-
1
-
-
53749097067
-
Perceptual video encryption scheme for mobile application based on H.264
-
L.F. Wang, W.D. Wang, J. Ma, C. Xiao, and K.Q. Wang Perceptual video encryption scheme for mobile application based on H.264 The Journal of China Universities of Posts and Telecommunications 15 1 2008 73 78
-
(2008)
The Journal of China Universities of Posts and Telecommunications
, vol.15
, Issue.1
, pp. 73-78
-
-
Wang, L.F.1
Wang, W.D.2
Ma, J.3
Xiao, C.4
Wang, K.Q.5
-
2
-
-
54549093824
-
A video encryption method based on chaotic maps in DCT domain
-
S. Yang, and S. Sun A video encryption method based on chaotic maps in DCT domain Progress in Natural Science 18 10 2008 1299 1304
-
(2008)
Progress in Natural Science
, vol.18
, Issue.10
, pp. 1299-1304
-
-
Yang, S.1
Sun, S.2
-
3
-
-
67449096190
-
A chaos-based image encryption algorithm with variable control parameters
-
Y. Wang, K.W. Wong, X. Liao, T. Xiang, and G. Chen A chaos-based image encryption algorithm with variable control parameters Chaos, Solitons & Fractals 41 4 2009 1773 1783
-
(2009)
Chaos, Solitons & Fractals
, vol.41
, Issue.4
, pp. 1773-1783
-
-
Wang, Y.1
Wong, K.W.2
Liao, X.3
Xiang, T.4
Chen, G.5
-
4
-
-
24944459842
-
Chaos-based image encryption algorithm
-
Z.H. Guan, F. Huang, and W. Guan Chaos-based image encryption algorithm Physics Letters A 346 1-3 2005 153 157
-
(2005)
Physics Letters A
, vol.346
, Issue.13
, pp. 153-157
-
-
Guan, Z.H.1
Huang, F.2
Guan, W.3
-
5
-
-
32644434350
-
A watermarking-based image ownership and tampering authentication scheme
-
C.C. Chang, Y.S. Hu, and T.C. Lu A watermarking-based image ownership and tampering authentication scheme Pattern Recognition Letters 27 5 2006 439 446
-
(2006)
Pattern Recognition Letters
, vol.27
, Issue.5
, pp. 439-446
-
-
Chang, C.C.1
Hu, Y.S.2
Lu, T.C.3
-
6
-
-
34250017964
-
Commutative encryption and watermarking in video compression
-
S. Lian, Z. Liu, Z. Ren, and H. Wang Commutative encryption and watermarking in video compression IEEE Transactions on Circuits and Systems for Video Technology 17 6 2007 774 778
-
(2007)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.17
, Issue.6
, pp. 774-778
-
-
Lian, S.1
Liu, Z.2
Ren, Z.3
Wang, H.4
-
7
-
-
77951205334
-
Prediction-based watermarking schemes using ahead/post AC prediction
-
J.M. Guo, and C.H. Chang Prediction-based watermarking schemes using ahead/post AC prediction Signal Processing 90 8 2010 2552 2566
-
(2010)
Signal Processing
, vol.90
, Issue.8
, pp. 2552-2566
-
-
Guo, J.M.1
Chang, C.H.2
-
8
-
-
78650903851
-
Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities
-
S. Bravo-Solorio, and A.K. Nandi Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities Signal Processing 91 4 2011 728 739
-
(2011)
Signal Processing
, vol.91
, Issue.4
, pp. 728-739
-
-
Bravo-Solorio, S.1
Nandi, A.K.2
-
9
-
-
84957663275
-
Watercasting: Distributed watermarking of multicast media
-
I. Brown, C. Perkins, J. Crowcroft, Watercasting: distributed watermarking of multicast media, in: Proceedings of the First International Workshop on Networked Group Communication, 1999, pp. 286-300.
-
(1999)
Proceedings of the First International Workshop on Networked Group Communication
, pp. 286-300
-
-
Brown, I.1
Perkins, C.2
Crowcroft, J.3
-
10
-
-
0030705368
-
Digital watermarking of mpeg-2 coded video in the bitstream domain
-
F. Hartung, B. Girod, Digital watermarking of mpeg-2 coded video in the bitstream domain, in: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, 1997, pp. 2621-2624.
