Figure 5From: Assessing JPEG2000 encryption with key-dependent wavelet packetsComparison with an optimized implementation.Back to article page