@article{bb359300,
AUTHOR = "Zhao, R. and Zhang, Y.S. and Lan, R. and Yi, S. and Hua, Z.Y. and Weng, J.",
TITLE = "All Roads Lead to Rome: Achieving 3D Object Encryption Through 2D
Image Encryption Methods",
JOURNAL = IP,
VOLUME = "34",
YEAR = "2025",
PAGES = "1075-1089",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353523"}
@article{bb359301,
AUTHOR = "Fan, L. and Li, M. and Hu, Z. and Hong, Y. and Kong, D.",
TITLE = "DNGG: Medical Image Lossless Encryption via Deep Network Guided
Generative",
JOURNAL = SPLetters,
VOLUME = "32",
YEAR = "2025",
PAGES = "1331-1335",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353524"}
@article{bb359302,
AUTHOR = "Wu, X.T. and Song, B. and Fang, J. and Yan, W. and Peng, Q.Y.",
TITLE = "CRP2-VCS: Contrast-Oriented Region-Based Progressive Probabilistic
Visual Cryptography Schemes",
JOURNAL = CirSysVideo,
VOLUME = "35",
YEAR = "2025",
NUMBER = "6",
MONTH = "June",
PAGES = "5501-5517",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353525"}
@article{bb359303,
AUTHOR = "He, G.H. and Ren, Y.L. and Cai, X.Q. and Feng, G.R. and Zhang, X.P.",
TITLE = "Private Sampling of Latent Diffusion Models for Encrypted Prompt",
JOURNAL = CirSysVideo,
VOLUME = "35",
YEAR = "2025",
NUMBER = "6",
MONTH = "June",
PAGES = "5833-5843",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353526"}
@article{bb359304,
AUTHOR = "Lai, Q. and Ji, L.",
TITLE = "A Bidirectional Cross-Scrambling Medical Image Encryption Scheme
Incorporates Compressed Sensing and Its Application in IoMT",
JOURNAL = CirSysVideo,
VOLUME = "35",
YEAR = "2025",
NUMBER = "8",
MONTH = "August",
PAGES = "7697-7705",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353527"}
@article{bb359305,
AUTHOR = "Gao, S. and Iu, H.H.C. and Erkan, U. and Simsek, C. and Toktas, A. and Cao, Y. and Wu, R. and Mou, J. and Li, Q. and Wang, C.P.",
TITLE = "A 3D Memristive Cubic Map With Dual Discrete Memristors: Design,
Implementation, and Application in Image Encryption",
JOURNAL = CirSysVideo,
VOLUME = "35",
YEAR = "2025",
NUMBER = "8",
MONTH = "August",
PAGES = "7706-7718",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353528"}
@article{bb359306,
AUTHOR = "Tang, J.B. and Jiang, X.X. and Huang, C.Y. and Ding, C. and Deng, M. and Huang, Z.Y. and Duan, J. and Zhu, X.Y.",
TITLE = "Texture-Adaptive Hierarchical Encryption Method for Large-Scale HR
Remote Sensing Image Data",
JOURNAL = RS,
VOLUME = "17",
YEAR = "2025",
NUMBER = "17",
PAGES = "2940",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353529"}
@article{bb359307,
AUTHOR = "Safdar, M.U. and Shah, T. and Ali, A.",
TITLE = "Multiple-image encryption algorithm based on S-boxes and DNA
sequences",
JOURNAL = SP:IC,
VOLUME = "138",
YEAR = "2025",
PAGES = "117353",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353530"}
@article{bb359308,
AUTHOR = "Xiao, H.F. and Yang, Y. and Xiang, T.",
TITLE = "Visual Content Revealing From Perceptually Encrypted Images",
JOURNAL = CirSysVideo,
VOLUME = "35",
YEAR = "2025",
NUMBER = "9",
MONTH = "September",
PAGES = "8893-8906",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353531"}
@article{bb359309,
AUTHOR = "Nikhil, U.V. and Stamenkovic, Z. and Raja, S.P.",
TITLE = "A Study of Elliptic Curve Cryptography and Its Applications",
JOURNAL = IJIG,
VOLUME = "25",
YEAR = "2025",
NUMBER = "6",
MONTH = "November",
PAGES = "2550062",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353532"}
@article{bb359310,
AUTHOR = "Yung, C. and Huang, S.C.H. and Wu, H.C. and Li, C.H.",
TITLE = "Novel Secure and Robust Recoverable Cryptographic Mosaic Technique",
JOURNAL = MultMed,
VOLUME = "27",
YEAR = "2025",
