Encryption, Visual Cryptography, Authentication

Chapter Contents (Back)
Encryption. Image Encryption. Cryptography. Visual Cryptography. Not really watermarks. Usually the more specific papers.

Scharinger, J.,
Fast Encryption of Image Data Using Chaotic Kolmogorov Flows,
JEI(7), No. 2, April 1998, pp. 318-325. 9807

Chuang, T.J., Lin, J.C.,
New Approach to Image Encryption,
JEI(7), No. 2, April 1998, pp. 350-356. 9807

Chung, K.L., Chang, L.C.,
Large Encrypting Binary Images with Higher Security,
PRL(19), No. 5-6, April 1998, pp. 461-468. 9808
See also Cryptanalysis of an encryption scheme for binary images. BibRef

Aikawa, M., Takaragi, K., Furuya, S., Sasamoto, M.,
A Lightweight Encryption Method Suitable For Copyright Protection,
Consumer(44), No. 3, August 1998, pp. 902-910. 9810

Yen, J.C., Guo, J.I.,
Efficient hierarchical chaotic image encryption algorithm and its VLSI realisation,
VISP(147), No. 2, April 2000, pp. 167. 0005

Chang, C.C.[Chin-Chen], Chuang, J.C.[Jun-Chou],
An image intellectual property protection scheme for gray-level images using visual secret sharing strategy,
PRL(23), No. 8, June 2002, pp. 931-941.
Elsevier DOI Link 0204

Chang, C.C.[Chin-Chen], Yu, T.X.[Tai-Xing],
Cryptanalysis of an encryption scheme for binary images,
PRL(23), No. 14, December 2002, pp. 1847-1852.
Elsevier DOI Link 0208
Shows how earlier method ( See also Large Encrypting Binary Images with Higher Security. ) can be broken. BibRef

Chang, C.C., Hwang, K.F., Hwang, M.S.,
Robust authentication scheme for protecting copyrights of images and graphics,
VISP(149), No. 1, February 2002, pp. 43-50.
IEEE Top Reference. 0205

Alberti, C., Romeo, A., Mattavelli, M.,
Intellectual property management and protection for MPEG multimedia content: A structured language for interoperable IPMP systems,
IJIST(13), No. 5, 2003, pp. 275-288.
DOI Link 0312

Lin, C.C.[Chang-Chou], Tsai, W.H.[Wen-Hsiang],
Visual cryptography for gray-level images by dithering techniques,
PRL(24), No. 1-3, January 2003, pp. 349-358.
Elsevier DOI Link 0211

Hou, Y.C.[Young-Chang],
Visual cryptography for color images,
PR(36), No. 7, July 2003, pp. 1619-1629.
WWW Version. 0304

Zhao, Y., Campisi, P., Kundur, D.,
Dual Domain Watermarking for Authentication and Compression of Cultural Heritage Images,
IP(13), No. 3, March 2004, pp. 430-448.
IEEE DOI Link 0404

Lukac, R.[Rastislav], Plataniotis, K.N.[Konstantinos N.],
Bit-level based secret sharing for image encryption,
PR(38), No. 5, May 2005, pp. 767-772.
WWW Version. 0501
Document image secret sharing using bit-level processing,
ICIP04(V: 2893-2896).
IEEE DOI Link 0505

Lukac, R.[Rastislav], Plataniotis, K.N.[Konstantinos N.],
A cost-effective encryption scheme for color images,
RealTimeImg(11), No. 5-6, October-December 2005, pp. 454-464.
WWW Version. 0510

Martin, K.[Karl], Lukac, R.[Rastislav], Plataniotis, K.N.[Konstantinos N.],
Efficient encryption of wavelet-based coded color images,
PR(38), No. 7, July 2005, pp. 1111-1115.
WWW Version. 0505

Heidarinejad, M.[Mohsen], Plataniotis, K.N.[Konstantinos N.],
A second generation Visual Secret Sharing scheme for color images,
IEEE DOI Link 0810

Li, C.T.,
Reversible watermarking scheme with image-independent embedding capacity,
VISP(152), No. 6, December 2005, pp. 779-786.
DOI Link 0512

Li, C.T., Lou, D.C., Chen, T.H.,
Image Authentication and Integrity Verification Via Content-based Watermarks and a Public Key Cryptosystem,
ICIP00(Vol III: 694-697).
IEEE DOI Link 0008

Celik, M.U., Sharma, G., Tekalp, A.M.,
Lossless Watermarking for Image Authentication: A New Framework and an Implementation,
IP(15), No. 4, April 2006, pp. 1042-1049.
IEEE DOI Link 0604

Shyu, S.J.[Shyong Jian],
Efficient visual secret sharing scheme for color images,
PR(39), No. 5, May 2006, pp. 866-880.
WWW Version. 0604
Visual cryptography; Secret sharing; Visual secret sharing; Color images BibRef

Shyu, S.J.[Shyong Jian],
Image encryption by random grids,
PR(40), No. 3, March 2007, pp. 1014-1031.
WWW Version. 0611
Image encryption; Random grid; Visual cryptography; Halftone; Color mixing; Color decomposition BibRef

Shyu, S.J.[Shyong Jian],
Image encryption by multiple random grids,
PR(42), No. 7, July 2009, pp. 1582-1596.
Elsevier DOI Link 0903
Image encryption; Random grid; Visual cryptogram; Visual cryptography; Visual secret sharing BibRef

