Controllable high-capacity separable data hiding in encrypted images by compressive sensing and data pretreatment
暂无分享,去创建一个
Yong Wang | Di Xiao | Mengdi Wang | Juan Zhao
[1] Yu Zheng,et al. Urban Water Quality Prediction Based on Multi-Task Multi-View Learning , 2016, IJCAI.
[2] Hsiang-Cheh Huang,et al. Robust Image Watermarking Based on Compressed Sensing Techniques , 2014, J. Inf. Hiding Multim. Signal Process..
[3] Zhen Guo,et al. A Robust Watermarking Algorithm for Medical Images in the Encrypted Domain , 2016, ICSH.
[4] Xinpeng Zhang,et al. Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.
[5] Luming Zhang,et al. Action2Activity: Recognizing Complex Activities from Sensor Data , 2015, IJCAI.
[6] Luming Zhang,et al. Fortune Teller: Predicting Your Career Path , 2016, AAAI.
[7] Shi-Jinn Horng,et al. Anti-forensic steganography using multi-bit MER with flexible bit location , 2015, Int. J. Ad Hoc Ubiquitous Comput..
[8] Vinay Kumar Srivastava,et al. A fast watermarking algorithm with enhanced security using compressive sensing and principle components and its performance analysis against a set of standard attacks , 2017, Multimedia Tools and Applications.
[9] Sen Bai,et al. High-capacity separable data hiding in encrypted image based on compressive sensing , 2016, Multimedia Tools and Applications.
[10] Li Liu,et al. Recognizing Complex Activities by a Probabilistic Interval-Based Model , 2016, AAAI.
[11] Asha Rani,et al. An image copyright protection scheme by encrypting secret data with the host image , 2014, Multimedia Tools and Applications.
[12] R.G. Baraniuk,et al. Compressive Sensing [Lecture Notes] , 2007, IEEE Signal Processing Magazine.
[13] Mohan S. Kankanhalli,et al. Compressed-encrypted domain JPEG2000 image watermarking , 2010, 2010 IEEE International Conference on Multimedia and Expo.
[14] Nouf A. Al-Otaibi,et al. 2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers , 2014 .
[15] Adnan Abdul-Aziz Gutub,et al. Pixel Indicator Technique for RGB Image Steganography , 2010 .
[16] Hongbin Zha,et al. Tracking Generic Human Motion via Fusion of Low- and High-Dimensional Approaches , 2013, IEEE Trans. Syst. Man Cybern. Syst..
[17] Jing Xu,et al. Dynamic weighted discrimination power analysis in DCT domain for face and palmprint recognition , 2010, 2010 International Conference on Information and Communication Technology Convergence (ICTC).
[18] Wei Li,et al. Data Hiding Based on Subsampling and Compressive Sensing , 2013, 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[19] Andrew Beng Jin Teoh,et al. Analysis of correlation of 2DPalmHash Code and orientation range suitable for transposition , 2014, Neurocomputing.
[20] Saudi Arabia,et al. Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority , 2014 .
[21] A. Gutub,et al. Vibrant Color Image Steganography using Channel Differences and Secret Data Distribution , 2010 .
[22] Di Xiao,et al. Separable data hiding in encrypted image based on compressive sensing , 2014 .
[23] K. P. Soman,et al. A robust watermarking method based on Compressed Sensing and Arnold scrambling , 2012, 2012 International Conference on Machine Vision and Image Processing (MVIP).
[24] David S. Rosenblum,et al. From action to activity: Sensor-based activity recognition , 2016, Neurocomputing.
[25] Trac D. Tran,et al. Fast and Efficient Compressive Sensing Using Structurally Random Matrices , 2011, IEEE Transactions on Signal Processing.
[26] Li Liang. Digital image watermark algorithm based on compressive sensing , 2012 .
[27] Tung-Shou Chen,et al. An Improved Reversible Data Hiding in Encrypted Images Using Side Match , 2012, IEEE Signal Processing Letters.
[28] Emmanuel J. Candès,et al. Near-Optimal Signal Recovery From Random Projections: Universal Encoding Strategies? , 2004, IEEE Transactions on Information Theory.
[29] Ching-Nung Yang,et al. Lossless data hiding for absolute moment block truncation coding using histogram modification , 2016, Journal of Real-Time Image Processing.
[30] Farhan Khan,et al. Message Concealment Techniques using Image based Steganography , 2007 .
[31] Mário A. T. Figueiredo,et al. Gradient Projection for Sparse Reconstruction: Application to Compressed Sensing and Other Inverse Problems , 2007, IEEE Journal of Selected Topics in Signal Processing.
[32] Marc Chaumont,et al. A reversible data hiding method for encrypted images , 2008, Electronic Imaging.
[33] E.J. Candes,et al. An Introduction To Compressive Sampling , 2008, IEEE Signal Processing Magazine.
[34] Muhammad Khurram Khan,et al. Dynamic weighted discrimination power analysis: A novel approach for face and palmprint recognition in DCT domain , 2010 .
[35] Emmanuel J. Candès,et al. Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information , 2004, IEEE Transactions on Information Theory.
[36] Muhammad Irshad Nazeer,et al. An Efficient Data Hiding Technique in Frequency domain by using Fresnelet Basis , 2012 .