23.3.9.6 Encryption, Visual Cryptography, Authentication

Chapter Contents (Back)
Encryption. Image Encryption. Cryptography. Visual Cryptography. Not really watermarks. Usually the more specific papers.

Scharinger, J.,
Fast Encryption of Image Data Using Chaotic Kolmogorov Flows,
JEI(7), No. 2, April 1998, pp. 318-325. 9807
BibRef

Chuang, T.J., Lin, J.C.,
New Approach to Image Encryption,
JEI(7), No. 2, April 1998, pp. 350-356. 9807
BibRef

Chung, K.L., Chang, L.C.,
Large Encrypting Binary Images with Higher Security,
PRL(19), No. 5-6, April 1998, pp. 461-468. 9808
See also Cryptanalysis of an encryption scheme for binary images. BibRef

Aikawa, M., Takaragi, K., Furuya, S., Sasamoto, M.,
A Lightweight Encryption Method Suitable For Copyright Protection,
Consumer(44), No. 3, August 1998, pp. 902-910. 9810
BibRef

Yen, J.C., Guo, J.I.,
Efficient hierarchical chaotic image encryption algorithm and its VLSI realisation,
VISP(147), No. 2, April 2000, pp. 167. 0005
BibRef

Chang, C.C.[Chin-Chen], Chuang, J.C.[Jun-Chou],
An image intellectual property protection scheme for gray-level images using visual secret sharing strategy,
PRL(23), No. 8, June 2002, pp. 931-941.
Elsevier DOI 0204
BibRef

Chang, C.C.[Chin-Chen], Yu, T.X.[Tai-Xing],
Cryptanalysis of an encryption scheme for binary images,
PRL(23), No. 14, December 2002, pp. 1847-1852.
Elsevier DOI 0208
Shows how earlier method ( See also Large Encrypting Binary Images with Higher Security. ) can be broken. BibRef

Chang, C.C., Hwang, K.F., Hwang, M.S.,
Robust authentication scheme for protecting copyrights of images and graphics,
VISP(149), No. 1, February 2002, pp. 43-50.
IEEE Top Reference. 0205
BibRef

Alberti, C., Romeo, A., Mattavelli, M.,
Intellectual property management and protection for MPEG multimedia content: A structured language for interoperable IPMP systems,
IJIST(13), No. 5, 2003, pp. 275-288.
DOI Link 0312
BibRef

Lin, C.C.[Chang-Chou], Tsai, W.H.[Wen-Hsiang],
Visual cryptography for gray-level images by dithering techniques,
PRL(24), No. 1-3, January 2003, pp. 349-358.
Elsevier DOI 0211
BibRef

Hou, Y.C.[Young-Chang],
Visual cryptography for color images,
PR(36), No. 7, July 2003, pp. 1619-1629.
WWW Link. 0304
BibRef

Zhao, Y., Campisi, P., Kundur, D.,
Dual Domain Watermarking for Authentication and Compression of Cultural Heritage Images,
IP(13), No. 3, March 2004, pp. 430-448.
IEEE DOI 0404
BibRef

Maiorana, E.[Emanuele], Campisi, P.[Patrizio],
High-capacity watermarking of high dynamic range images,
JIVP(2016), No. 1, 2016, pp. 3.
DOI Link 1601
BibRef

Lukac, R.[Rastislav], Plataniotis, K.N.[Konstantinos N.],
Bit-level based secret sharing for image encryption,
PR(38), No. 5, May 2005, pp. 767-772.
WWW Link. 0501
BibRef
Earlier:
Document image secret sharing using bit-level processing,
ICIP04(V: 2893-2896).
IEEE DOI 0505
BibRef

Lukac, R.[Rastislav], Plataniotis, K.N.[Konstantinos N.],
A cost-effective encryption scheme for color images,
RealTimeImg(11), No. 5-6, October-December 2005, pp. 454-464.
WWW Link. 0510
BibRef

Martin, K.[Karl], Lukac, R.[Rastislav], Plataniotis, K.N.[Konstantinos N.],
Efficient encryption of wavelet-based coded color images,
PR(38), No. 7, July 2005, pp. 1111-1115.
WWW Link. 0505
BibRef

Heidarinejad, M.[Mohsen], Plataniotis, K.N.[Konstantinos N.],
A second generation Visual Secret Sharing scheme for color images,
ICIP08(481-484).
IEEE DOI 0810
BibRef

Celik, M.U., Sharma, G., Tekalp, A.M.,
Lossless Watermarking for Image Authentication: A New Framework and an Implementation,
IP(15), No. 4, April 2006, pp. 1042-1049.
IEEE DOI 0604
BibRef

Shyu, S.J.[Shyong Jian],
Efficient visual secret sharing scheme for color images,
PR(39), No. 5, May 2006, pp. 866-880.
WWW Link. 0604
Visual cryptography; Secret sharing; Visual secret sharing; Color images BibRef

Shyu, S.J.[Shyong Jian],
Image encryption by random grids,
PR(40), No. 3, March 2007, pp. 1014-1031.
WWW Link. 0611
Image encryption; Random grid; Visual cryptography; Halftone; Color mixing; Color decomposition BibRef

Shyu, S.J.[Shyong Jian],
Image encryption by multiple random grids,
PR(42), No. 7, July 2009, pp. 1582-1596.
Elsevier DOI 0903
Image encryption; Random grid; Visual cryptogram; Visual cryptography; Visual secret sharing BibRef

Shyu, S.J.[Shyong Jian],
Threshold Visual Cryptographic Scheme With Meaningful Shares,
SPLetters(21), No. 12, December 2014, pp. 1521-1525.
IEEE DOI 1410
cryptography BibRef

Wang, R.Z.[Ran-Zan], Shyu, S.J.[Shyong-Jian],
Scalable secret image sharing,
SP:IC(22), No. 4, April 2007, pp. 363-373.
WWW Link. 0704
Image sharing; Progressive sharing; Shadow image; Secret sharing BibRef

Shyu, S.J.[Shyong Jian], Chen, K.[Kun],
Visual Multiple-Secret Sharing By Circle Random Grids,
SIIMS(3), No. 4, 2010, pp. 926-953.
DOI Link visual cryptography; visual cryptographic scheme; visual multiple-secret sharing; circle share; random grid BibRef 1000

Li, Y.H.[Yi Hao], Shyu, S.J.[Shyong Jian],
Visual Two-Secret Sharing Schemes by Different Superimposition Positions,
IWDW14(350-363).
Springer DOI 1602
BibRef

Shyu, S.J.,
Visual Cryptograms of Random Grids for General Access Structures,
CirSysVideo(23), No. 3, March 2013, pp. 414-424.
IEEE DOI 1303
BibRef

Wang, R.Z.[Ran-Zan],
Region Incrementing Visual Cryptography,
SPLetters(16), No. 8, August 2009, pp. 659-662.
IEEE DOI 0906
BibRef

Amador, J.J.[José J.], Green, R.W.[Robert W.],
Symmetric-key block cipher for image and text cryptography,
IJIST(15), No. 3, 2005, pp. 178-188.
DOI Link 0510
BibRef

Pareek, N.K., Patidar, V.[Vinod], Sud, K.K.,
Image encryption using chaotic logistic map,
IVC(24), No. 9, September 2006, pp. 926-934.
WWW Link. 0608
Image cipher; Chaotic cryptography; Logistic map BibRef

Caldelli, R.[Roberto], Filippini, F.[Francesco], Barni, M.[Mauro],
Joint near-lossless compression and watermarking of still images for authentication and tamper localization,
SP:IC(21), No. 10, November 2006, pp. 890-903.
WWW Link. 0701
Image authentication; Near-lossless JPEG; Digital watermarking; Tamper localization; Remote sensing; Medical imagery BibRef

Hu, C.M., Tzeng, W.G.,
Cheating Prevention in Visual Cryptography,
IP(16), No. 1, January 2007, pp. 36-45.
IEEE DOI 0701
See also Comment on Cheating Prevention in Visual Cryptography. BibRef

Chen, R.J.[Rong-Jian], Lai, J.L.[Jui-Lin],
Image security system using recursive cellular automata substitution,
PR(40), No. 5, May 2007, pp. 1621-1631.
WWW Link. 0702
Image processing; Cellular automata; Image security; Encryption; Decryption BibRef

