@inproceedings{bb325200, AUTHOR = "Faridnia, S. and Faez, K.", TITLE = "Image Encryption through Using Chaotic Function and Graph", BOOKTITLE = ICCVG10, YEAR = "2010", PAGES = "I: 352-359", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319565"} @inproceedings{bb325201, AUTHOR = "Ratan, R.", TITLE = "Key Independent Retrieval of Chaotic Encrypted Images", BOOKTITLE = PReMI09, YEAR = "2009", PAGES = "483-488", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319566"} @inproceedings{bb325202, AUTHOR = "Mayouf, M.A. and Shukur, Z.", TITLE = "Using Animation in Active Learning Tool to Detect Possible Attacks in Cryptographic Protocols", BOOKTITLE = IVIC09, YEAR = "2009", PAGES = "510-520", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319567"} @inproceedings{bb325203, AUTHOR = "Rane, S.D. and Sun, W. and Vetro, A.", TITLE = "Secure distortion computation among untrusting parties using homomorphic encryption", BOOKTITLE = ICIP09, YEAR = "2009", PAGES = "1485-1488", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319568"} @inproceedings{bb325204, AUTHOR = "Zhang, J.H. and Chen, H. and Geng, Q.", TITLE = "Cryptoanalysis of Certificateless Partially Blind Signature and Proxy Blind Signature Scheme", BOOKTITLE = CISP09, YEAR = "2009", PAGES = "1-5", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319569"} @inproceedings{bb325205, AUTHOR = "Zhang, J.H. and Gao, S.N.", TITLE = "Cryptoanlaysis of Two Proxy Blind Signature Schemes with Proxy Revocation", BOOKTITLE = CISP09, YEAR = "2009", PAGES = "1-4", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319570"} @inproceedings{bb325206, AUTHOR = "Lang, J. and Tao, R. and Wang, Y.", TITLE = "The Generalized Weighted Fractional Fourier Transform and its Application to Image Encryption", BOOKTITLE = CISP09, YEAR = "2009", PAGES = "1-5", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319571"} @inproceedings{bb325207, AUTHOR = "Cao, Y. and Qiu, R. and Fu, Y.Z.", TITLE = "Color Image Encryption Based on Hyper-Chaos", BOOKTITLE = CISP09, YEAR = "2009", PAGES = "1-6", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319572"} @inproceedings{bb325208, AUTHOR = "He, B. and Zhang, F. and Luo, L.Y. and Du, M.K. and Wang, Y.", TITLE = "An Image Encryption Algorithm Based on Spatiotemporal Chaos", BOOKTITLE = CISP09, YEAR = "2009", PAGES = "1-5", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319573"} @inproceedings{bb325209, AUTHOR = "Zhang, S. and Cai, R. and Jiang, Y.C. and Guo, S.P.", TITLE = "An Image Encryption Algorithm Based on Multiple Chaos and Wavelet Transform", BOOKTITLE = CISP09, YEAR = "2009", PAGES = "1-5", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319574"} @inproceedings{bb325210, AUTHOR = "Xiao, Y. and Zhang, H.Y. and Ran, Q.W. and Zhang, J. and Tan, L.Y.", TITLE = "Image Encryption and Two Dimensional Discrete M-Parameter Fractional Fourier Transform", BOOKTITLE = CISP09, YEAR = "2009", PAGES = "1-4", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319575"} @inproceedings{bb325211, AUTHOR = "Podoba, T. and Giesl, J. and Vlcek, K.", TITLE = "Image Encryption In Wavelet Domain Based on Chaotic Maps", BOOKTITLE = CISP09, YEAR = "2009", PAGES = "1-5", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319576"} @inproceedings{bb325212, AUTHOR = "Weir, J. and Yan, W.Q.", TITLE = "Authenticating Visual Cryptography Shares Using 2D Barcodes", BOOKTITLE = IWDW11, YEAR = "2011", PAGES = "196-210", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319577"} @inproceedings{bb325213, AUTHOR = "Weir, J. and Yan, W.Q.", TITLE = "Plane Transform Visual Cryptography", BOOKTITLE = DW10, YEAR = "2010", PAGES = "60-74", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319578"} @inproceedings{bb325214, AUTHOR = "Weir, J. and Yan, W.Q.", TITLE = "Image Hatching for Visual Cryptography", BOOKTITLE = IMVIP09, YEAR = "2009", PAGES = "59-64", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319579"} @inproceedings{bb325215, AUTHOR = "Weir, J. and Yan, W.Q.", TITLE = "Dot-Size Variant Visual Cryptography", BOOKTITLE = DW09, YEAR = "2009", PAGES = "136-148", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319580"} @inproceedings{bb325216, AUTHOR = "Piper, F.", TITLE = "The Changing Face of Cryptography", BOOKTITLE = DW09, YEAR = "2009", PAGES = "2", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319581"} @inproceedings{bb325217, AUTHOR = "Chen, W.B. and Zhang, X.", TITLE = "Image encryption algorithm based on Henon chaotic system", BOOKTITLE = IASP09, YEAR = "2009", PAGES = "94-97", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319582"} @inproceedings{bb325218, AUTHOR = "Du, Y.F. and Zhang, J. and Su, Y.T.", TITLE = "Watermarking for Authentication of LZ-77 Compressed Documents", BOOKTITLE = DW07, YEAR = "2007", PAGES = "365-372", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319583"} @inproceedings{bb325219, AUTHOR = "Luo, H. and Lu, Z.M. and Pan, J.S.", TITLE = "Multiple Watermarking in Visual Cryptography", BOOKTITLE = DW07, YEAR = "2007", PAGES = "60-70", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319584"} @inproceedings{bb325220, AUTHOR = "Sadeghi, A.R.", TITLE = "The Marriage of Cryptography and Watermarking: Beneficial and Challenging for Secure Watermarking and Detection", BOOKTITLE = DW07, YEAR = "2007", PAGES = "2-18", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319585"} @inproceedings{bb325221, AUTHOR = "He, D. and Jagmohan, A. and Lu, L.G.", TITLE = "Secure collaboration using Slepian-Wolf codes", BOOKTITLE = ICIP08, YEAR = "2008", PAGES = "2216-2219", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319586"} @inproceedings{bb325222, AUTHOR = "Seshadrinathan, M. and Dempski, K.L.", TITLE = "Implementation of Advanced Encryption Standard for encryption and decryption of images and text on a GPU", BOOKTITLE = CVGPU08, YEAR = "2008", PAGES = "1-6", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319587"} @inproceedings{bb325223, AUTHOR = "Alface, P.R. and Macq, B. and Cayre, F.", TITLE = "Blind and Robust Watermarking of 3D Models: How to Withstand the Cropping Attack?", BOOKTITLE = ICIP07, YEAR = "2007", PAGES = "V: 465-468", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319588"} @inproceedings{bb325224, AUTHOR = "Huang, T.J.", TITLE = "Evolvement of DRM Schema: From Encryption to Interoperability and Monitoring", BOOKTITLE = MCAM07, YEAR = "2007", PAGES = "65-75", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319589"} @inproceedings{bb325225, AUTHOR = "Lai, J.C. and Wang, C.H.", TITLE = "Buffer Occupancy Feedback Security Control and Changing Encryption Keys to Protect MOD Services", BOOKTITLE = PSIVT06, YEAR = "2006", PAGES = "888-897", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319590"} @inproceedings{bb325226, AUTHOR = "Li, W.H. and Yuan, Y.", TITLE = "Visual Information Encryption in Frequency Domain: Risk and Enhancement", BOOKTITLE = IWICPAS06, YEAR = "2006", PAGES = "225-234", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319591"} @inproceedings{bb325227, AUTHOR = "Wong, A. and Bishop, W.", TITLE = "Expert Knowledge Based Automatic Regions-of-Interest (ROI) Selection in Scanned Documents for Digital Image Encryption", BOOKTITLE = CRV06, YEAR = "2006", PAGES = "51-51", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319592"} @inproceedings{bb325228, AUTHOR = "Said, A.", TITLE = "Measuring the Strength of Partial Encryption Schemes", BOOKTITLE = ICIP05, YEAR = "2005", PAGES = "II: 1126-1129", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319593"} @inproceedings{bb325229, AUTHOR = "Katzenbeisser, S.", TITLE = "On the Integration of Watermarks and Cryptography", BOOKTITLE = DW03, YEAR = "2003", PAGES = "50-60", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319594"} @inproceedings{bb325230, AUTHOR = "Li, S.J. and Zheng, X.", TITLE = "On the security of an image encryption method", BOOKTITLE = ICIP02, YEAR = "2002", PAGES = "II: 925-928", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319595"} @inproceedings{bb325231, AUTHOR = "Yamaguchi, Y.S.", TITLE = "An Extended Visual Cryptography Scheme for Continuous-Tone Images", BOOKTITLE = IWDW11, YEAR = "2011", PAGES = "228-242", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319596"} @inproceedings{bb325232, AUTHOR = "Nakajima, M. and Yamaguchi, Y.S.", TITLE = "Extended Visual Cryptography for Natural Images", BOOKTITLE = WSCG02, YEAR = "2002", PAGES = "303", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319597"} @inproceedings{bb325233, AUTHOR = "Han, K. and Tewfik, A.", TITLE = "Scalable Cryptographic Scheme for Networked Multimedia Applications", BOOKTITLE = ICIP01, YEAR = "2001", PAGES = "III: 987-990", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319598"} @inproceedings{bb325234, AUTHOR = "Chen, Y.C. and Chang, L.W.", TITLE = "A Secure and Robust Digital Watermarking Technique by the Block Cipher Rc6 and Secure Hash Algorithm", BOOKTITLE = ICIP01, YEAR = "2001", PAGES = "II: 518-521", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319599"} @inproceedings{bb325235, AUTHOR = "Depovere, G. and Kalker, T.", TITLE = "Secret Key Watermarking with Changing Keys", BOOKTITLE = ICIP00, YEAR = "2000", PAGES = "Vol I: 427-429", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319600"} @inproceedings{bb325236, AUTHOR = "Bhattacharjee, S. and Kutter, M.", TITLE = "Compression tolerant image authentication", BOOKTITLE = ICIP98, YEAR = "1998", PAGES = "I: 435-439", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319601"} @inproceedings{bb325237, AUTHOR = "Creusere, C.D. and Mitra, S.K.", TITLE = "Efficient image scrambling using polyphase filter banks", BOOKTITLE = ICIP94, YEAR = "1994", PAGES = "II: 81-85", BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319602"} @article{bb325238, AUTHOR = "Caldelli, R. and Filippini, F. and Barni, M.", TITLE = "Joint near-lossless compression and watermarking of still images for authentication and tamper localization", JOURNAL = SP:IC, VOLUME = "21", YEAR = "2006", NUMBER = "10", MONTH = "November", PAGES = "890-903", BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319603"} @article{bb325239, AUTHOR = "Li, W.H. and Yuan, Y.", TITLE = "A New Blind Attack Procedure For Dct-based Image Encryption With Spectrum Learning", JOURNAL = IJIG, VOLUME = "7", YEAR = "2007", NUMBER = "3", MONTH = "July", PAGES = "481-496", BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319604"} @article{bb325240, AUTHOR = "Shreyamsha Kumar, B.K. and Patil, C.R.", TITLE = "JPEG image encryption using fuzzy PN sequences", JOURNAL = SIViP, VOLUME = "4", YEAR = "2010", NUMBER = "4", MONTH = "November", PAGES = "419-427", BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319605"} @article{bb325241, AUTHOR = "Watanabe, O. and Fukuhara, T. and Kiya, H.", TITLE = "Codestream-Based Identification