Shyu, S.J.[Shyong Jian],
Threshold Visual Cryptographic Scheme With Meaningful Shares,
SPLetters(21), No. 12, December 2014, pp. 1521-1525.
IEEE DOI Link 1410
cryptography BibRef

Wang, R.Z.[Ran-Zan], Shyu, S.J.[Shyong-Jian],
Scalable secret image sharing,
SP:IC(22), No. 4, April 2007, pp. 363-373.
WWW Version. 0704
Image sharing; Progressive sharing; Shadow image; Secret sharing BibRef

Shyu, S.J.[Shyong Jian], Chen, K.[Kun],
Visual Multiple-Secret Sharing By Circle Random Grids,
SIIMS(3), No. 4, 2010, pp. 926-953.
DOI Link visual cryptography; visual cryptographic scheme; visual multiple-secret sharing; circle share; random grid BibRef 1000

Shyu, S.J.,
Visual Cryptograms of Random Grids for General Access Structures,
CirSysVideo(23), No. 3, March 2013, pp. 414-424.
IEEE DOI Link 1303

Wang, R.Z.[Ran-Zan],
Region Incrementing Visual Cryptography,
SPLetters(16), No. 8, August 2009, pp. 659-662.
IEEE DOI Link 0906

Amador, J.J.[José J.], Green, R.W.[Robert W.],
Symmetric-key block cipher for image and text cryptography,
IJIST(15), No. 3, 2005, pp. 178-188.
DOI Link 0510

Pareek, N.K., Patidar, V.[Vinod], Sud, K.K.,
Image encryption using chaotic logistic map,
IVC(24), No. 9, September 2006, pp. 926-934.
WWW Version. 0608
Image cipher; Chaotic cryptography; Logistic map BibRef

Caldelli, R.[Roberto], Filippini, F.[Francesco], Barni, M.[Mauro],
Joint near-lossless compression and watermarking of still images for authentication and tamper localization,
SP:IC(21), No. 10, November 2006, pp. 890-903.
WWW Version. 0701
Image authentication; Near-lossless JPEG; Digital watermarking; Tamper localization; Remote sensing; Medical imagery BibRef

Hu, C.M., Tzeng, W.G.,
Cheating Prevention in Visual Cryptography,
IP(16), No. 1, January 2007, pp. 36-45.
IEEE DOI Link 0701
See also Comment on Cheating Prevention in Visual Cryptography. BibRef

Chen, R.J.[Rong-Jian], Lai, J.L.[Jui-Lin],
Image security system using recursive cellular automata substitution,
PR(40), No. 5, May 2007, pp. 1621-1631.
WWW Version. 0702
Image processing; Cellular automata; Image security; Encryption; Decryption BibRef

Wang, D.[Daoshun], Zhang, L.[Lei], Ma, N.[Ning], Li, X.B.[Xiao-Bo],
Two secret sharing schemes based on Boolean operations,
PR(40), No. 10, October 2007, pp. 2776-2785.
WWW Version. 0707
Secret sharing scheme; Visual secret sharing; Visual cryptography; Computation complexity; Pixel expansion BibRef

Yang, C.N.[Ching-Nung], Yu, K.H.[Kun-Hsuan], Lukac, R.[Rastislav],
User-friendly image sharing using polynomials with different primes,
IJIST(17), No. 1, 2007, pp. 40-47.
DOI Link 0707

Lin, S.J.[Sian-Jheng], Lin, J.C.[Ja-Chen],
VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches,
PR(40), No. 12, December 2007, pp. 3652-3666.
WWW Version. 0709
Hiding using block-types; Image sharing; (t,n) threshold scheme; Halftone version; Compression BibRef

Shyu, S.J.[Shyong Jian], Huang, S.Y.[Shih-Yu], Lee, Y.K.[Yeuan-Kuen], Wang, R.Z.[Ran-Zan], Chen, K.[Kun],
Sharing multiple secrets in visual cryptography,
PR(40), No. 12, December 2007, pp. 3633-3651.
WWW Version. 0709
Secret sharing; Visual cryptography; Visual multi-secret sharing BibRef

Puech, W., Rodrigues, J.M., Develay-Morice, J.E.,
A new fast reversible method for image safe transfer,
RealTimeIP(2), No. 1, October 2007, pp. 55-65.
Springer DOI Link 0711
Combines compression, data hiding and partial encryption in a single step. BibRef

Fang, W.P.[Wen-Pinn],
Friendly progressive visual secret sharing,
PR(41), No. 4, April 2008, pp. 1410-1414.
WWW Version. 0801
Visual cryptography; Progress; Secret sharing; Friendly BibRef

Alsultanny, Y.A.[Yas Abbas],
Random-bit sequence generation from image data,
IVC(26), No. 4, April 2008, pp. 592-601.
WWW Version. 0711
Image encryption; Randomness bit generation; CBC mode; ECB mode BibRef

Li, S., Li, C., Lo, K.T., Chen, G.,
Cryptanalysis of an Image Scrambling Scheme Without Bandwidth Expansion,
CirSysVideo(18), No. 3, March 2008, pp. 338-349.
IEEE DOI Link 0804