Wang, D.S.[Dao-Shun], Zhang, L.[Lei], Ma, N.[Ning], Li, X.B.[Xiao-Bo],
Two secret sharing schemes based on Boolean operations,
PR(40), No. 10, October 2007, pp. 2776-2785.
WWW Link. 0707
Secret sharing scheme; Visual secret sharing; Visual cryptography; Computation complexity; Pixel expansion BibRef

Yang, C.N.[Ching-Nung], Yu, K.H.[Kun-Hsuan], Lukac, R.[Rastislav],
User-friendly image sharing using polynomials with different primes,
IJIST(17), No. 1, 2007, pp. 40-47.
DOI Link 0707
BibRef

Lin, S.J.[Sian-Jheng], Lin, J.C.[Ja-Chen],
VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches,
PR(40), No. 12, December 2007, pp. 3652-3666.
WWW Link. 0709
Hiding using block-types; Image sharing; (t,n) threshold scheme; Halftone version; Compression BibRef

Shyu, S.J.[Shyong Jian], Huang, S.Y.[Shih-Yu], Lee, Y.K.[Yeuan-Kuen], Wang, R.Z.[Ran-Zan], Chen, K.[Kun],
Sharing multiple secrets in visual cryptography,
PR(40), No. 12, December 2007, pp. 3633-3651.
WWW Link. 0709
Secret sharing; Visual cryptography; Visual multi-secret sharing BibRef

Fang, W.P.[Wen-Pinn],
Friendly progressive visual secret sharing,
PR(41), No. 4, April 2008, pp. 1410-1414.
WWW Link. 0801
Visual cryptography; Progress; Secret sharing; Friendly BibRef

Alsultanny, Y.A.[Yas Abbas],
Random-bit sequence generation from image data,
IVC(26), No. 4, April 2008, pp. 592-601.
WWW Link. 0711
Image encryption; Randomness bit generation; CBC mode; ECB mode BibRef

Li, S., Li, C., Lo, K.T., Chen, G.,
Cryptanalysis of an Image Scrambling Scheme Without Bandwidth Expansion,
CirSysVideo(18), No. 3, March 2008, pp. 338-349.
IEEE DOI 0804
BibRef

Tong, X.J.[Xiao-Jun], Cui, M.G.[Ming-Gen],
Image encryption with compound chaotic sequence cipher shifting dynamically,
IVC(26), No. 6, 1 June 2008, pp. 843-850.
WWW Link. 0804
Compound chaos; Stream cipher; Image encryption BibRef

Lin, Q.H.[Qiu-Hua], Yin, F.L.[Fu-Liang], Mei, T.M.[Tie-Min], Liang, H.L.[Hua-Lou],
A blind source separation-based method for multiple images encryption,
IVC(26), No. 6, 1 June 2008, pp. 788-798.
WWW Link. 0804
Blind source separation; Independent component analysis; Image encryption BibRef

Li, S.J.[Shu-Jun], Li, C.Q.[Cheng-Qing], Chen, G.R.[Guan-Rong], Bourbakis, N.G.[Nikolaos G.], Lo, K.T.[Kwok-Tung],
A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks,
SP:IC(23), No. 3, March 2008, pp. 212-223.
WWW Link. 0804
Permutation-only multimedia encryption; Image; Video; Speech; Cryptanalysis; Known-plaintext attack; Chosen-plaintext attack BibRef

Yang, C.N.[Ching-Nung], Chen, T.S.[Tse-Shih],
Colored visual cryptography scheme based on additive color mixing,
PR(41), No. 10, October 2008, pp. 3114-3129.
WWW Link. 0808
Visual cryptography; Visual secret sharing; Colored visual cryptography; Additive color mixing BibRef

Li, W.H.[Wei-Hai], Yuan, Y.[Yuan],
A New Blind Attack Procedure For Dct-based Image Encryption With Spectrum Learning,
IJIG(7), No. 3, July 2007, pp. 481-496. 0707
BibRef

Naughton, T.J.[Thomas J.], Hennelly, B.M.[Bryan M.], Dowling, T.[Tom],
Introducing secure modes of operation for optical encryption,
JOSA-A(25), No. 10, October 2008, pp. 2608-2617.
WWW Link. 0810
BibRef

Leung, B.W.[Bert W.], Ng, F.Y.[Felix Y.], Wong, D.S.[Duncan S.],
On the security of a visual cryptography scheme for color images,
PR(42), No. 5, May 2009, pp. 929-940.
Elsevier DOI 0902
Visual cryptography; Dithering technology; Color decomposition; Secret sharing; Cryptanalysis BibRef

Chen, T.H.[Tzung-Her], Tsao, K.H.[Kai-Hsiang],
Visual secret sharing by random grids revisited,
PR(42), No. 9, September 2009, pp. 2203-2217.
Elsevier DOI 0905
Random grids; Visual secret sharing; Visual cryptography; Image encryption BibRef

Chen, T.H.[Tzung-Her], Tsao, K.H.[Kai-Hsiang],
User-Friendly Random-Grid-Based Visual Secret Sharing,
CirSysVideo(21), No. 11, November 2011, pp. 1693-1703.
IEEE DOI 1111
BibRef

Lin, C.H.[Chih-Hung], Lee, Y.S.[Yao-Sheng], Chen, T.H.[Tzung-Her],
Friendly progressive random-grid-based visual secret sharing with adaptive contrast,
JVCIR(33), No. 1, 2015, pp. 31-41.
Elsevier DOI 1512
Visual secret sharing BibRef

Lee, Y.S.[Yao-Sheng], Wang, B.J.[Bing-Jian], Chen, T.H.[Tzung-Her],
Quality-improved threshold visual secret sharing scheme by random grids,
IET-PR(7), No. 2, 2013, pp. xx-yy.
DOI Link 1307
BibRef

Li, C.Q.[Cheng-Qing], Li, S.J.[Shu-Jun], Asim, M.[Muhammad], Nunez, J.[Juana], Alvarez, G.[Gonzalo], Chen, G.R.[Guan-Rong],
On the security defects of an image encryption scheme,
IVC(27), No. 9, 3 August 2009, pp. 1371-1381.
Elsevier DOI 0906
Cryptanalysis; Image encryption; Chaos; Known-plaintext attack; Chosen-plaintext attack BibRef

Li, C.Q.[Cheng-Qing], Li, S.J.[Shu-Jun], Chen, G.R.[Guan-Rong], Halang, W.A.[Wolfgang A.],
Cryptanalysis of an image encryption scheme based on a compound chaotic sequence,
IVC(27), No. 8, 2 July 2009, pp. 1035-1039.
Elsevier DOI 0906
Cryptanalysis; Image encryption; Chaos; Differential chosen-plaintext attack; Randomness test BibRef

Wang, D.S.[Dao-Shun], Yi, F.[Feng], Li, X.B.[Xiao-Bo],
On general construction for extended visual cryptography schemes,
PR(42), No. 11, November 2009, pp. 3071-3082.
Elsevier DOI 0907
Visual cryptography; Secret sharing scheme; Multi-secret images BibRef

Ye, G.D.[Guo-Dong],
Image scrambling encryption algorithm of pixel bit based on chaos map,
PRL(31), No. 5, 1 April 2010, pp. 347-354.
Elsevier DOI 1002
Image scrambling encryption; Chaos map; Gray scrambling; Position permutation; Pixel bit BibRef

Liu, W., Zeng, W., Dong, L., Yao, Q.,
Efficient Compression of Encrypted Grayscale Images,
IP(19), No. 4, April 2010, pp. 1097-1102.
IEEE DOI 1003
BibRef

Wang, X.F.[Xiao-Feng], Zheng, N.N.[Nan-Ning], Tian, L.[Lihua],
Hash key-based video encryption scheme for H.264/AVC,
SP:IC(25), No. 6, July 2010, pp. 427-437.
Elsevier DOI 1007
Video encryption; H.264/AVC; Intra-prediction mode; Motion vector difference; Quantization coefficient; Hash function BibRef

