Denoising and error correction in noisy AES-encrypted images using statistical measures
暂无分享,去创建一个
[1] Emrullah Turhan Tunali,et al. Scalable video encryption of H.264 SVC Codec , 2011, J. Vis. Commun. Image Represent..
[2] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[3] Ziad Osman,et al. Error Correction of Noisy Block Cipher Using Cipher and Plaintext Characteristics , 2009, 2009 Third International Conference on Network and System Security.
[4] Marc Chaumont,et al. A reversible data hiding method for encrypted images , 2008, Electronic Imaging.
[5] Anastasios Tefas,et al. Image Watermarking: Techniques and Applications , 2009 .
[6] Pradeep K. Atrey,et al. Image Enhancement in Encrypted Domain over Cloud , 2015, ACM Trans. Multim. Comput. Commun. Appl..
[7] Xi Chen,et al. On the design of partial encryption scheme for multimedia content , 2013, Math. Comput. Model..
[8] Zhiwei He,et al. A New Method of Image Encryption/Decryption via Voice Features , 2009, 2009 2nd International Congress on Image and Signal Processing.
[9] Upena D. Dalal,et al. Enhancing selective ISMACryp video encryption for real time applications in handheld devices , 2011, TENCON 2011 - 2011 IEEE Region 10 Conference.
[10] Mohsen Rahmani,et al. A new modified version of Advanced Encryption Standard based algorithm for image encryption , 2010, 2010 International Conference on Electronics and Information Engineering.
[11] Xiaolin Tian,et al. A novel image encryption algorithm based on fractional fourier transform and magic cube rotation , 2011, 2011 4th International Congress on Image and Signal Processing.
[12] Xingyuan Wang,et al. A color image encryption with heterogeneous bit-permutation and correlated chaos , 2015 .
[13] Ramesh Karri,et al. Low cost concurrent error detection for the advanced encryption standard , 2004 .
[14] Philumon Joseph,et al. Reversible data hiding in selectively encrypted RGB images by reserving room in advance , 2014, 2014 First International Conference on Computational Systems and Communications (ICCSC).
[15] A. S. Madhukumar,et al. Error Detection and Correction in Communication Channels Using Inverse Gray RSNS Codes , 2011, IEEE Transactions on Communications.
[16] N. Otsu. A threshold selection method from gray level histograms , 1979 .
[17] Ramesh Karri,et al. On-line error detection and BIST for the AES encryption algorithm with different S-box implementations , 2005, 11th IEEE International On-Line Testing Symposium.
[18] Fangyan Nie,et al. Image Segmentation Using Two-dimensional Extension of Minimum Within-class Variance Criterion , 2013 .
[19] Zhihong Zhou,et al. Double-image encryption scheme combining DWT-based compressive sensing with discrete fractional random transform , 2015 .
[20] Ali Kanso,et al. Keyed hash function based on a chaotic map , 2012, Inf. Sci..
[21] Hongjun Liu,et al. Asymmetric color image encryption scheme using 2D discrete-time map , 2015, Signal Process..
[22] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[23] Sattar Mirzakuchaki,et al. A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map , 2012, Signal Process..
[24] Abhijit Mitra,et al. An Image Encryption Method with Magnitude and Phase Manipulation using Carrier Images , 2008 .
[25] William Puech,et al. Noise removing in encrypted color images by statistical analysis , 2012, Other Conferences.
[26] Xiaogang Wang,et al. Multiple-image encryption based on nonlinear amplitude-truncation and phase-truncation in Fourier domain , 2011 .
[27] Israel Koren,et al. Error Analysis and Detection Procedures for a Hardware Implementation of the Advanced Encryption Standard , 2003, IEEE Trans. Computers.
[28] Mohiy M. Hadhoud,et al. Chaotic image encryption in transform domains , 2009, 2009 International Conference on Computer Engineering & Systems.
[29] Malay Kishore Dutta,et al. Edge based selective encryption scheme for biometric data using chaotic theory , 2014, 2014 International Conference on Contemporary Computing and Informatics (IC3I).
[30] Lin Teng,et al. A bit-level image encryption algorithm based on spatiotemporal chaotic system and self-adaptive , 2012 .
[31] Xiaobo Li,et al. Partial encryption of compressed images and videos , 2000, IEEE Trans. Signal Process..
[32] Chun-I Fan,et al. Controllable privacy preserving search based on symmetric predicate encryption in cloud storage , 2013, Future Gener. Comput. Syst..
[33] Nahid Farhady Ghalaty,et al. Software-based control flow error detection and correction using branch triplication , 2011, 2011 IEEE 17th International On-Line Testing Symposium.
[34] B. Subramanyan,et al. Image Encryption Based on AES Key Expansion , 2011, 2011 Second International Conference on Emerging Applications of Information Technology.
[35] Yicong Zhou,et al. Cascade Chaotic System With Applications , 2015, IEEE Transactions on Cybernetics.
[36] Elankovan A. Sundararajan,et al. Performance study of selective encryption in comparison to full encryption for still visual images , 2014, Journal of Zhejiang University SCIENCE C.
[37] J. Fridrich. Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .
[38] Weiming Zhang,et al. Non-local Denoising in Encrypted Images , 2014, IOV.
[39] Xinpeng Zhang,et al. Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.
[40] Zhengjun Liu,et al. Color image encryption by using Arnold and discrete fractional random transforms in IHS space , 2010 .
[41] Chin-Chen Chang,et al. A new encryption algorithm for image cryptosystems , 2001, J. Syst. Softw..
[42] Sos S. Agaian,et al. Design of image cipher using latin squares , 2014, Inf. Sci..
[43] Yicong Zhou,et al. A new 1D chaotic system for image encryption , 2014, Signal Process..
[44] William Puech,et al. Decryption of noisy encrypted images by statistical analysis , 2011, 3rd European Workshop on Visual Information Processing.
[45] Maciej Nikodem,et al. Error detection and error correction procedures for the advanced encryption standard , 2008, Des. Codes Cryptogr..
[46] Jiang-Lung Liu,et al. Efficient selective encryption for JPEG 2000 images using private initial table , 2006, Pattern Recognit..
[47] Yicong Zhou,et al. Image encryption using a new parametric switching chaotic system , 2013, Signal Process..
[48] Nasharuddin Zainal,et al. Rapid Encryption Method based on AES Algorithm for Grey Scale HD Image Encryption , 2013 .
[49] Xiaomin Wang,et al. Secure chaotic system with application to chaotic ciphers , 2013, Inf. Sci..
[50] Mingoo Seok,et al. R-processor: 0.4V resilient processor with a voltage-scalable and low-overhead in-situ error detection and correction technique in 65nm CMOS , 2014, 2014 Symposium on VLSI Circuits Digest of Technical Papers.