PAGES = "7137-7151",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353533"}
@inproceedings{bb359311,
AUTHOR = "Zhao, Z. and Zhou, X.Y. and Ou, W.",
TITLE = "Non-uniform Thumbnail-preserving Encryption with Color Retention
after Channel Scrambling",
BOOKTITLE = ICIVC24,
YEAR = "2024",
PAGES = "251-256",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353534"}
@inproceedings{bb359312,
AUTHOR = "Chen, Z.K. and Jiang, M. and Chen, J.H. and Zhou, Y.G.",
TITLE = "Visual cryptography scheme by freeform optics based on optimal mass
transport",
BOOKTITLE = CVIDL23,
YEAR = "2023",
PAGES = "42-46",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353535"}
@inproceedings{bb359313,
AUTHOR = "Rai, D. and Rajput, S.S. and Arya, K.V. and Pranav, P. and Singh, S. and Sinha, A.",
TITLE = "Advanced Encryption Standard (AES) Based Robust Watermarking Scheme",
BOOKTITLE = ICCVMI23,
YEAR = "2023",
PAGES = "1-4",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353536"}
@inproceedings{bb359314,
AUTHOR = "Peng, H.W. and Huang, S.Y. and Zhou, T. and Luo, Y. and Wang, C.H. and Wang, Z. and Zhao, J.H. and Xie, X. and Li, A. and Geng, T. and Mahmood, K. and Wen, W. and Xu, X.L. and Ding, C.",
TITLE = "AutoReP: Automatic ReLU Replacement for Fast Private Network
Inference",
BOOKTITLE = ICCV23,
YEAR = "2023",
PAGES = "5155-5165",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353537"}
@inproceedings{bb359315,
AUTHOR = "Ma, L.F. and Fang, H. and Wei, T.Y. and Yang, Z.J. and Ma, Z. and Zhang, W.M. and Yu, N.H.",
TITLE = "A Geometric Distortion Immunized Deep Watermarking Framework with
Robustness Generalizability",
BOOKTITLE = ECCV24,
YEAR = "2024",
PAGES = "LXVII: 268-285",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353538"}
@inproceedings{bb359316,
AUTHOR = "Chen, Y.L. and Yao, Y.Z. and Yu, N.H.",
TITLE = "Image Translation-Based Deniable Encryption against Model Extraction
Attack",
BOOKTITLE = ICIP23,
YEAR = "2023",
PAGES = "1330-1334",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353539"}
@inproceedings{bb359317,
AUTHOR = "Puteaux, P. and Puech, W.",
TITLE = "Localization and Correction of Corrupted Pixel Blocks in Noisy
Encrypted Images",
BOOKTITLE = IPTA20,
YEAR = "2020",
PAGES = "1-6",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353540"}
@inproceedings{bb359318,
AUTHOR = "Zheng, H.Y. and Huang, Y.W. and Li, L. and Xiao, D.",
TITLE = "Compressive Sensing-Based Image Encryption and Authentication in
Edge-Clouds",
BOOKTITLE = MMMod22,
YEAR = "2022",
PAGES = "II:382-393",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353541"}
@inproceedings{bb359319,
AUTHOR = "Tian, J. and Zhou, J.T. and Duan, J.",
TITLE = "Probabilistic Selective Encryption of Convolutional Neural Networks
for Hierarchical Services",
BOOKTITLE = CVPR21,
YEAR = "2021",
PAGES = "2205-2214",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353542"}
@inproceedings{bb359320,
AUTHOR = "Chmielewski, L.J. and Orlowski, A.",
TITLE = "Does Randomness in the Random Visual Cryptography Protocol Depend on
the Period of Pseudorandom Number Generators?",
BOOKTITLE = ICCVG20,
YEAR = "2020",
PAGES = "36-47",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353543"}
@inproceedings{bb359321,
AUTHOR = "Bian, S. and Wang, T.C. and Hiromoto, M. and Shi, Y. and Sato, T.",
TITLE = "ENSEI: Efficient Secure Inference via Frequency-Domain Homomorphic
Convolution for Privacy-Preserving Visual Recognition",
BOOKTITLE = CVPR20,
YEAR = "2020",
PAGES = "9400-9409",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353544"}
@inproceedings{bb359322,
AUTHOR = "Puteaux, P. and Puech, W.",