Kang, I., Arce, G.R., Lee, H.K.,
Color Extended Visual Cryptography Using Error Diffusion,
IP(20), No. 1, January 2011, pp. 132-145.
IEEE DOI 1101
BibRef

Kwitt, R.[Roland], Meerwald, P.[Peter], Uhl, A.[Andreas],
Lightweight Detection of Additive Watermarking in the DWT-Domain,
IP(20), No. 2, February 2011, pp. 474-484.
IEEE DOI 1102
BibRef

Kwitt, R.[Roland], Meerwald, P.[Peter], Uhl, A.[Andreas],
Color-image watermarking using multivariate power-exponential distribution,
ICIP09(4245-4248).
IEEE DOI 0911
BibRef

Meerwald, P.[Peter], Uhl, A.[Andreas],
Watermarking of Raw Digital Images in Camera Firmware: Embedding and Detection,
PSIVT09(340-348).
Springer DOI 0901
BibRef
Earlier:
Watermark Security Via Wavelet Filter Parametrization,
ICIP01(III: 1027-1030).
IEEE DOI 0108
BibRef

Engel, D.[Dominik], Uhl, A.[Andreas],
An Attack Against Image-Based Selective Bitplane Encryption,
ICIP07(II: 141-144).
IEEE DOI 0709
BibRef

Pommer, A.[Andreas], Uhl, A.[Andreas],
Lightweight Protection of Visual Data Using High-Dimensional Wavelet Parametrization,
CIAP05(645-652).
Springer DOI 0509
BibRef

Meixner, A.[Albert], Uhl, A.[Andreas],
Security Enhancement of Visual Hashes Through Key Dependent Wavelet Transformations,
CIAP05(543-550).
Springer DOI 0509
BibRef

Noreen, R., Uhl, A.,
Encryption of wavelet-coded imagery using random permutations,
ICIP04(V: 3431-3434).
IEEE DOI 0505
BibRef

Yeung, S.K.A.[Siu-Kei Au], Zhu, S., Zeng, B.[Bing],
Design of New Unitary Transforms for Perceptual Video Encryption,
CirSysVideo(21), No. 9, September 2011, pp. 1341-1345.
IEEE DOI 1109
BibRef

Yeung, S.K.A.[Siu-Kei Au], Zeng, B.[Bing],
A new design of multiple transforms for perceptual video encryption,
ICIP12(2637-2640).
IEEE DOI 1302
BibRef

Hou, Y.C., Quan, Z.Y.,
Progressive Visual Cryptography With Unexpanded Shares,
CirSysVideo(21), No. 11, November 2011, pp. 1760-1764.
IEEE DOI 1111
BibRef

Wang, R.Z.[Ran-Zan], Hsu, S.F.[Shuo-Fang],
Tagged Visual Cryptography,
SPLetters(18), No. 11, November 2011, pp. 627-630.
IEEE DOI 1112
BibRef

Liu, F.[Feng], Guo, T.[Teng], Wu, C.K.[Chuan-Kun], Qian, L.[Lina],
Improving the visual quality of size invariant visual cryptography scheme,
JVCIR(23), No. 2, February 2012, pp. 331-342.
Elsevier DOI 1201
Visual cryptography; Visual quality; Size invariant; Secret sharing; Thin line problem; Variance; Multi-pixel encryption; Probabilistic visual cryptography scheme BibRef

François, M., Grosges, T., Barchiesi, D., Erra, R.,
A new image encryption scheme based on a chaotic function,
SP:IC(27), No. 3, March 2012, pp. 249-259.
Elsevier DOI 1203
Image encryption; Chaotic function; Statistical analysis; Confusion; Diffusion; Indistinguishability BibRef

Watanabe, O.[Osamu], Fukuhara, T.[Takahiro], Kiya, H.[Hitoshi],
Codestream-Based Identification of JPEG 2000 Images with Different Coding Parameters,
IEICE(E95-D), No. 4, April 2012, pp. 1120-1129.
WWW Link. 1204
BibRef

Watanabe, O.[Osamu], Iida, T.[Tomonori], Fukuhara, T.[Takahiro], Kiya, H.[Hitoshi],
Identification of JPEG 2000 images in encrypted domain for digital cinema,
ICIP09(2065-2068).
IEEE DOI 0911
BibRef

Shyu, S.J., Jiang, H.W.,
Efficient Construction for Region Incrementing Visual Cryptography,
CirSysVideo(22), No. 5, May 2012, pp. 769-777.
IEEE DOI 1202
BibRef

Yang, C.N., Shih, H.W., Wu, C.C., Harn, L.,
k Out of n Region Incrementing Scheme in Visual Cryptography,
CirSysVideo(22), No. 5, May 2012, pp. 799-810.
IEEE DOI 1202
BibRef

Yang, C.N.[Ching-Nung], Lin, Y.C.[Yi-Chin], Wu, C.C.[Chih-Cheng],
Cheating Immune Block-Based Progressive Visual Cryptography,
IWDW13(95-108).
Springer DOI 1407
BibRef

Win, L.L., Thomas, T., Emmanuel, S.,
Privacy Enabled Digital Rights Management Without Trusted Third Party Assumption,
MultMed(14), No. 3, 2012, pp. 546-554.
IEEE DOI 1202
BibRef

Chen, Y.C., Horng, G., Tsai, D.S.,
Comment on 'Cheating Prevention in Visual Cryptography',
IP(21), No. 7, July 2012, pp. 3319-3323.
IEEE DOI 1206
See also Cheating Prevention in Visual Cryptography. BibRef

Dalhoum, A.L.A.[Abdel Latif Abu], Mahafzah, B.A.[Basel A.], Awwad, A.A.[Aiman Ayyal], Aldhamari, I.[Ibraheem], Ortega, A.[Alfonso], Alfonseca, M.[Manuel],
Digital Image Scrambling Using 2D Cellular Automata,
MultMedMag(19), No. 4, 2012, pp. 28-36.
IEEE DOI 1210
based on game of life. BibRef

Lin, H.C.[Hsiao-Ching], Yang, C.N.[Ching-Nung], Laih, C.S.[Chi-Sung], Lin, H.T.[Hui-Tang],
Natural language letter based visual cryptography scheme,
JVCIR(24), No. 3, April 2013, pp. 318-331.
Elsevier DOI 1303
Deterministic VCS; Letter-based; Natural language; Probabilistic VCS; Secret sharing; Subpixel; Visual cryptography scheme; Visual secret sharing BibRef

Zhang, Y.S.[Yu-Shu], Xiao, D.[Di], Shu, Y.[Yonglu], Li, J.[Jing],
A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations,
SP:IC(28), No. 3, March 2013, pp. 292-300.
Elsevier DOI 1303
Hyperbolic chaotic systems; Partial differential equations; Image encryption; Coupled map lattices; Time-varying delay BibRef

Zhu, H.[Hegui], Zhao, C.[Cheng], Zhang, X.D.[Xiang-De],
A novel image encryption-compression scheme using hyper-chaos and Chinese remainder theorem,
SP:IC(28), No. 6, July 2013, pp. 670-680.
Elsevier DOI 1306
Hyper-chaos; Image encryption; Image compression; Compression ratio; Chinese remainder theorem BibRef

Azzaz, M.S., Tanougast, C., Sadoudi, S., Dandache, A.,
Robust chaotic key stream generator for real-time images encryption,
RealTimeIP(8), No. 3, September 2013, pp. 297-306.
WWW Link. 1309
BibRef

Thorpe, C.[Christopher], Li, F.[Feng], Li, Z.J.[Zi-Jia], Yu, Z.[Zhan], Saunders, D.[David], Yu, J.Y.[Jing-Yi],
A Coprime Blur Scheme for Data Security in Video Surveillance,
PAMI(35), No. 12, 2013, pp. 3066-3072.
IEEE DOI 1311
Cameras. Special encryption, strategic blurring. BibRef

Lima, J.B., Lima, E.A.O., Madeiro, F.,
Image encryption based on the finite field cosine transform,
SP:IC(28), No. 10, 2013, pp. 1537-1547.
Elsevier DOI 1312
Image encryption BibRef

