-
1
-
-
4744354027
-
On compressing encrypted data
-
Oct.
-
M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K. Ramchandran, "On compressing encrypted data," IEEE Trans. Signal Process., vol. 52, no. 10, pp. 2992-3006, Oct. 2004.
-
(2004)
IEEE Trans. Signal Process.
, vol.52
, Issue.10
, pp. 2992-3006
-
-
Johnson, M.1
Ishwar, P.2
Prabhakaran, V.M.3
Schonberg, D.4
Ramchandran, K.5
-
2
-
-
77949668515
-
Efficient compression of encrypted grayscale images
-
Apr.
-
W. Liu, W. Zeng, L. Dong, and Q. Yao, "Efficient compression of encrypted grayscale images," IEEE Trans. Image Process., vol. 19, no. 4, pp. 1097-1102, Apr. 2010.
-
(2010)
IEEE Trans. Image Process.
, vol.19
, Issue.4
, pp. 1097-1102
-
-
Liu, W.1
Zeng, W.2
Dong, L.3
Yao, Q.4
-
3
-
-
79951839282
-
Lossy compression and iterative reconstruction for encrypted image
-
Feb.
-
X. Zhang, "Lossy compression and iterative reconstruction for encrypted image," IEEE Trans. Inform. Forensics Security, vol. 6, no. 1, pp. 53-58, Feb. 2011.
-
(2011)
IEEE Trans. Inform. Forensics Security
, vol.6
, Issue.1
, pp. 53-58
-
-
Zhang, X.1
-
4
-
-
60449095773
-
On the implementation of the discrete Fourier transform in the encrypted domain
-
Feb.
-
T. Bianchi, A. Piva, and M. Barni, "On the implementation of the discrete Fourier transform in the encrypted domain," IEEE Trans. Inform. Forensics Security, vol. 4, no. 1, pp. 86-97, Feb. 2009.
-
(2009)
IEEE Trans. Inform. Forensics Security
, vol.4
, Issue.1
, pp. 86-97
-
-
Bianchi, T.1
Piva, A.2
Barni, M.3
-
5
-
-
77249117753
-
Composite signal representation for fast and storage-efficient processing of encrypted signals
-
Feb.
-
T. Bianchi, A. Piva, and M. Barni, "Composite signal representation for fast and storage-efficient processing of encrypted signals," IEEE Trans. Inform. Forensics Security, vol. 5, no. 1, pp. 180-187, Feb. 2010.
-
(2010)
IEEE Trans. Inform. Forensics Security
, vol.5
, Issue.1
, pp. 180-187
-
-
Bianchi, T.1
Piva, A.2
Barni, M.3
-
6
-
-
0035307977
-
A buyer-seller watermarking protocol
-
Apr.
-
N. Memon and P. W. Wong, "A buyer-seller watermarking protocol," IEEE Trans. Image Process., vol. 10, no. 4, pp. 643-649, Apr. 2001.
-
(2001)
IEEE Trans. Image Process.
, vol.10
, Issue.4
, pp. 643-649
-
-
Memon, N.1
Wong, P.W.2
-
7
-
-
28844473947
-
Fingerprinting protocol for images based on additive homomorphic property
-
Dec.
-
M. Kuribayashi and H. Tanaka, "Fingerprinting protocol for images based on additive homomorphic property," IEEE Trans. Image Process., vol. 14, no. 12, pp. 2129-2139, Dec. 2005.
-
(2005)
IEEE Trans. Image Process.
, vol.14
, Issue.12
, pp. 2129-2139
-
-
Kuribayashi, M.1
Tanaka, H.2
-
8
-
-
70449671086
-
An efficient buyer-seller watermarking protocol based on composite signal representation
-
M. Deng, T. Bianchi, A. Piva, and B. Preneel, "An efficient buyer-seller watermarking protocol based on composite signal representation," in Proc. 11th ACM Workshop Multimedia and Security, 2009, pp. 9-18.
-
(2009)
Proc. 11th ACM Workshop Multimedia and Security
, pp. 9-18
-
-
Deng, M.1
Bianchi, T.2
Piva, A.3
Preneel, B.4
-
9
-
-
34250017964
-
Commutative encryption and watermarking in video compression
-
Jun.
-
S. Lian, Z. Liu, Z. Ren, and H. Wang, "Commutative encryption and watermarking in video compression," IEEE Trans. Circuits Syst. Video Technol., vol. 17, no. 6, pp. 774-778, Jun. 2007.
-
(2007)
IEEE Trans. Circuits Syst. Video Technol.