TITLE = "Image Analysis and Processing in the Encrypted Domain",
BOOKTITLE = ICIP19,
YEAR = "2019",
PAGES = "3020-3022",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353545"}
@inproceedings{bb359323,
AUTHOR = "Lee, S. and Huang, Y. and Lin, J.",
TITLE = "WEB-VC: Visual Cryptography for Web Image",
BOOKTITLE = ICIP19,
YEAR = "2019",
PAGES = "4055-4059",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353546"}
@inproceedings{bb359324,
AUTHOR = "Bellafqira, R. and Coatrieux, G. and Genin, E. and Cozic, M.",
TITLE = "Secure Multilayer Perceptron Based on Homomorphic Encryption",
BOOKTITLE = IWDW18,
YEAR = "2018",
PAGES = "322-336",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353547"}
@inproceedings{bb359325,
AUTHOR = "Liu, Z. and Yang, M.L. and Yan, W.Q.",
TITLE = "Image encryption based on double random phase encoding",
BOOKTITLE = IVCNZ17,
YEAR = "2017",
PAGES = "1-6",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353548"}
@inproceedings{bb359326,
AUTHOR = "Touil, H. and Akkad, N.E. and Satori, K.",
TITLE = "Text Encryption:
Hybrid cryptographic method using Vigenere and Hill Ciphers.",
BOOKTITLE = ISCV20,
YEAR = "2020",
PAGES = "1-6",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353549"}
@inproceedings{bb359327,
AUTHOR = "Es sabry, M. and El Akkad, N. and Merras, M. and Saaidi, A. and Satori, K.",
TITLE = "Grayscale image encryption using shift bits operations",
BOOKTITLE = ISCV18,
YEAR = "2018",
PAGES = "1-7",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353550"}
@inproceedings{bb359328,
AUTHOR = "Hamici, Z.",
TITLE = "Image cryptography based on the imitation of gene fusion and
horizontal gene transfer",
BOOKTITLE = IPTA17,
YEAR = "2017",
PAGES = "1-6",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353551"}
@inproceedings{bb359329,
AUTHOR = "Kang, X. and Han, Z. and Yu, A. and Duan, P.",
TITLE = "Double random scrambling encoding in the RPMPFrHT domain",
BOOKTITLE = ICIP17,
YEAR = "2017",
PAGES = "4362-4366",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353552"}
@inproceedings{bb359330,
AUTHOR = "Yonetani, R. and Boddeti, V.N. and Kitani, K.M. and Sato, Y.",
TITLE = "Privacy-Preserving Visual Learning Using Doubly Permuted Homomorphic
Encryption",
BOOKTITLE = ICCV17,
YEAR = "2017",
PAGES = "2059-2069",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353553"}
@inproceedings{bb359331,
AUTHOR = "Zhang, Y. and Li, X.Q. and Hou, W.G.",
TITLE = "A fast image encryption scheme based on AES",
BOOKTITLE = ICIVC17,
YEAR = "2017",
PAGES = "624-628",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353554"}
@inproceedings{bb359332,
AUTHOR = "Shen, G. and Liu, F. and Fu, Z.X. and Yu, B. and Wang, W.",
TITLE = "Halftone Visual Cryptography with Complementary Cover Images",
BOOKTITLE = IWDW16,
YEAR = "2016",
PAGES = "223-237",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353555"}
@inproceedings{bb359333,
AUTHOR = "Wang, W. and Liu, F. and Guo, T. and Ren, Y.W.",
TITLE = "Temporal Integration Based Visual Cryptography Scheme and Its
Application",
BOOKTITLE = IWDW17,
YEAR = "2017",
PAGES = "406-419",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353556"}
@inproceedings{bb359334,
AUTHOR = "Ren, Y.W. and Liu, F. and Wang, W.",
TITLE = "Collusive Attacks to Partition Authentication Visual Cryptography
Scheme",
BOOKTITLE = IWDW16,
YEAR = "2016",
PAGES = "238-250",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353557"}
@inproceedings{bb359335,
AUTHOR = "Dutta, S. and Roy, P.S. and Adhikari, A. and Sakurai, K.",
TITLE = "On the Robustness of Visual Cryptographic Schemes",
BOOKTITLE = IWDW16,
YEAR = "2016",
