@inproceedings{bb325200,
        AUTHOR = "Faridnia, S. and Faez, K.",
        TITLE = "Image Encryption through Using Chaotic Function and Graph",
        BOOKTITLE = ICCVG10,
        YEAR = "2010",
        PAGES = "I: 352-359",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319565"}

@inproceedings{bb325201,
        AUTHOR = "Ratan, R.",
        TITLE = "Key Independent Retrieval of Chaotic Encrypted Images",
        BOOKTITLE = PReMI09,
        YEAR = "2009",
        PAGES = "483-488",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319566"}

@inproceedings{bb325202,
        AUTHOR = "Mayouf, M.A. and Shukur, Z.",
        TITLE = "Using Animation in Active Learning Tool to Detect Possible Attacks in
Cryptographic Protocols",
        BOOKTITLE = IVIC09,
        YEAR = "2009",
        PAGES = "510-520",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319567"}

@inproceedings{bb325203,
        AUTHOR = "Rane, S.D. and Sun, W. and Vetro, A.",
        TITLE = "Secure distortion computation among untrusting parties using
homomorphic encryption",
        BOOKTITLE = ICIP09,
        YEAR = "2009",
        PAGES = "1485-1488",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319568"}

@inproceedings{bb325204,
        AUTHOR = "Zhang, J.H. and Chen, H. and Geng, Q.",
        TITLE = "Cryptoanalysis of Certificateless Partially Blind Signature and Proxy
Blind Signature Scheme",
        BOOKTITLE = CISP09,
        YEAR = "2009",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319569"}

@inproceedings{bb325205,
        AUTHOR = "Zhang, J.H. and Gao, S.N.",
        TITLE = "Cryptoanlaysis of Two Proxy Blind Signature Schemes with Proxy
Revocation",
        BOOKTITLE = CISP09,
        YEAR = "2009",
        PAGES = "1-4",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319570"}

@inproceedings{bb325206,
        AUTHOR = "Lang, J. and Tao, R. and Wang, Y.",
        TITLE = "The Generalized Weighted Fractional Fourier Transform and its
Application to Image Encryption",
        BOOKTITLE = CISP09,
        YEAR = "2009",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319571"}

@inproceedings{bb325207,
        AUTHOR = "Cao, Y. and Qiu, R. and Fu, Y.Z.",
        TITLE = "Color Image Encryption Based on Hyper-Chaos",
        BOOKTITLE = CISP09,
        YEAR = "2009",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319572"}

@inproceedings{bb325208,
        AUTHOR = "He, B. and Zhang, F. and Luo, L.Y. and Du, M.K. and Wang, Y.",
        TITLE = "An Image Encryption Algorithm Based on Spatiotemporal Chaos",
        BOOKTITLE = CISP09,
        YEAR = "2009",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319573"}

@inproceedings{bb325209,
        AUTHOR = "Zhang, S. and Cai, R. and Jiang, Y.C. and Guo, S.P.",
        TITLE = "An Image Encryption Algorithm Based on Multiple Chaos and Wavelet
Transform",
        BOOKTITLE = CISP09,
        YEAR = "2009",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319574"}

@inproceedings{bb325210,
        AUTHOR = "Xiao, Y. and Zhang, H.Y. and Ran, Q.W. and Zhang, J. and Tan, L.Y.",
        TITLE = "Image Encryption and Two Dimensional Discrete M-Parameter Fractional
Fourier Transform",
        BOOKTITLE = CISP09,
        YEAR = "2009",
        PAGES = "1-4",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319575"}

@inproceedings{bb325211,
        AUTHOR = "Podoba, T. and Giesl, J. and Vlcek, K.",
        TITLE = "Image Encryption In Wavelet Domain Based on Chaotic Maps",
        BOOKTITLE = CISP09,
        YEAR = "2009",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319576"}

@inproceedings{bb325212,
        AUTHOR = "Weir, J. and Yan, W.Q.",
        TITLE = "Authenticating Visual Cryptography Shares Using 2D Barcodes",
        BOOKTITLE = IWDW11,
        YEAR = "2011",
        PAGES = "196-210",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319577"}

@inproceedings{bb325213,
        AUTHOR = "Weir, J. and Yan, W.Q.",
        TITLE = "Plane Transform Visual Cryptography",
        BOOKTITLE = DW10,
        YEAR = "2010",
        PAGES = "60-74",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319578"}

