encrypted data[J]. IEEE Transactions on Signal Processing, 2004, 52(10): 2992-3006.
2 SCHONBERG D , DRAPER S C , YEO C, et al . Toward compression of encrypted images and video sequences[J]. IEEE Transactions on Information Forensics and Security, 2008, 3(4): 749-762.
3 LAZZERETTI R , BARNI M . Lossless compression of encrypted grey-level and color images[C]// Proceedings of the 16th European Signal Processing Conference. Piscataway: IEEE, 2008: 1-5.
4 KUMAR A A , MAKUR A . Distributed source coding based encryption and lossless compression of gray scale and color images[C]// Proceedings of the IEEE 10th Workshop on Multimedia Signal Processing. Piscataway: IEEE, 2008: 760-764.
5 LIU W , ZENG W , DONG L , et al . Efficient compression of encrypted grayscale images[J]. IEEE Transactions on Image Processing, 2010, 19(4): 1097-1102.
6 ZHOU J , LIU X , AU O C, et al . Designing an efficient image encryption-then-compression system via prediction error clustering and random permutation[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(1): 39-50.
7 WANG C , NI J , ZHANG X , et al . Efficient compression of encrypted binary images using the Markov random field[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(5): 1271-1285.
8 WANG C , FENG Y , LI T , et al . A new encryption-then-compression scheme on gray images using the Markov random field[J]. Computers, Materials, and Continua, 2018, 56(1): 107-121.
9 ZHANG X , REN Y , FENG G , et al . Compressing encrypted image using compressive sensing[C]// Proceedings of the 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Piscataway: IEEE, 2011: 222-225.
10 SONG C , LIN X , SHEN X . Secure and effective image storage for cloud based e-healthcare systems[C]// Proceedings of the 2013 IEEE Global Communications Conference. Piscataway: IEEE, 2013: 653-658.
11 KUMAR A A , MAKUR A . Lossy compression of encrypted image by compressive sensing technique[C]// Proceedings of the 2009 IEEE Region 10 Conference. Piscataway: IEEE, 2009: 1-5.
12 ZHANG X , SUN G , SHEN L , et al . Compression of encrypted images with multi-layer decomposition[J]. Multimedia Tools and Applications, 2014, 72(1): 489-502.
13 ZHANG X , FENG G , REN Y , et al . Scalable coding of encrypted images[J]. IEEE Transactions on Image Processing, 2012, 21(6): 3108-3114.
14 ZHANG X . Lossy compression and iterative reconstruction for encrypted image[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(1): 53-58.
15 WANG C , NI J , HUANG Q . A new encryption-then-compression algorithm using the rate-distortion optimization[J]. Signal Processing: Image Communication, 2015, 39(Pt A): 141-150.
16 WANG C , NI J . Compressing encrypted images using the integer lifting wavelet[C]// Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Piscataway: IEEE, 2015:409-412.
17 WANG C , XIAO D , PENG H , et al . A lossy compression scheme for encrypted images exploiting Cauchy distribution and weighted rate distortion optimization[J]. Journal of Visual Communication and Image Representation, 2018, 51:122-130.
18 QIN C , ZHOU Q , CAO F , et al . Flexible lossy compression for selective encrypted image with image inpainting[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2019, 29(11): 3341-3355.
19 ZHOU J , AU O C, ZHAI G , et al . Scalable compression of stream cipher encrypted images through context-adaptive sampling[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(11): 1857-1868.
20 KANG X , PENG A , XU X , et al . Performing scalable lossy compression on pixel encrypted images[J]. EURASIP Journal on Image and Video Processing, 2013, 2013(1): No.32.
21 HU R , LI X , YANG B . A new lossy compression scheme for encrypted gray-scale images[C]// Proceedings of the 2014 IEEE International Conference on Acoustics, Speech and Signal Processing. Piscataway: IEEE, 2014: 7387-7390.
22 KSCHISCHANG F R , FREY B J , LOELIGER H A . Factor graphs and the sum-product algorithm[J]. IEEE Transactions on Information Theory, 2001, 47(2): 498-519.
23 WOODS J . Two-dimensional discrete Markovian fields[J]. IEEE Transactions on Information Theory, 1972, 18(2): 232-240.
24 LéVY P . A special problem of Brownian motion , and a general theory of Gaussian random functions[C]// Proceedings of the 3rd Berkeley Symposium on Mathematical Statistics and Probability. Oakland, CA: University of California Press, 1956: 133-175.
25 PRESTON C J . Generalized Gibbs states and Markov random fields[J]. Advances in Applied Probability, 1973, 5(2): 242-261.
26 LI S Z . Markov random field models in computer vision[C]// Proceedings of the 1994 European Conference on Computer Vision, LNCS 801. Berlin: Springer, 1994: 361-370.
27 HAMMERSLEY J M , CLIFFORD P . Markov fields on finite graphs and lattices[EB/OL].[2019-06-20].http://www.statslab.cam.ac.uk/~grg/books/hammfest/hamm-cliff.pdf.
28 GALLAGER R . Low-density parity-check codes[J]. IRE Transactions on Information Theory, 1962, 8(1): 21-28.
29 ADAM L . agl/jbig2enc: JBIG2 encoder[EB/OL]. [2019-11-10]. https://github.com/agl/jbig2enc.
30 Artifex Software Inc . Index of /jbig2dec.git[EB/OL]. [2019-12-16] http://git.ghostscript.com/jbig2dec.git/. |