id author title date pages extension mime words sentences flesch summary cache txt work_xqwalikemrez7c2wvqjytenvfq Med Amine Secure High Dynamic Range Images 2016.0 4 .pdf application/pdf 1954 197 59 Secure High Dynamic Range Images Secure High Dynamic Range Images Secure HDR Images from HDR (High Dynamic Range) images. hash function to compute local digital signatures, encryption for compression; integrity verification; encryption; scrambling; inverse service and how to apply its tools, and parts of the image data intrusion in privacy for HDR images. Transform) is proposed to secure HDR images. To detect manipulations to the image data, the integrity applied on the DCT coefficients generating a 160 bits value Example of integrity verification (a) original image, (b) tampered image, (c) digital signature verification For confidentiality, the use case of encryption (Fig. 4) is An example of a whole image or a ROI encryption is technique applied on the quantized DCT coefficients is A reconstructed HDR image is shown in Fig. 8 after verification, encryption and scrambling techniques. Image Compression Standard", IEEE Signal Processing Magazine , vol. ./cache/work_xqwalikemrez7c2wvqjytenvfq.pdf ./txt/work_xqwalikemrez7c2wvqjytenvfq.txt