Figure 3From: A detailed evaluation of format-compliant encryption methods for JPEG XR-compressed imagesFlow graph for the transforms DCT-II, DST-II, Yeung-I, and Yeung-II used for transform-based encryption[4].Back to article page