Multimedia Information Security and Privacy: Theory and Applications
暂无分享,去创建一个
Ming Yang | Lei Chen | Guillermo A. Francia | Monica Trifas | Yongliang Hu | Lei Chen | Yongliang Hu | Monica A. Trifas | Ming Yang
[1] Deepa Kundur,et al. The choice of watermark domain in the presence of compression , 2001, Proceedings International Conference on Information Technology: Coding and Computing.
[2] Jean-Luc Dugelay,et al. A guide tour of video watermarking , 2003, Signal Process. Image Commun..
[3] Li Li,et al. A Video Watermarking Scheme Based on Motion Vectors and Mode Selection , 2008, 2008 International Conference on Computer Science and Software Engineering.
[4] Chung Jung Kuo,et al. Novel image encryption technique and its application in progressive transmission , 1993, J. Electronic Imaging.
[5] Josef Scharinger. Fast encryption of image data using chaotic Kolmogorov flows , 1998, J. Electronic Imaging.
[6] Ming Yang,et al. Security and Privacy Issues in Secure E-Mail Standards and Services , 2009, Int. J. Inf. Secur. Priv..
[7] Minghua Chen,et al. Hiding privacy information in video surveillance system , 2005, IEEE International Conference on Image Processing 2005.
[8] Kuo-Liang Chung,et al. A novel SVD- and VQ-based image hiding scheme , 2001, Pattern Recognit. Lett..
[9] Ali Serhan Koyuncugil,et al. Surveillance Technologies and Early Warning Systems: Data Mining Applications for Risk Detection , 2010 .
[10] Muhammad Arsalan,et al. Intelligent threshold selection for reversible watermarking of medical images , 2010, GECCO '10.
[11] H. B. Kekre,et al. Increased Capacity of Information Hiding in LSB's Method for Text and Image , 2008 .
[12] Gin-Der Wu,et al. Image Watermarking Using Structure Based Wavelet Tree Quantization , 2007, 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007).
[13] Lintian Qiao,et al. A New Algorithm for MPEG Video Encryption , 2007 .
[14] Franck Davoine,et al. Self-similarity based image watermarking , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).
[15] Chin-Chen Chang,et al. Information hiding based on search-order coding for VQ indices , 2004, Pattern Recognit. Lett..
[16] Y. Hu. Grey-level image hiding scheme based on vector quantisation , 2003 .
[17] Wolfgang Effelsberg,et al. Semi-automatic registration of videos for improved watermark detection , 2010, MMSys '10.
[18] Lei Tang,et al. Methods for encrypting and decrypting MPEG video data efficiently , 1997, MULTIMEDIA '96.
[19] N. Bourbakis,et al. A high bitrate information hiding algorithm for digital video content under H.264/AVC compression , 2005, 48th Midwest Symposium on Circuits and Systems, 2005..
[20] Sung-Min Kim,et al. Data Hiding on H.264/AVC Compressed Video , 2007, ICIAR.
[21] Taifan Quan,et al. Study on Information Hiding Algorithm Based on RBF and LSB , 2008, 2008 Fourth International Conference on Natural Computation.
[22] Chin-Chen Chang,et al. A virtual image cryptosystem based upon vector quantization , 1998, IEEE Trans. Image Process..
[23] B. S. Manjunath,et al. Color image embedding using multidimensional lattice structures , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[24] Zhifeng Ma,et al. Information Hiding Algorithm Based on Predictive Coding , 2009, 2009 International Conference on Information Technology and Computer Science.
[25] Xiaolin Wu,et al. Joint image/video compression and encryption via high-order conditional entropy coding of wavelet coefficients , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[26] Motoi Iwata,et al. Digital Steganography Utilizing Features of JPEG Images , 2004 .
[27] Pierre Moulin,et al. A framework for evaluating the data-hiding capacity of image sources , 2002, IEEE Trans. Image Process..
[28] Colin J. Fidge,et al. Probabilistic Inference Channel Detection and Restriction Applied to Patients' Privacy Assurance , 2010, Int. J. Inf. Secur. Priv..
[29] Edward J. Delp,et al. Fragile watermarking using the VW2D watermark , 1999, Electronic Imaging.
[30] Nikolaos G. Bourbakis,et al. Lossless compression and information hiding in images , 2004, Pattern Recognit..
[31] Ingemar J. Cox,et al. A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.
[32] Xiang-Gen Xia,et al. A multiresolution watermark for digital images , 1997, Proceedings of International Conference on Image Processing.
[33] Bharat K. Bhargava,et al. An efficient MPEG video encryption algorithm , 1998, Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281).
[34] Arwa Zabian,et al. Algorithm for Text Hiding in Digital Image for Information Security , 2009 .
