A secure image sharing scheme based on SVD and Fractional Fourier Transform
暂无分享,去创建一个
[1] Gouenou Coatrieux,et al. A crypto-watermarking system for ensuring reliability control and traceability of medical images , 2016, Signal Process. Image Commun..
[2] Soo-Chang Pei,et al. Image Feature Extraction in Encrypted Domain With Privacy-Preserving SIFT , 2012, IEEE Transactions on Image Processing.
[3] Ahmad-Reza Sadeghi,et al. Privacy-Preserving ECG Classification With Branching Programs and Neural Networks , 2011, IEEE Transactions on Information Forensics and Security.
[4] Mauro Barni,et al. On the Implementation of the Discrete Fourier Transform in the Encrypted Domain , 2009, IEEE Transactions on Information Forensics and Security.
[5] Josh Benaloh,et al. Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing , 1986, CRYPTO.
[6] Jiasong Wu,et al. Robust watermarking scheme for color image based on quaternion-type moment invariants and visual cryptography , 2016, Signal Process. Image Commun..
[8] V. Namias. The Fractional Order Fourier Transform and its Application to Quantum Mechanics , 1980 .
[9] Nasir D. Memon,et al. A buyer-seller watermarking protocol , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).
[10] Xinpeng Zhang,et al. Separable Reversible Data Hiding in Encrypted Image , 2012, IEEE Transactions on Information Forensics and Security.
[11] Gaurav Bhatnagar,et al. Discrete fractional wavelet transform and its application to multiple encryption , 2013, Inf. Sci..
[12] Zhenxing Qian,et al. Reversible visible watermark embedded in encrypted domain , 2015, 2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP).
[13] Xinpeng Zhang,et al. Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode , 2016, Inf. Sci..
[14] Kwok-Wo Wong,et al. Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem , 2013, Signal Process. Image Commun..
[15] Peijia Zheng,et al. Discrete Wavelet Transform and Data Expansion Reduction in Homomorphic Encrypted Domain , 2013, IEEE Transactions on Image Processing.
[16] Vincenzo Piuri,et al. A privacy-compliant fingerprint recognition system based on homomorphic encryption and Fingercode templates , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[17] Balasubramanian Raman,et al. A chaotic system based fragile watermarking scheme for image tamper detection , 2011 .
[18] Maurice Mignotte,et al. How to Share a Secret? , 1982, EUROCRYPT.
[19] Gaurav Bhatnagar,et al. A new robust reference watermarking scheme based on DWT-SVD , 2009, Comput. Stand. Interfaces.
[20] Christian Roux,et al. A Joint Encryption/Watermarking System for Verifying the Reliability of Medical Images , 2012, IEEE Transactions on Information Technology in Biomedicine.
[21] John Bloom,et al. A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.
[22] Mauro Barni,et al. Composite Signal Representation for Fast and Storage-Efficient Processing of Encrypted Signals , 2010, IEEE Transactions on Information Forensics and Security.
[23] Mauro Barni,et al. Encrypted Domain DCT Based on Homomorphic Cryptosystems , 2009, EURASIP J. Inf. Secur..
[24] Ying Luo,et al. Privacy protected image denoising with secret shares , 2012, 2012 19th IEEE International Conference on Image Processing.
[25] Shiguo Lian,et al. Commutative Encryption and Watermarking in Video Compression , 2007, IEEE Transactions on Circuits and Systems for Video Technology.
[26] Mohan S. Kankanhalli,et al. Robust Watermarking of Compressed and Encrypted JPEG2000 Images , 2012, IEEE Transactions on Multimedia.
[27] Jianting Guo,et al. Secure watermarking scheme against watermark attacks in the encrypted domain , 2015, J. Vis. Commun. Image Represent..
[28] Stefan Katzenbeisser,et al. Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.
[29] Mauro Barni,et al. eSketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics , 2010, MM&Sec '10.
[30] KokSheik Wong,et al. Fast watermarking scheme for real-time spatial scalable video coding , 2016, Signal Process. Image Commun..
[31] Alessandro Neri,et al. A commutative digital image watermarking and encryption method in the tree structured Haar transform domain , 2011, Signal Process. Image Commun..