Separable and Three-Dimensional Optical Reversible Data Hiding with Integral Imaging Cryptosystem

[1]  Rajendra Bharti,et al.  Lossless and Reversible Data Hiding in Encrypted Images With Public Key Cryptography , 2017, RICE.

[2]  Ying Wang,et al.  Degradation and encryption for outsourced PNG images in cloud storage , 2016, Int. J. Grid Util. Comput..

[3]  J. Sheridan,et al.  Roadmap on optical security , 2016 .

[4]  Abdullah Alamareen,et al.  Image Mosaicing Using Binary Edge Detection Algorithm in a Cloud-Computing Environment , 2016, Int. J. Inf. Technol. Web Eng..

[5]  Bahram Javidi,et al.  Security authentication with a three-dimensional optical phase code using random forest classifier. , 2016, Journal of the Optical Society of America. A, Optics, image science, and vision.

[6]  Bin Ma,et al.  Reversible data hiding: Advances in the past two decades , 2016, IEEE Access.

[7]  Yiqun Liu,et al.  An Improved Security 3D Watermarking Method Using Computational Integral Imaging Cryptosystem , 2016, Int. J. Technol. Hum. Interact..

[8]  Ashkan Sami,et al.  Extracting Usage Patterns from Power Usage Data of Homes' Appliances in Smart Home using Big Data Platform , 2016, Int. J. Inf. Technol. Web Eng..

[9]  Cecilia Rossignoli,et al.  Business Intelligence System Design and its Consequences for Knowledge Sharing, Collaboration, and Decision-Making: An Exploratory Study , 2015, Int. J. Technol. Hum. Interact..

[10]  Rubem Pereira,et al.  Future internet: trends and challenges , 2015, Int. J. Space Based Situated Comput..

[11]  P. Venkata Krishna,et al.  Collective advancements on access control scheme for multi-authority cloud storage system , 2015, Int. J. Grid Util. Comput..

[12]  Yoshihiro Okada,et al.  WebGL-based 3D furniture layout system using interactive evolutionary computation and its user evaluations , 2014, Int. J. Space Based Situated Comput..

[13]  Fatos Xhafa,et al.  Detection of the onset of agitation in patients with dementia: real-time monitoring and the application of big-data solutions , 2013, Int. J. Space Based Situated Comput..

[14]  Weiming Zhang,et al.  Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption , 2013, IEEE Transactions on Information Forensics and Security.

[15]  Pla Information A Secure Image Steganographic Method in Encrypted Domain , 2012 .

[16]  Xinpeng Zhang,et al.  Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.

[17]  Alessandro Neri,et al.  A commutative digital image watermarking and encryption method in the tree structured Haar transform domain , 2011, Signal Process. Image Commun..

[18]  Fuyan Sun,et al.  Cryptographic pseudo-random sequence from the spatial chaotic map , 2009 .

[19]  Shiguo Lian,et al.  Commutative Encryption and Watermarking in Video Compression , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[20]  Minoru Kuribayashi,et al.  Fingerprinting protocol for images based on additive homomorphic property , 2005, IEEE Transactions on Image Processing.

[21]  Nasir D. Memon,et al.  A buyer-seller watermarking protocol , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).