Tong, X.J.[Xiao-Jun], Cui, M.G.[Ming-Gen],
Image encryption with compound chaotic sequence cipher shifting dynamically,
IVC(26), No. 6, 1 June 2008, pp. 843-850.
WWW Version. 0804
Compound chaos; Stream cipher; Image encryption BibRef

Lin, Q.H.[Qiu-Hua], Yin, F.L.[Fu-Liang], Mei, T.M.[Tie-Min], Liang, H.L.[Hua-Lou],
A blind source separation-based method for multiple images encryption,
IVC(26), No. 6, 1 June 2008, pp. 788-798.
WWW Version. 0804
Blind source separation; Independent component analysis; Image encryption BibRef

Li, S.J.[Shu-Jun], Li, C.Q.[Cheng-Qing], Chen, G.R.[Guan-Rong], Bourbakis, N.G.[Nikolaos G.], Lo, K.T.[Kwok-Tung],
A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks,
SP:IC(23), No. 3, March 2008, pp. 212-223.
WWW Version. 0804
Permutation-only multimedia encryption; Image; Video; Speech; Cryptanalysis; Known-plaintext attack; Chosen-plaintext attack BibRef

Yang, C.N.[Ching-Nung], Chen, T.S.[Tse-Shih],
Colored visual cryptography scheme based on additive color mixing,
PR(41), No. 10, October 2008, pp. 3114-3129.
WWW Version. 0808
Visual cryptography; Visual secret sharing; Colored visual cryptography; Additive color mixing BibRef

Li, W.H.[Wei-Hai], Yuan, Y.[Yuan],
A New Blind Attack Procedure For Dct-based Image Encryption With Spectrum Learning,
IJIG(7), No. 3, July 2007, pp. 481-496. 0707

Naughton, T.J.[Thomas J.], Hennelly, B.M.[Bryan M.], Dowling, T.[Tom],
Introducing secure modes of operation for optical encryption,
JOSA-A(25), No. 10, October 2008, pp. 2608-2617.
WWW Version. 0810

Leung, B.W.[Bert W.], Ng, F.Y.[Felix Y.], Wong, D.S.[Duncan S.],
On the security of a visual cryptography scheme for color images,
PR(42), No. 5, May 2009, pp. 929-940.
Elsevier DOI Link 0902
Visual cryptography; Dithering technology; Color decomposition; Secret sharing; Cryptanalysis BibRef

Chen, T.H.[Tzung-Her], Tsao, K.H.[Kai-Hsiang],
Visual secret sharing by random grids revisited,
PR(42), No. 9, September 2009, pp. 2203-2217.
Elsevier DOI Link 0905
Random grids; Visual secret sharing; Visual cryptography; Image encryption BibRef

Chen, T.H.[Tzung-Her], Tsao, K.H.[Kai-Hsiang],
User-Friendly Random-Grid-Based Visual Secret Sharing,
CirSysVideo(21), No. 11, November 2011, pp. 1693-1703.
IEEE DOI Link 1111

Lee, Y.S.[Yao-Sheng], Wang, B.J.[Bing-Jian], Chen, T.H.[Tzung-Her],
Quality-improved threshold visual secret sharing scheme by random grids,
IET-PR(7), No. 2, 2013, pp. xx-yy.
DOI Link 1307

Li, C.Q.[Cheng-Qing], Li, S.J.[Shu-Jun], Asim, M.[Muhammad], Nunez, J.[Juana], Alvarez, G.[Gonzalo], Chen, G.R.[Guan-Rong],
On the security defects of an image encryption scheme,
IVC(27), No. 9, 3 August 2009, pp. 1371-1381.
Elsevier DOI Link 0906
Cryptanalysis; Image encryption; Chaos; Known-plaintext attack; Chosen-plaintext attack BibRef

Li, C.Q.[Cheng-Qing], Li, S.J.[Shu-Jun], Chen, G.R.[Guan-Rong], Halang, W.A.[Wolfgang A.],
Cryptanalysis of an image encryption scheme based on a compound chaotic sequence,
IVC(27), No. 8, 2 July 2009, pp. 1035-1039.
Elsevier DOI Link 0906
Cryptanalysis; Image encryption; Chaos; Differential chosen-plaintext attack; Randomness test BibRef

Wang, D.S.[Dao-Shun], Yi, F.[Feng], Li, X.B.[Xiao-Bo],
On general construction for extended visual cryptography schemes,
PR(42), No. 11, November 2009, pp. 3071-3082.
Elsevier DOI Link 0907
Visual cryptography; Secret sharing scheme; Multi-secret images BibRef

Ye, G.D.[Guo-Dong],
Image scrambling encryption algorithm of pixel bit based on chaos map,
PRL(31), No. 5, 1 April 2010, pp. 347-354.
Elsevier DOI Link 1002
Image scrambling encryption; Chaos map; Gray scrambling; Position permutation; Pixel bit BibRef

Liu, W., Zeng, W., Dong, L., Yao, Q.,
Efficient Compression of Encrypted Grayscale Images,
IP(19), No. 4, April 2010, pp. 1097-1102.
IEEE DOI Link 1003

Wang, X.F.[Xiao-Feng], Zheng, N.N.[Nan-Ning], Tian, L.[Lihua],
Hash key-based video encryption scheme for H.264/AVC,
SP:IC(25), No. 6, July 2010, pp. 427-437.
Elsevier DOI Link 1007
Video encryption; H.264/AVC; Intra-prediction mode; Motion vector difference; Quantization coefficient; Hash function BibRef

