Novel Scheme for Compressed Image Authentication Using LSB Watermarking and EMRC6 Encryption
暂无分享,去创建一个
C. Seldev Christopher | S. J. Jereesha Mary | S. Sebastin Antony Joe | C. Christopher | S. J. J. Mary | S. Joe | S. Mary
[1] Puneet Kr Sharma,et al. ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM , 2012 .
[2] Kukoo Anna Mathew. Watermarking of JPEG2000 Compressed Images with Improved Encryption , 2013 .
[3] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[4] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[5] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[6] Deepa Kundur,et al. Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.
[7] N.A. El-Fishawy,et al. A modification of RC6/sup tm/ block cipher algorithm for data security (MRC6) , 2004, International Conference on Electrical, Electronic and Computer Engineering, 2004. ICEEC '04..
[8] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[9] K GayathriI.,et al. Digital Watermarking Using RC5 Encryption On JPEG2000 Images , 2013 .
[10] Atsuko Miyaji,et al. Evaluation of the Security of RC6 against the χ2-Attack*A preliminary version was presented at ACISP'05. , 2007 .
[11] Ingemar J. Cox,et al. Watermarking Is Not Cryptography , 2006, IWDW.
[12] Antoine Joux,et al. A Statistical Attack on RC6 , 2000, FSE.
[13] Christian Roux,et al. A joint watermarking/encryption algorithm for verifying medical image integrity and authenticity in both encrypted and spatial domains , 2011, 2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[14] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[15] Ming-Shi Wang,et al. A majority-voting based watermarking scheme for color image tamper detection and recovery , 2007, Comput. Stand. Interfaces.
[16] Michele Larobina,et al. Medical Image File Formats , 2014, Journal of Digital Imaging.
[17] Hongjun Wu,et al. Efficient and secure encryption schemes for JPEG2000 , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[18] Joos Vandewalle,et al. Linear Cryptanalysis of RC5 and RC6 , 1999, FSE.
[19] M.Y. Javed,et al. A Performance Comparison of Data Encryption Algorithms , 2005, 2005 International Conference on Information and Communication Technologies.
[20] S. El-Rabaie,et al. Homomorphic image encryption , 2009, J. Electronic Imaging.
[21] A.H.M. Ragab,et al. Enhancements and implementation of RC6/sup TM/ block cipher for data security , 2001, Proceedings of IEEE Region 10 International Conference on Electrical and Electronic Technology. TENCON 2001 (Cat. No.01CH37239).
[22] Edward J. Delp,et al. Detection of image alterations using semifragile watermarks , 2000, Electronic Imaging.
[23] Arun Patro,et al. Design and Implementation of Enhanced version of MRC6 algorithm for data security , 2015 .
[24] Safya Belghith,et al. Watermarking and encryption scheme to secure multimedia information , 2013, 2013 World Congress on Computer and Information Technology (WCCIT).
[25] Bernd Girod,et al. Blind watermarking applied to image authentication , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).
[26] Mohan S. Kankanhalli,et al. Compressed-encrypted domain JPEG2000 image watermarking , 2010, 2010 IEEE International Conference on Multimedia and Expo.
[27] Atsuko Miyaji,et al. PAPER Special Section on Cryptography and Information Security Evaluation of the Security of RC6 against the χ 2 -Attack ∗∗ , 2007 .
[28] Abdullah Bamatraf,et al. Digital watermarking algorithm using LSB , 2010, 2010 International Conference on Computer Applications and Industrial Electronics.
[29] Majid Rabbani,et al. An overview of the JPEG 2000 still image compression standard , 2002, Signal Process. Image Commun..