Secure Image Retrieval Based on Visual Content and Watermarking Protocol
暂无分享,去创建一个
Yi Mu | Jun Zhang | Wanlei Zhou | Lei Ye | Yang Xiang | Y. Mu | Wanlei Zhou | Jun Zhang | Yang Xiang | Lei Ye
[1] Stefan Katzenbeisser,et al. A Buyer–Seller Watermarking Protocol Based on Secure Embedding , 2008, IEEE Transactions on Information Forensics and Security.
[2] Dong Hoon Lee,et al. An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control , 2002, ICISC.
[3] Virgil D. Gligor. A Note on Denial-of-Service in Operating Systems , 1984, IEEE Transactions on Software Engineering.
[4] Chin-Laung Lei,et al. An efficient and anonymous buyer-seller watermarking protocol , 2004, IEEE Transactions on Image Processing.
[5] Minoru Kuribayashi,et al. Fingerprinting protocol for images based on additive homomorphic property , 2005, IEEE Transactions on Image Processing.
[6] Sherif Hazem Nour El-Din,et al. An Effective and Secure Buyer-Seller Watermarking Protocol , 2007 .
[7] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[8] Jongsung Kim,et al. Analysis of a Buyer–Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents , 2011, Wirel. Pers. Commun..
[9] Kotagiri Ramamohanarao,et al. Survey of network-based defense mechanisms countering the DoS and DDoS problems , 2007, CSUR.
[10] James Ze Wang,et al. SIMPLIcity: Semantics-Sensitive Integrated Matching for Picture LIbraries , 2000, IEEE Trans. Pattern Anal. Mach. Intell..
[11] Xuelong Li,et al. Watermarking in secure image retrieval , 2003, Pattern Recognit. Lett..
[12] Mohan S. Kankanhalli,et al. Joint Watermarking Scheme for Multiparty Multilevel DRM Architecture , 2009, IEEE Transactions on Information Forensics and Security.
[13] Franco Frattolillo,et al. Watermarking Protocol for Web Context , 2007, IEEE Transactions on Information Forensics and Security.
[14] Vishal Monga,et al. Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs , 2006, IEEE Transactions on Image Processing.
[15] Bart Preneel,et al. On Secure and Anonymous Buyer-Seller Watermarking Protocol , 2008, 2008 Third International Conference on Internet and Web Applications and Services.
[16] Rajkumar Buyya,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .
[17] Minyi Guo,et al. Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks , 2009, IEEE Transactions on Parallel and Distributed Systems.
[18] Marcel Worring,et al. Content-Based Image Retrieval at the End of the Early Years , 2000, IEEE Trans. Pattern Anal. Mach. Intell..
[19] Jun Zhang,et al. Watermarking protocol of secure verification , 2007, J. Electronic Imaging.
[20] Thierry Pun,et al. Performance evaluation in content-based image retrieval: overview and proposals , 2001, Pattern Recognit. Lett..
[21] Caroline Fontaine,et al. A Survey of Homomorphic Encryption for Nonspecialists , 2007, EURASIP J. Inf. Secur..
[22] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[23] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[24] Angelos D. Keromytis,et al. Using graphic turing tests to counter automated DDoS attacks against web servers , 2003, CCS '03.
[25] Jun Zhang,et al. Watermarking protocol for protecting user's right in content based image retrieval , 2009, 2009 IEEE International Conference on Multimedia and Expo.
[26] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[27] B. S. Manjunath,et al. Color and texture descriptors , 2001, IEEE Trans. Circuits Syst. Video Technol..
[28] David A. Forsyth,et al. Finding Naked People , 1996, ECCV.
[29] Kouichi Sakurai,et al. Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party , 2003, ACNS.
[30] Antoine Geissbühler,et al. A Review of Content{Based Image Retrieval Systems in Medical Applications { Clinical Bene(cid:12)ts and Future Directions , 2022 .
[31] James Ze Wang,et al. Image retrieval: Ideas, influences, and trends of the new age , 2008, CSUR.
[32] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[33] Jun Zhang,et al. Secure buyer-seller watermarking protocol , 2006 .
[34] Nasir D. Memon,et al. A buyer-seller watermarking protocol , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).
[35] Shih-Fu Chang,et al. A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[36] Klara Nahrstedt,et al. Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights , 1998, J. Vis. Commun. Image Represent..