Kang, I., Arce, G.R., Lee, H.K.,
Color Extended Visual Cryptography Using Error Diffusion,
IP(20), No. 1, January 2011, pp. 132-145.
IEEE DOI Link 1101

Kwitt, R.[Roland], Meerwald, P.[Peter], Uhl, A.[Andreas],
Lightweight Detection of Additive Watermarking in the DWT-Domain,
IP(20), No. 2, February 2011, pp. 474-484.
IEEE DOI Link 1102

Kwitt, R.[Roland], Meerwald, P.[Peter], Uhl, A.[Andreas],
Color-image watermarking using multivariate power-exponential distribution,
IEEE DOI Link 0911

Meerwald, P.[Peter], Uhl, A.[Andreas],
Watermarking of Raw Digital Images in Camera Firmware: Embedding and Detection,
Springer DOI Link 0901
Watermark Security Via Wavelet Filter Parametrization,
ICIP01(III: 1027-1030).
IEEE DOI Link 0108

Engel, D.[Dominik], Uhl, A.[Andreas],
An Attack Against Image-Based Selective Bitplane Encryption,
ICIP07(II: 141-144).
IEEE DOI Link 0709

Pommer, A.[Andreas], Uhl, A.[Andreas],
Lightweight Protection of Visual Data Using High-Dimensional Wavelet Parametrization,
Springer DOI Link 0509

Meixner, A.[Albert], Uhl, A.[Andreas],
Security Enhancement of Visual Hashes Through Key Dependent Wavelet Transformations,
Springer DOI Link 0509

Noreen, R., Uhl, A.,
Encryption of wavelet-coded imagery using random permutations,
ICIP04(V: 3431-3434).
IEEE DOI Link 0505

Yeung, S.K.A.[Siu-Kei Au], Zhu, S., Zeng, B.[Bing],
Design of New Unitary Transforms for Perceptual Video Encryption,
CirSysVideo(21), No. 9, September 2011, pp. 1341-1345.
IEEE DOI Link 1109

Yeung, S.K.A.[Siu-Kei Au], Zeng, B.[Bing],
A new design of multiple transforms for perceptual video encryption,
IEEE DOI Link 1302

Hou, Y.C., Quan, Z.Y.,
Progressive Visual Cryptography With Unexpanded Shares,
CirSysVideo(21), No. 11, November 2011, pp. 1760-1764.
IEEE DOI Link 1111

Wang, R.Z.[Ran-Zan], Hsu, S.F.[Shuo-Fang],
Tagged Visual Cryptography,
SPLetters(18), No. 11, November 2011, pp. 627-630.
IEEE DOI Link 1112

Liu, F.[Feng], Guo, T.[Teng], Wu, C.K.[Chuan-Kun], Qian, L.[Lina],
Improving the visual quality of size invariant visual cryptography scheme,
JVCIR(23), No. 2, February 2012, pp. 331-342.
Elsevier DOI Link 1201
Visual cryptography; Visual quality; Size invariant; Secret sharing; Thin line problem; Variance; Multi-pixel encryption; Probabilistic visual cryptography scheme BibRef

François, M., Grosges, T., Barchiesi, D., Erra, R.,
A new image encryption scheme based on a chaotic function,
SP:IC(27), No. 3, March 2012, pp. 249-259.
Elsevier DOI Link 1203
Image encryption; Chaotic function; Statistical analysis; Confusion; Diffusion; Indistinguishability BibRef

Watanabe, O.[Osamu], Fukuhara, T.[Takahiro], Kiya, H.[Hitoshi],
Codestream-Based Identification of JPEG 2000 Images with Different Coding Parameters,
IEICE(E95-D), No. 4, April 2012, pp. 1120-1129.
WWW Version. 1204

Watanabe, O.[Osamu], Iida, T.[Tomonori], Fukuhara, T.[Takahiro], Kiya, H.[Hitoshi],
Identification of JPEG 2000 images in encrypted domain for digital cinema,
IEEE DOI Link 0911

Shyu, S.J., Jiang, H.W.,
Efficient Construction for Region Incrementing Visual Cryptography,
CirSysVideo(22), No. 5, May 2012, pp. 769-777.
IEEE DOI Link 1202

Yang, C.N., Shih, H.W., Wu, C.C., Harn, L.,
k Out of n Region Incrementing Scheme in Visual Cryptography,
CirSysVideo(22), No. 5, May 2012, pp. 799-810.
IEEE DOI Link 1202

Yang, C.N.[Ching-Nung], Lin, Y.C.[Yi-Chin], Wu, C.C.[Chih-Cheng],
Cheating Immune Block-Based Progressive Visual Cryptography,
Springer DOI Link 1407

Win, L.L., Thomas, T., Emmanuel, S.,
Privacy Enabled Digital Rights Management Without Trusted Third Party Assumption,
MultMed(14), No. 3, 2012, pp. 546-554.
IEEE DOI Link 1202

Chen, Y.C., Horng, G., Tsai, D.S.,
Comment on 'Cheating Prevention in Visual Cryptography',
IP(21), No. 7, July 2012, pp. 3319-3323.
IEEE DOI Link 1206
See also Cheating Prevention in Visual Cryptography. BibRef