@inproceedings{bb325214,
        AUTHOR = "Weir, J. and Yan, W.Q.",
        TITLE = "Image Hatching for Visual Cryptography",
        BOOKTITLE = IMVIP09,
        YEAR = "2009",
        PAGES = "59-64",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319579"}

@inproceedings{bb325215,
        AUTHOR = "Weir, J. and Yan, W.Q.",
        TITLE = "Dot-Size Variant Visual Cryptography",
        BOOKTITLE = DW09,
        YEAR = "2009",
        PAGES = "136-148",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319580"}

@inproceedings{bb325216,
        AUTHOR = "Piper, F.",
        TITLE = "The Changing Face of Cryptography",
        BOOKTITLE = DW09,
        YEAR = "2009",
        PAGES = "2",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319581"}

@inproceedings{bb325217,
        AUTHOR = "Chen, W.B. and Zhang, X.",
        TITLE = "Image encryption algorithm based on Henon chaotic system",
        BOOKTITLE = IASP09,
        YEAR = "2009",
        PAGES = "94-97",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319582"}

@inproceedings{bb325218,
        AUTHOR = "Du, Y.F. and Zhang, J. and Su, Y.T.",
        TITLE = "Watermarking for Authentication of LZ-77 Compressed Documents",
        BOOKTITLE = DW07,
        YEAR = "2007",
        PAGES = "365-372",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319583"}

@inproceedings{bb325219,
        AUTHOR = "Luo, H. and Lu, Z.M. and Pan, J.S.",
        TITLE = "Multiple Watermarking in Visual Cryptography",
        BOOKTITLE = DW07,
        YEAR = "2007",
        PAGES = "60-70",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319584"}

@inproceedings{bb325220,
        AUTHOR = "Sadeghi, A.R.",
        TITLE = "The Marriage of Cryptography and Watermarking:
Beneficial and Challenging for Secure Watermarking and Detection",
        BOOKTITLE = DW07,
        YEAR = "2007",
        PAGES = "2-18",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319585"}

@inproceedings{bb325221,
        AUTHOR = "He, D. and Jagmohan, A. and Lu, L.G.",
        TITLE = "Secure collaboration using Slepian-Wolf codes",
        BOOKTITLE = ICIP08,
        YEAR = "2008",
        PAGES = "2216-2219",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319586"}

@inproceedings{bb325222,
        AUTHOR = "Seshadrinathan, M. and Dempski, K.L.",
        TITLE = "Implementation of Advanced Encryption Standard for encryption and
decryption of images and text on a GPU",
        BOOKTITLE = CVGPU08,
        YEAR = "2008",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319587"}

@inproceedings{bb325223,
        AUTHOR = "Alface, P.R. and Macq, B. and Cayre, F.",
        TITLE = "Blind and Robust Watermarking of 3D Models:
How to Withstand the Cropping Attack?",
        BOOKTITLE = ICIP07,
        YEAR = "2007",
        PAGES = "V: 465-468",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319588"}

@inproceedings{bb325224,
        AUTHOR = "Huang, T.J.",
        TITLE = "Evolvement of DRM Schema: From Encryption to Interoperability and
Monitoring",
        BOOKTITLE = MCAM07,
        YEAR = "2007",
        PAGES = "65-75",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319589"}

@inproceedings{bb325225,
        AUTHOR = "Lai, J.C. and Wang, C.H.",
        TITLE = "Buffer Occupancy Feedback Security Control and Changing Encryption Keys
to Protect MOD Services",
        BOOKTITLE = PSIVT06,
        YEAR = "2006",
        PAGES = "888-897",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319590"}

@inproceedings{bb325226,
        AUTHOR = "Li, W.H. and Yuan, Y.",
        TITLE = "Visual Information Encryption in Frequency Domain: Risk and Enhancement",
        BOOKTITLE = IWICPAS06,
        YEAR = "2006",
        PAGES = "225-234",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319591"}

@inproceedings{bb325227,
        AUTHOR = "Wong, A. and Bishop, W.",
        TITLE = "Expert Knowledge Based Automatic Regions-of-Interest (ROI) Selection in
Scanned Documents for Digital Image Encryption",
        BOOKTITLE = CRV06,
        YEAR = "2006",
        PAGES = "51-51",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319592"}