PAGES = "251-262",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353558"}
@inproceedings{bb359336,
AUTHOR = "Goel, A. and Chaudhari, K.",
TITLE = "Median based pixel selection for partial image encryption",
BOOKTITLE = IPTA16,
YEAR = "2016",
PAGES = "1-5",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353559"}
@inproceedings{bb359337,
AUTHOR = "Wen, W. and Zhang, Y. and Fang, Y. and Fang, Z.",
TITLE = "A novel selective image encryption method based on saliency detection",
BOOKTITLE = VCIP16,
YEAR = "2016",
PAGES = "1-4",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353560"}
@inproceedings{bb359338,
AUTHOR = "Fatahbeygi, A. and Akhlaghian, F.",
TITLE = "A new robust semi-blind image watermarking based on block
classification and visual cryptography",
BOOKTITLE = IPRIA15,
YEAR = "2015",
PAGES = "1-6",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353561"}
@inproceedings{bb359339,
AUTHOR = "Belkaid, B.M. and Mourad, L. and Mehdi, C. and Soltane, A.",
TITLE = "Secure transfer of medical images using hybrid encryption:
Authentication, confidentiality, integrity",
BOOKTITLE = ICCVIA15,
YEAR = "2015",
PAGES = "1-6",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353562"}
@inproceedings{bb359340,
AUTHOR = "Jolfaei, A. and Wu, X.W. and Muthukkumarasamy, V.",
TITLE = "A Secure Lightweight Texture Encryption Scheme",
BOOKTITLE = VSWS15,
YEAR = "2015",
PAGES = "344-356",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353563"}
@inproceedings{bb359341,
AUTHOR = "Wang, D.S. and Yi, F. and Yang, C.N.",
TITLE = "Visual Cryptography Scheme with Autostereogram",
BOOKTITLE = IWDW14,
YEAR = "2014",
PAGES = "364-375",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353564"}
@inproceedings{bb359342,
AUTHOR = "Chen, Y.C. and Lu, K.H. and Tso, R.L. and Wu, M.E.",
TITLE = "An Improved Visual Cryptography with Cheating Prevention",
BOOKTITLE = IWDW14,
YEAR = "2014",
PAGES = "444-454",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353565"}
@inproceedings{bb359343,
AUTHOR = "Liu, F. and Wu, C.K.",
TITLE = "Optimal XOR Based (2,n)-Visual Cryptography Schemes",
BOOKTITLE = IWDW14,
YEAR = "2014",
PAGES = "333-349",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353566"}
@inproceedings{bb359344,
AUTHOR = "Liu, S.C. and Fujiyoshi, M. and Kiya, H.",
TITLE = "A cheat preventing method with efficient pixel expansion for
Naor-Shamir's visual cryptography",
BOOKTITLE = ICIP14,
YEAR = "2014",
PAGES = "5527-5531",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353567"}
@inproceedings{bb359345,
AUTHOR = "Eluard, M. and Maetz, Y. and Doerr, G.",
TITLE = "Impact of geometry-preserving encryption on rendering time",
BOOKTITLE = ICIP14,
YEAR = "2014",
PAGES = "4787-4791",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353568"}
@inproceedings{bb359346,
AUTHOR = "Moreno Canadas, A. and Palma Vanegas, N.P. and Hernandez Quitian, M.",
TITLE = "Visual Cryptography Schemes Based in k -Linear Maps",
BOOKTITLE = IWDW13,
YEAR = "2013",
PAGES = "288-302",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353569"}
@inproceedings{bb359347,
AUTHOR = "Panduranga, H.T. and Kumar, H.S.S. and Kumar, S.K.N.",
TITLE = "Hybrid approach for dual image encryption using nibble exchange and
Hill-cipher",
BOOKTITLE = IMVIP12,
YEAR = "2012",
PAGES = "101-104",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353570"}
@inproceedings{bb359348,
AUTHOR = "Liu, F. and Guo, T. and Wu, C. and Yang, C.N.",
TITLE = "Flexible Visual Cryptography Scheme without Distortion",
BOOKTITLE = IWDW11,
YEAR = "2011",
PAGES = "211-227",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353571"}
@inproceedings{bb359349,
