@article{bb303800, AUTHOR = "Raj, N.R.N. and Shreelekshmi, R.", TITLE = "Fragile watermarking scheme for tamper localization in images using logistic map and singular value decomposition", JOURNAL = JVCIR, VOLUME = "85", YEAR = "2022", PAGES = "103500", BIBSOURCE = "http://www.visionbib.com/bibliography/char995f1.html#TT298295"} @article{bb303801, AUTHOR = "Wang, Y.L. and Li, Z.Y. and Gong, D.F. and Lu, H.Y. and Liu, F.L.", TITLE = "Image fragile watermarking algorithm based on deneighbourhood mapping", JOURNAL = IET-IPR, VOLUME = "16", YEAR = "2022", NUMBER = "10", PAGES = "2652-2664", BIBSOURCE = "http://www.visionbib.com/bibliography/char995f1.html#TT298296"} @article{bb303802, AUTHOR = "Zhao, G. and Qin, C. and Yao, H. and Han, Y.F.", TITLE = "DNN self-embedding watermarking: Towards tampering detection and parameter recovery for deep neural network", JOURNAL = PRL, VOLUME = "164", YEAR = "2022", PAGES = "16-22", BIBSOURCE = "http://www.visionbib.com/bibliography/char995f1.html#TT298297"} @inproceedings{bb303803, AUTHOR = "Yin, Z.X. and Yin, H. and Zhang, X.P.", TITLE = "Neural Network Fragile watermarking With No Model Performance Degradation", BOOKTITLE = ICIP22, YEAR = "2022", PAGES = "3958-3962", BIBSOURCE = "http://www.visionbib.com/bibliography/char995f1.html#TT298298"} @inproceedings{bb303804, AUTHOR = "Tang, X. and Qi, Y.N. and Huang, Y.F.", TITLE = "Fragile Watermarking Based Proofs of Retrievability for Archival Cloud Data", BOOKTITLE = IWDW16, YEAR = "2016", PAGES = "296-311", BIBSOURCE = "http://www.visionbib.com/bibliography/char995f1.html#TT298299"} @inproceedings{bb303805, AUTHOR = "Azeroual, A. and Afdel, K.", TITLE = "Image Authentication Based on Faber Schauder DWT", BOOKTITLE = CGiV16, YEAR = "2016", PAGES = "78-83", BIBSOURCE = "http://www.visionbib.com/bibliography/char995f1.html#TT298300"} @inproceedings{bb303806, AUTHOR = "Azeroual, A. and Afdel, K.", TITLE = "A Fragile Watermarking Scheme for Image Authentication Using Wavelet Transform", BOOKTITLE = ICISP16, YEAR = "2016", PAGES = "337-345", BIBSOURCE = "http://www.visionbib.com/bibliography/char995f1.html#TT298301"} @inproceedings{bb303807, AUTHOR = "Bhattacharya, A. and Palit, S. and Sarkar, D.", TITLE = "A blind quality assessment of video using fragile watermarking", BOOKTITLE = IVCNZ13, YEAR = "2013", PAGES = "489-493", BIBSOURCE = "http://www.visionbib.com/bibliography/char995f1.html#TT298302"} @inproceedings{bb303808, AUTHOR = "Wang, H. and Ho, A.T.S. and Zhao, X.", TITLE = "A Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression", BOOKTITLE = IWDW11, YEAR = "2011", PAGES = "72-85", BIBSOURCE = "http://www.visionbib.com/bibliography/char995f1.html#TT298303"} @inproceedings{bb303809, AUTHOR = "Golea, N.E.H.", TITLE = "A Fragile Watermarking Scheme Based CRC Checksum and Public Key Cryptosystem for RGB Color Image Authentication", BOOKTITLE = ICISP12, YEAR = "2012", PAGES = "316-325", BIBSOURCE = "http://www.visionbib.com/bibliography/char995f1.html#TT298304"} @inproceedings{bb303810, AUTHOR = "Huber, R. and Stogner, H. and Uhl, A.", TITLE = "Semi-fragile Watermarking in Biometric Systems: Template Self-Embedding", BOOKTITLE = CAIP11, YEAR = "2011", PAGES = "II: 34-41", BIBSOURCE = "http://www.visionbib.com/bibliography/char995f1.html#TT298305"} @inproceedings{bb303811, AUTHOR = "Mostafa, S.A.K.", TITLE = "A New Semi-Fragile Watermarking Scheme for Authentication and Tamper Localization in Remote Sensing Images", BOOKTITLE = CGC10, YEAR = "2010", PAGES = "216", BIBSOURCE = "http://www.visionbib.com/bibliography/char995f1.html#TT298306"} @inproceedings{bb303812, AUTHOR = "Wang, P.F. and Chen, Y.W.", TITLE = "A fragile watermarking algorithm based on logistic system and JPEG", BOOKTITLE = IASP10, YEAR = "2010", PAGES = "663-666", BIBSOURCE = "http://www.visionbib.com/bibliography/char995f1.html#TT298307"} @inproceedings{bb303813, AUTHOR = "Hassan, A.M. and Al Hamadi, A. and Hasan, Y.M.Y. and Wahab, M.A.A. and Panning, A. and Michaelis, B.", TITLE = "Variable block-size image authentication with localization and self-recovery", BOOKTITLE = ICIP10, YEAR = "2010", PAGES = "3665-3668", BIBSOURCE = "http://www.visionbib.com/bibliography/char995f1.html#TT298308"} @inproceedings{bb303814, AUTHOR = "Hassan, A.M. and Al Hamadi, A. and Michaelis, B. and Hasan, Y.M.Y. and Wahab, M.A.A.", TITLE = "Secure Self-Recovery Image Authentication Using Randomly-Sized Blocks", BOOKTITLE = ICPR10, YEAR = "2010", PAGES = "1445-1448", BIBSOURCE = "http://www.visionbib.com/bibliography/char995f1.html#TT298309"} @inproceedings{bb303815, AUTHOR = "Hassan, A.M. and Hasan, Y.M.Y. and Al Hamadi, A. and Wahab, M.A.A. and Michaelis, B.", TITLE = "A novel public key self-embedding fragile watermarking technique for image authentication", BOOKTITLE = ICIP09, YEAR = "2009", PAGES = "1261-1264", BIBSOURCE = "http://www.visionbib.com/bibliography/char995f1.html#TT298310"} @inproceedings{bb303816, AUTHOR = "Hassan, A.M. and Al Hamadi, A. and Michaelis, B. and Hasan, Y.M.Y. and Wahab, M.A.A.", TITLE = "Semi-fragile Image Authentication Using Robust Image Hashing with Localization", BOOKTITLE = ICMV09, YEAR = "2009", PAGES = "133-137", BIBSOURCE = "http://www.visionbib.com/bibliography/char995f1.html#TT298311"} @inproceedings{bb303817, AUTHOR = "Hoang, T. and Tran, D. and Sharma, D.", TITLE = "Remote multimodal biometric authentication using bit priority-based fragile watermarking", BOOKTITLE = ICPR08, YEAR = "2008", PAGES = "1-4", BIBSOURCE = "http://www.visionbib.com/bibliography/char995f1.html#TT298312"} @inproceedings{bb303818, AUTHOR = "Schaathun, H.G.", TITLE = "Attack Analysis for He and Wu's Joint Watermarking/Fingerprinting Scheme", BOOKTITLE = DW07, YEAR = "2007", PAGES = "45-59", BIBSOURCE = "http://www.visionbib.com/bibliography/char995f1.html#TT298313"} @inproceedings{bb303819, AUTHOR = "Ridzon, R. and Levicky, D.", TITLE = "Robust digital watermarking in color images", BOOKTITLE = WSSIP08, YEAR = "2008", PAGES = "425-428", BIBSOURCE = "http://www.visionbib.com/bibliography/char995f1.html#TT298314"} @inproceedings{bb303820, AUTHOR = "Shen, B. and Kalker, T.", TITLE = "Re-quantization Based Semi-Fragile Authentication for General Uniform Quantizer", BOOKTITLE = ICIP07, YEAR = "2007", PAGES = "VI: 113-116", BIBSOURCE = "http://www.visionbib.com/bibliography/char995f1.html#TT298315"} @inproceedings{bb303821, AUTHOR = "He, H.J. and Zhang, J.S. and Tai, H.M.", TITLE = "A Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication", BOOKTITLE = DW06, YEAR = "2006", PAGES = "422-432", BIBSOURCE = "http://www.visionbib.com/bibliography/char995f1.html#TT298316"} @inproceedings{bb303822, AUTHOR = "Boyer, J.P. and Duhamel, P. and Blanc Talon, J.", TITLE = "Game-Theoretic Analysis of a Semi-Fragile Watermarking Scheme Based on SCS", BOOKTITLE = ICIP05, YEAR = "2005", PAGES = "II: 1122-1125", BIBSOURCE = "http://www.visionbib.com/bibliography/char995f1.html#TT298317"} @inproceedings{bb303823, AUTHOR = "Huang, J.W. and Hu, J.Q. and Huang, D. and Shi, Y.Q.", TITLE = "Improve security of fragile watermarking via parameterized wavelet", BOOKTITLE = ICIP04, YEAR = "2004", PAGES = "II: 721-724", BIBSOURCE = "http://www.visionbib.com/bibliography/char995f1.html#TT298318"} @inproceedings{bb303824, AUTHOR = "Hu, J.Q. and Huang, J.W. and Huang, D. and Shi, Y.Q.", TITLE = "A DWT-Based Fragile Watermarking Tolerant of JPEG Compression", BOOKTITLE = DW02, YEAR = "2002", PAGES = "179 ff", BIBSOURCE = "http://www.visionbib.com/bibliography/char995f1.html#TT298319"} @inproceedings{bb303825, AUTHOR = "Yuan, Y.Y. and Li, C.T.", TITLE = "Fragile watermarking scheme exploiting non-deterministic block-wise dependency", BOOKTITLE = ICPR04, YEAR = "2004", PAGES = "IV: 849-852", BIBSOURCE = "http://www.visionbib.com/bibliography/char995f1.html#TT298320"} @inproceedings{bb303826, AUTHOR = "Han, S.J. and Chang, I.S. and Park, R.H.", TITLE = "Semi-fragile Watermarking for Tamper Proofing and Authentication of Still Images", BOOKTITLE = DW03, YEAR = "2003", PAGES = "328-339", BIBSOURCE = "http://www.visionbib.com/bibliography/char995f1.html#TT298321"} @inproceedings{bb303827, AUTHOR = "Sun, Q.B. and Chang, S.F. and Kurato, M. and Suto, M.", TITLE = "A quantitive semi-fragile jpeg2000 image authentication system", BOOKTITLE = ICIP02, YEAR = "2002", PAGES = "II: 921-924", BIBSOURCE = "http://www.visionbib.com/bibliography/char995f1.html#TT298322"} @inproceedings{bb303828, AUTHOR = "Byun, S.C. and Lee, S.K. and Tewfik, A.H. and Ahn, B.H.", TITLE = "A SVD-Based Fragile Watermarking Scheme for Image Authentication", BOOKTITLE = DW02, YEAR = "2002", PAGES = "170 ff", BIBSOURCE = "http://www.visionbib.com/bibliography/char995f1.html#TT298323"} @inproceedings{bb303829, AUTHOR = "Sun, Q.B. and Chang, S.F.", TITLE = "Semi-fragile image authentication using generic wavelet domain features and ecc", BOOKTITLE = ICIP02, YEAR = "2002", PAGES = "II: 901-904", BIBSOURCE = "http://www.visionbib.com/bibliography/char995f1.html#TT298324"} @inproceedings{bb303830, AUTHOR = "Almutairi, A.F. and Mersereauu, R.M.", TITLE = "Secure Fragile Digital Watermarking Technique for Image Authentication", BOOKTITLE = ICIP01, YEAR = "2001", PAGES = "III: 1031-1034", BIBSOURCE = "http://www.visionbib.com/bibliography/char995f1.html#TT298325"} @inproceedings{bb303831, AUTHOR = "Fridrich, J. and Goljan, M.", TITLE = "New Fragile Authentication Watermark for Images", BOOKTITLE = ICIP00, YEAR = "2000", PAGES = "Vol I: 446-449", BIBSOURCE = "http://www.visionbib.com/bibliography/char995f1.html#TT298326"} @article{bb303832, AUTHOR = "Scharinger, J.", TITLE = "Fast Encryption of Image Data Using Chaotic Kolmogorov Flows", JOURNAL = JEI, VOLUME = "7", YEAR = "1998", NUMBER = "2", MONTH = "April", PAGES = "318-325", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298327"} @article{bb303833, AUTHOR = "Chuang, T.J. and Lin, J.C.", TITLE = "New Approach to Image Encryption", JOURNAL = JEI, VOLUME = "7", YEAR = "1998", NUMBER = "2", MONTH = "April", PAGES = "350-356", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298328"} @article{bb303834, AUTHOR = "Chung, K.L. and Chang, L.C.", TITLE = "Large Encrypting Binary Images with Higher Security", JOURNAL = PRL, VOLUME = "19", YEAR = "1998", NUMBER = "5-6", MONTH = "April", PAGES = "461-468", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298329"} @article{bb303835, AUTHOR = "Aikawa, M. and Takaragi, K. and Furuya, S. and Sasamoto, M.", TITLE = "A Lightweight Encryption Method Suitable For Copyright Protection", JOURNAL = Consumer, VOLUME = "44", YEAR = "1998", NUMBER = "3", MONTH = "August", PAGES = "902-910", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298330"} @article{bb303836, AUTHOR = "Yen, J.C. and Guo, J.I.", TITLE = "Efficient hierarchical chaotic image encryption algorithm and its VLSI realisation", JOURNAL = VISP, VOLUME = "147", YEAR = "2000", NUMBER = "2", MONTH = "April", PAGES = "167", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298331"} @article{bb303837, AUTHOR = "Chang, C.C. and Chuang, J.C.", TITLE = "An image intellectual property protection scheme for gray-level images using visual secret sharing strategy", JOURNAL = PRL, VOLUME = "23", YEAR = "2002", NUMBER = "8", MONTH = "June", PAGES = "931-941", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298332"} @article{bb303838, AUTHOR = "Chang, C.C. and Yu, T.X.", TITLE = "Cryptanalysis of an encryption scheme for binary images", JOURNAL = PRL, VOLUME = "23", YEAR = "2002", NUMBER = "14", MONTH = "December", PAGES = "1847-1852", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298333"} @article{bb303839, AUTHOR = "Chang, C.C. and Hwang, K.F. and Hwang, M.S.", TITLE = "Robust authentication scheme for protecting copyrights of images and graphics", JOURNAL = VISP, VOLUME = "149", YEAR = "2002", NUMBER = "1", MONTH = "February", PAGES = "43-50", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298334"} @article{bb303840, AUTHOR = "Alberti, C. and Romeo, A. and Mattavelli, M.", TITLE = "Intellectual property management and protection for MPEG multimedia content: A structured language for interoperable IPMP systems", JOURNAL = IJIST, VOLUME = "13", YEAR = "2003", NUMBER = "5", PAGES = "275-288", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298335"} @article{bb303841, AUTHOR = "Lin, C.C. and Tsai, W.H.", TITLE = "Visual cryptography for gray-level images by dithering techniques", JOURNAL = PRL, VOLUME = "24", YEAR = "2003", NUMBER = "1-3", MONTH = "January", PAGES = "349-358", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298336"} @article{bb303842, AUTHOR = "Hou, Y.C.", TITLE = "Visual cryptography for color images", JOURNAL = PR, VOLUME = "36", YEAR = "2003", NUMBER = "7", MONTH = "July", PAGES = "1619-1629", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298337"} @article{bb303843, AUTHOR = "Zhao, Y. and Campisi, P. and Kundur, D.", TITLE = "Dual Domain Watermarking for Authentication and Compression of Cultural Heritage Images", JOURNAL = IP, VOLUME = "13", YEAR = "2004", NUMBER = "3", MONTH = "March", PAGES = "430-448", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298338"} @article{bb303844, AUTHOR = "Maiorana, E. and Campisi, P.", TITLE = "High-capacity watermarking of high dynamic range images", JOURNAL = JIVP, VOLUME = "2016", YEAR = "2016", NUMBER = "1", PAGES = "3", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298339"} @article{bb303845, AUTHOR = "Lukac, R. and Plataniotis, K.N.", TITLE = "Bit-level based secret sharing for image encryption", JOURNAL = PR, VOLUME = "38", YEAR = "2005", NUMBER = "5", MONTH = "May", PAGES = "767-772", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298340"} @inproceedings{bb303846, AUTHOR = "Lukac, R. and Plataniotis, K.N.", TITLE = "Document image secret sharing using bit-level processing", BOOKTITLE = ICIP04, YEAR = "2004", PAGES = "V: 2893-2896", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298341"} @article{bb303847, AUTHOR = "Lukac, R. and Plataniotis, K.N.", TITLE = "A cost-effective encryption scheme for color images", JOURNAL = RealTimeImg, VOLUME = "11", YEAR = "2005", NUMBER = "5-6", MONTH = "October", PAGES = "454-464", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298342"} @article{bb303848, AUTHOR = "Martin, K. and Lukac, R. and Plataniotis, K.N.", TITLE = "Efficient encryption of wavelet-based coded color images", JOURNAL = PR, VOLUME = "38", YEAR = "2005", NUMBER = "7", MONTH = "July", PAGES = "1111-1115", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298343"} @inproceedings{bb303849, AUTHOR = "Heidarinejad, M. and Plataniotis, K.N.", TITLE = "A second generation Visual Secret Sharing scheme for color images", BOOKTITLE = ICIP08, YEAR = "2008", PAGES = "481-484", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298344"} @article{bb303850, AUTHOR = "Celik, M.U. and Sharma, G. and Tekalp, A.M.", TITLE = "Lossless Watermarking for Image Authentication: A New Framework and an Implementation", JOURNAL = IP, VOLUME = "15", YEAR = "2006", NUMBER = "4", MONTH = "April", PAGES = "1042-1049", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298345"} @article{bb303851, AUTHOR = "Wang, R.Z.", TITLE = "Region Incrementing Visual Cryptography", JOURNAL = SPLetters, VOLUME = "16", YEAR = "2009", NUMBER = "8", MONTH = "August", PAGES = "659-662", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298346"} @article{bb303852, AUTHOR = "Amador, J.J. and Green, R.W.", TITLE = "Symmetric-key block cipher for image and text cryptography", JOURNAL = IJIST, VOLUME = "15", YEAR = "2005", NUMBER = "3", PAGES = "178-188", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298347"} @article{bb303853, AUTHOR = "Pareek, N.K. and Patidar, V. and Sud, K.K.", TITLE = "Image encryption using chaotic logistic map", JOURNAL = IVC, VOLUME = "24", YEAR = "2006", NUMBER = "9", MONTH = "September", PAGES = "926-934", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298348"} @article{bb303854, AUTHOR = "Caldelli, R. and Filippini, F. and Barni, M.", TITLE = "Joint near-lossless compression and watermarking of still images for authentication and tamper localization", JOURNAL = SP:IC, VOLUME = "21", YEAR = "2006", NUMBER = "10", MONTH = "November", PAGES = "890-903", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298349"} @article{bb303855, AUTHOR = "Hu, C.M. and Tzeng, W.G.", TITLE = "Cheating Prevention in Visual Cryptography", JOURNAL = IP, VOLUME = "16", YEAR = "2007", NUMBER = "1", MONTH = "January", PAGES = "36-45", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298350"} @article{bb303856, AUTHOR = "Chen, R.J. and Lai, J.L.", TITLE = "Image security system using recursive cellular automata substitution", JOURNAL = PR, VOLUME = "40", YEAR = "2007", NUMBER = "5", MONTH = "May", PAGES = "1621-1631", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298351"} @article{bb303857, AUTHOR = "Wang, D.S. and Zhang, L. and Ma, N. and Li, X.B.", TITLE = "Two secret sharing schemes based on Boolean operations", JOURNAL = PR, VOLUME = "40", YEAR = "2007", NUMBER = "10", MONTH = "October", PAGES = "2776-2785", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298352"} @article{bb303858, AUTHOR = "Yang, C.N. and Yu, K.H. and Lukac, R.", TITLE = "User-friendly image sharing using polynomials with different primes", JOURNAL = IJIST, VOLUME = "17", YEAR = "2007", NUMBER = "1", PAGES = "40-47", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298353"} @article{bb303859, AUTHOR = "Lin, S.J. and Lin, J.C.", TITLE = "VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches", JOURNAL = PR, VOLUME = "40", YEAR = "2007", NUMBER = "12", MONTH = "December", PAGES = "3652-3666", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298354"} @article{bb303860, AUTHOR = "Shyu, S.J. and Huang, S.Y. and Lee, Y.K. and Wang, R.Z. and Chen, K.", TITLE = "Sharing multiple secrets in visual cryptography", JOURNAL = PR, VOLUME = "40", YEAR = "2007", NUMBER = "12", MONTH = "December", PAGES = "3633-3651", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298355"} @article{bb303861, AUTHOR = "Fang, W.P.", TITLE = "Friendly progressive visual secret sharing", JOURNAL = PR, VOLUME = "41", YEAR = "2008", NUMBER = "4", MONTH = "April", PAGES = "1410-1414", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298356"} @article{bb303862, AUTHOR = "Li, S. and Li, C. and Lo, K.T. and Chen, G.", TITLE = "Cryptanalysis of an Image Scrambling Scheme Without Bandwidth Expansion", JOURNAL = CirSysVideo, VOLUME = "18", YEAR = "2008", NUMBER = "3", MONTH = "March", PAGES = "338-349", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298357"} @article{bb303863, AUTHOR = "Tong, X.J. and