Lima, J.B., da Silva, E.S., Campello de Souza, R.M.,
Cosine transforms over fields of characteristic 2: Fast computation and application to image encryption,
SP:IC(54), No. 1, 2017, pp. 130-139.
Elsevier DOI 1704
Finite field cosine transform BibRef

Lima, J.B., Madeiro, F., Sales, F.J.R.,
Encryption of medical images based on the cosine number transform,
SP:IC(35), No. 1, 2015, pp. 1-8.
Elsevier DOI 1506
Medical images BibRef

Liu, Y.[Yang], Tong, X.J.[Xiao-Jun], Hu, S.[Shicheng],
A family of new complex number chaotic maps based image encryption algorithm,
SP:IC(28), No. 10, 2013, pp. 1548-1559.
Elsevier DOI 1312
Image encryption BibRef

Li, P.[Peng], Yang, C.N.[Ching-Nung], Kong, Q.[Qian], Ma, Y.P.[Yan-Peng], Liu, Z.[Zheng],
Sharing more information in gray visual cryptography scheme,
JVCIR(24), No. 8, 2013, pp. 1380-1393.
Elsevier DOI 1312
Visual cryptography BibRef

Asghar, M.N.[Mamoona N.], Ghanbari, M.[Mohammed], Fleury, M.[Martin], Reed, M.J.[Martin J.],
Confidentiality of a selectively encrypted H.264 coded video bit-stream,
JVCIR(25), No. 2, 2014, pp. 487-498.
Elsevier DOI 1402
Confidentiality BibRef

Asghar, M.N.[Mamoona N.], Kousar, R.[Rukhsana], Majid, H.[Hooriya], Fleury, M.[Martin],
Transparent encryption with scalable video communication: Lower-latency, CABAC-based schemes,
JVCIR(45), No. 1, 2017, pp. 122-136.
Elsevier DOI 1704
B-frames BibRef

Yang, C.N.[Ching-Nung], Wang, D.S.[Dao-Shun],
Property Analysis of XOR-Based Visual Cryptography,
CirSysVideo(24), No. 2, February 2014, pp. 189-197.
IEEE DOI 1403
cryptography BibRef

Barakat, M.L., Mansingka, A.S., Radwan, A.G., Salama, K.N.,
Hardware stream cipher with controllable chaos generator for colour image encryption,
IET-PR(8), No. 1, January 2014, pp. 33-43.
DOI Link 1403
cryptography BibRef

Pande, A., Mohapatra, P., Zambreno, J.,
Securing Multimedia Content Using Joint Compression and Encryption,
MultMedMag(20), No. 4, October 2013, pp. 50-61.
IEEE DOI 1403
Internet BibRef

Caragata, D.[Daniel], Tutanescu, I.[Ion],
On the security of a new image encryption scheme based on a chaotic function,
SIViP(8), No. 4, May 2014, pp. 641-646.
WWW Link. 1404
BibRef

Wang, X., Pei, Q., Li, H.,
A Lossless Tagged Visual Cryptography Scheme,
SPLetters(21), No. 7, July 2014, pp. 853-856.
IEEE DOI 1405
Cryptography BibRef

Hou, Y., Wei, S., Lin, C.,
Random-Grid-Based Visual Cryptography Schemes,
CirSysVideo(24), No. 5, May 2014, pp. 733-744.
IEEE DOI 1405
Encryption BibRef

Ghebleh, M., Kanso, A., Noura, H.,
An image encryption scheme based on irregularly decimated chaotic maps,
SP:IC(29), No. 5, 2014, pp. 618-627.
Elsevier DOI 1406
Chaos BibRef

Dong, C.[Chang'e],
Color image encryption using one-time keys and coupled chaotic systems,
SP:IC(29), No. 5, 2014, pp. 628-640.
Elsevier DOI 1406
Color image encryption BibRef

Czaplewski, B.[Bartosz], Dzwonkowski, M.[Mariusz], Rykaczewski, R.[Roman],
Digital fingerprinting for color images based on the quaternion encryption scheme,
PRL(46), No. 1, 2014, pp. 11-19.
Elsevier DOI 1407
Cryptography BibRef

Czaplewski, B.[Bartosz],
Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher quaternion chaining,
JVCIR(40, Part A), No. 1, 2016, pp. 1-13.
Elsevier DOI 1609
Fingerprinting BibRef

Zhang, X.P.[Xuan-Ping], Zhao, Z.M.[Zhong-Meng], Wang, J.Y.[Jia-Yin],
Chaotic image encryption based on circular substitution box and key stream buffer,
SP:IC(29), No. 8, 2014, pp. 902-913.
Elsevier DOI 1410
Image encryption BibRef

Boriga, R.[Radu], Dascalescu, A.C.[Ana Cristina], Priescu, I.[Iustin],
A new hyperchaotic map and its application in an image encryption scheme,
SP:IC(29), No. 8, 2014, pp. 887-901.
Elsevier DOI 1410
Hyperchaos BibRef

Li, C.Q.[Cheng-Qing], Liu, Y.S.[Yuan-Sheng], Zhang, L.Y.[Leo Yu], Wong, K.W.[Kwok-Wo],
Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem,
SP:IC(29), No. 8, 2014, pp. 914-920.
Elsevier DOI 1410
Compression BibRef

Bhatnagar, G., Wu, Q.M.J.,
Biometric Inspired Multimedia Encryption Based on Dual Parameter Fractional Fourier Transform,
SMCS(44), No. 9, September 2014, pp. 1234-1247.
IEEE DOI 1410
Fourier transforms BibRef

Ziyabar, H.M.[Hashem Moradmand], Sinaie, M.[Mahnaz], Payandeh, A.[Ali], Payandeh, A.[Ali], Vakili, V.T.[Vahid Tabataba],
Secure FSM-based arithmetic codes,
SIViP(8), No. 7, October 2014, pp. 1263-1272.
Springer DOI 1410
atithmetic coding for compression and secrecy. BibRef

Masmoudi, A., Puech, W.,
Lossless chaos-based crypto-compression scheme for image protection,
IET-IPR(8), No. 12, 2014, pp. 671-686.
DOI Link 1412
chaos BibRef

Abd-El-Hafiz, S.K., Radwan, A.G., Haleem, S.H.A.[S.H. Abdel], Barakat, M.L.,
A fractal-based image encryption system,
IET-IPR(8), No. 12, 2014, pp. 742-752.
DOI Link 1412
cryptography BibRef

Bai, X.[Xiao], Yang, H.[Haichuan], Zhou, J.[Jun], Ren, P.[Peng], Cheng, J.[Jian],
Data-Dependent Hashing Based on p-Stable Distribution,
IP(23), No. 12, December 2014, pp. 5033-5046.
IEEE DOI 1412
cryptography BibRef

Elhoseny, H.M.[Heba M.], Ahmed, H.E.H.[Hossam E. H.], Abbas, A.M.[Alaa M.], Kazemian, H.B.[Hassan B.], Faragallah, O.S.[Osama S.], El-Rabaie, E.S.M.[El-Sayed M.], El-Samie, F.E.A.[Fathi E. Abd],
Chaotic encryption of images in the fractional Fourier transform domain using different modes of operation,
SIViP(9), No. 3, March 2015, pp. 611-622.
Springer DOI 1503
BibRef

Faragallah, O.S.[Osama S.],
Efficient confusion-diffusion chaotic image cryptosystem using enhanced standard map,
SIViP(9), No. 8, November 2015, pp. 1917-1926.
WWW Link. 1511
BibRef

Ullagaddi, V.[Vishwanath], Hassan, F.[Firas], Devabhaktuni, V.[Vijay],
Symmetric synchronous stream encryption using images,
SIViP(9), No. 1, January 2015, pp. 1-8.
Springer DOI 1503
Use bit plane from an image for encryption of stream. (Not encrypt an image.) BibRef

Sun, Y.Y.[Yuan-Yuan], Xu, R.[Rudan], Chen, L.[Lina], Hu, X.P.[Xiao-Peng],
Image compression and encryption scheme using fractal dictionary and Julia set,
IET-IPR(9), No. 3, 2015, pp. 173-183.
DOI Link 1504
cryptography BibRef