AUTHOR = "Di, H. and Zheng, K.F. and Niu, X.X. and Zhang, X.",
TITLE = "Multiple-image compressed encryption and decryption by compressive
holography",
BOOKTITLE = VCIP11,
YEAR = "2011",
PAGES = "1-4",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353572"}
@inproceedings{bb359350,
AUTHOR = "Bajaj, N. and Thakur, A.",
TITLE = "Enhancement of RC5 for image encryption",
BOOKTITLE = ICIIP11,
YEAR = "2011",
PAGES = "1-5",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353573"}
@inproceedings{bb359351,
AUTHOR = "Petrauskiene, V. and Ragulskiene, J. and Sakyte, E. and Ragulskis, M.",
TITLE = "Near-Optimal Time Function for Secure Dynamic Visual Cryptography",
BOOKTITLE = ISVC11,
YEAR = "2011",
PAGES = "II: 300-309",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353574"}
@inproceedings{bb359352,
AUTHOR = "Zhao, L. and Adhikari, A. and Sakurai, K.",
TITLE = "A New Scrambling Evaluation Scheme Based on Spatial Distribution
Entropy and Centroid Difference of Bit-Plane",
BOOKTITLE = DW10,
YEAR = "2010",
PAGES = "29-44",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353575"}
@inproceedings{bb359353,
AUTHOR = "Zhao, L. and Adhikari, A. and Xiao, D. and Sakurai, K.",
TITLE = "Cryptanalysis on an Image Scrambling Encryption Scheme Based on Pixel
Bit",
BOOKTITLE = DW10,
YEAR = "2010",
PAGES = "45-59",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353576"}
@inproceedings{bb359354,
AUTHOR = "Mayouf, M.A. and Shukur, Z.",
TITLE = "Using Animation in Active Learning Tool to Detect Possible Attacks in
Cryptographic Protocols",
BOOKTITLE = IVIC09,
YEAR = "2009",
PAGES = "510-520",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353577"}
@inproceedings{bb359355,
AUTHOR = "Rane, S.D. and Sun, W. and Vetro, A.",
TITLE = "Secure distortion computation among untrusting parties using
homomorphic encryption",
BOOKTITLE = ICIP09,
YEAR = "2009",
PAGES = "1485-1488",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353578"}
@inproceedings{bb359356,
AUTHOR = "Zhang, J.H. and Chen, H. and Geng, Q.",
TITLE = "Cryptoanalysis of Certificateless Partially Blind Signature and Proxy
Blind Signature Scheme",
BOOKTITLE = CISP09,
YEAR = "2009",
PAGES = "1-5",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353579"}
@inproceedings{bb359357,
AUTHOR = "Zhang, J.H. and Gao, S.N.",
TITLE = "Cryptoanlaysis of Two Proxy Blind Signature Schemes with Proxy
Revocation",
BOOKTITLE = CISP09,
YEAR = "2009",
PAGES = "1-4",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353580"}
@inproceedings{bb359358,
AUTHOR = "Lang, J. and Tao, R. and Wang, Y.",
TITLE = "The Generalized Weighted Fractional Fourier Transform and its
Application to Image Encryption",
BOOKTITLE = CISP09,
YEAR = "2009",
PAGES = "1-5",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353581"}
@inproceedings{bb359359,
AUTHOR = "Xiao, Y. and Zhang, H.Y. and Ran, Q.W. and Zhang, J. and Tan, L.Y.",
TITLE = "Image Encryption and Two Dimensional Discrete M-Parameter Fractional
Fourier Transform",
BOOKTITLE = CISP09,
YEAR = "2009",
PAGES = "1-4",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353582"}
@inproceedings{bb359360,
AUTHOR = "Weir, J. and Yan, W.Q.",
TITLE = "Authenticating Visual Cryptography Shares Using 2D Barcodes",
BOOKTITLE = IWDW11,
YEAR = "2011",
PAGES = "196-210",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353583"}
@inproceedings{bb359361,
AUTHOR = "Weir, J. and Yan, W.Q.",
TITLE = "Plane Transform Visual Cryptography",
BOOKTITLE = DW10,
YEAR = "2010",
PAGES = "60-74",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353584"}
@inproceedings{bb359362,
AUTHOR = "Weir, J. and Yan, W.Q.",
TITLE = "Image Hatching for Visual Cryptography",
