Secure Social Multimedia Big Data Sharing Using Scalable JFE in the TSHWT Domain
暂无分享,去创建一个
Zenggang Xiong | Hefei Ling | Conghuan Ye | Fang Xu | Fuhao Zou | Cong Liu | Z. Xiong | Conghuan Ye | H. Ling | F. Zou | Cong Liu | Fang Xu
[1] Md Anwar Hussain,et al. Coded Fingerprinting Based Watermarking to Resist Collusion Attacks and Trace Colluders , 2010, 2010 International Conference on Advances in Computer Engineering.
[2] Peijia Zheng,et al. Implementation of the discrete wavelet transform and multiresolution analysis in the encrypted domain , 2011, ACM Multimedia.
[3] Zenggang Xiong,et al. A Novel JFE Scheme for Social Multimedia Distribution in Compressed Domain Using SVD and CA , 2012, IWDW.
[4] K. J. Ray Liu,et al. Bandwidth efficient fingerprint multicast for video streaming , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[5] Stefan Katzenbeisser,et al. Tardos fingerprinting codes in the combined digit model , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).
[6] Nasir D. Memon,et al. A buyer-seller watermarking protocol , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).
[7] Hefei Ling,et al. A collusion attack optimization framework toward spread-spectrum fingerprinting , 2013, Appl. Soft Comput..
[8] Hsiang-Cheh Huang,et al. Genetic fingerprinting for copyright protection of multicast media , 2009, Soft Comput..
[9] Jaakko Astola,et al. Tree-Structured Haar Transforms , 2004, Journal of Mathematical Imaging and Vision.
[10] Peijia Zheng,et al. An efficient image homomorphic encryption scheme with small ciphertext expansion , 2013, ACM Multimedia.
[11] Xiaohui Liang,et al. Exploiting multimedia services in mobile social networks from security and privacy perspectives , 2014, IEEE Communications Magazine.
[12] Zenggang Xiong,et al. Secure Multimedia Big Data Sharing in Social Networks Using Fingerprinting and Encryption in the JPEG2000 Compressed Domain , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.
[13] Alessandro Neri,et al. A commutative digital image watermarking and encryption method in the tree structured Haar transform domain , 2011, Signal Process. Image Commun..
[14] Zenggang Xiong,et al. Joint fingerprinting and encryption in hybrid domains for multimedia sharing in social networks , 2014, J. Vis. Lang. Comput..
[15] Mauro Barni,et al. On the Implementation of the Discrete Fourier Transform in the Encrypted Domain , 2009, IEEE Transactions on Information Forensics and Security.
[16] Hefei Ling,et al. Secure content sharing for social network using fingerprinting and encryption in the TSH transform domain , 2012, ACM Multimedia.
[17] Hefei Ling,et al. A new fingerprinting scheme using social network analysis for majority attack , 2013, Telecommunication Systems.
[18] Zenggang Xiong,et al. Joint Fingerprinting and Encryption for JPEG Images Sharing in Mobile Social Network , 2015, DMS.
[19] Hefei Ling,et al. A collusion attack optimization strategy for digital fingerprinting , 2012, TOMCCAP.
[20] Tarek Elgamal,et al. Cloud-Based Multimedia Content Protection System , 2015, IEEE Transactions on Multimedia.
[21] Gouenou Coatrieux,et al. A joint encryption/watermarking algorithm for verifying the reliability of medical images: Application to echographic images , 2012, Comput. Methods Programs Biomed..
[22] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[23] Shiguo Lian,et al. Collusion-Traceable Secure Multimedia Distribution Based on Controllable Modulation , 2008, IEEE Transactions on Circuits and Systems for Video Technology.
[24] Dasara Shullani,et al. Anticollusion solutions for asymmetric fingerprinting protocols based on client side embedding , 2015, EURASIP J. Inf. Secur..
[25] Zenggang Xiong,et al. Traceable Content Distribution Using Wavelet Decomposition and Social Network Analysis , 2012, 2012 International Symposium on Computer, Consumer and Control.
[26] Samrat L. Sabat,et al. A fast chaotic block cipher for image encryption , 2014, Commun. Nonlinear Sci. Numer. Simul..
[27] Kwok-Wo Wong,et al. A chaos-based joint image compression and encryption scheme using DCT and SHA-1 , 2011, Appl. Soft Comput..
[28] Gennian Ge,et al. New Bounds on Separable Codes for Multimedia Fingerprinting , 2014, IEEE Transactions on Information Theory.
[29] Xiaobo Li,et al. Partial encryption of compressed images and videos , 2000, IEEE Trans. Signal Process..
[30] H. Mori,et al. Analytic study of chaos of the tent map: Band structures, power spectra, and critical behaviors , 1983 .
[31] Hongjun Liu,et al. Color image encryption based on one-time keys and robust chaotic maps , 2010, Comput. Math. Appl..
[32] Z. Guan,et al. Chaos-based image encryption algorithm ✩ , 2005 .
[33] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[34] Xiangjun Wu,et al. A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps , 2015, Appl. Soft Comput..
[35] Hefei Ling,et al. Kernelized Neighborhood Preserving Hashing for Social-Network-Oriented Digital Fingerprints , 2014, IEEE Transactions on Information Forensics and Security.
[36] Deepa Kundur,et al. Video fingerprinting and encryption principles for digital rights management , 2004, Proceedings of the IEEE.