Jeng, F.G.[Fuh-Gwo], Huang, W.L.[Wei-Lun], Chen, T.H.[Tzung-Her],
Cryptanalysis and improvement of two hyper-chaos-based image encryption schemes,
SP:IC(34), No. 1, 2015, pp. 45-51.
Elsevier DOI 1505
Cryptanalysis BibRef

Wadi, S.M., Zainal, N.,
Decomposition by binary codes-based speedy image encryption algorithm for multiple applications,
IET-IPR(9), No. 5, 2015, pp. 413-423.
DOI Link 1506
binary codes BibRef

Nini, B., Lemmouchi, C.,
Security analysis of a three-dimensional rotation-based image encryption,
IET-IPR(9), No. 8, 2015, pp. 680-689.
DOI Link 1506
cryptography BibRef

Benrhouma, O.[Oussama], Hermassi, H.[Houcemeddine], El-Latif, A.A.A.[Ahmed A. Abd], Belghith, S.[Safya],
Cryptanalysis of a video encryption method based on mixing and permutation operations in the DCT domain,
SIViP(9), No. 6, September 2015, pp. 1281-1286.
Springer DOI 1509
BibRef

Kishore, B., Kumar, B.K.S.[B.K. Shreyamsha], Patil, C.R.[Chidamber R.],
FPGA based simple and fast JPEG encryptor,
RealTimeIP(10), No. 3, September 2015, pp. 551-559.
Springer DOI 1509
BibRef

Naik, K.[Kshiramani], Pal, A.K.[Arup Kumar],
Design of a cryptosystem for DCT compressed image using Arnold transform and fractional Fourier transform,
IJCVR(5), No. 3, 2015, pp. 335-346.
DOI Link 1509
BibRef

Shyu, S.J., Chen, M.C.,
Minimizing Pixel Expansion in Visual Cryptographic Scheme for General Access Structures,
CirSysVideo(25), No. 9, September 2015, pp. 1557-1561.
IEEE DOI 1509
Cryptography BibRef

Daneshgar, A.[Amir], Khadem, B.[Behrooz],
A self-synchronized chaotic image encryption scheme,
SP:IC(36), No. 1, 2015, pp. 106-114.
Elsevier DOI 1509
Chaos BibRef

Dzwonkowski, M., Papaj, M., Rykaczewski, R.,
A New Quaternion-Based Encryption Method for DICOM Images,
IP(24), No. 11, November 2015, pp. 4614-4622.
IEEE DOI 1509
DICOM BibRef

Yang, C.N.[Ching-Nung], Wu, C.C.[Chih-Cheng], Lin, Y.C.[Yi-Chin], Kim, C.[Cheonshik],
Constructions and Properties of General (k, n) Block-Based Progressive Visual Cryptography,
ETRI(37), No. 5, October 2015, pp. 979-989.
DOI Link 1511
BibRef

Tong, X.J.[Xiao-Jun], Zhang, M.[Miao], Wang, Z.[Zhu], Liu, Y.[Yang], Xu, H.[Hui], Ma, J.[Jing],
A fast encryption algorithm of color image based on four-dimensional chaotic system,
JVCIR(33), No. 1, 2015, pp. 219-234.
Elsevier DOI 1512
Image encryption BibRef

Xu, H.[Hui], Tong, X.J.[Xiao-Jun], Zhang, M.[Miao], Wang, Z.[Zhu], Li, L.H.[Ling-Hao],
Dynamic video encryption algorithm for H.264/AVC based on a spatiotemporal chaos system,
JOSA-A(33), No. 6, June 2016, pp. 1166-1174.
DOI Link 1606
Video BibRef

Bechikh, R.[Rabei], Hermassi, H.[Houcemeddine], El-Latif, A.A.A.[Ahmed A. Abd], Rhouma, R.[Rhouma], Belghith, S.[Safya],
Breaking an image encryption scheme based on a spatiotemporal chaotic system,
SP:IC(39, Part A), No. 1, 2015, pp. 151-158.
Elsevier DOI 1512
Cryptanalysis BibRef

Zhang, Y.S.[Yu-Shu], Wong, K.W.[Kwok-Wo], Zhang, L.Y.[Leo Yu], Wen, W.[Wenying], Zhou, J.T.[Jian-Tao], He, X.[Xing],
Robust coding of encrypted images via structural matrix,
SP:IC(39, Part A), No. 1, 2015, pp. 202-211.
Elsevier DOI 1512
Multiple description code BibRef

Gu, G.S.[Guo-Sheng], Ling, J.[Jie], Xie, G.[Guobo], Li, Z.[Zheng],
A chaotic-cipher-based packet body encryption algorithm for JPEG2000 images,
SP:IC(40), No. 1, 2016, pp. 52-64.
Elsevier DOI 1601
Chaotic cipher BibRef

Islam, N.[Naveed], Shahid, Z.[Zafar], Puech, W.[William],
Denoising and error correction in noisy AES-encrypted images using statistical measures,
SP:IC(41), No. 1, 2016, pp. 15-27.
Elsevier DOI 1602
BibRef
And: A1, A3, Only:
Decryption of noisy encrypted images by statistical analysis,
EUVIP11(192-198).
IEEE DOI 1110
Cryptosystem. BibRef

El Assad, S.[Safwan], Farajallah, M.[Mousa],
A new chaos-based image encryption system,
SP:IC(41), No. 1, 2016, pp. 144-157.
Elsevier DOI 1602
Chaos-based cryptosystem BibRef

Fawaz, Z.[Zeinab], Noura, H.[Hassan], Mostefaoui, A.[Ahmed],
An efficient and secure cipher scheme for images confidentiality preservation,
SP:IC(42), No. 1, 2016, pp. 90-108.
Elsevier DOI 1603
Security BibRef

Ye, G., Huang, X.,
An Image Encryption Algorithm Based on Autoblocking and Electrocardiography,
MultMedMag(23), No. 2, April 2016, pp. 64-71.
IEEE DOI 1605
Algorithm design and analysis BibRef

Chen, C.C.[Chien-Chang], Chen, S.C.[Shih-Chang],
Two-layered structure for optimally essential secret image sharing scheme,
JVCIR(38), No. 1, 2016, pp. 595-601.
Elsevier DOI 1605
Secret image sharing BibRef

Yang, C.N.[Ching-Nung], Sun, L.Z.[Li-Zhe], Yan, X.[Xuehu], Kim, C.[Cheonshik],
Design a new visual cryptography for human-verifiable authentication in accessing a database,
RealTimeIP(12), No. 2, August 2016, pp. 483-494.
Springer DOI 1608
BibRef

Karabina, K.[Koray], Canpolat, O.[Onur],
A new cryptographic primitive for noise tolerant template security,
PRL(80), No. 1, 2016, pp. 70-75.
Elsevier DOI 1609
Template security BibRef

Yap, W.S.[Wun-She], Phan, R.C.W.[Raphael C.-W.], Goi, B.M.[Bok-Min], Yau, W.C.[Wei-Chuen], Heng, S.H.[Swee-Huay],
On the effective subkey space of some image encryption algorithms using external key,
JVCIR(40, Part A), No. 1, 2016, pp. 51-57.
Elsevier DOI 1609
Image encryption BibRef

Murugan, B., Gounder, A.G.N.[A. G. Nanjappa],
Image encryption scheme based on block-based confusion and multiple levels of diffusion,
IET-CV(10), No. 6, 2016, pp. 593-602.
DOI Link 1609
cryptography BibRef

Abanda, Y., Tiedeu, A.,
Image encryption by chaos mixing,
IET-IPR(10), No. 10, 2016, pp. 742-750.
DOI Link 1610
chaos BibRef

Shao, Z.H.[Zhu-Hong], Shang, Y.Y.[Yuan-Yuan], Zeng, R.[Rui], Shu, H.Z.[Hua-Zhong], Coatrieux, G.[Gouenou], Wu, J.S.[Jia-Song],
Robust watermarking scheme for color image based on quaternion-type moment invariants and visual cryptography,
SP:IC(48), No. 1, 2016, pp. 12-21.
Elsevier DOI 1609
Color image BibRef