BOOKTITLE = IMVIP09,
YEAR = "2009",
PAGES = "59-64",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353585"}
@inproceedings{bb359363,
AUTHOR = "Weir, J. and Yan, W.Q.",
TITLE = "Dot-Size Variant Visual Cryptography",
BOOKTITLE = DW09,
YEAR = "2009",
PAGES = "136-148",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353586"}
@inproceedings{bb359364,
AUTHOR = "Piper, F.",
TITLE = "The Changing Face of Cryptography",
BOOKTITLE = DW09,
YEAR = "2009",
PAGES = "2",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353587"}
@inproceedings{bb359365,
AUTHOR = "Du, Y.F. and Zhang, J. and Su, Y.T.",
TITLE = "Watermarking for Authentication of LZ-77 Compressed Documents",
BOOKTITLE = DW07,
YEAR = "2007",
PAGES = "365-372",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353588"}
@inproceedings{bb359366,
AUTHOR = "Luo, H. and Lu, Z.M. and Pan, J.S.",
TITLE = "Multiple Watermarking in Visual Cryptography",
BOOKTITLE = DW07,
YEAR = "2007",
PAGES = "60-70",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353589"}
@inproceedings{bb359367,
AUTHOR = "Sadeghi, A.R.",
TITLE = "The Marriage of Cryptography and Watermarking:
Beneficial and Challenging for Secure Watermarking and Detection",
BOOKTITLE = DW07,
YEAR = "2007",
PAGES = "2-18",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353590"}
@inproceedings{bb359368,
AUTHOR = "He, D. and Jagmohan, A. and Lu, L.G.",
TITLE = "Secure collaboration using Slepian-Wolf codes",
BOOKTITLE = ICIP08,
YEAR = "2008",
PAGES = "2216-2219",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353591"}
@inproceedings{bb359369,
AUTHOR = "Seshadrinathan, M. and Dempski, K.L.",
TITLE = "Implementation of Advanced Encryption Standard for encryption and
decryption of images and text on a GPU",
BOOKTITLE = CVGPU08,
YEAR = "2008",
PAGES = "1-6",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353592"}
@inproceedings{bb359370,
AUTHOR = "Alface, P.R. and Macq, B. and Cayre, F.",
TITLE = "Blind and Robust Watermarking of 3D Models:
How to Withstand the Cropping Attack?",
BOOKTITLE = ICIP07,
YEAR = "2007",
PAGES = "V: 465-468",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353593"}
@inproceedings{bb359371,
AUTHOR = "Huang, T.J.",
TITLE = "Evolvement of DRM Schema: From Encryption to Interoperability and
Monitoring",
BOOKTITLE = MCAM07,
YEAR = "2007",
PAGES = "65-75",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353594"}
@inproceedings{bb359372,
AUTHOR = "Lai, J.C. and Wang, C.H.",
TITLE = "Buffer Occupancy Feedback Security Control and Changing Encryption Keys
to Protect MOD Services",
BOOKTITLE = PSIVT06,
YEAR = "2006",
PAGES = "888-897",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353595"}
@inproceedings{bb359373,
AUTHOR = "Li, W.H. and Yuan, Y.",
TITLE = "Visual Information Encryption in Frequency Domain: Risk and Enhancement",
BOOKTITLE = IWICPAS06,
YEAR = "2006",
PAGES = "225-234",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353596"}
@inproceedings{bb359374,
AUTHOR = "Wong, A. and Bishop, W.",
TITLE = "Expert Knowledge Based Automatic Regions-of-Interest (ROI) Selection in
Scanned Documents for Digital Image Encryption",
BOOKTITLE = CRV06,
YEAR = "2006",
PAGES = "51-51",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353597"}
@inproceedings{bb359375,
AUTHOR = "Said, A.",
TITLE = "Measuring the Strength of Partial Encryption Schemes",
BOOKTITLE = ICIP05,
YEAR = "2005",
PAGES = "II: 1126-1129",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353598"}
@inproceedings{bb359376,
AUTHOR = "Katzenbeisser, S.",
TITLE = "On the Integration of Watermarks and Cryptography",
BOOKTITLE = DW03,