Dalhoum, A.L.A.[Abdel Latif Abu], Mahafzah, B.A.[Basel A.], Awwad, A.A.[Aiman Ayyal], Aldhamari, I.[Ibraheem], Ortega, A.[Alfonso], Alfonseca, M.[Manuel],
Digital Image Scrambling Using 2D Cellular Automata,
MultMedMag(19), No. 4, 2012, pp. 28-36.
IEEE DOI Link 1210
based on game of life. BibRef

Wu, X.T.[Xiao-Tian], Sun, W.[Wei],
Random grid-based visual secret sharing with abilities of OR and XOR decryptions,
JVCIR(24), No. 1, January 2013, pp. 48-62.
Elsevier DOI Link 1301
Visual secret sharing; Visual cryptography; Random grid; OR; XOR; Decryption; Visual quality; Contrast BibRef

Wu, X.T.[Xiao-Tian], Liu, T.[Tong], Sun, W.[Wei],
Improving the visual quality of random grid-based visual secret sharing via error diffusion,
JVCIR(24), No. 5, July 2013, pp. 552-566.
Elsevier DOI Link 1306
Visual secret sharing; Visual cryptography; Visual quality; Random grid; Error diffusion; Noise balanced; Homogeneous distribution; Pixel expansion BibRef

Ou, D.H.[Duan-Hao], Sun, W.[Wei],
Reversible AMBTC-based secret sharing scheme with abilities of two decryptions,
JVCIR(25), No. 5, 2014, pp. 1222-1239.
Elsevier DOI Link 1406
Visual secret sharing BibRef

Lin, H.C.[Hsiao-Ching], Yang, C.N.[Ching-Nung], Laih, C.S.[Chi-Sung], Lin, H.T.[Hui-Tang],
Natural language letter based visual cryptography scheme,
JVCIR(24), No. 3, April 2013, pp. 318-331.
Elsevier DOI Link 1303
Deterministic VCS; Letter-based; Natural language; Probabilistic VCS; Secret sharing; Subpixel; Visual cryptography scheme; Visual secret sharing BibRef

Zhang, Y.S.[Yu-Shu], Xiao, D.[Di], Shu, Y.[Yonglu], Li, J.[Jing],
A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations,
SP:IC(28), No. 3, March 2013, pp. 292-300.
Elsevier DOI Link 1303
Hyperbolic chaotic systems; Partial differential equations; Image encryption; Coupled map lattices; Time-varying delay BibRef

Zhu, H.[Hegui], Zhao, C.[Cheng], Zhang, X.D.[Xiang-De],
A novel image encryption-compression scheme using hyper-chaos and Chinese remainder theorem,
SP:IC(28), No. 6, July 2013, pp. 670-680.
Elsevier DOI Link 1306
Hyper-chaos; Image encryption; Image compression; Compression ratio; Chinese remainder theorem BibRef

Azzaz, M.S., Tanougast, C., Sadoudi, S., Dandache, A.,
Robust chaotic key stream generator for real-time images encryption,
RealTimeIP(8), No. 3, September 2013, pp. 297-306.
WWW Version. 1309

Thorpe, C.[Christopher], Li, F.[Feng], Li, Z.[Zijia], Yu, Z.[Zhan], Saunders, D.[David], Yu, J.Y.[Jing-Yi],
A Coprime Blur Scheme for Data Security in Video Surveillance,
PAMI(35), No. 12, 2013, pp. 3066-3072.
IEEE DOI Link 1311
Cameras. Special encryption, strategic blurring. BibRef

Lima, J.B., Lima, E.A.O., Madeiro, F.,
Image encryption based on the finite field cosine transform,
SP:IC(28), No. 10, 2013, pp. 1537-1547.
Elsevier DOI Link 1312
Image encryption BibRef

Liu, Y.[Yang], Tong, X.J.[Xiao-Jun], Hu, S.[Shicheng],
A family of new complex number chaotic maps based image encryption algorithm,
SP:IC(28), No. 10, 2013, pp. 1548-1559.
Elsevier DOI Link 1312
Image encryption BibRef

Li, P.[Peng], Yang, C.N.[Ching-Nung], Kong, Q.[Qian], Ma, Y.P.[Yan-Peng], Liu, Z.[Zheng],
Sharing more information in gray visual cryptography scheme,
JVCIR(24), No. 8, 2013, pp. 1380-1393.
Elsevier DOI Link 1312
Visual cryptography BibRef

Asghar, M.N.[Mamoona N.], Ghanbari, M.[Mohammed], Fleury, M.[Martin], Reed, M.J.[Martin J.],
Confidentiality of a selectively encrypted H.264 coded video bit-stream,
JVCIR(25), No. 2, 2014, pp. 487-498.
Elsevier DOI Link 1402
Confidentiality BibRef

Yang, C.N.[Ching-Nung], Wang, D.S.[Dao-Shun],
Property Analysis of XOR-Based Visual Cryptography,
CirSysVideo(24), No. 2, February 2014, pp. 189-197.
IEEE DOI Link 1403
cryptography BibRef

Barakat, M.L., Mansingka, A.S., Radwan, A.G., Salama, K.N.,
Hardware stream cipher with controllable chaos generator for colour image encryption,
IET-PR(8), No. 1, January 2014, pp. 33-43.
DOI Link 1403
cryptography BibRef