of JPEG 2000 Images with Different Coding Parameters", JOURNAL = IEICE, VOLUME = "E95-D", YEAR = "2012", NUMBER = "4", MONTH = "April", PAGES = "1120-1129", BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319606"} @article{bb325242, AUTHOR = "Iida, K. and Kiya, H.", TITLE = "Robust Image Identification without Visible Information for JPEG Images", JOURNAL = IEICE, VOLUME = "E101-D", YEAR = "2018", NUMBER = "1", MONTH = "January", PAGES = "13-19", BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319607"} @inproceedings{bb325243, AUTHOR = "Iida, K. and Kiya, H.", TITLE = "Robust image identification with secure features for JPEG images", BOOKTITLE = ICIP17, YEAR = "2017", PAGES = "4342-4346", BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319608"} @article{bb325244, AUTHOR = "Iida, K. and Kiya, H.", TITLE = "Robust Image Identification with DC Coefficients for Double-Compressed JPEG Images", JOURNAL = IEICE, VOLUME = "E102-D", YEAR = "2019", NUMBER = "1", MONTH = "January", PAGES = "2-10", BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319609"} @inproceedings{bb325245, AUTHOR = "Kobayashi, H. and Imaizumi, S. and Kiya, H.", TITLE = "A Robust Identification Scheme for JPEG XR Images with Various Compression Ratios", BOOKTITLE = PSIVT15, YEAR = "2015", PAGES = "38-50", BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319610"} @inproceedings{bb325246, AUTHOR = "Imaizumi, S. and Fujiyoshi, M. and Kiya, H. and Aoki, N. and Kobayashi, H.", TITLE = "A Key Derivation Scheme for Hierarchical Access Control to JPEG 2000 Coded Images", BOOKTITLE = PSIVT11, YEAR = "2011", PAGES = "II: 180-191", BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319611"} @inproceedings{bb325247, AUTHOR = "Hashimoto, N. and Imaizumi, S. and Fujiyoshi, M. and Kiya, H.", TITLE = "Hierarchical encryption using short encryption keys for scalable access control of JPEG 2000 coded images", BOOKTITLE = ICIP08, YEAR = "2008", PAGES = "3116-3119", BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319612"} @inproceedings{bb325248, AUTHOR = "Imaizumi, S. and Fujiyoshi, M. and Abe, Y. and Kiya, H.", TITLE = "Collusion Attack-Resilient Hierarchical Encryption of JPEG 2000 Codestreams with Scalable Access Control", BOOKTITLE = ICIP07, YEAR = "2007", PAGES = "II: 137-140", BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319613"} @inproceedings{bb325249, AUTHOR = "Imaizumi, S. and Watanabe, O. and Fujiyoshi, M. and Kiya, H.", TITLE = "Generalized Hierarchical Encryption of JPEG 2000 Codestreams for Access Control", BOOKTITLE = ICIP05, YEAR = "2005", PAGES = "II: 1094-1097", BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319614"} @inproceedings{bb325250, AUTHOR = "Fujiyoshi, M. and Saitou, W. and Watanabe, O. and Kiya, H.", TITLE = "Hierarchical Encryption of Multimedia Contents for Access Control", BOOKTITLE = ICIP06, YEAR = "2006", PAGES = "1977-1980", BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319615"} @inproceedings{bb325251, AUTHOR = "Watanabe, O. and Iida, T. and Fukuhara, T. and Kiya, H.", TITLE = "Identification of JPEG 2000 images in encrypted domain for digital cinema", BOOKTITLE = ICIP09, YEAR = "2009", PAGES = "2065-2068", BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319616"} @article{bb325252, AUTHOR = "Kishore, B. and Kumar, B.K.S. and Patil, C.R.", TITLE = "FPGA based simple and fast JPEG encryptor", JOURNAL = RealTimeIP, VOLUME = "10", YEAR = "2015", NUMBER = "3", MONTH = "September", PAGES = "551-559", BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319617"} @article{bb325253, AUTHOR = "Naik, K. and Pal, A.K.", TITLE = "Design of a cryptosystem for DCT compressed image using Arnold transform and fractional Fourier transform", JOURNAL = IJCVR, VOLUME = "5", YEAR = "2015", NUMBER = "3", PAGES = "335-346", BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319618"} @article{bb325254, AUTHOR = "Gu, G.S. and Ling, J. and Xie, G. and Li, Z.", TITLE = "A chaotic-cipher-based packet body encryption algorithm for JPEG2000 images", JOURNAL = SP:IC, VOLUME = "40", YEAR = "2016", NUMBER = "1", PAGES = "52-64", BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319619"} @article{bb325255, AUTHOR = "He, J. and Huang, S. and Tang, S. and Huang, J.", TITLE = "JPEG Image Encryption With Improved Format Compatibility and File Size Preservation", JOURNAL = MultMed, VOLUME = "20", YEAR = "2018", NUMBER = "10", MONTH = "October", PAGES = "2645-2658", BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319620"} @article{bb325256, AUTHOR = "Liang, H.H. and Zhang, X.P. and Cheng, H.", TITLE = "Huffman-code based retrieval for encrypted JPEG images", JOURNAL = JVCIR, VOLUME = "61", YEAR = "2019", PAGES = "149-156", BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319621"} @article{bb325257, AUTHOR = "Itier, V. and Puteaux, P. and Puech, W.", TITLE = "Recompression of JPEG Crypto-Compressed Images Without a Key", JOURNAL = CirSysVideo, VOLUME = "30", YEAR = "2020", NUMBER = "3", MONTH = "March", PAGES = "646-660", BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319622"} @article{bb325258, AUTHOR = "He, H.J. and Yuan, Y. and Ye, Y. and Tai, H.M. and Chen, F.", TITLE = "Chosen plaintext attack on JPEG image encryption with adaptive key and run consistency", JOURNAL = JVCIR, VOLUME = "90", YEAR = "2023", PAGES = "103733", BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319623"} @article{bb325259, AUTHOR = "Li, P.Y. and Sun, Z. and Situ, Z. and He, M.L. and Song, T.T.", TITLE = "Joint JPEG Compression and Encryption Scheme Based on Order-8-16 Block Transform", JOURNAL = ITS, VOLUME = "24", YEAR = "2023", NUMBER = "7", MONTH = "July", PAGES = "7687-7696", BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319624"} @article{bb325260, AUTHOR = "Ye, X. and Zhang, Y.S. and Xiao, X.L. and Yi, S. and Lan, R.", TITLE = "Usability Enhanced Thumbnail-Preserving Encryption Based on Data Hiding for JPEG Images", JOURNAL = SPLetters, VOLUME = "30", YEAR = "2023", PAGES = "793-797", BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319625"} @article{bb325261, AUTHOR = "Qin, C. and Hu, J. and Li, F. and Qian, Z.X. and Zhang, X.P.", TITLE = "JPEG Image Encryption With Adaptive DC Coefficient Prediction and RS Pair Permutation", JOURNAL = MultMed, VOLUME = "25", YEAR = "2023", PAGES = "2528-2542", BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319626"} @article{bb325262, AUTHOR = "Yuan, Y. and He, H.J. and Yang, Y.L. and Mao, N.X. and Chen, F. and Ali, M.", TITLE = "JPEG image encryption with grouping coefficients based on entropy coding", JOURNAL = JVCIR, VOLUME = "97", YEAR = "2023", PAGES = "103975", BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319627"} @inproceedings{bb325263, AUTHOR = "Ting, J. and Wong, K. and Ong, S.", TITLE = "Format-Compliant Perceptual Encryption Method for JPEG XT", BOOKTITLE = ICIP19, YEAR = "2019", PAGES = "4559-4563", BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319628"} @inproceedings{bb325264, AUTHOR = "Maqbool, S. and Ahmad, N. and Muhammad, A. and Enriquez, A.M.M.", TITLE = "Simultaneous Encryption and Compression of Digital Images Based on Secure-JPEG Encoding", BOOKTITLE = MCPR16, YEAR = "2016", PAGES = "145-154", BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319629"} @inproceedings{bb325265, AUTHOR = "Hofbauer, H. and Unterweger, A. and Uhl, A.", TITLE = "Encrypting only AC coefficient signs considered harmful", BOOKTITLE = ICIP15, YEAR = "2015", PAGES = "3740-3744", BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319630"} @inproceedings{bb325266, AUTHOR = "Korshunov, P. and Ebrahimi, T.", TITLE = "Scrambling-based tool for secure protection of JPEG images", BOOKTITLE = ICIP14, YEAR = "2014", PAGES = "3423-3425", BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319631"} @inproceedings{bb325267, AUTHOR = "Pinto, M. and Puech, W. and Subsol, G.", TITLE = "Protection of JPEG compressed e-comics by selective encryption", BOOKTITLE = ICIP13, YEAR = "2013", PAGES = "4588-4592", BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319632"} @inproceedings{bb325268, AUTHOR = "Chen, B. and Chandran, V.", TITLE = "Robust Image Hashing Using Higher Order Spectral Features", BOOKTITLE = DICTA10, YEAR = "2010", PAGES = "100-104", BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319633"} @inproceedings{bb325269, AUTHOR = "Ahmed, F. and Siyal, M.Y. and Abbas, V.U.", TITLE = "A Perceptually Scalable and JPEG Compression Tolerant Image Encryption Scheme", BOOKTITLE = PSIVT10, YEAR = "2010", PAGES = "232-238", BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319634"} @inproceedings{bb325270, AUTHOR = "Zhu, B.B. and Yang, Y. and Li, S.P.", TITLE = "JPEG 2000 Syntax-Compliant Encryption Preserving Full Scalability", BOOKTITLE = ICIP05, YEAR = "2005", PAGES = "III: 636-639", BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319635"} @inproceedings{bb325271, AUTHOR = "Watanabe, O. and Nakazaki, A. and Kiya, H.", TITLE = "A fast image-scramble method using public-key encryption allowing backward compatibility with jpeg2000", BOOKTITLE = ICIP04, YEAR = "2004", PAGES = "V: 3435-3438", BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319636"} @article{bb325272, AUTHOR = "Li, S.J. and Li, C.Q. and Chen, G.R. and Bourbakis, N.G. and Lo, K.T.", TITLE = "A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks", JOURNAL = SP:IC, VOLUME = "23", YEAR = "2008", NUMBER = "3", MONTH = "March", PAGES = "212-223", BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319637"} @article{bb325273, AUTHOR = "Wang, X.F. and Zheng, N.N. and Tian, L.", TITLE = "Hash key-based video encryption scheme for H.264/AVC", JOURNAL = SP:IC, VOLUME = "25", YEAR = "2010", NUMBER = "6", MONTH = "July", PAGES = "427-437", BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319638"} @article{bb325274, AUTHOR = "Yeung, S.K.A. and Zhu, S. and Zeng, B.", TITLE = "Design of New Unitary Transforms for Perceptual Video Encryption", JOURNAL = CirSysVideo, VOLUME = "21", YEAR = "2011", NUMBER = "9", MONTH = "September", PAGES = "1341-1345", BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319639"} @inproceedings{bb325275, AUTHOR = "Yeung, S.K.A. and Zeng, B.", TITLE = "A new design of multiple transforms for perceptual video encryption", BOOKTITLE = ICIP12, YEAR = "2012", PAGES = "2637-2640", BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319640"} @article{bb325276, AUTHOR = "Thorpe, C. and Li, F. and Li, Z.J. and Yu, Z. and Saunders, D. and Yu, J.Y.", TITLE = "A Coprime Blur Scheme for Data Security in Video Surveillance", JOURNAL = PAMI, VOLUME = "35", YEAR = "2013", NUMBER = "12", PAGES = "3066-3072", BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319641"} @article{bb325277, AUTHOR = "Asghar, M.N. and Ghanbari, M. and Fleury, M. and Reed, M.J.", TITLE = "Confidentiality