Reversible data hiding based on Shamir's secret sharing for color images over cloud
暂无分享,去创建一个
[1] Xinpeng Zhang,et al. Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode , 2016, Inf. Sci..
[2] Nasir D. Memon,et al. A buyer-seller watermarking protocol , 2001, IEEE Trans. Image Process..
[3] Zhenxing Qian,et al. Reversible visible watermark embedded in encrypted domain , 2015, 2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP).
[4] Hai-Dong Yuan,et al. Secret sharing with multi-cover adaptive steganography , 2014, Inf. Sci..
[5] Xingming Sun,et al. Reversible data hiding with contrast enhancement and tamper localization for medical images , 2017, Inf. Sci..
[6] Adi Shamir,et al. How to share a secret , 1979, CACM.
[7] Suneeta Agarwal,et al. A self recoverable dual watermarking scheme for copyright protection and integrity verification , 2017, Multimedia Tools and Applications.
[8] Tung-Shou Chen,et al. An Improved Reversible Data Hiding in Encrypted Images Using Side Match , 2012, IEEE Signal Processing Letters.
[9] Xinpeng Zhang,et al. Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.
[10] Josh Benaloh,et al. Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing , 1986, CRYPTO.
[11] Ching-Nung Yang,et al. Improvements of image sharing with steganography and authentication , 2007, J. Syst. Softw..
[12] Partha Pratim Roy,et al. A multimodal biometric watermarking system for digital images in redundant discrete wavelet transform , 2017, Multimedia Tools and Applications.
[13] Hamidreza Rashidy Kanan,et al. A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm , 2014, Expert Syst. Appl..
[14] Uwe Schwiegelshohn,et al. Towards understanding uncertainty in cloud computing with risks of confidentiality, integrity, and availability , 2016, J. Comput. Sci..
[15] Ying Luo,et al. Privacy protected image denoising with secret shares , 2012, 2012 19th IEEE International Conference on Image Processing.
[16] Kwok-Wo Wong,et al. Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem , 2013, Signal Process. Image Commun..
[17] Shiguo Lian,et al. Commutative Encryption and Watermarking in Video Compression , 2007, IEEE Transactions on Circuits and Systems for Video Technology.
[18] Mohan S. Kankanhalli,et al. Robust Watermarking of Compressed and Encrypted JPEG2000 Images , 2012, IEEE Transactions on Multimedia.
[19] Jianting Guo,et al. Secure watermarking scheme against watermark attacks in the encrypted domain , 2015, J. Vis. Commun. Image Represent..
[20] Balasubramanian Raman,et al. Don't see me, just filter me: towards secure cloud based filtering using Shamir's secret sharing and POB number system , 2016, ICVGIP '16.
[21] Chang-Chou Lin,et al. Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..
[22] Xinpeng Zhang,et al. Separable Reversible Data Hiding in Encrypted Image , 2012, IEEE Transactions on Information Forensics and Security.
[23] Athanasios V. Vasilakos,et al. Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..
[24] Engin Avci,et al. A reversible data hiding algorithm based on probabilistic DNA-XOR secret sharing scheme for color images , 2016, Displays.
[25] Christian Roux,et al. A Joint Encryption/Watermarking System for Verifying the Reliability of Medical Images , 2012, IEEE Transactions on Information Technology in Biomedicine.
[26] Chin-Chen Chang,et al. Sharing secrets in stego images with authentication , 2008, Pattern Recognit..
[27] Suneeta Agarwal,et al. An efficient fragile watermarking scheme with multilevel tamper detection and recovery based on dynamic domain selection , 2015, Multimedia Tools and Applications.
[28] Alessandro Neri,et al. A commutative digital image watermarking and encryption method in the tree structured Haar transform domain , 2011, Signal Process. Image Commun..
[29] Neha Jain,et al. Rough set based effective technique of image watermarking , 2017, J. Comput. Sci..
[30] Manoj Misra,et al. Just process me, without knowing me: a secure encrypted domain processing based on Shamir secret sharing and POB number system , 2017, Multimedia Tools and Applications.
[31] Albert Y. Zomaya,et al. GA-ETI: An enhanced genetic algorithm for the scheduling of scientific workflows in cloud environments , 2016, J. Comput. Sci..
[32] Shang-Juh Kao,et al. A high quality image sharing with steganography and adaptive authentication scheme , 2011, J. Syst. Softw..