JPEG encryption for image rescaling in the encrypted domain
暂无分享,去创建一个
[1] Zhenxing Qian,et al. Scalable Coding of Encrypted Images , 2012, IEEE Trans. Image Process..
[2] Tung-Shou Chen,et al. An Improved Reversible Data Hiding in Encrypted Images Using Side Match , 2012, IEEE Signal Processing Letters.
[3] Xuelong Li,et al. A local Tchebichef moments-based robust image watermarking , 2009, Signal Process..
[4] Xinpeng Zhang,et al. Separable Reversible Data Hiding in Encrypted Image , 2012, IEEE Transactions on Information Forensics and Security.
[5] Wenjun Zeng,et al. Efficient Compression of Encrypted Grayscale Images , 2010, IEEE Transactions on Image Processing.
[6] Neri Merhav,et al. Fast algorithms for DCT-domain image downsampling and for inverse motion compensation , 1997, IEEE Trans. Circuits Syst. Video Technol..
[7] Mauro Barni,et al. Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation , 2013, IEEE Signal Processing Magazine.
[8] Stefan Katzenbeisser,et al. Inspiring New Research in the Field of Signal Processing in the Encrypted Domain [From the Guest Editors] , 2013, IEEE Signal Process. Mag..
[9] Nasir D. Memon,et al. A buyer-seller watermarking protocol , 2001, IEEE Trans. Image Process..
[10] Xinpeng Zhang,et al. Lossy Compression and Iterative Reconstruction for Encrypted Image , 2011, IEEE Transactions on Information Forensics and Security.
[11] Xinpeng Zhang,et al. Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.
[12] Vinod M. Prabhakaran,et al. On compressing encrypted data , 2004, IEEE Transactions on Signal Processing.
[13] Zhenxing Qian,et al. Reversible Data Hiding in Encrypted JPEG Bitstream , 2014, IEEE Transactions on Multimedia.
[14] Gerald Schaefer,et al. UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.
[15] Xuelong Li,et al. Geometric Distortion Insensitive Image Watermarking in Affine Covariant Regions , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[16] Stefan Katzenbeisser,et al. Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing , 2007, EURASIP J. Inf. Secur..
[17] Weiming Zhang,et al. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption , 2013, IEEE Transactions on Information Forensics and Security.
[18] H. Vincent Poor,et al. The Role of Signal Processing in Meeting Privacy Challenges: An Overview , 2013, IEEE Signal Processing Magazine.
[19] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[20] Alessandro Piva,et al. An efficient buyer-seller watermarking protocol based on composite signal representation , 2009, MM&Sec '09.