-
(1997)
Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing
, pp. 2621-2624
-
-
Hartung, F.1
Girod, B.2
-
11
-
-
11144253373
-
Video fingerprinting and encryption principles for digital rights management
-
D. Kundur, and K. Karthik Video fingerprinting and encryption principles for digital rights management, Proceedings of the IEEE 92 6 2004 918 932
-
(2004)
Proceedings of the IEEE
, vol.92
, Issue.6
, pp. 918-932
-
-
Kundur, D.1
Karthik, K.2
-
12
-
-
84936892450
-
Cryptology for digital TV broadcasting
-
B.M. Macq, and J.J. Quisquater Cryptology for digital TV broadcasting Proceedings of the IEEE 83 6 1995 944 957
-
(1995)
Proceedings of the IEEE
, vol.83
, Issue.6
, pp. 944-957
-
-
MacQ, B.M.1
Quisquater, J.J.2
-
13
-
-
0032656890
-
Copy protection for DVD video
-
J.A. Bloom, I.J. Cox, T. Kalker, J.P.M.G. Linnartz, M.L. Miller, and C.B.S. Traw Copy protection for DVD video Proceedings of the IEEE 87 7 1999 1267 1276
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.7
, pp. 1267-1276
-
-
Bloom, J.A.1
Cox, I.J.2
Kalker, T.3
Linnartz, J.P.M.G.4
Miller, M.L.5
Traw, C.B.S.6
-
15
-
-
33845398262
-
Secure watermark embedding through partial encryption
-
A. Lemma, S. Katzenbeisser, M. Celik, M.V.D. Veen, Secure watermark embedding through partial encryption, in: Proceedings of International Workshop on Digital Watermarking, 2006, pp. 433-445.
-
(2006)
Proceedings of International Workshop on Digital Watermarking
, pp. 433-445
-
-
Lemma, A.1
Katzenbeisser, S.2
Celik, M.3
Veen, M.V.D.4
-
17
-
-
49549083913
-
Lookup-table-based secure client-side embedding for spread-spectrum watermarks
-
M.U. Celik, A.N. Lemma, S. Katzenbeisser, and M.V.D. Veen Lookup-table-based secure client-side embedding for spread-spectrum watermarks, IEEE Transactions on Information Forensics and Security 3 3 2008 475 487
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.3
, pp. 475-487
-
-
Celik, M.U.1
Lemma, A.N.2
Katzenbeisser, S.3
Veen, M.V.D.4
-
20
-
-
84982192401
-
A progressive codebook training algorithm for vector quantization
-
Beijing, China
-
Y.C. Hu, C.C. Chang, A progressive codebook training algorithm for vector quantization, in: Proceedings of the Fifth Asia-Pacific Conference on Communications and Fourth Optoelectronics and Communications Conference, 1999, Beijing, China, pp. 936-939.
-
(1999)
Proceedings of the Fifth Asia-Pacific Conference on Communications and Fourth Optoelectronics and Communications Conference
, pp. 936-939
-
-
Hu, Y.C.1
Chang, C.C.2
-
24
-
-
0142000516
-
Digital images watermarking by vector quantization
-
Taichung, Taiwan
-
Y.C. Lin, C.C. Wang, Digital images watermarking by vector quantization, in: Proceedings of National Computer Symposium, 1999, Taichung, Taiwan, pp. 76-87.
-
(1999)
Proceedings of National Computer Symposium
, pp. 76-87
-
-
Lin, Y.C.1
Wang, C.C.2
-
25
-
-
0028466006
-
An optimal algorithm for the on-line closest-pair problem
-
C. Schwartz, M. Smid, and J. Snoeyink An optimal algorithm for the on-line closest-pair problem, Algorithmica 12 1 1994 18 29
-
(1994)
Algorithmica
, vol.12
, Issue.1
, pp. 18-29
-
-
Schwartz, C.1
Smid, M.2
Snoeyink, J.3
-
26
-
-
33846706433
-
Reversible steganographic method using SMVQ approach based on declustering
-
C.C. Chang, and C.Y. Lin Reversible steganographic method using SMVQ approach based on declustering, Information Sciences 177 8 2007 1796 1805
-
(2007)
Information Sciences
, vol.177
, Issue.8
, pp. 1796-1805
-
-
Chang, C.C.1
Lin, C.Y.2
-
27
-
-
0032089417
-
Symmetric ciphers based on two-dimensional chaotic maps
-
J. Fridrich Symmetric ciphers based on two-dimensional chaotic maps, International Journal of Bifurcation and Chaos 8 6 1998 1259 1284
-
(1998)
International Journal of Bifurcation and Chaos
, vol.8
, Issue.6
, pp. 1259-1284
-
-
Fridrich, J.1
-
28
-
-
41849097790
-
Image encryption based on a new total shuffling algorithm
-
Z.C.T. Gao Image encryption based on a new total shuffling algorithm, Chaos, Solitons & Fractals 38 2008 213 220
-
(2008)
Chaos, Solitons & Fractals
, vol.38
, pp. 213-220
-
-
Gao, Z.C.T.1
-
29
-
-
78649879843
-
Secure distribution scheme for compressed data streams
-
S. Lian, Z. Liu, Z. Ren, H. Wang, Secure distribution scheme for compressed data streams, in: Proceedings of IEEE Conference on Image Processing, 2006, pp. 1953-1956.
-
(2006)
Proceedings of IEEE Conference on Image Processing
, pp. 1953-1956
-
-
Lian, S.1
Liu, Z.2
Ren, Z.3
Wang, H.4
|