A Hybrid Cryptographic and Digital Watermarking Technique for Securing Digital Images based on a Generated Symmetric Key
暂无分享,去创建一个
Laurent Nana | Quist-Aphetsi Kester | Nii Narku Quaynor | Anca Christine Pascu | Sophie Gire | Jojo M. Eghan
[1] Manoj Kumar,et al. Robust Digital Video Watermarking using Reversible Data Hiding and Visual Cryptography , 2013, 24th IET Irish Signals and Systems Conference (ISSC 2013).
[2] R. Latif,et al. Secure transmission of medical images by watermarking technique , 2012, 2012 IEEE International Conference on Complex Systems (ICCS).
[3] Saadeh Sweidan,et al. Hardware Design and Implementation of ElGamal Public-Key Cryptography Algorithm , 2010, Inf. Secur. J. A Glob. Perspect..
[4] Bin Wang,et al. On the fast algebraic immunity of even-variable rotation symmetric Boolean functions , 2012, 2012 14th International Conference on Advanced Communication Technology (ICACT).
[5] Chip Elliott,et al. Quantum cryptography in practice , 2003, SIGCOMM '03.
[6] Song Y. Yan. Computational Number Theory and Modern Cryptography , 2012 .
[7] Rajendra K. Sharma,et al. Identity-Based Cryptography Techniques and Applications (A Review) , 2013, 2013 5th International Conference on Computational Intelligence and Communication Networks.
[8] Abolfazl Falahati,et al. A secure variant of the Hill Cipher , 2009, 2009 IEEE Symposium on Computers and Communications.
[9] Xinxin Niu,et al. A Robust Digital Watermarking Scheme and Its Application in Certificate Verification , 2009, 2009 International Conference on Measuring Technology and Mechatronics Automation.
[10] Pei-Yu Lin,et al. Analyze the Digital Watermarking Security Demands for the Facebook Website , 2012, 2012 Sixth International Conference on Genetic and Evolutionary Computing.
[11] Bo Zhang,et al. DWTC: A Dual Watermarking Scheme Based on Threshold Cryptography for Web Document , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).
[12] H. Nyeem,et al. On the robustness and security of digital image watermarking , 2012, 2012 International Conference on Informatics, Electronics & Vision (ICIEV).
[13] B. Padhmavathi,et al. An effective blind watermarking scheme for protecting rightful ownership of digital images , 2009, TENCON 2009 - 2009 IEEE Region 10 Conference.
[14] Jonathan Bishop,et al. Representations of 'trolls' in mass media communication: a review of media-texts and moral panics relating to 'internet trolling' , 2014, Int. J. Web Based Communities.
[15] Mehdi Semsarzadeh,et al. Tampering Detection in Compressed Digital Video Using Watermarking , 2014, IEEE Transactions on Instrumentation and Measurement.
[16] Laurent Nana,et al. A novel cryptographic encryption technique of video images using quantum cryptography for satellite communications , 2013, 2013 International Conference on Adaptive Science and Technology.
[17] Musheer Ahmad,et al. Securing multimedia colour imagery using multiple high dimensional chaos-based hybrid keys , 2014, Int. J. Commun. Networks Distributed Syst..
[18] Ibrahim Kamel,et al. Distortion-Free Watermarking Scheme for Wireless Sensor Networks , 2009, 2009 International Conference on Intelligent Networking and Collaborative Systems.
[19] Huiping Guo,et al. Digital image watermarking for ownership verification , 2003 .
[20] Chi-Man Pun,et al. Digital Image Watermarking with Blind Detection for Copyright Verification , 2008, 2008 Congress on Image and Signal Processing.
[21] Laurent Nana,et al. A Hybrid Cryptographic and Digital Watermarking Technique for Securing Digital Images , 2014, ICONS 2014.
[22] Sajal K. Das,et al. Handbook on Securing Cyber-Physical Critical Infrastructure , 2012 .
[23] N. Bhargava,et al. Digital image authentication system based on digital watermarking , 2012, 2012 International Conference on Radar, Communication and Computing (ICRCC).
[24] Emmanuel Bresson,et al. Provably secure authenticated group Diffie-Hellman key exchange , 2007, TSEC.
[25] S. Roy,et al. Robust video watermarking scheme based on visual cryptography , 2012, 2012 World Congress on Information and Communication Technologies.
[26] Burton S. Kaliski. IEEE P1363: A Standard for RSA, Diffie-Hellman, and Elliptic-Curve Cryptography (Abstract) , 1996, Security Protocols Workshop.
[27] Q. Saeed,et al. Mathematical Hard Problems in Modern Public-Key Cryptosystem , 2006, 2006 International Conference on Emerging Technologies.
[28] Junaid Gilani,et al. Using Digital Signature Standard Algorithm to Incorporate Non-invertibility in Private Digital Watermarking Techniques , 2009, 2009 10th ACIS International Conference on Software Engineering, Artificial Intelligences, Networking and Parallel/Distributed Computing.
[29] Stelvio Cimato,et al. Visual Cryptography Based Watermarking: Definition and Meaning , 2012, IWDW.
[30] Abdulmotaleb El Saddik,et al. Combining cryptography and watermarking to secure revocable iris templates , 2011, 2011 IEEE International Instrumentation and Measurement Technology Conference.
[31] Shing-Chi Cheung,et al. The Use of Digital Watermarking for Intelligence Multimedia Document Distribution , 2008, J. Theor. Appl. Electron. Commer. Res..