-
1
-
-
79251474010
-
Genetic programming based robust image watermarking using wavelet and morton order
-
A. Abbasi, Z. Jan. A. Jaffar and A. M. Mirza, Genetic programming based robust image watermarking using wavelet and morton order, ICIC Express Letters, vol.5, no.2, pp.367-372, 2011.
-
(2011)
ICIC Express Letters
, vol.5
, Issue.2
, pp. 367-372
-
-
Abbasi, A.1
Jan, Z.2
Jaffar, A.3
Mirza, A.M.4
-
2
-
-
77956693446
-
A novel image encryption algorithm based on double hyper-chaotic systems
-
E. Dong, Z. Chen, Z. Chen, H. Li and C. Xia, A novel image encryption algorithm based on double hyper-chaotic systems, ICIC Express Letters, vol.4, no.5(A), pp.1439-1444, 2010.
-
(2010)
ICIC Express Letters
, vol.4
, Issue.5 A
, pp. 1439-1444
-
-
Dong, E.1
Chen, Z.2
Chen, Z.3
Li, H.4
Xia, C.5
-
3
-
-
0011954758
-
Matrix transformation and its application to image hiding
-
(in Chinese)
-
D. Qi, Matrix transformation and its application to image hiding, Journal of North China University of Technology, vol.11, no.1, pp.24-28, 1999 (in Chinese).
-
(1999)
Journal of North China University of Technology
, vol.11
, Issue.1
, pp. 24-28
-
-
Qi, D.1
-
4
-
-
40349091694
-
A novel algorithm for scrambling digital image based on cat chaotic mapping
-
Pasadena, CA, USA
-
L. Zhu, W. Li, L. Liao and H. Li, A novel algorithm for scrambling digital image based on cat chaotic mapping, Proc. of the 2nd IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Pasadena, CA, USA, pp.601-604, 2006.
-
(2006)
Proc. of the 2nd IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing
, pp. 601-604
-
-
Zhu, L.1
Li, W.2
Liao, L.3
Li, H.4
-
5
-
-
58349093097
-
A block location scrambling algorithm of digital image based on Arnold transformation
-
Zhangjiajie, China
-
Z. Shang, H. Ren and J. Zhang, A block location scrambling algorithm of digital image based on Arnold transformation, Proc. of the 9th International Conference for Young Computer Scientists, Zhangjiajie, China, pp.2942-2947, 2008.
-
(2008)
Proc. of the 9th International Conference for Young Computer Scientists
, pp. 2942-2947
-
-
Shang, Z.1
Ren, H.2
Zhang, J.3
-
6
-
-
0011983274
-
The periodicity of Arnold transformation
-
(in Chinese)
-
W. Sun, The periodicity of Arnold transformation, Journal of North China University of Technology, vol.11, no.1, pp.29-32, 1999 (in Chinese).
-
(1999)
Journal of North China University of Technology
, vol.11
, Issue.1
, pp. 29-32
-
-
Sun, W.1
-
7
-
-
2942661839
-
Image scrambling without bandwidth expansion
-
D. V. D. Ville, W. Philips, R. V. de Walle and I. Lemanhieu, Image scrambling without bandwidth expansion, IEEE Trans. Circuits Syst. Video Technol., vol. 14, no.6, pp.892-897, 2004.
-
(2004)
IEEE Trans. Circuits Syst. Video Technol.
, vol.14
, Issue.6
, pp. 892-897
-
-
Ville, D.V.D.1
Philips, W.2
de Walle, R.V.3
Lemanhieu, I.4
-
8
-
-
20444450903
-
A fast image-scramble method using public-key encryption allowing backward compatibility with JPEG2000
-
Singapore
-
O. Watanabe, A. Nakazaki and H. Kiya, A fast image-scramble method using public-key encryption allowing backward compatibility with JPEG2000, Proc. of IEEE Conference on Image Processing, Singapore, pp.3435-3438, 2004.
-
(2004)
Proc. of IEEE Conference on Image Processing
, pp. 3435-3438
-
-
Watanabe, O.1
Nakazaki, A.2
Kiya, H.3
-
9
-
-
0034444578
-
Robust image hashing
-
Vancouver, BC, Canada
-
R. Venkatesan, S.-M. Koon, M. H. Jakubowski and P. Moulin, Robust image hashing, Proc. of IEEE International Conference on Image Processing, Vancouver, BC, Canada, pp.664-666, 2000.
-
(2000)
Proc. of IEEE International Conference on Image Processing
, pp. 664-666
-
-
Venkatesan, R.1
Koon, S.-M.2
Jakubowski, M.H.3
Moulin, P.4
-
10
-
-
34548085689
-
Robust and secure image hashing via non-negative matrix factorizations
-
V. Monga and M. K. Mihcak, Robust and secure image hashing via non-negative matrix factorizations, IEEE Transactions on Information Forensics and Security, vol.2, no.3, pp.376-390, 2007.
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.3
, pp. 376-390
-
-
Monga, V.1
Mihcak, M.K.2
-
11
-
-
70350221685
-
Robust image hashing for tamper detection using non-negative matrix factorization
-
Z. Tang, S. Wang, X. Zhang, W. Wei and S. Su, Robust image hashing for tamper detection using non-negative matrix factorization, Journal of Ubiquitous Convergence and Technology, vol.2, no.1, pp. 18-26, 2008.
-
(2008)
Journal of Ubiquitous Convergence and Technology
, vol.2
, Issue.1
, pp. 18-26
-
-
Tang, Z.1
Wang, S.2
Zhang, X.3
Wei, W.4
Su, S.5
|