Figure 6
From: Assessing JPEG2000 encryption with key-dependent wavelet packets

Theoretical comparison of computational complexity.
From: Assessing JPEG2000 encryption with key-dependent wavelet packets
Theoretical comparison of computational complexity.