Secure content sharing for social network using fingerprinting and encryption in the TSH transform domain
暂无分享,去创建一个
[1] Deepa Kundur,et al. Video fingerprinting and encryption principles for digital rights management , 2004, Proceedings of the IEEE.
[2] Alessandro Neri,et al. A commutative digital image watermarking and encryption method in the tree structured Haar transform domain , 2011, Signal Process. Image Commun..
[3] Nasir D. Memon,et al. A buyer-seller watermarking protocol , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).
[4] Jaakko Astola,et al. Tree-Structured Haar Transforms , 2004, Journal of Mathematical Imaging and Vision.
[5] Xiaobo Li,et al. Partial encryption of compressed images and videos , 2000, IEEE Trans. Signal Process..
[6] Kwok-Wo Wong,et al. A chaos-based joint image compression and encryption scheme using DCT and SHA-1 , 2011, Appl. Soft Comput..
[7] Shiguo Lian,et al. Collusion-Traceable Secure Multimedia Distribution Based on Controllable Modulation , 2008, IEEE Transactions on Circuits and Systems for Video Technology.
[8] Peijia Zheng,et al. Implementation of the discrete wavelet transform and multiresolution analysis in the encrypted domain , 2011, ACM Multimedia.