@inproceedings{bb325228,
        AUTHOR = "Said, A.",
        TITLE = "Measuring the Strength of Partial Encryption Schemes",
        BOOKTITLE = ICIP05,
        YEAR = "2005",
        PAGES = "II: 1126-1129",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319593"}

@inproceedings{bb325229,
        AUTHOR = "Katzenbeisser, S.",
        TITLE = "On the Integration of Watermarks and Cryptography",
        BOOKTITLE = DW03,
        YEAR = "2003",
        PAGES = "50-60",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319594"}

@inproceedings{bb325230,
        AUTHOR = "Li, S.J. and Zheng, X.",
        TITLE = "On the security of an image encryption method",
        BOOKTITLE = ICIP02,
        YEAR = "2002",
        PAGES = "II: 925-928",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319595"}

@inproceedings{bb325231,
        AUTHOR = "Yamaguchi, Y.S.",
        TITLE = "An Extended Visual Cryptography Scheme for Continuous-Tone Images",
        BOOKTITLE = IWDW11,
        YEAR = "2011",
        PAGES = "228-242",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319596"}

@inproceedings{bb325232,
        AUTHOR = "Nakajima, M. and Yamaguchi, Y.S.",
        TITLE = "Extended Visual Cryptography for Natural Images",
        BOOKTITLE = WSCG02,
        YEAR = "2002",
        PAGES = "303",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319597"}

@inproceedings{bb325233,
        AUTHOR = "Han, K. and Tewfik, A.",
        TITLE = "Scalable Cryptographic Scheme for Networked Multimedia Applications",
        BOOKTITLE = ICIP01,
        YEAR = "2001",
        PAGES = "III: 987-990",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319598"}

@inproceedings{bb325234,
        AUTHOR = "Chen, Y.C. and Chang, L.W.",
        TITLE = "A Secure and Robust Digital Watermarking Technique by the Block Cipher
Rc6 and Secure Hash Algorithm",
        BOOKTITLE = ICIP01,
        YEAR = "2001",
        PAGES = "II: 518-521",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319599"}

@inproceedings{bb325235,
        AUTHOR = "Depovere, G. and Kalker, T.",
        TITLE = "Secret Key Watermarking with Changing Keys",
        BOOKTITLE = ICIP00,
        YEAR = "2000",
        PAGES = "Vol I: 427-429",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319600"}

@inproceedings{bb325236,
        AUTHOR = "Bhattacharjee, S. and Kutter, M.",
        TITLE = "Compression tolerant image authentication",
        BOOKTITLE = ICIP98,
        YEAR = "1998",
        PAGES = "I: 435-439",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319601"}

@inproceedings{bb325237,
        AUTHOR = "Creusere, C.D. and Mitra, S.K.",
        TITLE = "Efficient image scrambling using polyphase filter banks",
        BOOKTITLE = ICIP94,
        YEAR = "1994",
        PAGES = "II: 81-85",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT319602"}

@article{bb325238,
        AUTHOR = "Caldelli, R. and Filippini, F. and Barni, M.",
        TITLE = "Joint near-lossless compression and watermarking of still images for
authentication and tamper localization",
        JOURNAL = SP:IC,
        VOLUME = "21",
        YEAR = "2006",
        NUMBER = "10",
        MONTH = "November",
        PAGES = "890-903",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319603"}

@article{bb325239,
        AUTHOR = "Li, W.H. and Yuan, Y.",
        TITLE = "A New Blind Attack Procedure For Dct-based Image Encryption With
Spectrum Learning",
        JOURNAL = IJIG,
        VOLUME = "7",
        YEAR = "2007",
        NUMBER = "3",
        MONTH = "July",
        PAGES = "481-496",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319604"}

@article{bb325240,
        AUTHOR = "Shreyamsha Kumar, B.K. and Patil, C.R.",
        TITLE = "JPEG image encryption using fuzzy PN sequences",
        JOURNAL = SIViP,
        VOLUME = "4",
        YEAR = "2010",
        NUMBER = "4",
        MONTH = "November",
        PAGES = "419-427",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319605"}

@article{bb325241,
        AUTHOR = "Watanabe, O. and Fukuhara, T. and Kiya, H.",
        TITLE = "Codestream-Based Identification of JPEG 2000 Images with Different
Coding Parameters",
        JOURNAL = IEICE,
        VOLUME = "E95-D",
        YEAR = "2012",
        NUMBER = "4",
        MONTH = "April",
        PAGES = "1120-1129",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319606"}

