An optimal approach for watermarking using MRC4 encryption scheme
暂无分享,去创建一个
[1] Kenji Yoshigoe,et al. RC4-2S: RC4 Stream Cipher with Two State Tables , 2013, ITCS.
[2] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[3] Zekeriya Erkin,et al. Anonymous Fingerprinting with Robust QIM Watermarking Techniques , 2007, EURASIP J. Inf. Secur..
[4] Thomas Stütz,et al. A survey on JPEG2000 encryption , 2009, Multimedia Systems.
[5] Alessandro Neri,et al. A joint digital watermarking and encryption method , 2008, Electronic Imaging.
[6] Mohan S. Kankanhalli,et al. Privacy Preserving Multiparty Multilevel DRM Architecture , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.
[7] Mauro Barni,et al. Composite Signal Representation for Fast and Storage-Efficient Processing of Encrypted Signals , 2010, IEEE Transactions on Information Forensics and Security.
[8] Ahmet M. Eskicioglu,et al. Robust DWT-SVD domain image watermarking: embedding data in all frequencies , 2004, MM&Sec '04.
[9] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[10] Mohan S. Kankanhalli,et al. Compressed-encrypted domain JPEG2000 image watermarking , 2010, 2010 IEEE International Conference on Multimedia and Expo.
[11] Zhi Li,et al. Constructing Secure Content-Dependent Watermarking Scheme using Homomorphic Encryption , 2007, 2007 IEEE International Conference on Multimedia and Expo.
[12] Bernd Girod,et al. Scalar Costa scheme for information embedding , 2003, IEEE Trans. Signal Process..
[13] NeriAlessandro,et al. Joint watermarking and encryption of color images in the Fibonacci-Haar domain , 2009 .
[14] Alessandro Piva,et al. An efficient buyer-seller watermarking protocol based on composite signal representation , 2009, MM&Sec '09.
[15] Shih-Fu Chang,et al. A quantitative semi-fragile JPEG2000 image authentication system , 2002, Proceedings. International Conference on Image Processing.
[16] Hongjun Wu,et al. Efficient and secure encryption schemes for JPEG2000 , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[17] Xiaolong Li,et al. Efficient Generalized Integer Transform for Reversible Watermarking , 2010, IEEE Signal Processing Letters.
[18] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[19] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[20] Shiguo Lian,et al. Commutative watermarking and encryption for media data , 2006 .
[21] Mohan S. Kankanhalli,et al. A dual watermarking technique for images , 1999, MULTIMEDIA '99.
[22] Seong Oun Hwang,et al. Modeling and implementation of digital rights , 2004, J. Syst. Softw..
[23] Brahmjit Singh,et al. Performance analysis of modified RC4 encryption algorithm , 2014, International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014).
[24] Alessandro Neri,et al. Joint Watermarking and Encryption of Color Images in the Fibonacci-Haar Domain , 2009, EURASIP J. Adv. Signal Process..
[25] Bernd Girod,et al. Watermarking of uncompressed and compressed video , 1998, Signal Process..
[26] Gerald Schaefer,et al. UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.
[27] Mohan S. Kankanhalli,et al. Robust Watermarking of Compressed and Encrypted JPEG2000 Images , 2012, IEEE Transactions on Multimedia.