Shao, Z.H.[Zhu-Hong], Wu, J.S.[Jia-Song], Coatrieux, J.L.[Jean Louis], Coatrieux, G.[Gouenou], Shu, H.Z.[Hua-Zhong],
Quaternion gyrator transform and its application to color image encryption,
ICIP13(4579-4582)
IEEE DOI 1402
Quaternion gyrator transform; color image; encryption BibRef

Annaby, M.H., Rushdi, M.A., Nehary, E.A.,
Image encryption via discrete fractional Fourier-type transforms generated by random matrices,
SP:IC(49), No. 1, 2016, pp. 25-46.
Elsevier DOI 1609
Discrete fractional Fourier transform BibRef

Yuan, H.M.[Hong-Mei], Liu, Y.[Ye], Lin, T.[Tao], Hu, T.[Ting], Gong, L.H.[Li-Hua],
A new parallel image cryptosystem based on 5D hyper-chaotic system,
SP:IC(52), No. 1, 2017, pp. 87-96.
Elsevier DOI 1701
Parallel image cryptosystem BibRef

Chai, X.L.[Xiu-Li], Gan, Z.H.[Zhi-Hua], Yang, K.[Kang], Chen, Y.R.[Yi-Ran], Liu, X.X.[Xian-Xing],
An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations,
SP:IC(52), No. 1, 2017, pp. 6-19.
Elsevier DOI 1701
Image encryption BibRef

Yang, C.N.[Ching-Nung], Liao, J.K.[Jung-Kuo], Wang, D.S.[Dao-Shun],
New privilege-based visual cryptography with arbitrary privilege levels,
JVCIR(42), No. 1, 2017, pp. 121-131.
Elsevier DOI 1701
Visual cryptography BibRef

Cao, X.W.[Xing-Wu], Wei, X.X.[Xing-Xing], Guo, R.[Rui], Wang, C.C.[Chang-Chun],
No embedding: A novel image cryptosystem for meaningful encryption,
JVCIR(44), No. 1, 2017, pp. 236-249.
Elsevier DOI 1703
Image encryption BibRef

Boyadjis, B., Bergeron, C., Pesquet-Popescu, B., DuFaux, F.[Frédéric],
Extended Selective Encryption of H.264/AVC (CABAC)- and HEVC-Encoded Video Streams,
CirSysVideo(27), No. 4, April 2017, pp. 892-906.
IEEE DOI 1704
Channel coding BibRef

Huang, H.Q.[Hui-Qing], Yang, S.Z.[Shou-Zhi],
Colour image encryption based on logistic mapping and double random-phase encoding,
IET-IPR(11), No. 4, April 2017, pp. 211-216.
DOI Link 1704
BibRef

Chang, Y.T.[Yao-Tang], Lin, Y.C.[Yih-Chuan], Chen, Y.C.[Yu-Chang], Liou, Y.T.[Yan-Tai],
Scrambling Cryptography Using Programmable SLM-Based Filter for Video Streaming Over a WDM Network,
CompIMAGE16(241-250).
Springer DOI 1704
BibRef

Özkaynak, F.[Fatih], Çelik, V.[Vedat], Özer, A.B.[Ahmet Bedri],
A new S-box construction method based on the fractional-order chaotic Chen system,
SIViP(11), No. 4, May 2017, pp. 659-664.
WWW Link. 1704
substitution box, block encryption algorithms. BibRef

Liu, H.J.[Hong-Jun], Kadir, A.[Abdurahman], Sun, X.B.[Xiao-Bo],
Chaos-based fast colour image encryption scheme with true random number keys from environmental noise,
IET-IPR(11), No. 5, April 2017, pp. 324-332.
DOI Link 1706
BibRef

Li, C., Lin, D., Lü, J.,
Cryptanalyzing an Image-Scrambling Encryption Algorithm of Pixel Bits,
MultMedMag(24), No. 3, 2017, pp. 64-71.
IEEE DOI 1708
Algorithm design and analysis, Ciphers, Cryptography, Encryption, Image processing, Mathematical model, Multimedia communication, Visualization, ciphertext-only attack, cryptanalysis, cryptography, graphics, image encryption, known-plaintext attack, multimedia, security, template, matching BibRef

Yang, C.N.[Ching-Nung], Wu, X.T.[Xiao-Tian], Chou, Y.C.[Yung-Chien], Fu, Z.[Zhangjie],
Constructions of general reversible AMBTC-based visual cryptography with two decryption options,
JVCIR(48), No. 1, 2017, pp. 182-194.
Elsevier DOI 1708
Visual, cryptography BibRef

Bao, L., Yi, S., Zhou, Y.,
Combination of Sharing Matrix and Image Encryption for Lossless (k,n)-Secret Image Sharing,
IP(26), No. 12, December 2017, pp. 5618-5631.
IEEE DOI 1710
cryptography, image reconstruction, sharing matrix, Algorithm design and analysis, Distortion, BibRef

Nosrati, K.[Komeil], Volos, C.[Christos], Azemi, A.[Asad],
Cubature Kalman filter-based chaotic synchronization and image encryption,
SP:IC(58), No. 1, 2017, pp. 35-48.
Elsevier DOI 1710
Chaos, synchronization BibRef

Boussif, M.[Mohamed], Aloui, N.[Noureddine], Cherif, A.[Adnane],
Smartphone application for medical images secured exchange based on encryption using the matrix product and the exclusive addition,
IET-IPR(11), No. 11, November 2017, pp. 1020-1026.
DOI Link 1711
BibRef


Raval, N., Machanavajjhala, A., Cox, L.P.,
Protecting Visual Secrets Using Adversarial Nets,
PRIV17(1329-1332)
IEEE DOI 1709
Cameras, Feeds, Loss measurement, Machine learning, Privacy, Training, Visualization BibRef

Zhang, Y., Li, X.Q.[Xue-Qian], Hou, W.G.[Wen-Gang],
A fast image encryption scheme based on AES,
ICIVC17(624-628)
IEEE DOI 1708
Ciphers, Correlation, Encryption, Histograms, Information entropy, Sensitivity, aes, cipher block chaining, image encryption, information, security BibRef

Yan, B.[Bing], Bai, S.,
Design of image confusion-diffusion cryptosystem based on vector quantization and cross chaotic map,
ICIVC17(639-644)
IEEE DOI 1708
Decoding, Encryption, Image coding, Indexes, Sensitivity analysis, confusion-diffusion cryptosystem, cross chaotic map, image compression and encryption, vector, quantization BibRef

Shen, G.[Gang], Liu, F.[Feng], Fu, Z.[Zhengxin], Yu, B.[Bin], Wang, W.[Wen],
Halftone Visual Cryptography with Complementary Cover Images,
IWDW16(223-237).
Springer DOI 1703
BibRef

Wang, W.[Wen], Liu, F.[Feng], Guo, T.[Teng], Ren, Y.[Yawei],
Temporal Integration Based Visual Cryptography Scheme and Its Application,
IWDW17(406-419).
Springer DOI 1708
BibRef
Earlier: A4, A2, A1, Only:
Collusive Attacks to Partition Authentication Visual Cryptography Scheme,
IWDW16(238-250).
Springer DOI 1703
BibRef

Dutta, S.[Sabyasachi], Roy, P.S.[Partha Sarathi], Adhikari, A.[Avishek], Sakurai, K.[Kouichi],
On the Robustness of Visual Cryptographic Schemes,
IWDW16(251-262).
Springer DOI 1703
BibRef

Goel, A., Chaudhari, K.,
Median based pixel selection for partial image encryption,
IPTA16(1-5)
IEEE DOI 1703
cryptography BibRef

Wen, W., Zhang, Y., Fang, Y., Fang, Z.,
A novel selective image encryption method based on saliency detection,
VCIP16(1-4)
IEEE DOI 1701
Discrete wavelet transforms BibRef

Maqbool, S.[Saqib], Ahmad, N.[Nisar], Muhammad, A.[Aslam], Enriquez, A.M.M.[A.M. Martinez],
Simultaneous Encryption and Compression of Digital Images Based on Secure-JPEG Encoding,
MCPR16(145-154).
Springer DOI 1608
BibRef

Abdmouleh, M.K.[Med Karim], Khalfallah, A.[Ali], Bouhlel, M.S.[Med Salim],
A Chaotic Cryptosystem for Color Image with Dynamic Look-Up Table,
ICISP16(91-100).
WWW Link. 1606
BibRef