@article{bb325242,
        AUTHOR = "Iida, K. and Kiya, H.",
        TITLE = "Robust Image Identification without Visible Information for JPEG Images",
        JOURNAL = IEICE,
        VOLUME = "E101-D",
        YEAR = "2018",
        NUMBER = "1",
        MONTH = "January",
        PAGES = "13-19",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319607"}

@inproceedings{bb325243,
        AUTHOR = "Iida, K. and Kiya, H.",
        TITLE = "Robust image identification with secure features for JPEG images",
        BOOKTITLE = ICIP17,
        YEAR = "2017",
        PAGES = "4342-4346",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319608"}

@article{bb325244,
        AUTHOR = "Iida, K. and Kiya, H.",
        TITLE = "Robust Image Identification with DC Coefficients for Double-Compressed
JPEG Images",
        JOURNAL = IEICE,
        VOLUME = "E102-D",
        YEAR = "2019",
        NUMBER = "1",
        MONTH = "January",
        PAGES = "2-10",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319609"}

@inproceedings{bb325245,
        AUTHOR = "Kobayashi, H. and Imaizumi, S. and Kiya, H.",
        TITLE = "A Robust Identification Scheme for JPEG XR Images with Various
Compression Ratios",
        BOOKTITLE = PSIVT15,
        YEAR = "2015",
        PAGES = "38-50",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319610"}

@inproceedings{bb325246,
        AUTHOR = "Imaizumi, S. and Fujiyoshi, M. and Kiya, H. and Aoki, N. and Kobayashi, H.",
        TITLE = "A Key Derivation Scheme for Hierarchical Access Control to JPEG 2000
Coded Images",
        BOOKTITLE = PSIVT11,
        YEAR = "2011",
        PAGES = "II: 180-191",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319611"}

@inproceedings{bb325247,
        AUTHOR = "Hashimoto, N. and Imaizumi, S. and Fujiyoshi, M. and Kiya, H.",
        TITLE = "Hierarchical encryption using short encryption keys for scalable access
control of JPEG 2000 coded images",
        BOOKTITLE = ICIP08,
        YEAR = "2008",
        PAGES = "3116-3119",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319612"}

@inproceedings{bb325248,
        AUTHOR = "Imaizumi, S. and Fujiyoshi, M. and Abe, Y. and Kiya, H.",
        TITLE = "Collusion Attack-Resilient Hierarchical Encryption of JPEG 2000
Codestreams with Scalable Access Control",
        BOOKTITLE = ICIP07,
        YEAR = "2007",
        PAGES = "II: 137-140",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319613"}

@inproceedings{bb325249,
        AUTHOR = "Imaizumi, S. and Watanabe, O. and Fujiyoshi, M. and Kiya, H.",
        TITLE = "Generalized Hierarchical Encryption of JPEG 2000 Codestreams for Access
Control",
        BOOKTITLE = ICIP05,
        YEAR = "2005",
        PAGES = "II: 1094-1097",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319614"}

@inproceedings{bb325250,
        AUTHOR = "Fujiyoshi, M. and Saitou, W. and Watanabe, O. and Kiya, H.",
        TITLE = "Hierarchical Encryption of Multimedia Contents for Access Control",
        BOOKTITLE = ICIP06,
        YEAR = "2006",
        PAGES = "1977-1980",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319615"}

@inproceedings{bb325251,
        AUTHOR = "Watanabe, O. and Iida, T. and Fukuhara, T. and Kiya, H.",
        TITLE = "Identification of JPEG 2000 images in encrypted domain for digital
cinema",
        BOOKTITLE = ICIP09,
        YEAR = "2009",
        PAGES = "2065-2068",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319616"}

@article{bb325252,
        AUTHOR = "Kishore, B. and Kumar, B.K.S. and Patil, C.R.",
        TITLE = "FPGA based simple and fast JPEG encryptor",
        JOURNAL = RealTimeIP,
        VOLUME = "10",
        YEAR = "2015",
        NUMBER = "3",
        MONTH = "September",
        PAGES = "551-559",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319617"}

@article{bb325253,
        AUTHOR = "Naik, K. and Pal, A.K.",
        TITLE = "Design of a cryptosystem for DCT compressed image using Arnold
transform and fractional Fourier transform",
        JOURNAL = IJCVR,
        VOLUME = "5",
        YEAR = "2015",
        NUMBER = "3",
        PAGES = "335-346",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319618"}

