Figure 6From: Assessing JPEG2000 encryption with key-dependent wavelet packetsTheoretical comparison of computational complexity.Back to article page