Image error concealment and quality access control based on data hiding and cryptography
暂无分享,去创建一个
[1] Touradj Ebrahimi,et al. Christopoulos: Thc Jpeg2000 Still Image Coding System: an Overview the Jpeg2000 Still Image Coding System: an Overview , 2022 .
[2] Yong Huang,et al. Texture decomposition by harmonics extraction from higher order statistics , 2004, IEEE Trans. Image Process..
[3] Uday B. Desai,et al. Projection Onto Convex Sets with Watermarking for Error Concealment , 2007, PReMI.
[4] Santi P. Maity,et al. A High Capacity CI/MC-CDMA System for Reduction in PAPR , 2009, 2009 Seventh Annual Communication Networks and Services Research Conference.
[5] Masaaki Fujiyoshi,et al. Generalized hierarchical encryption of JPEG 2000 codestreams for access control , 2005, IEEE International Conference on Image Processing 2005.
[6] Robert M. Gray,et al. Subband-coded image reconstruction for lossy packet networks , 1997, IEEE Trans. Image Process..
[7] Hsiang-Cheh Huang,et al. Layered Access Control Schemes on Watermarked Scalable Media , 2007, J. VLSI Signal Process..
[8] Zhou Wang,et al. Image Quality Assessment: From Error Measurement to Structural Similarity , 2004 .
[9] Ee-Chien Chang,et al. Edge directed filter based error concealment for wavelet-based images , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[10] Mauro Barni,et al. Improved wavelet-based watermarking through pixel-wise masking , 2001, IEEE Trans. Image Process..
[11] M. Budagavi,et al. Unequal error protection of MPEG-4 compressed video , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).
[12] Zhang Rongfu,et al. Content-adaptive spatial error concealment for video communication , 2004 .
[13] Fatih Alagöz,et al. A novel error concealment method for images using watermarking in error-prone channels , 2005, 2005 IEEE 16th International Symposium on Personal, Indoor and Mobile Radio Communications.
[14] Huifang Sun,et al. Concealment of damaged block transform coded images using projections onto convex sets , 1995, IEEE Trans. Image Process..
[15] Ming-Chieh Chi,et al. Recursive block-matching principle for error concealment algorithm , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..
[16] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[17] Yanda Li,et al. Error Concealment for Digital Images Using Data Hiding , 2000 .
[18] Jiang-Lung Liu,et al. Efficient selective encryption for JPEG 2000 images using private initial table , 2006, Pattern Recognit..
[19] Yan Zhao,et al. Spatial Error Concealment Using Directional Extrapolation , 2005, Digital Image Computing: Techniques and Applications (DICTA'05).
[20] Amit Phadikar,et al. Quality access control of compressed color images using data hiding , 2010 .
[21] Li Chuanmu,et al. A New Image Encryption Scheme based on Hyperchaotic Sequences , 2007, 2007 International Workshop on Anti-Counterfeiting, Security and Identification (ASID).
[22] Michael T. Orchard,et al. Novel sequential error-concealment techniques using orientation adaptive interpolation , 2001, IEEE Trans. Circuits Syst. Video Technol..
[23] Aggelos K. Katsaggelos,et al. Error resilient video coding techniques , 2000, IEEE Signal Process. Mag..
[24] Amit Phadikar,et al. Image Error Concealment Based On Data Hiding Using Dual-Tree Complex Wavelets , 2009, Indian International Conference on Artificial Intelligence.
[25] Amit Phadikar,et al. M-ary QIM Data Hiding for Error Concealment of Digital Image in JPEG Pipeline , 2009, 2009 International Conference on Advances in Computing, Control, and Telecommunication Technologies.
[26] Mylène C. Q. Farias,et al. Error control and concealment for video transmission using data hiding , 2002, The 5th International Symposium on Wireless Personal Multimedia Communications.
[27] Touradj Ebrahimi,et al. Authentication and access control in the JPEG 2000 compressed domain , 2001, Optics + Photonics.
[28] Laurence B. Milstein,et al. Performance of successive interference cancellation in convolutionally coded multicarrier DS/CDMA systems , 2001, IEEE Trans. Commun..
[29] P. Nasiopoulos,et al. A Novel Blind Video Watermarking Scheme for Access Control Using Complex Wavelets , 2007, 2007 Digest of Technical Papers International Conference on Consumer Electronics.
[30] I. Daubechies,et al. Wavelet Transforms That Map Integers to Integers , 1998 .
[31] Ranjan Bose,et al. Information theory, coding and cryptography , 2003 .
[32] Xuanqin Mou,et al. Chaotic encryption scheme for real-time digital video , 2002, IS&T/SPIE Electronic Imaging.
[33] Jue Wang,et al. A region and data hiding based error concealment scheme for images , 2001, IEEE Trans. Consumer Electron..