-
1
-
-
16344371432
-
Security analysis of a chaos-based image encryptionalgorithm
-
Shiguo Lian, Jinsheng Sun, Zhiquan Wang, Security analysis of a chaos-based image encryptionalgorithm, Physica A: Statistical Mechanics and its Applications, Vol. 351, no. 2-4, pp. 645-661, 2005.
-
(2005)
Physica A: Statistical Mechanics and its Applications
, vol.351
, Issue.2-4
, pp. 645-661
-
-
Lian, S.1
Sun, J.2
Wang, Z.3
-
2
-
-
64249094192
-
Multi chaotic systems based pixel shuffle for image encryption
-
C.K. Huang, and H.H. Nien. Multi chaotic systems based pixel shuffle for image encryption,Optics Communications, Vol 282, no. 11, 2009.
-
(2009)
Optics Communications
, vol.11
, pp. 282
-
-
Huang, C.K.1
Nien, H.H.2
-
3
-
-
1342306864
-
A symmetric image encryption scheme based on 3D chaotic cat maps
-
Guanrong Chen, Yaobin Mao, Charles K. Chui, A symmetric image encryption scheme based on 3D chaotic cat maps, Chaos Solitons & Fractals Vol. 12 no.3, pp. 749-761, 2004
-
(2004)
Chaos Solitons & Fractals
, vol.12
, Issue.3
, pp. 749-761
-
-
Chen, G.1
Mao, Y.2
Charles, C.K.3
-
4
-
-
78651573799
-
A New Design of Encryption/Decryption for Field Applications
-
Kuo-Ching Liu, Hui-Feng Huang, A New Design of Encryption/Decryption for Field Applications, JCIT: Journal of Convergence Information Technology, Vol. 5, No. 5, pp. 39-43, 2010
-
(2010)
JCIT: Journal of Convergence Information Technology
, vol.5
, Issue.5
, pp. 39-43
-
-
Kuo-Ching, L.1
Hui-Feng, H.2
-
5
-
-
70349565258
-
Watermarking scheme of colour image based on chaotic sequences
-
Nian-sheng Liu, Dong-hui Guo, Watermarking scheme of colour image based on chaotic sequences, Optoelectronics Letters. Vol 5, no. 3, pp. 227-231, 2009.
-
(2009)
Optoelectronics Letters
, vol.5
, Issue.3
, pp. 227-231
-
-
Nian-sheng, L.1
Dong-hui, G.2
-
6
-
-
78651526793
-
Watermarking 3D Triangular Mesh with High Visual Quality
-
Osama Hosam, Lincong Yang, Wei Liang, Xingming Sun, Watermarking 3D Triangular Mesh with High Visual Quality, JDCTA: International Journal of Digital Content Technology and its Applications, Vol. 4, No. 4, pp. 107-116, 2010
-
(2010)
JDCTA: International Journal of Digital Content Technology and Its Applications
, vol.4
, Issue.4
, pp. 107-116
-
-
Hosam, O.1
Yang, L.2
Liang, W.3
Sun, X.4
-
7
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T, Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing, Vol. 6, no. 12, pp. 1673-1687, 1997.
-
(1997)
IEEE Transactions on Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, F.T.3
Shamoon, T.4
-
8
-
-
77958555199
-
Robust Digital Image Watermarking Based on Joint DWT-DCT, JDCTA
-
Saeed K. Amirgholipour, Ahmad R. Naghsh-Nilchi, Robust Digital Image Watermarking Based on Joint DWT-DCT, JDCTA: International Journal of Digital Content Technology and its Applications, Vol. 3, No. 2, pp. 42-54, 2009
-
(2009)
International Journal of Digital Content Technology and Its Applications
, vol.3
, Issue.2
, pp. 42-54
-
-
Amirgholipour, S.K.1
Naghsh-Nilchi, A.R.2
-
9
-
-
63449123596
-
Quasi-commutative watermarking and encryption for secure media content distribution
-
Shiguo Lian, Quasi-commutative watermarking and encryption for secure media content distribution, Multimedia Tools and Applications, Vol. 43, no. 1, pp. 91-107, 2009.
-
(2009)
Multimedia Tools and Applications
, vol.43
, Issue.1
, pp. 91-107
-
-
Lian, S.1
-
10
-
-
0037151693
-
WHIM: Watermarking multicast video with a hierarchy of intermediaries
-
Judge Paul, Ammar Mostafa, WHIM: watermarking multicast video with a hierarchy of intermediaries, Computer Networks, Vol. 39, no. 6, pp. 699-712, 2002.
-
(2002)
Computer Networks
, vol.39
, Issue.6
, pp. 699-712
-
-
Paul, J.1
Mostafa, A.2
-
11
-
-
55149105649
-
Collusion-Traceable Secure Multimedia Distribution Based on Controllable Modulation
-
Shiguo Lian, Zhiquan Wang, Collusion-Traceable Secure Multimedia Distribution Based on Controllable Modulation, IEEE Transactions on Circuits Systems Video Technology, Vol.18, no.10, pp.1462-1467, 2008.
-
(2008)
IEEE Transactions on Circuits Systems Video Technology
, vol.18
, Issue.10
, pp. 1462-1467
-
-
Lian, S.1
Wang, Z.2
-
12
-
-
70350168767
-
Secure image distribution based on joint decryption and fingerprinting
-
Shiguo Lian, Secure image distribution based on joint decryption and fingerprinting, Imaging Science Journal, Vol. 57, no 2, pp. 84-93, 2009
-
(2009)
Imaging Science Journal
, vol.57
, Issue.2
, pp. 84-93
-
-
Lian, S.1
-
13
-
-
33746371748
-
Fingercasting joint fingerprinting and decryption of broadcast messages
-
4058 of Lecture Notes in Computer Science
-
Adelsbach, U.Huber, A.-R.Sadeghi, Fingercasting joint fingerprinting and decryption of broadcast messages, in Proceedings of the 11th Australasian Conference on Information Security and Privacy (ACISP'06), Vol. 4058 of Lecture Notes in Computer Science, pp.136-147, 2006.
-
(2006)
Proceedings of the 11th Australasian Conference on Information Security and Privacy (ACISP'06)
, pp. 136-147
-
-
Adelsbach, U.1
Hubersadeghi, A.R.2
-
14
-
-
0038527384
-
Anti-collusion fingerprinting for multimedia
-
W. Trappe, M. Wu, Z. Wang, K.J.R. Liu, Anti-collusion fingerprinting for multimedia, IEEE Transactions on Signal Processing, vol.51, pp.1069-1087, 2003.
-
(2003)
IEEE Transactions on Signal Processing
, vol.51
, pp. 1069-1087
-
-
Trappe, W.1
Wu, M.2
Wang, Z.3
Liu, K.J.R.4
|