Cui, M.G.", TITLE = "Image encryption with compound chaotic sequence cipher shifting dynamically", JOURNAL = IVC, VOLUME = "26", YEAR = "2008", NUMBER = "6", MONTH = "June", PAGES = "843-850", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298358"} @article{bb303864, AUTHOR = "Lin, Q.H. and Yin, F.L. and Mei, T.M. and Liang, H.L.", TITLE = "A blind source separation-based method for multiple images encryption", JOURNAL = IVC, VOLUME = "26", YEAR = "2008", NUMBER = "6", MONTH = "June", PAGES = "788-798", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298359"} @article{bb303865, AUTHOR = "Yang, C.N. and Chen, T.S.", TITLE = "Colored visual cryptography scheme based on additive color mixing", JOURNAL = PR, VOLUME = "41", YEAR = "2008", NUMBER = "10", MONTH = "October", PAGES = "3114-3129", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298360"} @article{bb303866, AUTHOR = "Li, W.H. and Yuan, Y.", TITLE = "A New Blind Attack Procedure For Dct-based Image Encryption With Spectrum Learning", JOURNAL = IJIG, VOLUME = "7", YEAR = "2007", NUMBER = "3", MONTH = "July", PAGES = "481-496", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298361"} @article{bb303867, AUTHOR = "Naughton, T.J. and Hennelly, B.M. and Dowling, T.", TITLE = "Introducing secure modes of operation for optical encryption", JOURNAL = JOSA-A, VOLUME = "25", YEAR = "2008", NUMBER = "10", MONTH = "October", PAGES = "2608-2617", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298362"} @article{bb303868, AUTHOR = "Leung, B.W. and Ng, F.Y. and Wong, D.S.", TITLE = "On the security of a visual cryptography scheme for color images", JOURNAL = PR, VOLUME = "42", YEAR = "2009", NUMBER = "5", MONTH = "May", PAGES = "929-940", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298363"} @article{bb303869, AUTHOR = "Li, C.Q. and Li, S.J. and Asim, M. and Nunez, J. and Alvarez, G. and Chen, G.R.", TITLE = "On the security defects of an image encryption scheme", JOURNAL = IVC, VOLUME = "27", YEAR = "2009", NUMBER = "9", MONTH = "August", PAGES = "1371-1381", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298364"} @article{bb303870, AUTHOR = "Li, C.Q. and Li, S.J. and Chen, G.R. and Halang, W.A.", TITLE = "Cryptanalysis of an image encryption scheme based on a compound chaotic sequence", JOURNAL = IVC, VOLUME = "27", YEAR = "2009", NUMBER = "8", MONTH = "July", PAGES = "1035-1039", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298365"} @article{bb303871, AUTHOR = "Wang, D.S. and Yi, F. and Li, X.B.", TITLE = "On general construction for extended visual cryptography schemes", JOURNAL = PR, VOLUME = "42", YEAR = "2009", NUMBER = "11", MONTH = "November", PAGES = "3071-3082", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298366"} @article{bb303872, AUTHOR = "Ye, G.D.", TITLE = "Image scrambling encryption algorithm of pixel bit based on chaos map", JOURNAL = PRL, VOLUME = "31", YEAR = "2010", NUMBER = "5", MONTH = "April", PAGES = "347-354", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298367"} @article{bb303873, AUTHOR = "Liu, W. and Zeng, W. and Dong, L. and Yao, Q.", TITLE = "Efficient Compression of Encrypted Grayscale Images", JOURNAL = IP, VOLUME = "19", YEAR = "2010", NUMBER = "4", MONTH = "April", PAGES = "1097-1102", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298368"} @article{bb303874, AUTHOR = "Kang, I. and Arce, G.R. and Lee, H.K.", TITLE = "Color Extended Visual Cryptography Using Error Diffusion", JOURNAL = IP, VOLUME = "20", YEAR = "2011", NUMBER = "1", MONTH = "January", PAGES = "132-145", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298369"} @article{bb303875, AUTHOR = "Hou, Y.C. and Quan, Z.Y.", TITLE = "Progressive Visual Cryptography With Unexpanded