Pande, A., Mohapatra, P., Zambreno, J.,
Securing Multimedia Content Using Joint Compression and Encryption,
MultMedMag(20), No. 4, October 2013, pp. 50-61.
IEEE DOI Link 1403
Internet BibRef

Caragata, D.[Daniel], Tutanescu, I.[Ion],
On the security of a new image encryption scheme based on a chaotic function,
SIViP(8), No. 4, May 2014, pp. 641-646.
WWW Version. 1404

Wang, X., Pei, Q., Li, H.,
A Lossless Tagged Visual Cryptography Scheme,
SPLetters(21), No. 7, July 2014, pp. 853-856.
IEEE DOI Link 1405
Cryptography BibRef

Hou, Y., Wei, S., Lin, C.,
Random-Grid-Based Visual Cryptography Schemes,
CirSysVideo(24), No. 5, May 2014, pp. 733-744.
IEEE DOI Link 1405
Encryption BibRef

Ghebleh, M., Kanso, A., Noura, H.,
An image encryption scheme based on irregularly decimated chaotic maps,
SP:IC(29), No. 5, 2014, pp. 618-627.
Elsevier DOI Link 1406
Chaos BibRef

Dong, C.[Chang'e],
Color image encryption using one-time keys and coupled chaotic systems,
SP:IC(29), No. 5, 2014, pp. 628-640.
Elsevier DOI Link 1406
Color image encryption BibRef

Czaplewski, B.[Bartosz], Dzwonkowski, M.[Mariusz], Rykaczewski, R.[Roman],
Digital fingerprinting for color images based on the quaternion encryption scheme,
PRL(46), No. 1, 2014, pp. 11-19.
Elsevier DOI Link 1407
Cryptography BibRef

Zhang, X.P.[Xuan-Ping], Zhao, Z.M.[Zhong-Meng], Wang, J.Y.[Jia-Yin],
Chaotic image encryption based on circular substitution box and key stream buffer,
SP:IC(29), No. 8, 2014, pp. 902-913.
Elsevier DOI Link 1410
Image encryption BibRef

Boriga, R.[Radu], Dascalescu, A.C.[Ana Cristina], Priescu, I.[Iustin],
A new hyperchaotic map and its application in an image encryption scheme,
SP:IC(29), No. 8, 2014, pp. 887-901.
Elsevier DOI Link 1410
Hyperchaos BibRef

Li, C.Q.[Cheng-Qing], Liu, Y.S.[Yuan-Sheng], Zhang, L.Y.[Leo Yu], Wong, K.W.[Kwok-Wo],
Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem,
SP:IC(29), No. 8, 2014, pp. 914-920.
Elsevier DOI Link 1410
Compression BibRef

Bhatnagar, G., Wu, Q.M.J.,
Biometric Inspired Multimedia Encryption Based on Dual Parameter Fractional Fourier Transform,
SMCS(44), No. 9, September 2014, pp. 1234-1247.
IEEE DOI Link 1410
Fourier transforms BibRef

Ziyabar, H.M.[Hashem Moradmand], Sinaie, M.[Mahnaz], Payandeh, A.[Ali], Payandeh, A.[Ali], Vakili, V.T.[Vahid Tabataba],
Secure FSM-based arithmetic codes,
SIViP(8), No. 7, October 2014, pp. 1263-1272.
Springer DOI Link 1410
atithmetic coding for compression and secrecy. BibRef

Wang, W.[Wan], Jiang, X.[Xinghao], Wang, S.L.[Shi-Lin], Wan, M.[Meng], Sun, T.[Tanfeng],
Identifying Video Forgery Process Using Optical Flow,
Springer DOI Link 1407

Ou, D.[Duanhao], Wu, X.T.[Xiao-Tian], Dai, L.[Lu], Sun, W.[Wei],
Improved Tagged Visual Cryptograms by Using Random Grids,
Springer DOI Link 1407

Fu, Z.X.[Zheng-Xin], Yu, B.[Bin],
Visual Cryptography and Random Grids Schemes,
Springer DOI Link 1407

Moreno Cañadas, A.[Agustín], Palma Vanegas, N.P.[Nelly Paola], Hernández Quitián, M.[Margoth],
Visual Cryptography Schemes Based in k -Linear Maps,
Springer DOI Link 1407

Shao, Z.H.[Zhu-Hong], Wu, J.S.[Jia-Song], Coatrieux, J.L.[Jean Louis], Coatrieux, G.[Gouenou], Shu, H.Z.[Hua-Zhong],
Quaternion gyrator transform and its application to color image encryption,
IEEE DOI Link 1402
Quaternion gyrator transform; color image; encryption BibRef

Pinto, M.[Michael], Puech, W.[William], Subsol, G.[Gerard],
Protection of JPEG compressed e-comics by selective encryption,
IEEE DOI Link 1402
AES BibRef

Puech, W., Erkin, Z., Barni, M., Rane, S., Lagendijk, R.L.,
Emerging cryptographic challenges in image and video processing,
IEEE DOI Link 1302
enforce content access control, identity verification and authentication, and privacy protection BibRef

Islam, N.[Naveed], Puech, W.[William],
Decryption of noisy encrypted images by statistical analysis,
IEEE DOI Link 1110

Panduranga, H.T., Kumar, H.S.S.[H.S. Sharath], Kumar, S.K.N.[S.K. Naveen],
Hybrid approach for dual image encryption using nibble exchange and Hill-cipher,
IEEE DOI Link 1302