@article{bb325254,
        AUTHOR = "Gu, G.S. and Ling, J. and Xie, G. and Li, Z.",
        TITLE = "A chaotic-cipher-based packet body encryption algorithm for JPEG2000
images",
        JOURNAL = SP:IC,
        VOLUME = "40",
        YEAR = "2016",
        NUMBER = "1",
        PAGES = "52-64",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319619"}

@article{bb325255,
        AUTHOR = "He, J. and Huang, S. and Tang, S. and Huang, J.",
        TITLE = "JPEG Image Encryption With Improved Format Compatibility and File
Size Preservation",
        JOURNAL = MultMed,
        VOLUME = "20",
        YEAR = "2018",
        NUMBER = "10",
        MONTH = "October",
        PAGES = "2645-2658",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319620"}

@article{bb325256,
        AUTHOR = "Liang, H.H. and Zhang, X.P. and Cheng, H.",
        TITLE = "Huffman-code based retrieval for encrypted JPEG images",
        JOURNAL = JVCIR,
        VOLUME = "61",
        YEAR = "2019",
        PAGES = "149-156",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319621"}

@article{bb325257,
        AUTHOR = "Itier, V. and Puteaux, P. and Puech, W.",
        TITLE = "Recompression of JPEG Crypto-Compressed Images Without a Key",
        JOURNAL = CirSysVideo,
        VOLUME = "30",
        YEAR = "2020",
        NUMBER = "3",
        MONTH = "March",
        PAGES = "646-660",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319622"}

@article{bb325258,
        AUTHOR = "He, H.J. and Yuan, Y. and Ye, Y. and Tai, H.M. and Chen, F.",
        TITLE = "Chosen plaintext attack on JPEG image encryption with adaptive key
and run consistency",
        JOURNAL = JVCIR,
        VOLUME = "90",
        YEAR = "2023",
        PAGES = "103733",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319623"}

@article{bb325259,
        AUTHOR = "Li, P.Y. and Sun, Z. and Situ, Z. and He, M.L. and Song, T.T.",
        TITLE = "Joint JPEG Compression and Encryption Scheme Based on Order-8-16
Block Transform",
        JOURNAL = ITS,
        VOLUME = "24",
        YEAR = "2023",
        NUMBER = "7",
        MONTH = "July",
        PAGES = "7687-7696",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319624"}

@article{bb325260,
        AUTHOR = "Ye, X. and Zhang, Y.S. and Xiao, X.L. and Yi, S. and Lan, R.",
        TITLE = "Usability Enhanced Thumbnail-Preserving Encryption Based on Data
Hiding for JPEG Images",
        JOURNAL = SPLetters,
        VOLUME = "30",
        YEAR = "2023",
        PAGES = "793-797",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319625"}

@article{bb325261,
        AUTHOR = "Qin, C. and Hu, J. and Li, F. and Qian, Z.X. and Zhang, X.P.",
        TITLE = "JPEG Image Encryption With Adaptive DC Coefficient Prediction and RS
Pair Permutation",
        JOURNAL = MultMed,
        VOLUME = "25",
        YEAR = "2023",
        PAGES = "2528-2542",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319626"}

@article{bb325262,
        AUTHOR = "Yuan, Y. and He, H.J. and Yang, Y.L. and Mao, N.X. and Chen, F. and Ali, M.",
        TITLE = "JPEG image encryption with grouping coefficients based on entropy
coding",
        JOURNAL = JVCIR,
        VOLUME = "97",
        YEAR = "2023",
        PAGES = "103975",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319627"}

@inproceedings{bb325263,
        AUTHOR = "Ting, J. and Wong, K. and Ong, S.",
        TITLE = "Format-Compliant Perceptual Encryption Method for JPEG XT",
        BOOKTITLE = ICIP19,
        YEAR = "2019",
        PAGES = "4559-4563",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319628"}

@inproceedings{bb325264,
        AUTHOR = "Maqbool, S. and Ahmad, N. and Muhammad, A. and Enriquez, A.M.M.",
        TITLE = "Simultaneous Encryption and Compression of Digital Images Based on
Secure-JPEG Encoding",
        BOOKTITLE = MCPR16,
        YEAR = "2016",
        PAGES = "145-154",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319629"}