Shares", JOURNAL = CirSysVideo, VOLUME = "21", YEAR = "2011", NUMBER = "11", MONTH = "November", PAGES = "1760-1764", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298370"} @article{bb303876, AUTHOR = "Wang, R.Z. and Hsu, S.F.", TITLE = "Tagged Visual Cryptography", JOURNAL = SPLetters, VOLUME = "18", YEAR = "2011", NUMBER = "11", MONTH = "November", PAGES = "627-630", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298371"} @article{bb303877, AUTHOR = "Liu, F. and Guo, T. and Wu, C.K. and Qian, L.", TITLE = "Improving the visual quality of size invariant visual cryptography scheme", JOURNAL = JVCIR, VOLUME = "23", YEAR = "2012", NUMBER = "2", MONTH = "February", PAGES = "331-342", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298372"} @article{bb303878, AUTHOR = "Francois, M. and Grosges, T. and Barchiesi, D. and Erra, R.", TITLE = "A new image encryption scheme based on a chaotic function", JOURNAL = SP:IC, VOLUME = "27", YEAR = "2012", NUMBER = "3", MONTH = "March", PAGES = "249-259", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298373"} @article{bb303879, AUTHOR = "Watanabe, O. and Fukuhara, T. and Kiya, H.", TITLE = "Codestream-Based Identification of JPEG 2000 Images with Different Coding Parameters", JOURNAL = IEICE, VOLUME = "E95-D", YEAR = "2012", NUMBER = "4", MONTH = "April", PAGES = "1120-1129", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298374"} @article{bb303880, AUTHOR = "Iida, K. and Kiya, H.", TITLE = "Robust Image Identification without Visible Information for JPEG Images", JOURNAL = IEICE, VOLUME = "E101-D", YEAR = "2018", NUMBER = "1", MONTH = "January", PAGES = "13-19", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298375"} @inproceedings{bb303881, AUTHOR = "Iida, K. and Kiya, H.", TITLE = "Robust image identification with secure features for JPEG images", BOOKTITLE = ICIP17, YEAR = "2017", PAGES = "4342-4346", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298376"} @article{bb303882, AUTHOR = "Iida, K. and Kiya, H.", TITLE = "Robust Image Identification with DC Coefficients for Double-Compressed JPEG Images", JOURNAL = IEICE, VOLUME = "E102-D", YEAR = "2019", NUMBER = "1", MONTH = "January", PAGES = "2-10", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298377"} @inproceedings{bb303883, AUTHOR = "Kobayashi, H. and Imaizumi, S. and Kiya, H.", TITLE = "A Robust Identification Scheme for JPEG XR Images with Various Compression Ratios", BOOKTITLE = PSIVT15, YEAR = "2015", PAGES = "38-50", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298378"} @inproceedings{bb303884, AUTHOR = "Imaizumi, S. and Fujiyoshi, M. and Kiya, H. and Aoki, N. and Kobayashi, H.", TITLE = "A Key Derivation Scheme for Hierarchical Access Control to JPEG 2000 Coded Images", BOOKTITLE = PSIVT11, YEAR = "2011", PAGES = "II: 180-191", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298379"} @inproceedings{bb303885, AUTHOR = "Hashimoto, N. and Imaizumi, S. and Fujiyoshi, M. and Kiya, H.", TITLE = "Hierarchical encryption using short encryption keys for scalable access control of JPEG 2000 coded images", BOOKTITLE = ICIP08, YEAR = "2008", PAGES = "3116-3119", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298380"} @inproceedings{bb303886, AUTHOR = "Imaizumi, S. and Fujiyoshi, M. and Abe, Y. and Kiya, H.", TITLE = "Collusion Attack-Resilient Hierarchical Encryption of JPEG 2000 Codestreams with Scalable Access Control", BOOKTITLE = ICIP07, YEAR = "2007", PAGES = "II: 137-140", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298381"} @inproceedings{bb303887, AUTHOR = "Imaizumi, S. and Watanabe, O. and Fujiyoshi, M. and Kiya, H.", TITLE = "Generalized Hierarchical Encryption of JPEG 2000 Codestreams for Access Control", BOOKTITLE = ICIP05, YEAR = "2005", PAGES = "II: 1094-1097", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298382"} @inproceedings{bb303888, AUTHOR = "Fujiyoshi, M. and Saitou, W. and Watanabe, O. and Kiya, H.", TITLE = "Hierarchical Encryption of Multimedia Contents for Access Control", BOOKTITLE = ICIP06, YEAR = "2006", PAGES = "1977-1980", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298383"} @inproceedings{bb303889, AUTHOR = "Watanabe, O. and Iida, T. and Fukuhara, T. and Kiya, H.", TITLE = "Identification of JPEG 2000 images in encrypted domain for digital cinema", BOOKTITLE = ICIP09, YEAR = "2009", PAGES = "2065-2068", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298384"} @article{bb303890, AUTHOR = "Imaizumi, S. and Kiya, H.", TITLE = "A Block-Permutation-Based Encryption Scheme with Independent Processing of RGB Components", JOURNAL = IEICE, VOLUME = "E101-D", YEAR = "2018", NUMBER = "12", MONTH = "December", PAGES = "3150-3157", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298385"} @inproceedings{bb303891, AUTHOR = "Imaizumi, S. and Ogasawara, T. and Kiya, H.", TITLE = "Block-Permutation-Based Encryption Scheme with Enhanced Color Scrambling", BOOKTITLE = SCIA17, YEAR = "2017", PAGES = "I: 562-573", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298386"} @article{bb303892, AUTHOR = "Shyu, S.J. and Jiang, H.W.", TITLE = "Efficient Construction for Region Incrementing Visual Cryptography", JOURNAL = CirSysVideo, VOLUME = "22", YEAR = "2012", NUMBER = "5", MONTH = "May", PAGES = "769-777", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298387"} @article{bb303893, AUTHOR = "Yang, C.N. and Shih, H.W. and Wu, C.C. and Harn, L.", TITLE = "k Out of n Region Incrementing Scheme in Visual Cryptography", JOURNAL = CirSysVideo, VOLUME = "22", YEAR = "2012", NUMBER = "5", MONTH = "May", PAGES = "799-810", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298388"} @article{bb303894, AUTHOR = "Yang, C.N. and Wu, C.C. and Lin, Y.C.", TITLE = "k Out of n Region-Based Progressive Visual Cryptography", JOURNAL = CirSysVideo, VOLUME = "29", YEAR = "2019", NUMBER = "1", MONTH = "January", PAGES = "252-262", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298389"} @inproceedings{bb303895, AUTHOR = "Yang, C.N. and Lin, Y.C. and Wu, C.C.", TITLE = "Cheating Immune Block-Based Progressive Visual Cryptography", BOOKTITLE = IWDW13, YEAR = "2013", PAGES = "95-108", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298390"} @article{bb303896, AUTHOR = "Win, L.L. and Thomas, T. and Emmanuel, S.", TITLE = "Privacy Enabled Digital Rights Management Without Trusted Third Party Assumption", JOURNAL = MultMed, VOLUME = "14", YEAR = "2012", NUMBER = "3", PAGES = "546-554", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298391"} @article{bb303897, AUTHOR = "Chen, Y.C. and Horng, G. and Tsai, D.S.", TITLE = "Comment on 'Cheating Prevention in Visual Cryptography'", JOURNAL = IP, VOLUME = "21", YEAR = "2012", NUMBER = "7", MONTH = "July", PAGES = "3319-3323", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298392"} @article{bb303898, AUTHOR = "Dalhoum, A.L.A. and Mahafzah, B.A. and Awwad, A.A. and Aldhamari, I. and Ortega, A. and Alfonseca, M.", TITLE = "Digital Image Scrambling Using 2D Cellular Automata", JOURNAL = MultMedMag, VOLUME = "19", YEAR = "2012", NUMBER = "4", PAGES = "28-36", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298393"} @article{bb303899, AUTHOR = "Lin, H.C. and Yang, C.N. and Laih, C.S. and Lin, H.T.", TITLE = "Natural language letter based visual cryptography scheme", JOURNAL = JVCIR, VOLUME = "24", YEAR = "2013", NUMBER = "3", MONTH = "April", PAGES = "318-331", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT298394"}