YEAR = "2003",
PAGES = "50-60",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353599"}
@inproceedings{bb359377,
AUTHOR = "Li, S.J. and Zheng, X.",
TITLE = "On the security of an image encryption method",
BOOKTITLE = ICIP02,
YEAR = "2002",
PAGES = "II: 925-928",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353600"}
@inproceedings{bb359378,
AUTHOR = "Yamaguchi, Y.S.",
TITLE = "An Extended Visual Cryptography Scheme for Continuous-Tone Images",
BOOKTITLE = IWDW11,
YEAR = "2011",
PAGES = "228-242",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353601"}
@inproceedings{bb359379,
AUTHOR = "Nakajima, M. and Yamaguchi, Y.S.",
TITLE = "Extended Visual Cryptography for Natural Images",
BOOKTITLE = WSCG02,
YEAR = "2002",
PAGES = "303",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353602"}
@inproceedings{bb359380,
AUTHOR = "Chen, Y.C. and Chang, L.W.",
TITLE = "A Secure and Robust Digital Watermarking Technique by the Block Cipher
Rc6 and Secure Hash Algorithm",
BOOKTITLE = ICIP01,
YEAR = "2001",
PAGES = "II: 518-521",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353603"}
@inproceedings{bb359381,
AUTHOR = "Bhattacharjee, S. and Kutter, M.",
TITLE = "Compression tolerant image authentication",
BOOKTITLE = ICIP98,
YEAR = "1998",
PAGES = "I: 435-439",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353604"}
@inproceedings{bb359382,
AUTHOR = "Creusere, C.D. and Mitra, S.K.",
TITLE = "Efficient image scrambling using polyphase filter banks",
BOOKTITLE = ICIP94,
YEAR = "1994",
PAGES = "II: 81-85",
BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT353605"}
@article{bb359383,
AUTHOR = "Scharinger, J.",
TITLE = "Fast Encryption of Image Data Using Chaotic Kolmogorov Flows",
JOURNAL = JEI,
VOLUME = "7",
YEAR = "1998",
NUMBER = "2",
MONTH = "April",
PAGES = "318-325",
BIBSOURCE = "http://www.visionbib.com/bibliography/char996chaocry4.html#TT353606"}
@article{bb359384,
AUTHOR = "Yen, J.C. and Guo, J.I.",
TITLE = "Efficient hierarchical chaotic image encryption algorithm and its VLSI
realisation",
JOURNAL = VISP,
VOLUME = "147",
YEAR = "2000",
NUMBER = "2",
MONTH = "April",
PAGES = "167",
BIBSOURCE = "http://www.visionbib.com/bibliography/char996chaocry4.html#TT353607"}
@article{bb359385,
AUTHOR = "Pareek, N.K. and Patidar, V. and Sud, K.K.",
TITLE = "Image encryption using chaotic logistic map",
JOURNAL = IVC,
VOLUME = "24",
YEAR = "2006",
NUMBER = "9",
MONTH = "September",
PAGES = "926-934",
BIBSOURCE = "http://www.visionbib.com/bibliography/char996chaocry4.html#TT353608"}
@article{bb359386,
AUTHOR = "Tong, X.J. and Cui, M.G.",
TITLE = "Image encryption with compound chaotic sequence cipher shifting
dynamically",
JOURNAL = IVC,
VOLUME = "26",
YEAR = "2008",
NUMBER = "6",
MONTH = "June",
PAGES = "843-850",
BIBSOURCE = "http://www.visionbib.com/bibliography/char996chaocry4.html#TT353609"}
@article{bb359387,
AUTHOR = "Li, C.Q. and Li, S.J. and Asim, M. and Nunez, J. and Alvarez, G. and Chen, G.R.",
TITLE = "On the security defects of an image encryption scheme",
JOURNAL = IVC,
VOLUME = "27",
YEAR = "2009",
NUMBER = "9",
MONTH = "August",
PAGES = "1371-1381",
BIBSOURCE = "http://www.visionbib.com/bibliography/char996chaocry4.html#TT353610"}
@article{bb359388,
AUTHOR = "Li, C.Q. and Li, S.J. and Chen, G.R. and Halang, W.A.",
TITLE = "Cryptanalysis of an image encryption scheme based on a compound chaotic
sequence",
JOURNAL = IVC,
VOLUME = "27",
YEAR = "2009",
NUMBER = "8",
MONTH = "July",
PAGES = "1035-1039",
BIBSOURCE = "http://www.visionbib.com/bibliography/char996chaocry4.html#TT353611"}
@article{bb359389,
AUTHOR = "Ye, G.D.",
