Separable and Three-Dimensional Optical Reversible Data Hiding with Integral Imaging Cryptosystem
暂无分享,去创建一个
[1] Rajendra Bharti,et al. Lossless and Reversible Data Hiding in Encrypted Images With Public Key Cryptography , 2017, RICE.
[2] Ying Wang,et al. Degradation and encryption for outsourced PNG images in cloud storage , 2016, Int. J. Grid Util. Comput..
[3] J. Sheridan,et al. Roadmap on optical security , 2016 .
[4] Abdullah Alamareen,et al. Image Mosaicing Using Binary Edge Detection Algorithm in a Cloud-Computing Environment , 2016, Int. J. Inf. Technol. Web Eng..
[5] Bahram Javidi,et al. Security authentication with a three-dimensional optical phase code using random forest classifier. , 2016, Journal of the Optical Society of America. A, Optics, image science, and vision.
[6] Bin Ma,et al. Reversible data hiding: Advances in the past two decades , 2016, IEEE Access.
[7] Yiqun Liu,et al. An Improved Security 3D Watermarking Method Using Computational Integral Imaging Cryptosystem , 2016, Int. J. Technol. Hum. Interact..
[8] Ashkan Sami,et al. Extracting Usage Patterns from Power Usage Data of Homes' Appliances in Smart Home using Big Data Platform , 2016, Int. J. Inf. Technol. Web Eng..
[9] Cecilia Rossignoli,et al. Business Intelligence System Design and its Consequences for Knowledge Sharing, Collaboration, and Decision-Making: An Exploratory Study , 2015, Int. J. Technol. Hum. Interact..
[10] Rubem Pereira,et al. Future internet: trends and challenges , 2015, Int. J. Space Based Situated Comput..
[11] P. Venkata Krishna,et al. Collective advancements on access control scheme for multi-authority cloud storage system , 2015, Int. J. Grid Util. Comput..
[12] Yoshihiro Okada,et al. WebGL-based 3D furniture layout system using interactive evolutionary computation and its user evaluations , 2014, Int. J. Space Based Situated Comput..
[13] Fatos Xhafa,et al. Detection of the onset of agitation in patients with dementia: real-time monitoring and the application of big-data solutions , 2013, Int. J. Space Based Situated Comput..
[14] Weiming Zhang,et al. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption , 2013, IEEE Transactions on Information Forensics and Security.
[15] Pla Information. A Secure Image Steganographic Method in Encrypted Domain , 2012 .
[16] Xinpeng Zhang,et al. Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.
[17] Alessandro Neri,et al. A commutative digital image watermarking and encryption method in the tree structured Haar transform domain , 2011, Signal Process. Image Commun..
[18] Fuyan Sun,et al. Cryptographic pseudo-random sequence from the spatial chaotic map , 2009 .
[19] Shiguo Lian,et al. Commutative Encryption and Watermarking in Video Compression , 2007, IEEE Transactions on Circuits and Systems for Video Technology.
[20] Minoru Kuribayashi,et al. Fingerprinting protocol for images based on additive homomorphic property , 2005, IEEE Transactions on Image Processing.
[21] Nasir D. Memon,et al. A buyer-seller watermarking protocol , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).