Joint Fingerprinting and Encryption for JPEG Images Sharing in Mobile Social Network
暂无分享,去创建一个
Zenggang Xiong | Xuemin Zhang | Guangwei Wang | Conghuan Ye | Fang Xu | Yaoming Ding | Guangwei Wang | Z. Xiong | Conghuan Ye | Xuemin Zhang | Yaoming Ding | Fang Xu
[1] Gouenou Coatrieux,et al. A joint encryption/watermarking algorithm for verifying the reliability of medical images: Application to echographic images , 2012, Comput. Methods Programs Biomed..
[2] Zenggang Xiong,et al. Joint fingerprinting and encryption in hybrid domains for multimedia sharing in social networks , 2014, J. Vis. Lang. Comput..
[3] Deepa Kundur,et al. Video fingerprinting and encryption principles for digital rights management , 2004, Proceedings of the IEEE.
[4] Sabu Emmanuel,et al. Robust Watermarking of Compressed JPEG Images in Encrypted Domain , 2011, Trans. Data Hiding Multim. Secur..
[5] Bartosz Czaplewski,et al. Matrix-based robust joint fingerprinting and decryption method for multicast distribution of multimedia , 2015, Signal Process..
[6] C. Chui,et al. A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .
[7] Andrew Adamatzky,et al. Game of Life Cellular Automata , 2010 .
[8] Sarika Jain,et al. A review on watermarking techniques for compressed encrypted images , 2014, 2014 International Conference on Medical Imaging, m-Health and Emerging Communication Systems (MedCom).
[9] Helena Rifà-Pous,et al. Framework for preserving security and privacy in peer-to-peer content distribution systems , 2015, Expert Syst. Appl..
[10] Hefei Ling,et al. A new fingerprinting scheme using social network analysis for majority attack , 2013, Telecommunication Systems.
[11] Chih-Yang Lin,et al. Joint fingerprinting and decryption with noise-resistant for vector quantization images , 2012, Signal Process..
[12] Roshan K. Thomas,et al. Visual Authorization Modeling in E-commerce Applications , 2003, IEEE Multim..
[13] Hong Liu,et al. Attack and improvement of the joint fingerprinting and decryption method for vector quantization images , 2014, Signal Process..
[14] Gonzalo Álvarez,et al. Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.
[15] Mao-Bin Hu,et al. Detect overlapping and hierarchical community structure in networks , 2008, ArXiv.
[16] Hefei Ling,et al. Secure content sharing for social network using fingerprinting and encryption in the TSH transform domain , 2012, ACM Multimedia.
[17] Hefei Ling,et al. Real-Time Compressed- Domain Video Watermarking Resistance to Geometric Distortions , 2012, IEEE MultiMedia.
[18] S. Lian,et al. Efficient image or video encryption based on spatiotemporal chaos system , 2009 .
[19] Xi Chen,et al. Traceable content protection based on chaos and neural networks , 2011, Appl. Soft Comput..
[20] Mohan S. Kankanhalli,et al. Robust Watermarking of Compressed and Encrypted JPEG2000 Images , 2012, IEEE Transactions on Multimedia.
[21] Jianting Guo,et al. Secure watermarking scheme against watermark attacks in the encrypted domain , 2015, J. Vis. Commun. Image Represent..
[22] Hongjun Liu,et al. Color image encryption based on one-time keys and robust chaotic maps , 2010, Comput. Math. Appl..
[23] Alessandro Piva,et al. Secure Watermarking for Multimedia Content Protection: A Review of its Benefits and Open Issues , 2013, IEEE Signal Processing Magazine.
[24] C.-C. Jay Kuo,et al. Design of integrated multimedia compression and encryption systems , 2005, IEEE Transactions on Multimedia.
[25] Jiwu Huang,et al. JPEG Error Analysis and Its Applications to Digital Image Forensics , 2010, IEEE Transactions on Information Forensics and Security.
[26] Stephen Wolfram,et al. Theory and Applications of Cellular Automata , 1986 .
[27] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[28] Petros Belimpasakis,et al. Sharing with people: a system for user-centric content sharing , 2010, Multimedia Systems.
[29] Stephen Wolfram,et al. A New Kind of Science , 2003, Artificial Life.
[30] Kwok-Wo Wong,et al. A chaos-based joint image compression and encryption scheme using DCT and SHA-1 , 2011, Appl. Soft Comput..
[31] Tao Xiang,et al. Secure MQ coder: An efficient way to protect JPEG 2000 images in wireless multimedia sensor networks , 2014, Signal Process. Image Commun..
[32] Weigang Wang,et al. Team-and-role-based organizational context and access control for cooperative hypermedia environments , 1999, Hypertext.
[33] Stéphane Mallat,et al. A Theory for Multiresolution Signal Decomposition: The Wavelet Representation , 1989, IEEE Trans. Pattern Anal. Mach. Intell..
[34] Klara Nahrstedt,et al. Using Cryptographic and Watermarking Algorithms , 2001, IEEE Multim..
[35] Muhammad Khurram Khan,et al. Challenge-response-based biometric image scrambling for secure personal identification , 2011, Future Gener. Comput. Syst..
[36] Massimiliano Giordano,et al. Visual Computer-Managed Security: A Framework for Developing Access Control in Enterprise Applications , 2013, IEEE Software.
[37] S. Hamid Nawab,et al. The relationship of transform coefficients for differing transforms and/or differing subblock sizes , 2004, IEEE Transactions on Signal Processing.
[38] A. Akhavan,et al. A novel algorithm for image encryption based on mixture of chaotic maps , 2008 .