[35] Edward J. Delp,et al. Perceptual watermarks for digital images and video , 1999, Electronic Imaging.
[36] Gustaf Neumann,et al. Managing Security in the World Wide Web: Architecture, Services and Techniques , 2000 .
[37] N. Bourbakis,et al. SCAN-Based Compression-Encryption-Hiding for Video on Demand , 2003, IEEE Multim..
[38] Mathews Z. Nkhoma,et al. Contributing Factors of Information Security Investments in South East Asia SMBs: A Technology- Organisational -Environment Approach , 2013, Int. J. Inf. Secur. Priv..
[39] B. S. Manjunath,et al. Data hiding in video , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).
[40] Yanghee Choi,et al. Authentication, Authorization, and Accounting (AAA) Framework in Network Mobility (NEMO) Environments , 2008 .
[41] Chin-Chen Chang,et al. Joint coding and embedding techniques for multimedia images , 2008, Inf. Sci..
[42] N. Bourbakis,et al. A synthetic stegano-crypto scheme for securing multimedia medical records and their associations , 2009, 2009 16th International Conference on Digital Signal Processing.
[43] Chun-Xia Li. A Novel Scheme for Text Information Hiding into a Carrier Image Based on BCH Code and HVS Model , 2009 .
[44] Shih-Fu Chang,et al. Semifragile watermarking for authenticating JPEG visual content , 2000, Electronic Imaging.
[45] Rui Du,et al. Invertible authentication watermark for JPEG images , 2001, Proceedings International Conference on Information Technology: Coding and Computing.
[46] Chin-Chen Chang,et al. Both Color and Gray Scale Secret Images Hiding in a Color Image , 2002, Int. J. Pattern Recognit. Artif. Intell..
[47] Bharat K. Bhargava,et al. A fast MPEG video encryption algorithm , 1998, MULTIMEDIA '98.
[48] Dima Pröfrock,et al. Dual watermarking for protection of rightful ownership and secure image authentication , 2006, MCPS '06.
[49] Chin-Chen Chang,et al. Reversible steganographic method using SMVQ approach based on declustering , 2007, Inf. Sci..
[50] Yongcheng Li,et al. Security enhanced MPEG player , 1996, Proceedings International Workshop on Multimedia Software Development.
[51] Ahmed H. Tewfik,et al. Data hiding for video-in-video , 1997, Proceedings of International Conference on Image Processing.
[52] Dejun Mu,et al. Study of information hiding algorithm based on GHM and color transfer theory , 2009 .
[53] Yu-Chen Hu,et al. High-capacity image hiding scheme based on vector quantization , 2006, Pattern Recognit..
[54] Oscal T.-C. Chen,et al. Data hiding in inter and intra prediction modes of H.264/AVC , 2008, 2008 IEEE International Symposium on Circuits and Systems.
[55] Ni Rongrong,et al. Embedding information into color images using wavelet , 2002, 2002 IEEE Region 10 Conference on Computers, Communications, Control and Power Engineering. TENCOM '02. Proceedings..
[56] Thomas S. Huang,et al. An additive approach to transform-domain information hiding and optimum detection structure , 2001, IEEE Trans. Multim..
[57] Jun Tian,et al. Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..
[58] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[59] Chin-Chen Chang,et al. Reversible hiding in DCT-based compressed images , 2007, Inf. Sci..
[60] Subariah bt. Ibrahim,et al. Stenography: Random LSB Insertion Using Discrete Logarithm , 2003, CITA.
[61] Chin-Chen Chang,et al. An embedding technique based upon block prediction , 2008, J. Syst. Softw..
[62] Junjie Li,et al. An information hiding algorithm based on intra-prediction modes and matrix coding for H.264/AVC video stream , 2011 .
[63] A. Murat Tekalp,et al. Robust watermarking of fingerprint images , 2002, Pattern Recognit..
[64] Jong Ryul Kim,et al. A robust wavelet-based digital watermarking using level-adaptive thresholding , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).
[65] Chin-Chen Chang,et al. A new steganographic method for color and grayscale image hiding , 2007, Comput. Vis. Image Underst..
[66] Iskender Agi,et al. An empirical study of secure MPEG video transmissions , 1996, Proceedings of Internet Society Symposium on Network and Distributed Systems Security.
[67] Shih-Fu Chang,et al. Watermarking capacity of digital images based on domain-specific masking effects , 2001, Proceedings International Conference on Information Technology: Coding and Computing.
[68] Yu-Ming Cheng,et al. An Efficient Information Hiding Algorithm for Polygon Models , 2005, Comput. Graph. Forum.