TITLE = "Image scrambling encryption algorithm of pixel bit based on chaos map",
JOURNAL = PRL,
VOLUME = "31",
YEAR = "2010",
NUMBER = "5",
MONTH = "April",
PAGES = "347-354",
BIBSOURCE = "http://www.visionbib.com/bibliography/char996chaocry4.html#TT353612"}
@article{bb359390,
AUTHOR = "Francois, M. and Grosges, T. and Barchiesi, D. and Erra, R.",
TITLE = "A new image encryption scheme based on a chaotic function",
JOURNAL = SP:IC,
VOLUME = "27",
YEAR = "2012",
NUMBER = "3",
MONTH = "March",
PAGES = "249-259",
BIBSOURCE = "http://www.visionbib.com/bibliography/char996chaocry4.html#TT353613"}
@article{bb359391,
AUTHOR = "Zhang, Y.S. and Xiao, D. and Shu, Y. and Li, J.",
TITLE = "A novel image encryption scheme based on a linear hyperbolic chaotic
system of partial differential equations",
JOURNAL = SP:IC,
VOLUME = "28",
YEAR = "2013",
NUMBER = "3",
MONTH = "March",
PAGES = "292-300",
BIBSOURCE = "http://www.visionbib.com/bibliography/char996chaocry4.html#TT353614"}
@article{bb359392,
AUTHOR = "Zhu, H. and Zhao, C. and Zhang, X.D.",
TITLE = "A novel image encryption-compression scheme using hyper-chaos and
Chinese remainder theorem",
JOURNAL = SP:IC,
VOLUME = "28",
YEAR = "2013",
NUMBER = "6",
MONTH = "July",
PAGES = "670-680",
BIBSOURCE = "http://www.visionbib.com/bibliography/char996chaocry4.html#TT353615"}
@article{bb359393,
AUTHOR = "Azzaz, M.S. and Tanougast, C. and Sadoudi, S. and Dandache, A.",
TITLE = "Robust chaotic key stream generator for real-time images encryption",
JOURNAL = RealTimeIP,
VOLUME = "8",
YEAR = "2013",
NUMBER = "3",
MONTH = "September",
PAGES = "297-306",
BIBSOURCE = "http://www.visionbib.com/bibliography/char996chaocry4.html#TT353616"}
@article{bb359394,
AUTHOR = "Liu, Y. and Tong, X.J. and Hu, S.",
TITLE = "A family of new complex number chaotic maps based image encryption
algorithm",
JOURNAL = SP:IC,
VOLUME = "28",
YEAR = "2013",
NUMBER = "10",
PAGES = "1548-1559",
BIBSOURCE = "http://www.visionbib.com/bibliography/char996chaocry4.html#TT353617"}
@article{bb359395,
AUTHOR = "Barakat, M.L. and Mansingka, A.S. and Radwan, A.G. and Salama, K.N.",
TITLE = "Hardware stream cipher with controllable chaos generator for colour
image encryption",
JOURNAL = IET-IPR,
VOLUME = "8",
YEAR = "2014",
NUMBER = "1",
MONTH = "January",
PAGES = "33-43",
BIBSOURCE = "http://www.visionbib.com/bibliography/char996chaocry4.html#TT353618"}
@article{bb359396,
AUTHOR = "Caragata, D. and Tutanescu, I.",
TITLE = "On the security of a new image encryption scheme based on a chaotic
function",
JOURNAL = SIViP,
VOLUME = "8",
YEAR = "2014",
NUMBER = "4",
MONTH = "May",
PAGES = "641-646",
BIBSOURCE = "http://www.visionbib.com/bibliography/char996chaocry4.html#TT353619"}
@article{bb359397,
AUTHOR = "Ghebleh, M. and Kanso, A. and Noura, H.",
TITLE = "An image encryption scheme based on irregularly decimated chaotic
maps",
JOURNAL = SP:IC,
VOLUME = "29",
YEAR = "2014",
NUMBER = "5",
PAGES = "618-627",
BIBSOURCE = "http://www.visionbib.com/bibliography/char996chaocry4.html#TT353620"}
@article{bb359398,
AUTHOR = "Dong, C.",
TITLE = "Color image encryption using one-time keys and coupled chaotic
systems",
JOURNAL = SP:IC,
VOLUME = "29",
YEAR = "2014",
NUMBER = "5",
PAGES = "628-640",
BIBSOURCE = "http://www.visionbib.com/bibliography/char996chaocry4.html#TT353621"}
@article{bb359399,
AUTHOR = "Zhang, X.P. and Zhao, Z.M. and Wang, J.Y.",
TITLE = "Chaotic image encryption based on circular substitution box and key
stream buffer",
JOURNAL = SP:IC,
VOLUME = "29",
YEAR = "2014",
NUMBER = "8",
PAGES = "902-913",
BIBSOURCE = "http://www.visionbib.com/bibliography/char996chaocry4.html#TT353622"}
Last update:Nov 26, 2025 at 20:24:09