An Overview of Image Security Techniques
暂无分享,去创建一个
[2] John A. Courtright,et al. Normative Images of Communication Media Mass and Interpersonal Channels in the New Media Environment , 1993 .
[3] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[4] Vinod Patidar,et al. Medical image protection using genetic algorithm operations , 2014, Soft Computing.
[5] Howard M. Heys,et al. An extended visual cryptography scheme without pixel expansion for halftone images , 2013, 2013 26th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE).
[6] Radia J. Perlman,et al. Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.
[7] S. Shefali,et al. Self embedding technique for digital color image authentication and security , 2007, 2007 International Conference on Industrial and Information Systems.
[8] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[9] K. Anusudha,et al. An algorithm for enhanced image security with reversible data hiding , 2014, 2014 International Conference on Contemporary Computing and Informatics (IC3I).
[10] Tingting Wang,et al. Segmentation Algorithm Study for Infrared Images with Occluded Target Based on Artificial Immune System , 2012, 2012 Eighth International Conference on Computational Intelligence and Security.
[11] Bo Zhang,et al. XOR based optical encryption with noise performance modeling and application to image transmission over wireless IP lan , 2004 .
[12] Chiragkumar B. Patel,et al. Simulation and Implementation Novel Hybrid Blind Method of Image Security , 2012 .
[13] Wei Lu,et al. Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture , 2015, IEEE Transactions on Information Forensics and Security.
[14] Kuan-Ta Chen,et al. Involuntary Information Leakage in Social Network Services , 2008, IWSEC.
[15] Afshan Mulla,et al. Probabilistic triangular shuffling approach in DWT based image compression scheme , 2015, 2015 International Conference on Communication, Information & Computing Technology (ICCICT).
[16] Xu Zhengquan,et al. An Active-Passive Security Protection Method for Remote Sensing Image , 2011, 2011 International Conference on Network Computing and Information Security.
[17] A. S. Gandhi,et al. Image security using chaos and EZW compression , 2014, 2014 Students Conference on Engineering and Systems.
[18] Michael Frankfurter. Information Security Intelligence Cryptographic Principles And Applications , 2016 .
[19] Abdul Hanan Abdullah,et al. Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence , 2014 .
[20] Lixin Shen,et al. Adaptive Inpainting Algorithm Based on DCT Induced Wavelet Regularization , 2013, IEEE Transactions on Image Processing.
[21] Christophe Charrier,et al. Blind Image Quality Assessment: A Natural Scene Statistics Approach in the DCT Domain , 2012, IEEE Transactions on Image Processing.
[22] Hamidreza Rashidy Kanan,et al. A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm , 2014, Expert Syst. Appl..
[23] G. Singh,et al. Cuckoo search algorithm based satellite image contrast and brightness enhancement using DWT-SVD. , 2014, ISA transactions.
[25] Richard J. Duro,et al. An ANN based hyperspectral waterway control and security system , 2011, 2011 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications (CIMSA) Proceedings.
[27] Ahmad Abusukhon,et al. A novel network security algorithm based on private key encryption , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).
[28] Ebrahim Zarei Zefreh,et al. Image security system using recursive Cellular automata substitution and its parallelization , 2011, 2011 CSI International Symposium on Computer Science and Software Engineering (CSSE).
[29] Ayman Alfalou,et al. Optical image compression and encryption methods , 2009 .
[30] M. Omair Ahmad,et al. A Study of Multiplicative Watermark Detection in the Contourlet Domain Using Alpha-Stable Distributions , 2014, IEEE Transactions on Image Processing.
[31] Arnab Mitra. Investigating scopes for automata based designs targeting image security in health system , 2015, 2015 E-Health and Bioengineering Conference (EHB).
[32] Afshan Mulla,et al. Sub-band exchange DWT based image fusion algorithm for enhanced security , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[33] Asoke K. Nandi,et al. Watermarking method with exact self-propagating restoration capabilities , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[34] Vasif V. Nabiyev,et al. Secret Sharing Scheme to implement medical image security , 2010, 2010 IEEE 18th Signal Processing and Communications Applications Conference.
[35] G. R. Suresh,et al. Security in medical image communication with arnold's cat map method and reversible watermarking , 2013, 2013 International Conference on Circuits, Power and Computing Technologies (ICCPCT).
[36] P. V. V. Kishore,et al. Medical image watermarking with ANN in wavelet domain , 2015, 2015 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT).
[37] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[38] Tracy Bradley Maples,et al. Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video , 1995, Proceedings of Fourth International Conference on Computer Communications and Networks - IC3N'95.
[39] Xing-yuan Wang,et al. A novel image encryption algorithm based on dynamic S-boxes constructed by chaos , 2013, Nonlinear Dynamics.
[40] A. S. Gandhi,et al. A simple and efficient approach for medical image security using chaos on EZW , 2015, 2015 Eighth International Conference on Advances in Pattern Recognition (ICAPR).
[41] Shashank Srivastava,et al. An approach for virtual machine image security , 2014, 2014 International Conference on Signal Propagation and Computer Technology (ICSPCT 2014).