[69] Yuewei Dai,et al. A new adaptive watermarking for real-time MPEG videos , 2007, Appl. Math. Comput..
[70] Shih-Chieh Shie,et al. Visually imperceptible image hiding scheme based on vector quantization , 2010, Inf. Process. Manag..
[71] Dima Pröfrock,et al. H.264/AVC video authentication using skipped macroblocks for an erasable watermark , 2005, Visual Communications and Image Processing.
[72] Sos S. Agaian,et al. Secure information hiding algorithm using parametric slant-Hadamard transforms , 2008, SPIE Defense + Commercial Sensing.
[73] Jun Zheng,et al. Handbook of Research on Wireless Security , 2008 .
[74] Russell M. Mersereau,et al. Towards robust compressed-domain video watermarking for H.264 , 2006, Electronic Imaging.
[75] Tracy Bradley Maples,et al. Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video , 1995, Proceedings of Fourth International Conference on Computer Communications and Networks - IC3N'95.
[76] Athanassios N. Skodras,et al. Real time data hiding by exploiting the IPCM macroblocks in H.264/AVC streams , 2009, Journal of Real-Time Image Processing.
[77] Aman Jantan,et al. Image Encryption Using Block-Based Transformation Algorithm , 2008 .
[78] Borko Furht,et al. Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[79] C. Chang,et al. Hiding secret data adaptively in vector quantisation index tables , 2006 .
[80] Jean-Luc Dugelay,et al. A Survey of Watermarking Algorithms for Image Authentication , 2002, EURASIP J. Adv. Signal Process..
[81] N. Cvejic,et al. Channel capacity of high bit rate audio data hiding algorithms in diverse transform domains , 2004, IEEE International Symposium on Communications and Information Technology, 2004. ISCIT 2004..
[82] Yoshiyasu Takefuji,et al. Damageless Information Hiding using Neural Network on YCbCr Domain , 2008 .
[83] Chin-Chen Chang,et al. A Reversible Data Hiding Scheme Based on Side Match Vector Quantization , 2006, IEEE Transactions on Circuits and Systems for Video Technology.
[84] Russell M. Mersereau,et al. A novel approach for increasing security and data embedding capacity in images for data hiding applications , 2001, Proceedings International Conference on Information Technology: Coding and Computing.
[85] Frank Gadegast. Securitymechanisms for Multimedia-Data with the Example MPEG-I-Video , 1998 .
[86] S. D. Lin,et al. Secret image communication scheme based on vector quantisation , 2004 .
[87] Johann A. Briffa,et al. Channel models for high-capacity information hiding in images , 2003, SPIE Optics + Photonics.
[88] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[89] Dieter Fink,et al. A Model of Information Security Governance for E-Business , 2006 .
[90] Iwan Setyawan,et al. Watermarking digital image and video data. A state-of-the-art overview , 2000 .
[91] Chunhua Yang,et al. A Large Capacity Blind Information Hiding Algorithm , 2008, 2008 International Symposium on Electronic Commerce and Security.
[92] Z. Qiu,et al. A DWT-based color image steganography scheme , 2002, 6th International Conference on Signal Processing, 2002..
[93] Wei Su,et al. Robust lossless image data hiding , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).
[94] A. Murat Tekalp,et al. Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.
[95] Deepa Kundur. Implications for high capacity data hiding in the presence of lossy compression , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).
[96] Lan Anh Tran,et al. Securing Web Services: Practical Usage of Standards and Specifications , 2008 .
[97] Chin-Chen Chang,et al. A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..
[98] Stephen Chong,et al. Self-identifying sensor data , 2010, IPSN '10.
[99] W.-J. Hsu,et al. Adaptive data hiding based on VQ compressed images , 2003 .
[100] W. Tsai,et al. Data hiding in images via multiple-based number conversion and lossy compression , 1998 .
[101] Ajay Luthra,et al. Overview of the H.264/AVC video coding standard , 2003, IEEE Trans. Circuits Syst. Video Technol..
[102] Sheng-bing Che,et al. A Fragile Information Hiding Technique Based on Human Visual Gray Sensitivity , 2010 .
[103] Andreas Uhl,et al. Experimental study on the impact of robust watermarking on iris recognition accuracy , 2010, SAC '10.
[104] Jennifer L. Davidson,et al. Steganography using the minimax eigenvalue decomposition , 1998, Optics & Photonics.
[105] Hamid R. Nemati. International Journal of Information Security and Privacy , 2007 .
[106] H. B. Kekre,et al. Mixing Codebooks of LBG, KPE and KFCG Algorithms to Increase Capacity of Information Hiding , 2010 .
[107] Zhicheng Ni,et al. Distortionless data hiding based on integer wavelet transform , 2002 .