Markov Process Based Retrieval for Encrypted JPEG Images
暂无分享,去创建一个
[1] Min Wu,et al. Secure image retrieval through feature protection , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[2] Elaine Shi,et al. Multi-Dimensional Range Query over Encrypted Data , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[3] P. Vishvapathi,et al. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data , 2022 .
[4] Tri Van Le. Efficient Provably Secure Public Key Steganography , 2003, IACR Cryptol. ePrint Arch..
[5] Eu-Jin Goh,et al. Secure Indexes , 2003, IACR Cryptol. ePrint Arch..
[6] Nenghai Yu,et al. A robust chaos-based image encryption scheme , 2009, 2009 IEEE International Conference on Multimedia and Expo.
[7] Xinpeng Zhang,et al. Markov process-based retrieval for encrypted JPEG images , 2016 .
[8] Yun Q. Shi,et al. A Markov Process Based Approach to Effective Attacking JPEG Steganography , 2006, Information Hiding.
[9] Shiguo Lian,et al. A novel image encryption scheme based-on JPEG encoding , 2004, Proceedings. Eighth International Conference on Information Visualisation, 2004. IV 2004..
[10] Xinpeng Zhang,et al. Histogram-based retrieval for encrypted JPEG images , 2014, 2014 IEEE China Summit & International Conference on Signal and Information Processing (ChinaSIP).
[11] H. Wu,et al. Mixed Guassian and uniform impulse noise analysis using robust estimation for digital images , 2009, 2009 16th International Conference on Digital Signal Processing.
[12] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[13] Charalampos Papamanthou,et al. Parallel and Dynamic Searchable Symmetric Encryption , 2013, Financial Cryptography.
[14] Hugo Krawczyk,et al. Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries , 2013, IACR Cryptol. ePrint Arch..
[15] Bian Yang,et al. Transparent and perceptually enhanced JPEG image encryption , 2009, 2009 16th International Conference on Digital Signal Processing.
[16] Min Wu,et al. Confidentiality-Preserving Image Search: A Comparative Study Between Homomorphic Encryption and Distance-Preserving Randomization , 2014, IEEE Access.
[17] Cong Wang,et al. Achieving usable and privacy-assured similarity search over outsourced cloud data , 2012, 2012 Proceedings IEEE INFOCOM.
[18] Min Wu,et al. Enabling search over encrypted multimedia databases , 2009, Electronic Imaging.
[19] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[20] Jun Zhao,et al. Edge-Guided Dual-Modality Image Reconstruction , 2014, IEEE Access.
[21] Zhenxing Qian,et al. Reversible Data Hiding in Encrypted JPEG Bitstream , 2014, IEEE Transactions on Multimedia.
[22] Rafail Ostrovsky,et al. Searchable symmetric encryption: Improved definitions and efficient constructions , 2011, J. Comput. Secur..
[23] Yun Q. Shi,et al. JPEG image steganalysis utilizing both intrablock and interblock correlations , 2008, 2008 IEEE International Symposium on Circuits and Systems.