Commutative reversible data hiding and encryption
暂无分享,去创建一个
[1] Shiguo Lian,et al. Commutative watermarking and encryption for media data , 2006 .
[2] Xinpeng Zhang,et al. Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.
[3] Jun Tian,et al. Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..
[4] Shiguo Lian,et al. Commutative Encryption and Watermarking in Video Compression , 2007, IEEE Transactions on Circuits and Systems for Video Technology.
[5] Weiming Zhang,et al. Capacity-Approaching Codes for Reversible Data Hiding , 2011, Information Hiding.
[6] Deepa Kundur,et al. Video fingerprinting and encryption principles for digital rights management , 2004, Proceedings of the IEEE.
[7] A. Murat Tekalp,et al. Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.
[8] Nasir D. Memon,et al. A buyer-seller watermarking protocol , 2001, IEEE Trans. Image Process..
[9] Minoru Kuribayashi,et al. Fingerprinting protocol for images based on additive homomorphic property , 2005, IEEE Transactions on Image Processing.
[10] Xiaolong Li,et al. Efficient Generalized Integer Transform for Reversible Watermarking , 2010, IEEE Signal Processing Letters.
[11] Kumar Parasuraman,et al. Reversible image watermarking using interpolation technique , 2014, 2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE).
[12] Alessandro Neri,et al. A commutative digital image watermarking and encryption method in the tree structured Haar transform domain , 2011, Signal Process. Image Commun..
[13] Nasir D. Memon,et al. A buyer-seller watermarking protocol , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).
[14] Yun Q. Shi,et al. Reversible Data Hiding , 2003, IWDW.
[15] Alessandro Piva,et al. An efficient buyer-seller watermarking protocol based on composite signal representation , 2009, MM&Sec '09.
[16] Jeho Nam,et al. A Novel Difference Expansion Transform for Reversible Data Embedding , 2008, IEEE Transactions on Information Forensics and Security.
[17] Ton Kalker,et al. Capacity bounds and constructions for reversible data-hiding , 2003, IS&T/SPIE Electronic Imaging.