Fatahbeygi, A., Akhlaghian, F.,
A new robust semi-blind image watermarking based on block classification and visual cryptography,
IPRIA15(1-6)
IEEE DOI 1603
cryptography BibRef

Belkaid, B.M., Mourad, L., Mehdi, C., Soltane, A.,
Secure transfer of medical images using hybrid encryption: Authentication, confidentiality, integrity,
ICCVIA15(1-6)
IEEE DOI 1603
authorisation BibRef

Jolfaei, A.[Alireza], Wu, X.W.[Xin-Wen], Muthukkumarasamy, V.[Vallipuram],
A Secure Lightweight Texture Encryption Scheme,
VSWS15(344-356).
Springer DOI 1603
BibRef

Wang, D.S.[Dao-Shun], Yi, F.[Feng], Yang, C.N.[Ching-Nung],
Visual Cryptography Scheme with Autostereogram,
IWDW14(364-375).
Springer DOI 1602
BibRef

Chen, Y.C.[Yu-Chi], Lu, K.[Kunhan], Tso, R.[Raylin], Wu, M.E.[Mu-En],
An Improved Visual Cryptography with Cheating Prevention,
IWDW14(444-454).
Springer DOI 1602
BibRef

Liu, F.[Feng], Wu, C.K.[Chuan-Kun],
Optimal XOR Based (2,n)-Visual Cryptography Schemes,
IWDW14(333-349).
Springer DOI 1602
BibRef

Hofbauer, H.[Heinz], Unterweger, A.[Andreas], Uhl, A.[Andreas],
Encrypting only AC coefficient signs considered harmful,
ICIP15(3740-3744)
IEEE DOI 1511
DCT; Encryption; coefficient signs; security BibRef

Almarashda, K.[Khalfan], Dawood, A.[Ali], Martin, T.[Thomas], Al-Mualla, M.[Mohammed], Bhaskar, H.[Harish],
An Optimized Selective Encryption for Video Confidentiality,
ICIAR15(109-118).
Springer DOI 1507
BibRef

Liu, S.[Shenchuan], Fujiyoshi, M.[Masaaki], Kiya, H.[Hitoshi],
A cheat preventing method with efficient pixel expansion for Naor-Shamir's visual cryptography,
ICIP14(5527-5531)
IEEE DOI 1502
Cloud computing BibRef

Eluard, M.[Marc], Maetz, Y.[Yves], Doerr, G.[Gwenael],
Impact of geometry-preserving encryption on rendering time,
ICIP14(4787-4791)
IEEE DOI 1502
Collaboration BibRef

Korshunov, P.[Pavel], Ebrahimi, T.[Touradj],
Scrambling-based tool for secure protection of JPEG images,
ICIP14(3423-3425)
IEEE DOI 1502
Decoding BibRef

Ou, D.[Duanhao], Wu, X.T.[Xiao-Tian], Dai, L.[Lu], Sun, W.[Wei],
Improved Tagged Visual Cryptograms by Using Random Grids,
IWDW13(79-94).
Springer DOI 1407
BibRef

Fu, Z.X.[Zheng-Xin], Yu, B.[Bin],
Visual Cryptography and Random Grids Schemes,
IWDW13(109-122).
Springer DOI 1407
BibRef

Moreno Cańadas, A.[Agustín], Palma Vanegas, N.P.[Nelly Paola], Hernández Quitián, M.[Margoth],
Visual Cryptography Schemes Based in k -Linear Maps,
IWDW13(288-302).
Springer DOI 1407
BibRef

Pinto, M.[Michael], Puech, W.[William], Subsol, G.[Gerard],
Protection of JPEG compressed e-comics by selective encryption,
ICIP13(4588-4592)
IEEE DOI 1402
AES BibRef

Puech, W., Erkin, Z., Barni, M., Rane, S., Lagendijk, R.L.,
Emerging cryptographic challenges in image and video processing,
ICIP12(2629-2632).
IEEE DOI 1302
enforce content access control, identity verification and authentication, and privacy protection BibRef

Panduranga, H.T., Kumar, H.S.S.[H.S. Sharath], Kumar, S.K.N.[S.K. Naveen],
Hybrid approach for dual image encryption using nibble exchange and Hill-cipher,
IMVIP12(101-104).
IEEE DOI 1302
BibRef

Liu, F.[Feng], Guo, T.[Teng], Wu, C.[ChuanKun], Yang, C.N.[Ching-Nung],
Flexible Visual Cryptography Scheme without Distortion,
IWDW11(211-227).
Springer DOI 1208
BibRef

Di, H.[Hong], Zheng, K.[Kangfeng], Niu, X.[Xinxin], Zhang, X.[Xin],
Multiple-image compressed encryption and decryption by compressive holography,
VCIP11(1-4).
IEEE DOI 1201
BibRef

Bajaj, N.[Nikesh], Thakur, A.[Amit],
Enhancement of RC5 for image encryption,
ICIIP11(1-5).
IEEE DOI 1112
BibRef

Goumidi, D.E., Hachouf, F.,
Modified confusion-diffusion based satellite image cipher using chaotic standard, logistic and sine maps,
EUVIP10(204-209).
IEEE DOI 1110
BibRef

Petrauskiene, V., Ragulskiene, J., Sakyte, E., Ragulskis, M.,
Near-Optimal Time Function for Secure Dynamic Visual Cryptography,
ISVC11(II: 300-309).
Springer DOI 1109
BibRef

Nien, H.H., Changchien, S.K., Wu, S.Y., Huang, C.K.,
A new Pixel-Chaotic-Shuffle method for image encryption,
ICARCV08(883-887).
IEEE DOI 1109
BibRef

Chen, B.[Brenden], Chandran, V.[Vinod],
Robust Image Hashing Using Higher Order Spectral Features,
DICTA10(100-104).
IEEE DOI 1012
robust to JPEG, etc. BibRef

Ahmed, F., Siyal, M.Y., Abbas, V.U.,
A Perceptually Scalable and JPEG Compression Tolerant Image Encryption Scheme,
PSIVT10(232-238).
IEEE DOI 1011
Reconstruct encryped image even after JPEG compression. BibRef

Zhao, L.[Liang], Adhikari, A.[Avishek], Sakurai, K.[Kouichi],
A New Scrambling Evaluation Scheme Based on Spatial Distribution Entropy and Centroid Difference of Bit-Plane,
DW10(29-44).
Springer DOI 1010
BibRef

Zhao, L.[Liang], Adhikari, A.[Avishek], Xiao, D.[Di], Sakurai, K.[Kouichi],
Cryptanalysis on an Image Scrambling Encryption Scheme Based on Pixel Bit,
DW10(45-59).
Springer DOI 1010
BibRef

Faridnia, S.[Saed], Faez, K.[Karim],
Image Encryption through Using Chaotic Function and Graph,
ICCVG10(I: 352-359).
Springer DOI 1009
BibRef

Ratan, R.[Ram],
Key Independent Retrieval of Chaotic Encrypted Images,
PReMI09(483-488).
Springer DOI 0912
BibRef

Mayouf, M.A.[Mabroka Ali], Shukur, Z.[Zarina],
Using Animation in Active Learning Tool to Detect Possible Attacks in Cryptographic Protocols,
IVIC09(510-520).
Springer DOI 0911
BibRef

Rane, S.D.[Shantanu D.], Sun, W.[Wei], Vetro, A.[Anthony],
Secure distortion computation among untrusting parties using homomorphic encryption,
ICIP09(1485-1488).
IEEE DOI 0911
BibRef

Li, C.H.[Chun-Hua], Yuan, C.[Chun], Zhong, Y.Z.[Yu-Zhuo],
Layered Encryption for Scalable Video Coding,
CISP09(1-4).
IEEE DOI 0910
BibRef

Zhang, J.H.[Jian-Hong], Chen, H.[Hua], Geng, Q.[Qin],
Cryptoanalysis of Certificateless Partially Blind Signature and Proxy Blind Signature Scheme,
CISP09(1-5).
IEEE DOI 0910
BibRef

