Securing color information of an image by concealing the color palette
暂无分享,去创建一个
[1] Michael Gervautz,et al. A simple method for color quantization: octree quantization , 1990 .
[2] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[3] C. Fontaine,et al. Watermarking security: theory and practice , 2005, IEEE Transactions on Signal Processing.
[4] Wen-Hsiang Tsai,et al. Adaptive data hiding in palette images by color ordering and mapping with security protection , 2004, IEEE Transactions on Communications.
[5] Karen M. Braun,et al. Color to gray and back: color embedding into textured gray images , 2005, IEEE Transactions on Image Processing.
[6] Armando J. Pinho,et al. A survey on palette reordering methods for improving the compression of color-indexed images , 2004, IEEE Transactions on Image Processing.
[7] Andreas Uhl,et al. Confidential storage and transmission of medical image data , 2003, Comput. Biol. Medicine.
[8] Tu-Thach Quach,et al. Locatability of modified pixels in steganographic images , 2012, Other Conferences.
[9] Ricardo L. de Queiroz,et al. Reversible color-to-gray mapping using subband domain texturization , 2010, Pattern Recognit. Lett..
[10] Ioannis Pitas,et al. Robust image watermarking in the spatial domain , 1998, Signal Process..
[11] Andreas Uhl,et al. Image And Video Encryption: From Digital Rights Management To Secured Personal Communication (Advances in Information Security) , 2004 .
[12] Stefan Katzenbeisser,et al. Secure Watermark Embedding Through Partial Encryption , 2006, IWDW.
[13] Andreas Uhl,et al. Image and Video Encryption - From Digital Rights Management to Secured Personal Communication , 2005, Advances in Information Security.
[14] Kuo-Liang Chung,et al. Large encrypting binary images with higher security , 1998, Pattern Recognit. Lett..
[15] Alessandro Neri,et al. Compressive Data Hiding: An Unconventional Approach for Improved Color Image Coding , 2002, EURASIP J. Adv. Signal Process..
[16] Andreas Thiel,et al. A JAVA-based DICOM server with integration of clinical findings and DICOM-conform data encryption , 2001, Int. J. Medical Informatics.
[17] Shiguo Lian,et al. Commutative watermarking and encryption for media data , 2006 .
[18] Sebastiano Battiato,et al. Self Organizing Motor Maps for Color-Mapped Image Re-Indexing , 2007, IEEE Transactions on Image Processing.
[19] Jessica J. Fridrich,et al. Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.
[20] Mei-Yi Wu,et al. An iterative method of palette-based image steganography , 2004, Pattern Recognit. Lett..
[21] Edward J. Delp,et al. An overview of multimedia content protection in consumer electronics devices , 2001, Signal Process. Image Commun..
[22] Frank Y. Shih,et al. Combinational image watermarking in the spatial and frequency domains , 2003, Pattern Recognit..
[23] Marc Chaumont,et al. A reversible data hiding method for encrypted images , 2008, Electronic Imaging.
[24] Jessica Fridrich,et al. Steganography in Digital Media: References , 2009 .
[25] Amine Nait-Ali,et al. Compression of Biomedical Images and Signals , 2008 .
[26] Deepa Kundur,et al. Dual domain watermarking for authentication and compression of cultural heritage images , 2004, IEEE Transactions on Image Processing.
[27] Marc Chaumont,et al. A Color Image Hidden in a Grey-Level Image , 2006, CGIV.
[28] Wen-Hsiang Tsai,et al. Adaptive data hiding in palette images by color ordering and mapping with security protection , 2004, IEEE Trans. Commun..
[29] Marc Chaumont,et al. Attack by colorization of a grey-level image hiding its color palette , 2008, 2008 IEEE International Conference on Multimedia and Expo.
[30] Vito Cappellini,et al. Opportunities and issues of image processing for cultural heritage applications , 2006, 2006 14th European Signal Processing Conference.
[31] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[32] Takahiko Horiuchi,et al. Accurate reversible color-to-gray mapping algorithm without distortion conditions , 2010, Pattern Recognit. Lett..
[33] J. C. Dunn,et al. A Fuzzy Relative of the ISODATA Process and Its Use in Detecting Compact Well-Separated Clusters , 1973 .
[34] Marc Chaumont,et al. A fast and efficient method to protect color images , 2007, Electronic Imaging.
[35] Nasir D. Memon,et al. On ordering color maps for lossless predictive coding , 1996, IEEE Trans. Image Process..
[36] Jessica J. Fridrich,et al. Steganalysis of JPEG images using rich models , 2012, Other Conferences.
[37] Geoffrey H. Ball,et al. ISODATA, A NOVEL METHOD OF DATA ANALYSIS AND PATTERN CLASSIFICATION , 1965 .
[38] Roberto Castagno,et al. Estimation of image feature reliability for an interactive video segmentation scheme , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[39] Chang-Hwan Son,et al. Color Embedding and Recovery Based on Wavelet Packet Transform , 2008 .
[40] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[41] Aloka Sinha,et al. A technique for image encryption using digital signature , 2003 .
[42] Xiaowei Xu,et al. A hybrid scheme for encryption and watermarking , 2004, IS&T/SPIE Electronic Imaging.
[43] Chin-Chen Chang,et al. A new encryption algorithm for image cryptosystems , 2001, J. Syst. Softw..