Recovering tampered regions in encrypted video using POB number system
暂无分享,去创建一个
[1] Yongdong Zhang,et al. Restricted H.264/AVC video coding for privacy protected video scrambling , 2011, J. Vis. Commun. Image Represent..
[2] A. Murat Tekalp,et al. Video authentication with self-recovery , 2002, IS&T/SPIE Electronic Imaging.
[3] Manoj Misra,et al. A secure image sharing scheme based on SVD and Fractional Fourier Transform , 2017, Signal Process. Image Commun..
[4] Cong Wang,et al. Toward secure and effective data utilization in public cloud , 2012, IEEE Network.
[5] K. Srinathan,et al. Efficient privacy preserving video surveillance , 2009, 2009 IEEE 12th International Conference on Computer Vision.
[6] Bijan G. Mobasseri,et al. Content-dependent video authentication by self-watermarking in color space , 2001, IS&T/SPIE Electronic Imaging.
[7] Kianoosh Mokhtarian,et al. Authentication of Scalable Video Streams With Low Communication Overhead , 2010, IEEE Transactions on Multimedia.
[8] Cong Wang,et al. Enabling Privacy-Preserving Image-Centric Social Discovery , 2014, 2014 IEEE 34th International Conference on Distributed Computing Systems.
[9] Bin Li,et al. Automatic Detection of Object-Based Forgery in Advanced Video , 2016, IEEE Transactions on Circuits and Systems for Video Technology.
[10] Wenjun Zeng,et al. Efficient frequency domain selective scrambling of digital video , 2003, IEEE Trans. Multim..
[11] Athanasios V. Vasilakos,et al. Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..
[12] Yongdong Zhang,et al. Prediction restricted H.264/AVC video scrambling for privacy protection , 2010 .
[13] Mohamed Rida,et al. A survey of intrusion detection systems for cloud computing environment , 2016, 2016 International Conference on Engineering & MIS (ICEMIS).
[14] Chang Wen Chen,et al. Secure media sharing in the cloud: Two-dimensional-scalable access control and comprehensive key management , 2014, 2014 IEEE International Conference on Multimedia and Expo (ICME).
[15] Pradeep K. Atrey,et al. Secure Cloud-Based Image Tampering Detection and Localization Using POB Number System , 2017, ACM Trans. Multim. Comput. Commun. Appl..
[16] Jinwei Wang,et al. Hierarchical recovery for tampered images based on watermark self-embedding , 2017, Displays.
[17] Mohan S. Kankanhalli,et al. A hierarchical signature scheme for robust video authentication using secret sharing , 2004, 10th International Multimedia Modelling Conference, 2004. Proceedings..
[18] Robert H. Deng,et al. A Hybrid Scheme for Authenticating Scalable Video Codestreams , 2014, IEEE Transactions on Information Forensics and Security.
[19] Monjur Ahmed,et al. Cloud Computing and Security Issues in the Cloud , 2014, Trinity Journal of Management, IT & Media.
[20] Balasubramanian Raman,et al. Toward Encrypted Video Tampering Detection and Localization Based on POB Number System Over Cloud , 2018, IEEE Transactions on Circuits and Systems for Video Technology.
[21] Cong Wang,et al. Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing , 2014, ACM Multimedia.
[22] Suneeta Agarwal,et al. An efficient fragile watermarking scheme with multilevel tamper detection and recovery based on dynamic domain selection , 2015, Multimedia Tools and Applications.
[23] Pradeep K. Atrey,et al. Confidence Evolution in Multimedia Systems , 2008, IEEE Transactions on Multimedia.
[24] Robert H. Deng,et al. Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks , 2013, IEEE Transactions on Multimedia.
[25] C.-C. Jay Kuo,et al. Design of integrated multimedia compression and encryption systems , 2005, IEEE Transactions on Multimedia.
[26] Mehdi Semsarzadeh,et al. Tampering Detection in Compressed Digital Video Using Watermarking , 2014, IEEE Transactions on Instrumentation and Measurement.
[27] Chin-Chen Chang,et al. Adaptive self-recovery for tampered images based on VQ indexing and inpainting , 2013, Signal Process..
[28] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[29] Suneeta Agarwal,et al. A self recoverable dual watermarking scheme for copyright protection and integrity verification , 2017, Multimedia Tools and Applications.