Zhang, J.H.[Jian-Hong], Gao, S.N.[Sheng-Nan],
Cryptoanlaysis of Two Proxy Blind Signature Schemes with Proxy Revocation,
CISP09(1-4).
IEEE DOI 0910
BibRef

Lang, J.[Jun], Tao, R.[Ran], Wang, Y.[Yue],
The Generalized Weighted Fractional Fourier Transform and its Application to Image Encryption,
CISP09(1-5).
IEEE DOI 0910
BibRef

Cao, Y.[Yun], Qiu, R.[Runhe], Fu, Y.[Yuzhe],
Color Image Encryption Based on Hyper-Chaos,
CISP09(1-6).
IEEE DOI 0910
BibRef

He, B.[Bo], Zhang, F.[Fang], Luo, L.[Longyan], Du, M.[Maokang], Wang, Y.[Yong],
An Image Encryption Algorithm Based on Spatiotemporal Chaos,
CISP09(1-5).
IEEE DOI 0910
BibRef

Zhang, S.[Shuo], Cai, R.[Ruhua], Jiang, Y.C.[Ying-Chun], Guo, S.P.[Shi-Ping],
An Image Encryption Algorithm Based on Multiple Chaos and Wavelet Transform,
CISP09(1-5).
IEEE DOI 0910
BibRef

Xiao, Y.[Yu], Zhang, H.Y.[Hai-Ying], Ran, Q.W.[Qi-Wen], Zhang, J.[Jin], Tan, L.Y.[Li-Ying],
Image Encryption and Two Dimensional Discrete M-Parameter Fractional Fourier Transform,
CISP09(1-4).
IEEE DOI 0910
BibRef

Podoba, T., Giesl, J., Vlcek, K.,
Image Encryption In Wavelet Domain Based on Chaotic Maps,
CISP09(1-5).
IEEE DOI 0910
BibRef

Weir, J.[Jonathan], Yan, W.Q.[Wei-Qi],
Authenticating Visual Cryptography Shares Using 2D Barcodes,
IWDW11(196-210).
Springer DOI 1208
BibRef
Earlier:
Plane Transform Visual Cryptography,
DW10(60-74).
Springer DOI 1010
BibRef
Earlier:
Image Hatching for Visual Cryptography,
IMVIP09(59-64).
IEEE DOI 0909
BibRef
And:
Dot-Size Variant Visual Cryptography,
DW09(136-148).
Springer DOI 0908
BibRef

Piper, F.[Fred],
The Changing Face of Cryptography,
DW09(2).
Springer DOI 0908
BibRef

Chen, W.B.[Wei-Bin], Zhang, X.[Xin],
Image encryption algorithm based on Henon chaotic system,
IASP09(94-97).
IEEE DOI 0904
BibRef

Du, Y.F.[Yan-Fang], Zhang, J.[Jing], Su, Y.T.[Yu-Ting],
Watermarking for Authentication of LZ-77 Compressed Documents,
DW07(365-372).
Springer DOI 0712
BibRef

Luo, H.[Hao], Lu, Z.M.[Zhe-Ming], Pan, J.S.[Jeng-Shyang],
Multiple Watermarking in Visual Cryptography,
DW07(60-70).
Springer DOI 0712
BibRef

Sadeghi, A.R.[Ahmad-Reza],
The Marriage of Cryptography and Watermarking: Beneficial and Challenging for Secure Watermarking and Detection,
DW07(2-18).
Springer DOI 0712
BibRef

He, D.[Dake], Jagmohan, A.[Ashish], Lu, L.G.[Li-Gang],
Secure collaboration using Slepian-Wolf codes,
ICIP08(2216-2219).
IEEE DOI 0810
BibRef

Raju, C.N.[C. Narsimha], Umadevi, G.[Ganugula], Srinathan, K.[Kannan], Jawahar, C.V.,
Fast and Secure Real-Time Video Encryption,
ICCVGIP08(257-264).
IEEE DOI 0812
BibRef
And:
A novel video encryption technique based on secret sharing,
ICIP08(3136-3139).
IEEE DOI 0810
BibRef

Seshadrinathan, M.[Manoj], Dempski, K.L.[Kelly L.],
Implementation of Advanced Encryption Standard for encryption and decryption of images and text on a GPU,
CVGPU08(1-6).
IEEE DOI 0806
BibRef

Alface, P.R.[Patrice Rondao], Macq, B.[Benoit], Cayre, F.[Francois],
Blind and Robust Watermarking of 3D Models: How to Withstand the Cropping Attack?,
ICIP07(V: 465-468).
IEEE DOI 0709
BibRef

Huang, T.J.[Tie-Jun],
Evolvement of DRM Schema: From Encryption to Interoperability and Monitoring,
MCAM07(65-75).
Springer DOI 0706
BibRef

Chen, Z.Y.[Zhen-Yong], Xiong, Z.[Zhang], Tang, L.[Long],
A Novel Scrambling Scheme for Digital Video Encryption,
PSIVT06(997-1006).
Springer DOI 0612
BibRef

Lai, J.C.[Jen-Chieh], Wang, C.H.[Chia-Hui],
Buffer Occupancy Feedback Security Control and Changing Encryption Keys to Protect MOD Services,
PSIVT06(888-897).
Springer DOI 0612
BibRef

Socek, D.[Daniel], Kalva, H.[Hari], Magliveras, S.S.[Spyros S.], Marques, O.[Oge], Culibrk, D.[Dubravko], Furht, B.[Borko],
A Permutation-Based Correlation-Preserving Encryption Method for Digital Videos,
ICIAR06(I: 547-558).
Springer DOI 0610
BibRef

Li, W.H.[Wei-Hai], Yuan, Y.[Yuan],
Visual Information Encryption in Frequency Domain: Risk and Enhancement,
IWICPAS06(225-234).
Springer DOI 0608
BibRef

Wong, A., Bishop, W.,
Expert Knowledge Based Automatic Regions-of-Interest (ROI) Selection in Scanned Documents for Digital Image Encryption,
CRV06(51-51).
IEEE DOI 0607
BibRef

Said, A.,
Measuring the Strength of Partial Encryption Schemes,
ICIP05(II: 1126-1129).
IEEE DOI 0512
BibRef

Watanabe, O., Nakazaki, A., Kiya, H.,
A fast image-scramble method using public-key encryption allowing backward compatibility with jpeg2000,
ICIP04(V: 3435-3438).
IEEE DOI 0505
BibRef

Katzenbeisser, S.[Stefan],
On the Integration of Watermarks and Cryptography,
DW03(50-60).
Springer DOI 0405
BibRef

Li, S.J.[Shu-Jun], Zheng, X.[Xuan],
On the security of an image encryption method,
ICIP02(II: 925-928).
IEEE DOI 0210
BibRef

Yamaguchi, Y.S.[Yasu-Shi],
An Extended Visual Cryptography Scheme for Continuous-Tone Images,
IWDW11(228-242).
Springer DOI 1208
BibRef

Nakajima, M., Yamaguchi, Y.S.[Yasu-Shi],
Extended Visual Cryptography for Natural Images,
WSCG02(303).
HTML Version. 0209
BibRef

Han, K., Tewfik, A.,
Scalable Cryptographic Scheme for Networked Multimedia Applications,
ICIP01(III: 987-990).
IEEE DOI 0108
BibRef

Chen, Y.C., Chang, L.W.,
A Secure and Robust Digital Watermarking Technique by the Block Cipher Rc6 and Secure Hash Algorithm,
ICIP01(II: 518-521).
IEEE DOI 0108
BibRef

Depovere, G., Kalker, T.,
Secret Key Watermarking with Changing Keys,
ICIP00(Vol I: 427-429).
IEEE DOI 0008
BibRef

Bhattacharjee, S., Kutter, M.,
Compression tolerant image authentication,
ICIP98(I: 435-439).
IEEE DOI 9810
BibRef

Creusere, C.D., Mitra, S.K.,
Efficient image scrambling using polyphase filter banks,
ICIP94(II: 81-85).
IEEE DOI 9411
BibRef

Chapter on OCR, Document Analysis and Character Recognition Systems continues in
Watermarks: Extraction, Detection or Recovery .


Last update:Nov 11, 2017 at 13:31:57