, vol.17
, Issue.6
, pp. 774-778
-
-
Lian, S.1
Liu, Z.2
Ren, Z.3
Wang, H.4
-
10
-
-
78651086488
-
A commutative digital image watermarking and encryption method in the tree structured Haar transform domain
-
M. Cancellaro, F. Battisti, M. Carli, G. Boato, F. G. B. Natale, and A. Neri, "A commutative digital image watermarking and encryption method in the tree structured Haar transform domain," Signal Processing: Image Commun., vol. 26, no. 1, pp. 1-12, 2011.
-
(2011)
Signal Processing: Image Commun.
, vol.26
, Issue.1
, pp. 1-12
-
-
Cancellaro, M.1
Battisti, F.2
Carli, M.3
Boato, G.4
Natale, F.G.B.5
Neri, A.6
-
11
-
-
11144253373
-
Video fingerprinting and encryption principles for digital rights management
-
Jun.
-
D. Kundur and K. Karthik, "Video fingerprinting and encryption principles for digital rights management," Proceedings IEEE, vol. 92, no. 6, pp. 918-932, Jun. 2004.
-
(2004)
Proceedings IEEE
, vol.92
, Issue.6
, pp. 918-932
-
-
Kundur, D.1
Karthik, K.2
-
12
-
-
79952179059
-
Reversible data hiding in encrypted image
-
Apr.
-
X. Zhang, "Reversible data hiding in encrypted image," IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255-258, Apr. 2011.
-
(2011)
IEEE Signal Process. Lett.
, vol.18
, Issue.4
, pp. 255-258
-
-
Zhang, X.1
-
13
-
-
0141862029
-
Reversible data embedding using a difference expansion
-
Aug.
-
J. Tian, "Reversible data embedding using a difference expansion," IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890-896, Aug. 2003.
-
(2003)
IEEE Trans. Circuits Syst. Video Technol.
, vol.13
, Issue.8
, pp. 890-896
-
-
J. Tian1
-
14
-
-
33645157142
-
Reversible data hiding
-
Mar.
-
Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, "Reversible data hiding," IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354-362, Mar. 2006.
-
(2006)
IEEE Trans. Circuits Syst. Video Technol.
, vol.16
, Issue.3
, pp. 354-362
-
-
Ni, Z.1
Shi, Y.-Q.2
Ansari, N.3
Su, W.4
-
15
-
-
13244269881
-
Lossless generalized- LSB data embedding
-
Feb.
-
M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, "Lossless generalized- LSB data embedding," IEEE Trans. Image Process., vol. 14, no. 2, pp. 253-266, Feb. 2005.
-
(2005)
IEEE Trans. Image Process.
, vol.14
, Issue.2
, pp. 253-266
-
-
Celik, M.U.1
Sharma, G.2
Tekalp, A.M.3
Saber, E.4
-
16
-
-
77955307612
-
A high capacity reversible data hiding scheme using orthogonal projection and prediction error modification
-
W. Hong, T.-S. Chen, Y.-P. Chang, and C.-W. Shiu, "A high capacity reversible data hiding scheme using orthogonal projection and prediction error modification," Signal Process., vol. 90, pp. 2911-2922, 2010.
-
(2010)
Signal Process.
, vol.90
, pp. 2911-2922
-
-
Hong, W.1
Chen, T.-S.2
Chang, Y.-P.3
Shiu, C.-W.4
-
17
-
-
45749117988
-
Reversible data-embedding scheme using differences between original and predicted pixel values
-
C.-C. Chang, C.-C. Lin, and Y.-H. Chen, "Reversible data-embedding scheme using differences between original and predicted pixel values," IET Inform. Security, vol. 2, no. 2, pp. 35-46, 2008.
-
(2008)
IET Inform. Security
, vol.2
, Issue.2
, pp. 35-46
-
-
Chang, C.-C.1
Lin, C.-C.2
Chen, Y.-H.3
-
18
-
-
0032314376
-
A comparison of image quality models and metrics based on human visual sensitivity
-
Chicago, IL
-
A. Mayache, T. Eude, and H. Cherifi, "A comparison of image quality models and metrics based on human visual sensitivity," in Proc. Int. Conf. Image Processing (ICIP'98), Chicago, IL, 1998, vol. 3, pp. 409-413.
-
(1998)
Proc. Int. Conf. Image Processing (ICIP'98)
, vol.3
, pp. 409-413
-
-
Mayache, A.1
Eude, T.2
Cherifi, H.3
-
19
-
-
0036493909
-
A universal image quality index
-
Jan.
-
Z. Wang and A. C. Bovik, "A universal image quality index," IEEE Signal Process. Lett., vol. 9, no. 1, pp. 81-84, Jan. 2002.
-
(2002)
IEEE Signal Process. Lett.
, vol.9
, Issue.1
, pp. 81-84
-
-
Wang, Z.1
Bovik, A.C.2
|