Privacy-Aware Image Authentication from Cryptographic Primitives
暂无分享,去创建一个
Yi Mu | Xinyi Huang | Haixia Chen | Wei Wu | Y. Mu | Wei Wu | Xinyi Huang | Haixia Chen
[1] Wei Wu,et al. Image Authentication for Permissible Cropping , 2018, Inscrypt.
[2] Di Xiao,et al. A Novel Image Authentication with Tamper Localization and Self-Recovery in Encrypted Domain Based on Compressive Sensing , 2018, Secur. Commun. Networks.
[3] Hyunok Oh,et al. PASS: Privacy aware secure signature scheme for surveillance systems , 2017, 2017 14th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS).
[4] Eran Tromer,et al. PhotoProof: Cryptographic Image Authentication for Any Set of Permissible Transformations , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[5] R. Eswaraiah,et al. Robust medical image watermarking technique for accurate detection of tampers inside region of interest and recovering original region of interest , 2015, IET Image Process..
[6] Christian Hanser,et al. Revisiting Cryptographic Accumulators, Additional Properties and Relations to other Primitives , 2015, IACR Cryptol. ePrint Arch..
[7] Yehuda Lindell,et al. Introduction to Modern Cryptography, Second Edition , 2014 .
[8] Yu-Chen Hu,et al. A novel reversible image authentication scheme for digital images , 2014, Signal Process..
[9] Jin Li,et al. Identity-based chameleon hashing and signatures without key exposure , 2014, Inf. Sci..
[10] Hany Farid,et al. Digital Image Authentication From JPEG Headers , 2011, IEEE Transactions on Information Forensics and Security.
[11] Yanqiang Lei,et al. Robust image hash in Radon transform domain for authentication , 2011, Signal Process. Image Commun..
[12] Mohammed Yakoob Siyal,et al. A secure and robust hash-based scheme for image authentication , 2010, Signal Process..
[13] Dong-Chul Park,et al. Medical Image Authentication Using Hash Function and Integer Wavelet Transform , 2008, 2008 Congress on Image and Signal Processing.
[14] Der-Chyuan Lou,et al. A copyright protection scheme for digital images using visual cryptography technique , 2007, Comput. Stand. Interfaces.
[15] Kwangjo Kim,et al. Chameleon Hashing Without Key Exposure , 2004, ISC.
[16] Giuseppe Ateniese,et al. On the Key Exposure Problem in Chameleon Hashes , 2004, SCN.
[17] Jessica J. Fridrich,et al. Invertible authentication , 2001, Security and Watermarking of Multimedia Contents.
[18] Jiri Fridrich,et al. New fragile authentication watermark for images , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[19] Tiago Rosa Maria Paula Queluz. Content-based integrity protection of digital images , 1999, Electronic Imaging.
[20] Jiri Fridrich,et al. Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[21] Jitendra Malik,et al. Normalized cuts and image segmentation , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[22] Shih-Fu Chang,et al. A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.