Providing security and privacy to huge and vulnerable songs repository using visual cryptography
暂无分享,去创建一个
[1] Alimohammad Latif,et al. An adaptive secret image sharing with a new bitwise steganographic property , 2016, Inf. Sci..
[2] Zhihua Xia,et al. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.
[3] Mahmoud Al-Ayyoub,et al. Accelerating 3D medical volume segmentation using GPUs , 2016, Multimedia Tools and Applications.
[4] Hongjun Liu,et al. Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys , 2016 .
[5] Abdellah Adib,et al. Audio watermarking with high embedding capacity based on multiple access techniques , 2014, Digit. Signal Process..
[6] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[7] Ling-Yuan Hsu,et al. Perceptual-based DWPT-DCT framework for selective blind audio watermarking , 2014, Signal Process..
[8] Kouichi Sakurai,et al. An enhanced audio ownership protection scheme based on visual cryptography , 2014, EURASIP J. Inf. Secur..
[9] Suneeta Agarwal,et al. VPVC: verifiable progressive visual cryptography , 2016, Pattern Analysis and Applications.
[10] Jianzhong Li,et al. Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition , 2017, Multimedia Tools and Applications.
[11] Yodai Watanabe,et al. Security of audio secret sharing scheme encrypting audio secrets with bounded shares , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[12] Wen-Hsiang Tsai,et al. A covert communication method via spreadsheets by secret sharing with a self-authentication capability , 2013, J. Syst. Softw..
[13] Moni Naor,et al. Visual Authentication and Identification , 1997, CRYPTO.
[14] Zhihua Xia,et al. A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.
[15] Tetsuya Shimamura,et al. Blind SVD-based audio watermarking using entropy and log-polar transformation , 2015, J. Inf. Secur. Appl..
[16] Jiwu Huang,et al. Twenty years of digital audio watermarking - a comprehensive review , 2016, Signal Process..
[17] S. Hemalatha,et al. Wavelet Transform Based Steganography Technique to Hide Audio Signals in Image , 2015 .
[18] Indranil Sengupta,et al. An adaptive audio watermarking based on the singular value decomposition in the wavelet domain , 2010, Digit. Signal Process..
[19] Ling-Yuan Hsu,et al. Robust, transparent and high-capacity audio watermarking in DCT domain , 2015, Signal Process..
[20] S. Hemalatha,et al. Audio data hiding technique using integer wavelet transform , 2016, Int. J. Electron. Secur. Digit. Forensics.
[21] Fathi E. Abd El-Samie,et al. An SVD audio watermarking approach using chaotic encrypted images , 2011, Digit. Signal Process..
[22] Zhi Zhou,et al. Halftone visual cryptography , 2006, IEEE Transactions on Image Processing.
[23] Suneeta Agarwal,et al. Quantization-Based Fragile Watermarking using Block-Wise Authentication and Pixel-Wise Recovery Scheme for Tampered Image , 2013, Int. J. Image Graph..
[24] Oscar C. Au,et al. Joint visual cryptography and watermarking , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).