Secure and Efficient Medical Image Transmission by New Tailored Visual Cryptography Scheme with LS Compressions
暂无分享,去创建一个
[1] Ja-Chen Lin,et al. Visual cryptography with extra ability of hiding confidential data , 2006, J. Electronic Imaging.
[2] Ching-Nung Yang,et al. New visual secret sharing schemes using probabilistic method , 2004, Pattern Recognit. Lett..
[3] Vishal Monga,et al. Robust and Secure Image Hashing via Non-Negative Matrix Factorizations , 2007, IEEE Transactions on Information Forensics and Security.
[4] Giovanni Di Crescenzo,et al. Halftone Visual Cryptography Via Error Diffusion , 2009, IEEE Transactions on Information Forensics and Security.
[5] Subramania Sudharsanan. Shared key encryption of JPEG color images , 2005, IEEE Transactions on Consumer Electronics.
[6] J.-C. Yeo,et al. Efficient hierarchical chaotic image encryption algorithm and its VLSI realisation , 2000 .
[7] K. Porkumaran,et al. The new block pixel sort algorithm for TVC-encrypted medical image , 2014 .
[8] Xiaobo Li,et al. Partial encryption of compressed images and videos , 2000, IEEE Trans. Signal Process..
[9] Weisi Lin,et al. Modeling visual attention's modulatory aftereffects on visual sensitivity and quality evaluation , 2005, IEEE Transactions on Image Processing.
[10] Feng Liu,et al. Step Construction of Visual Cryptography Schemes , 2010, IEEE Transactions on Information Forensics and Security.
[11] John C. Zubeck,et al. Implementing Reuse with RAD Tools' Native Objects , 1997, Computer.
[12] Zhe Chen,et al. Performance evaluation of functional medical imaging compression via optimal sampling schedule designs and cluster analysis , 2005, IEEE Transactions on Biomedical Engineering.
[13] S-F Tua,et al. Design of visual cryptographic methods with smoothlooking decoded images of invariant size for grey-level images , 2007 .
[14] Hsien-Chu Wu,et al. Color Visual Cryptography Scheme Using Meaningful Shares , 2008, 2008 Eighth International Conference on Intelligent Systems Design and Applications.
[15] Y. Chu,et al. New data hiding scheme using pixel swapping for halftone images , 2008 .
[16] Hossain Shahriar,et al. Hijacking of Clicks: Attacks and Mitigation Techniques , 2015 .
[17] Lynn Batten,et al. Hypothesis generation and testing in event profiling for digital forensic investigations , 2013 .
[18] B. Javidi,et al. Compression of Optically Encrypted Digital Holograms Using Artificial Neural Networks , 2006, Journal of Display Technology.
[19] Fu-Liang Yin,et al. Blind source separation applied to image cryptosystems with dual encryption , 2002 .
[20] Yung-Gi Wu,et al. Medical image compression by sampling DCT coefficients , 2002, IEEE Trans. Inf. Technol. Biomed..
[21] U. Rajendra Acharya,et al. Compact storage of medical images with patient information , 2001, IEEE Transactions on Information Technology in Biomedicine.
[22] Xiaofei Wang,et al. Visual Cryptography for General Access Structure Using Pixel-block Aware Encoding , 2008, J. Comput..
[23] Min Zhang,et al. T-matrix and its applications in image processing , 2004 .
[24] A. Kh. Al Jabri,et al. Secure progressive transmission of compressed images , 1996 .
[25] N. Bourbakis,et al. SCAN-Based Compression-Encryption-Hiding for Video on Demand , 2003, IEEE Multim..
[26] C.-C. Jay Kuo,et al. Design of integrated multimedia compression and encryption systems , 2005, IEEE Transactions on Multimedia.
[27] Chuohao Yeo,et al. Toward Compression of Encrypted Images and Video Sequences , 2008, IEEE Transactions on Information Forensics and Security.
[28] Tzung-Her Chen,et al. Friendly Color Visual Secret Sharing by Random Grids , 2009, Fundam. Informaticae.
[29] Heung-Kyu Lee,et al. Color Extended Visual Cryptography Using Error Diffusion , 2011, IEEE Transactions on Image Processing.
[30] Sotiris Ioannidis,et al. Multilevel Visualization Using Enhanced Social Network Analysis with Smartphone Data , 2013, Int. J. Digit. Crime Forensics.
[31] Guanrong Chen,et al. Cryptanalysis of an Image Scrambling Scheme Without Bandwidth Expansion , 2008, IEEE Transactions on Circuits and Systems for Video Technology.
[32] W. Kuo,et al. Adaptive predictive multiplicative autoregressive model for medical image compression. , 1999, IEEE transactions on medical imaging.
[33] Der-Chyuan Lou,et al. A novel authenticatable color visual secret sharing scheme using non-expanded meaningful shares , 2011, Displays.
[34] Shen-Chuan Tai,et al. Medical image compression by discrete cosine transform spectral similarity strategy , 2001, IEEE Transactions on Information Technology in Biomedicine.
[35] D. S. Guru,et al. An Approach for Hand Vein Representation and Indexing , 2011, Int. J. Digit. Crime Forensics.
[36] M. Cruz-cunha,et al. Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance , 2014 .
[37] H. K. Huang,et al. Authenticity and integrity of digital mammography images , 2001, IEEE Transactions on Medical Imaging.
[38] Juan Carlos De Martin,et al. Perception-based partial encryption of compressed speech , 2002, IEEE Trans. Speech Audio Process..
[39] Haiping Lu,et al. A Biometric Encryption System for the Self-Exclusion Scenario of Face Recognition , 2009, IEEE Systems Journal.