of a selectively encrypted H.264 coded video bit-stream", JOURNAL = JVCIR, VOLUME = "25", YEAR = "2014", NUMBER = "2", PAGES = "487-498", BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319642"} @article{bb325278, AUTHOR = "Asghar, M.N. and Kousar, R. and Majid, H. and Fleury, M.", TITLE = "Transparent encryption with scalable video communication: Lower-latency, CABAC-based schemes", JOURNAL = JVCIR, VOLUME = "45", YEAR = "2017", NUMBER = "1", PAGES = "122-136", BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319643"} @article{bb325279, AUTHOR = "Benrhouma, O. and Hermassi, H. and El Latif, A.A.A. and Belghith, S.", TITLE = "Cryptanalysis of a video encryption method based on mixing and permutation operations in the DCT domain", JOURNAL = SIViP, VOLUME = "9", YEAR = "2015", NUMBER = "6", MONTH = "September", PAGES = "1281-1286", BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319644"} @article{bb325280, AUTHOR = "Xu, H. and Tong, X.J. and Zhang, M. and Wang, Z. and Li, L.H.", TITLE = "Dynamic video encryption algorithm for H.264/AVC based on a spatiotemporal chaos system", JOURNAL = JOSA-A, VOLUME = "33", YEAR = "2016", NUMBER = "6", MONTH = "June", PAGES = "1166-1174", BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319645"} @article{bb325281, AUTHOR = "Boyadjis, B. and Bergeron, C. and Pesquet Popescu, B. and DuFaux, F.", TITLE = "Extended Selective Encryption of H.264/AVC (CABAC)- and HEVC-Encoded Video Streams", JOURNAL = CirSysVideo, VOLUME = "27", YEAR = "2017", NUMBER = "4", MONTH = "April", PAGES = "892-906", BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319646"} @article{bb325282, AUTHOR = "Minemura, K. and Wong, K. and Phan, R.C.W. and Tanaka, K.", TITLE = "A Novel Sketch Attack for H.264/AVC Format-Compliant Encrypted Video", JOURNAL = CirSysVideo, VOLUME = "27", YEAR = "2017", NUMBER = "11", MONTH = "November", PAGES = "2309-2321", BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319647"} @article{bb325283, AUTHOR = "Khlif, N. and Masmoudi, A. and Kammoun, F. and Masmoudi, N.", TITLE = "Secure chaotic dual encryption scheme for H.264/AVC video conferencing protection", JOURNAL = IET-IPR, VOLUME = "12", YEAR = "2018", NUMBER = "1", MONTH = "January", PAGES = "42-52", BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319648"} @article{bb325284, AUTHOR = "Thiyagarajan, K. and Lu, R. and El Sankary, K. and Zhu, H.", TITLE = "Energy-Aware Encryption for Securing Video Transmission in Internet of Multimedia Things", JOURNAL = CirSysVideo, VOLUME = "29", YEAR = "2019", NUMBER = "3", MONTH = "March", PAGES = "610-624", BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319649"} @article{bb325285, AUTHOR = "Elkamchouchi, H. and Salama, W.M. and Abouelseoud, Y.", TITLE = "New video encryption schemes based on chaotic maps", JOURNAL = IET-IPR, VOLUME = "14", YEAR = "2020", NUMBER = "2", MONTH = "February", PAGES = "397-406", BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319650"} @article{bb325286, AUTHOR = "Ghimire, S. and Choi, J.Y. and Lee, B.", TITLE = "Using Blockchain for Improved Video Integrity Verification", JOURNAL = MultMed, VOLUME = "22", YEAR = "2020", NUMBER = "1", MONTH = "January", PAGES = "108-121", BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319651"} @article{bb325287, AUTHOR = "Panwar, K. and Purwar, R.K. and Srivastava, G.", TITLE = "A Fast Encryption Scheme Suitable for Video Surveillance Applications Using SHA-256 Hash Function and 1D Sine-Sine Chaotic Map", JOURNAL = IJIG, VOLUME = "21", YEAR = "2021", NUMBER = "2 2021", PAGES = "2150022", BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319652"} @article{bb325288, AUTHOR = "Beugnon, S. and van Rensburg, B.J. and Amalou, N. and Puech, W. and Pedeboy, J.P.", TITLE = "A 3D Visual Security (3DVS) score to measure the visual security level of selectively encrypted 3D objects", JOURNAL = SP:IC, VOLUME = "108", YEAR = "2022", PAGES = "116832", BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319653"} @inproceedings{bb325289, AUTHOR = "Li, D. and Zhang, X. and Zhai, G. and Yang, X. and Zhu, W. and Gu, X.", TITLE = "Modeling Thermal Sequence Signal Decreasing for Dual Modal Password Breaking", BOOKTITLE = ICIP18, YEAR = "2018", PAGES = "1703-1707", BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319654"} @inproceedings{bb325290, AUTHOR = "Kim, J. and Lee, S. and Yoon, J. and Ko, H. and Kim, S. and Oh, H.", TITLE = "PASS: Privacy aware secure signature scheme for surveillance systems", BOOKTITLE = AVSS17, YEAR = "2017", PAGES = "1-6", BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319655"} @inproceedings{bb325291, AUTHOR = "Hu, Y. and Zhou, W. and Zhao, S. and Chen, Z. and Li, W.", TITLE = "SDM: Semantic Distortion Measurement for Video Encryption", BOOKTITLE = FG18, YEAR = "2018", PAGES = "764-768", BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319656"} @inproceedings{bb325292, AUTHOR = "Chang, Y.T. and Lin, Y.C. and Chen, Y.C. and Liou, Y.T.", TITLE = "Scrambling Cryptography Using Programmable SLM-Based Filter for Video Streaming Over a WDM Network", BOOKTITLE = CompIMAGE16, YEAR = "2016", PAGES = "241-250", BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319657"} @inproceedings{bb325293, AUTHOR = "Almarashda, K. and Dawood, A. and Martin, T. and Al Mualla, M. and Bhaskar, H.", TITLE = "An Optimized Selective Encryption for Video Confidentiality", BOOKTITLE = ICIAR15, YEAR = "2015", PAGES = "109-118", BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319658"} @inproceedings{bb325294, AUTHOR = "Puech, W. and Erkin, Z. and Barni, M. and Rane, S. and Lagendijk, R.L.", TITLE = "Emerging cryptographic challenges in image and video processing", BOOKTITLE = ICIP12, YEAR = "2012", PAGES = "2629-2632", BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319659"} @inproceedings{bb325295, AUTHOR = "Li, C.H. and Yuan, C. and Zhong, Y.Z.", TITLE = "Layered Encryption for Scalable Video Coding", BOOKTITLE = CISP09, YEAR = "2009", PAGES = "1-4", BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319660"} @inproceedings{bb325296, AUTHOR = "Raju, C.N. and Umadevi, G. and Srinathan, K. and Jawahar, C.V.", TITLE = "Fast and Secure Real-Time Video Encryption", BOOKTITLE = ICCVGIP08, YEAR = "2008", PAGES = "257-264", BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319661"} @inproceedings{bb325297, AUTHOR = "Raju, C.N. and Umadevi, G. and Srinathan, K. and Jawahar, C.V.", TITLE = "A novel video encryption technique based on secret sharing", BOOKTITLE = ICIP08, YEAR = "2008", PAGES = "3136-3139", BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319662"} @inproceedings{bb325298, AUTHOR = "Chen, Z.Y. and Xiong, Z. and Tang, L.", TITLE = "A Novel Scrambling Scheme for Digital Video Encryption", BOOKTITLE = PSIVT06, YEAR = "2006", PAGES = "997-1006", BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319663"} @inproceedings{bb325299, AUTHOR = "Socek, D. and Kalva, H. and Magliveras, S.S. and Marques, O. and Culibrk, D. and Furht, B.", TITLE = "A Permutation-Based Correlation-Preserving Encryption Method for Digital Videos", BOOKTITLE = ICIAR06, YEAR = "2006", PAGES = "I: 547-558", BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319664"}