Liu, F.[Feng], Guo, T.[Teng], Wu, C.[ChuanKun], Yang, C.N.[Ching-Nung],
Flexible Visual Cryptography Scheme without Distortion,
Springer DOI Link 1208

Di, H.[Hong], Zheng, K.[Kangfeng], Niu, X.[Xinxin], Zhang, X.[Xin],
Multiple-image compressed encryption and decryption by compressive holography,
IEEE DOI Link 1201

Bajaj, N.[Nikesh], Thakur, A.[Amit],
Enhancement of RC5 for image encryption,
IEEE DOI Link 1112

Goumidi, D.E., Hachouf, F.,
Modified confusion-diffusion based satellite image cipher using chaotic standard, logistic and sine maps,
IEEE DOI Link 1110

Petrauskiene, V., Ragulskiene, J., Sakyte, E., Ragulskis, M.,
Near-Optimal Time Function for Secure Dynamic Visual Cryptography,
ISVC11(II: 300-309).
Springer DOI Link 1109

Nien, H.H., Changchien, S.K., Wu, S.Y., Huang, C.K.,
A new Pixel-Chaotic-Shuffle method for image encryption,
IEEE DOI Link 1109

Chen, B.[Brenden], Chandran, V.[Vinod],
Robust Image Hashing Using Higher Order Spectral Features,
IEEE DOI Link 1012
robust to JPEG, etc. BibRef

Ahmed, F., Siyal, M.Y., Abbas, V.U.,
A Perceptually Scalable and JPEG Compression Tolerant Image Encryption Scheme,
IEEE DOI Link 1011
Reconstruct encryped image even after JPEG compression. BibRef

Zhao, L.[Liang], Adhikari, A.[Avishek], Sakurai, K.[Kouichi],
A New Scrambling Evaluation Scheme Based on Spatial Distribution Entropy and Centroid Difference of Bit-Plane,
Springer DOI Link 1010

Zhao, L.[Liang], Adhikari, A.[Avishek], Xiao, D.[Di], Sakurai, K.[Kouichi],
Cryptanalysis on an Image Scrambling Encryption Scheme Based on Pixel Bit,
Springer DOI Link 1010

Faridnia, S.[Saed], Faez, K.[Karim],
Image Encryption through Using Chaotic Function and Graph,
ICCVG10(I: 352-359).
Springer DOI Link 1009

Ratan, R.[Ram],
Key Independent Retrieval of Chaotic Encrypted Images,
Springer DOI Link 0912

Mayouf, M.A.[Mabroka Ali], Shukur, Z.[Zarina],
Using Animation in Active Learning Tool to Detect Possible Attacks in Cryptographic Protocols,
Springer DOI Link 0911

Rane, S.D.[Shantanu D.], Sun, W.[Wei], Vetro, A.[Anthony],
Secure distortion computation among untrusting parties using homomorphic encryption,
IEEE DOI Link 0911

Li, C.H.[Chun-Hua], Yuan, C.[Chun], Zhong, Y.Z.[Yu-Zhuo],
Layered Encryption for Scalable Video Coding,
IEEE DOI Link 0910

Zhang, J.H.[Jian-Hong], Chen, H.[Hua], Geng, Q.[Qin],
Cryptoanalysis of Certificateless Partially Blind Signature and Proxy Blind Signature Scheme,
IEEE DOI Link 0910

Zhang, J.H.[Jian-Hong], Gao, S.N.[Sheng-Nan],
Cryptoanlaysis of Two Proxy Blind Signature Schemes with Proxy Revocation,
IEEE DOI Link 0910

Lang, J.[Jun], Tao, R.[Ran], Wang, Y.[Yue],
The Generalized Weighted Fractional Fourier Transform and its Application to Image Encryption,
IEEE DOI Link 0910

Cao, Y.[Yun], Qiu, R.[Runhe], Fu, Y.[Yuzhe],
Color Image Encryption Based on Hyper-Chaos,
IEEE DOI Link 0910

He, B.[Bo], Zhang, F.[Fang], Luo, L.[Longyan], Du, M.[Maokang], Wang, Y.[Yong],
An Image Encryption Algorithm Based on Spatiotemporal Chaos,
IEEE DOI Link 0910

Zhang, S.[Shuo], Cai, R.[Ruhua], Jiang, Y.C.[Ying-Chun], Guo, S.P.[Shi-Ping],
An Image Encryption Algorithm Based on Multiple Chaos and Wavelet Transform,
IEEE DOI Link 0910

Xiao, Y.[Yu], Zhang, H.Y.[Hai-Ying], Ran, Q.W.[Qi-Wen], Zhang, J.[Jin], Tan, L.Y.[Li-Ying],
Image Encryption and Two Dimensional Discrete M-Parameter Fractional Fourier Transform,
IEEE DOI Link 0910

Podoba, T., Giesl, J., Vlcek, K.,
Image Encryption In Wavelet Domain Based on Chaotic Maps,
IEEE DOI Link 0910

Weir, J.[Jonathan], Yan, W.Q.[Wei-Qi],
Authenticating Visual Cryptography Shares Using 2D Barcodes,
Springer DOI Link 1208
Plane Transform Visual Cryptography,
Springer DOI Link 1010
Image Hatching for Visual Cryptography,
IEEE DOI Link 0909
Dot-Size Variant Visual Cryptography,
Springer DOI Link 0908