@inproceedings{bb325265,
        AUTHOR = "Hofbauer, H. and Unterweger, A. and Uhl, A.",
        TITLE = "Encrypting only AC coefficient signs considered harmful",
        BOOKTITLE = ICIP15,
        YEAR = "2015",
        PAGES = "3740-3744",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319630"}

@inproceedings{bb325266,
        AUTHOR = "Korshunov, P. and Ebrahimi, T.",
        TITLE = "Scrambling-based tool for secure protection of JPEG images",
        BOOKTITLE = ICIP14,
        YEAR = "2014",
        PAGES = "3423-3425",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319631"}

@inproceedings{bb325267,
        AUTHOR = "Pinto, M. and Puech, W. and Subsol, G.",
        TITLE = "Protection of JPEG compressed e-comics by selective encryption",
        BOOKTITLE = ICIP13,
        YEAR = "2013",
        PAGES = "4588-4592",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319632"}

@inproceedings{bb325268,
        AUTHOR = "Chen, B. and Chandran, V.",
        TITLE = "Robust Image Hashing Using Higher Order Spectral Features",
        BOOKTITLE = DICTA10,
        YEAR = "2010",
        PAGES = "100-104",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319633"}

@inproceedings{bb325269,
        AUTHOR = "Ahmed, F. and Siyal, M.Y. and Abbas, V.U.",
        TITLE = "A Perceptually Scalable and JPEG Compression Tolerant Image Encryption
Scheme",
        BOOKTITLE = PSIVT10,
        YEAR = "2010",
        PAGES = "232-238",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319634"}

@inproceedings{bb325270,
        AUTHOR = "Zhu, B.B. and Yang, Y. and Li, S.P.",
        TITLE = "JPEG 2000 Syntax-Compliant Encryption Preserving Full Scalability",
        BOOKTITLE = ICIP05,
        YEAR = "2005",
        PAGES = "III: 636-639",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319635"}

@inproceedings{bb325271,
        AUTHOR = "Watanabe, O. and Nakazaki, A. and Kiya, H.",
        TITLE = "A fast image-scramble method using public-key encryption allowing
backward compatibility with jpeg2000",
        BOOKTITLE = ICIP04,
        YEAR = "2004",
        PAGES = "V: 3435-3438",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996jpcry3.html#TT319636"}

@article{bb325272,
        AUTHOR = "Li, S.J. and Li, C.Q. and Chen, G.R. and Bourbakis, N.G. and Lo, K.T.",
        TITLE = "A general quantitative cryptanalysis of permutation-only multimedia
ciphers against plaintext attacks",
        JOURNAL = SP:IC,
        VOLUME = "23",
        YEAR = "2008",
        NUMBER = "3",
        MONTH = "March",
        PAGES = "212-223",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319637"}

@article{bb325273,
        AUTHOR = "Wang, X.F. and Zheng, N.N. and Tian, L.",
        TITLE = "Hash key-based video encryption scheme for H.264/AVC",
        JOURNAL = SP:IC,
        VOLUME = "25",
        YEAR = "2010",
        NUMBER = "6",
        MONTH = "July",
        PAGES = "427-437",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319638"}

@article{bb325274,
        AUTHOR = "Yeung, S.K.A. and Zhu, S. and Zeng, B.",
        TITLE = "Design of New Unitary Transforms for Perceptual Video Encryption",
        JOURNAL = CirSysVideo,
        VOLUME = "21",
        YEAR = "2011",
        NUMBER = "9",
        MONTH = "September",
        PAGES = "1341-1345",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319639"}

@inproceedings{bb325275,
        AUTHOR = "Yeung, S.K.A. and Zeng, B.",
        TITLE = "A new design of multiple transforms for perceptual video encryption",
        BOOKTITLE = ICIP12,
        YEAR = "2012",
        PAGES = "2637-2640",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319640"}

@article{bb325276,
        AUTHOR = "Thorpe, C. and Li, F. and Li, Z.J. and Yu, Z. and Saunders, D. and Yu, J.Y.",
        TITLE = "A Coprime Blur Scheme for Data Security in Video Surveillance",
        JOURNAL = PAMI,
        VOLUME = "35",
        YEAR = "2013",
        NUMBER = "12",
        PAGES = "3066-3072",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319641"}

@article{bb325277,
        AUTHOR = "Asghar, M.N. and Ghanbari, M. and Fleury, M. and Reed, M.J.",
        TITLE = "Confidentiality of a selectively encrypted H.264 coded video
bit-stream",
        JOURNAL = JVCIR,
        VOLUME = "25",
        YEAR = "2014",
        NUMBER = "2",
        PAGES = "487-498",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319642"}

