Perceptual Visual Security Index Based on Edge and Texture Similarities
暂无分享,去创建一个
[1] Andreas Uhl,et al. Selective encryption of the MC-EZBC bitstream and residual information , 2010, 2010 18th European Signal Processing Conference.
[2] C. Chui,et al. A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .
[3] Weisi Lin,et al. Image Quality Assessment Based on Gradient Similarity , 2012, IEEE Transactions on Image Processing.
[4] Alan C. Bovik,et al. A Statistical Evaluation of Recent Full Reference Image Quality Assessment Algorithms , 2006, IEEE Transactions on Image Processing.
[5] Enrico Magli,et al. Multimedia Selective Encryption by Means of Randomized Arithmetic Coding , 2006, IEEE Transactions on Multimedia.
[6] Xiaojun Tong,et al. Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator , 2009, Signal Process..
[7] Alan C. Bovik,et al. Image information and visual quality , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[8] Min Wu,et al. A joint signal processing and cryptographic approach to multimedia encryption , 2006, IEEE Transactions on Image Processing.
[9] Wenjun Zeng,et al. Efficient frequency domain selective scrambling of digital video , 2003, IEEE Trans. Multim..
[10] Andreas Uhl,et al. Selective encryption of the MC EZBC bitstream for DRM scenarios , 2009, MM&Sec '09.
[11] Zhu Liu,et al. Multimedia content analysis-using both audio and visual clues , 2000, IEEE Signal Process. Mag..
[12] Sheila S. Hemami,et al. THE ROLE OF EDGE INFORMATION TO ESTIMATE THE PERCEIVED UTILITY OF NATURAL IMAGES , 2009 .
[13] Lei Zhang,et al. Gradient Magnitude Similarity Deviation: A Highly Efficient Perceptual Image Quality Index , 2013, IEEE Transactions on Image Processing.
[14] J. Fridrich. Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .
[15] Xinpeng Zhang,et al. Separable Reversible Data Hiding in Encrypted Image , 2012, IEEE Transactions on Information Forensics and Security.
[16] Jieying Zhu,et al. Image Quality Assessment by Visual Gradient Similarity , 2012, IEEE Transactions on Image Processing.
[17] C.-C. Jay Kuo,et al. Design of integrated multimedia compression and encryption systems , 2005, IEEE Transactions on Multimedia.
[18] Leen-Kiat Soh,et al. Texture analysis of SAR sea ice imagery using gray level co-occurrence matrices , 1999, IEEE Trans. Geosci. Remote. Sens..
[19] Nariman Farvardin,et al. A perceptually motivated three-component image model-Part I: description of the model , 1995, IEEE Trans. Image Process..
[20] Mihir Bellare,et al. Lecture Notes on Cryptography , 2001 .
[21] Mahmood Fathy,et al. A classified and comparative study of edge detection algorithms , 2002, Proceedings. International Conference on Information Technology: Coding and Computing.
[22] Weiming Ke,et al. Probability, Statistics, and Reliability for Engineers and Scientists , 2008, Technometrics.
[23] Robert M. Haralick,et al. Textural Features for Image Classification , 1973, IEEE Trans. Syst. Man Cybern..
[24] Yuan Yan Tang,et al. Scalable Compression of Stream Cipher Encrypted Images Through Context-Adaptive Sampling , 2014, IEEE Transactions on Information Forensics and Security.
[25] David M. Rouse,et al. Estimating the usefulness of distorted natural images using an image contour degradation measure. , 2011, Journal of the Optical Society of America. A, Optics, image science, and vision.
[26] Moncef Gabbouj,et al. Perceptual Encryption of H.264 Videos: Embedding Sign-Flips Into the Integer-Based Transforms , 2014, IEEE Transactions on Information Forensics and Security.
[27] Xiaobo Li,et al. Partial encryption of compressed images and videos , 2000, IEEE Trans. Signal Process..
[28] Andreas Uhl,et al. Visual quality indices and lowquality images , 2010, 2010 2nd European Workshop on Visual Information Processing (EUVIP).
[29] Sheila S. Hemami,et al. Natural image utility assessment using image contours , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).
[30] Sheila S. Hemami,et al. VSNR: A Wavelet-Based Visual Signal-to-Noise Ratio for Natural Images , 2007, IEEE Transactions on Image Processing.
[31] Heinz Hofbauer. Visual evaluation, scaling and transport of secure videos , 2013 .
[32] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[33] Shiguo Lian,et al. Secure advanced video coding based on selective encryption algorithms , 2006, IEEE Trans. Consumer Electron..
[34] Yongdong Zhang,et al. Visual security evaluation for video encryption , 2010, ACM Multimedia.
[35] Min Wu,et al. Security evaluation for communication-friendly encryption of multimedia , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..