Piper, F.[Fred],
The Changing Face of Cryptography,
Springer DOI Link 0908

Chen, W.B.[Wei-Bin], Zhang, X.[Xin],
Image encryption algorithm based on Henon chaotic system,
IEEE DOI Link 0904

Du, Y.F.[Yan-Fang], Zhang, J.[Jing], Su, Y.T.[Yu-Ting],
Watermarking for Authentication of LZ-77 Compressed Documents,
Springer DOI Link 0712

Luo, H.[Hao], Lu, Z.M.[Zhe-Ming], Pan, J.S.[Jeng-Shyang],
Multiple Watermarking in Visual Cryptography,
Springer DOI Link 0712

Sadeghi, A.R.[Ahmad-Reza],
The Marriage of Cryptography and Watermarking: Beneficial and Challenging for Secure Watermarking and Detection,
Springer DOI Link 0712

He, D.[Dake], Jagmohan, A.[Ashish], Lu, L.G.[Li-Gang],
Secure collaboration using Slepian-Wolf codes,
IEEE DOI Link 0810

Raju, C.N.[C. Narsimha], Umadevi, G.[Ganugula], Srinathan, K.[Kannan], Jawahar, C.V.,
Fast and Secure Real-Time Video Encryption,
IEEE DOI Link 0812
A novel video encryption technique based on secret sharing,
IEEE DOI Link 0810

Seshadrinathan, M.[Manoj], Dempski, K.L.[Kelly L.],
Implementation of Advanced Encryption Standard for encryption and decryption of images and text on a GPU,
IEEE DOI Link 0806

Alface, P.R.[Patrice Rondao], Macq, B.[Benoit], Cayre, F.[Francois],
Blind and Robust Watermarking of 3D Models: How to Withstand the Cropping Attack?,
ICIP07(V: 465-468).
IEEE DOI Link 0709

Huang, T.J.[Tie-Jun],
Evolvement of DRM Schema: From Encryption to Interoperability and Monitoring,
Springer DOI Link 0706

Chen, Z.Y.[Zhen-Yong], Xiong, Z.[Zhang], Tang, L.[Long],
A Novel Scrambling Scheme for Digital Video Encryption,
Springer DOI Link 0612

Lai, J.C.[Jen-Chieh], Wang, C.H.[Chia-Hui],
Buffer Occupancy Feedback Security Control and Changing Encryption Keys to Protect MOD Services,
Springer DOI Link 0612

Socek, D.[Daniel], Kalva, H.[Hari], Magliveras, S.S.[Spyros S.], Marques, O.[Oge], Culibrk, D.[Dubravko], Furht, B.[Borko],
A Permutation-Based Correlation-Preserving Encryption Method for Digital Videos,
ICIAR06(I: 547-558).
Springer DOI Link 0610

Li, W.H.[Wei-Hai], Yuan, Y.[Yuan],
Visual Information Encryption in Frequency Domain: Risk and Enhancement,
Springer DOI Link 0608

Wong, A., Bishop, W.,
Expert Knowledge Based Automatic Regions-of-Interest (ROI) Selection in Scanned Documents for Digital Image Encryption,
IEEE DOI Link 0607

Said, A.,
Measuring the Strength of Partial Encryption Schemes,
ICIP05(II: 1126-1129).
IEEE DOI Link 0512

Watanabe, O., Nakazaki, A., Kiya, H.,
A fast image-scramble method using public-key encryption allowing backward compatibility with jpeg2000,
ICIP04(V: 3435-3438).
IEEE DOI Link 0505

Katzenbeisser, S.[Stefan],
On the Integration of Watermarks and Cryptography,
WWW Version. 0405

Li, S.J.[Shu-Jun], Zheng, X.[Xuan],
On the security of an image encryption method,
ICIP02(II: 925-928).
IEEE DOI Link 0210

Yamaguchi, Y.S.[Yasu-Shi],
An Extended Visual Cryptography Scheme for Continuous-Tone Images,
Springer DOI Link 1208

Nakajima, M., Yamaguchi, Y.S.[Yasu-Shi],
Extended Visual Cryptography for Natural Images,
HTML Version. 0209

Han, K., Tewfik, A.,
Scalable Cryptographic Scheme for Networked Multimedia Applications,
ICIP01(III: 987-990).
IEEE DOI Link 0108

Chen, Y.C., Chang, L.W.,
A Secure and Robust Digital Watermarking Technique by the Block Cipher Rc6 and Secure Hash Algorithm,
ICIP01(II: 518-521).
IEEE DOI Link 0108

Depovere, G., Kalker, T.,
Secret Key Watermarking with Changing Keys,
ICIP00(Vol I: 427-429).
IEEE DOI Link 0008

Bhattacharjee, S., Kutter, M.,
Compression tolerant image authentication,
ICIP98(I: 435-439).
IEEE DOI Link 9810

Creusere, C.D., Mitra, S.K.,
Efficient image scrambling using polyphase filter banks,
ICIP94(II: 81-85).
IEEE DOI Link 9411

Chapter on OCR, Document Analysis and Character Recognition Systems continues in
Watermarks: Extraction, Detection or Recovery .

Last update:Oct 24, 2014 at 11:22:31