@article{bb325278,
        AUTHOR = "Asghar, M.N. and Kousar, R. and Majid, H. and Fleury, M.",
        TITLE = "Transparent encryption with scalable video communication:
Lower-latency, CABAC-based schemes",
        JOURNAL = JVCIR,
        VOLUME = "45",
        YEAR = "2017",
        NUMBER = "1",
        PAGES = "122-136",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319643"}

@article{bb325279,
        AUTHOR = "Benrhouma, O. and Hermassi, H. and El Latif, A.A.A. and Belghith, S.",
        TITLE = "Cryptanalysis of a video encryption method based on mixing and
permutation operations in the DCT domain",
        JOURNAL = SIViP,
        VOLUME = "9",
        YEAR = "2015",
        NUMBER = "6",
        MONTH = "September",
        PAGES = "1281-1286",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319644"}

@article{bb325280,
        AUTHOR = "Xu, H. and Tong, X.J. and Zhang, M. and Wang, Z. and Li, L.H.",
        TITLE = "Dynamic video encryption algorithm for H.264/AVC based on a
spatiotemporal chaos system",
        JOURNAL = JOSA-A,
        VOLUME = "33",
        YEAR = "2016",
        NUMBER = "6",
        MONTH = "June",
        PAGES = "1166-1174",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319645"}

@article{bb325281,
        AUTHOR = "Boyadjis, B. and Bergeron, C. and Pesquet Popescu, B. and DuFaux, F.",
        TITLE = "Extended Selective Encryption of H.264/AVC (CABAC)- and HEVC-Encoded
Video Streams",
        JOURNAL = CirSysVideo,
        VOLUME = "27",
        YEAR = "2017",
        NUMBER = "4",
        MONTH = "April",
        PAGES = "892-906",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319646"}

@article{bb325282,
        AUTHOR = "Minemura, K. and Wong, K. and Phan, R.C.W. and Tanaka, K.",
        TITLE = "A Novel Sketch Attack for H.264/AVC Format-Compliant Encrypted Video",
        JOURNAL = CirSysVideo,
        VOLUME = "27",
        YEAR = "2017",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "2309-2321",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319647"}

@article{bb325283,
        AUTHOR = "Khlif, N. and Masmoudi, A. and Kammoun, F. and Masmoudi, N.",
        TITLE = "Secure chaotic dual encryption scheme for H.264/AVC video conferencing
protection",
        JOURNAL = IET-IPR,
        VOLUME = "12",
        YEAR = "2018",
        NUMBER = "1",
        MONTH = "January",
        PAGES = "42-52",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319648"}

@article{bb325284,
        AUTHOR = "Thiyagarajan, K. and Lu, R. and El Sankary, K. and Zhu, H.",
        TITLE = "Energy-Aware Encryption for Securing Video Transmission in Internet
of Multimedia Things",
        JOURNAL = CirSysVideo,
        VOLUME = "29",
        YEAR = "2019",
        NUMBER = "3",
        MONTH = "March",
        PAGES = "610-624",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319649"}

@article{bb325285,
        AUTHOR = "Elkamchouchi, H. and Salama, W.M. and Abouelseoud, Y.",
        TITLE = "New video encryption schemes based on chaotic maps",
        JOURNAL = IET-IPR,
        VOLUME = "14",
        YEAR = "2020",
        NUMBER = "2",
        MONTH = "February",
        PAGES = "397-406",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319650"}

@article{bb325286,
        AUTHOR = "Ghimire, S. and Choi, J.Y. and Lee, B.",
        TITLE = "Using Blockchain for Improved Video Integrity Verification",
        JOURNAL = MultMed,
        VOLUME = "22",
        YEAR = "2020",
        NUMBER = "1",
        MONTH = "January",
        PAGES = "108-121",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319651"}

@article{bb325287,
        AUTHOR = "Panwar, K. and Purwar, R.K. and Srivastava, G.",
        TITLE = "A Fast Encryption Scheme Suitable for Video Surveillance Applications
Using SHA-256 Hash Function and 1D Sine-Sine Chaotic Map",
        JOURNAL = IJIG,
        VOLUME = "21",
        YEAR = "2021",
        NUMBER = "2 2021",
        PAGES = "2150022",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319652"}

@article{bb325288,
        AUTHOR = "Beugnon, S. and van Rensburg, B.J. and Amalou, N. and Puech, W. and Pedeboy, J.P.",
        TITLE = "A 3D Visual Security (3DVS) score to measure the visual security
level of selectively encrypted 3D objects",
        JOURNAL = SP:IC,
        VOLUME = "108",
        YEAR = "2022",
        PAGES = "116832",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319653"}

@inproceedings{bb325289,
        AUTHOR = "Li, D. and Zhang, X. and Zhai, G. and Yang, X. and Zhu, W. and Gu, X.",
        TITLE = "Modeling Thermal Sequence Signal Decreasing for Dual Modal Password
Breaking",
        BOOKTITLE = ICIP18,
        YEAR = "2018",
        PAGES = "1703-1707",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319654"}

@inproceedings{bb325290,
        AUTHOR = "Kim, J. and Lee, S. and Yoon, J. and Ko, H. and Kim, S. and Oh, H.",
        TITLE = "PASS: Privacy aware secure signature scheme for surveillance systems",
        BOOKTITLE = AVSS17,
        YEAR = "2017",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319655"}

@inproceedings{bb325291,
        AUTHOR = "Hu, Y. and Zhou, W. and Zhao, S. and Chen, Z. and Li, W.",
        TITLE = "SDM: Semantic Distortion Measurement for Video Encryption",
        BOOKTITLE = FG18,
        YEAR = "2018",
        PAGES = "764-768",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319656"}

@inproceedings{bb325292,
        AUTHOR = "Chang, Y.T. and Lin, Y.C. and Chen, Y.C. and Liou, Y.T.",
        TITLE = "Scrambling Cryptography Using Programmable SLM-Based Filter for Video
Streaming Over a WDM Network",
        BOOKTITLE = CompIMAGE16,
        YEAR = "2016",
        PAGES = "241-250",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319657"}

@inproceedings{bb325293,
        AUTHOR = "Almarashda, K. and Dawood, A. and Martin, T. and Al Mualla, M. and Bhaskar, H.",
        TITLE = "An Optimized Selective Encryption for Video Confidentiality",
        BOOKTITLE = ICIAR15,
        YEAR = "2015",
        PAGES = "109-118",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319658"}

@inproceedings{bb325294,
        AUTHOR = "Puech, W. and Erkin, Z. and Barni, M. and Rane, S. and Lagendijk, R.L.",
        TITLE = "Emerging cryptographic challenges in image and video processing",
        BOOKTITLE = ICIP12,
        YEAR = "2012",
        PAGES = "2629-2632",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319659"}

@inproceedings{bb325295,
        AUTHOR = "Li, C.H. and Yuan, C. and Zhong, Y.Z.",
        TITLE = "Layered Encryption for Scalable Video Coding",
        BOOKTITLE = CISP09,
        YEAR = "2009",
        PAGES = "1-4",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319660"}

@inproceedings{bb325296,
        AUTHOR = "Raju, C.N. and Umadevi, G. and Srinathan, K. and Jawahar, C.V.",
        TITLE = "Fast and Secure Real-Time Video Encryption",
        BOOKTITLE = ICCVGIP08,
        YEAR = "2008",
        PAGES = "257-264",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319661"}

@inproceedings{bb325297,
        AUTHOR = "Raju, C.N. and Umadevi, G. and Srinathan, K. and Jawahar, C.V.",
        TITLE = "A novel video encryption technique based on secret sharing",
        BOOKTITLE = ICIP08,
        YEAR = "2008",
        PAGES = "3136-3139",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319662"}

@inproceedings{bb325298,
        AUTHOR = "Chen, Z.Y. and Xiong, Z. and Tang, L.",
        TITLE = "A Novel Scrambling Scheme for Digital Video Encryption",
        BOOKTITLE = PSIVT06,
        YEAR = "2006",
        PAGES = "997-1006",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319663"}

@inproceedings{bb325299,
        AUTHOR = "Socek, D. and Kalva, H. and Magliveras, S.S. and Marques, O. and Culibrk, D. and Furht, B.",
        TITLE = "A Permutation-Based Correlation-Preserving Encryption Method for
Digital Videos",
        BOOKTITLE = ICIAR06,
        YEAR = "2006",
        PAGES = "I: 547-558",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT319664"}

Last update:May 6, 2024 at 15:50:14