Chuang, T.J.,
Lin, J.C.,
New Approach to Image Encryption,
JEI(7), No. 2, April 1998, pp. 350-356.
9807
BibRef
Chung, K.L.,
Chang, L.C.,
Large Encrypting Binary Images with Higher Security,
PRL(19), No. 5-6, April 1998, pp. 461-468.
9808
See also Cryptanalysis of an encryption scheme for binary images.
BibRef
Aikawa, M.,
Takaragi, K.,
Furuya, S.,
Sasamoto, M.,
A Lightweight Encryption Method Suitable For Copyright Protection,
Consumer(44), No. 3, August 1998, pp. 902-910.
9810
BibRef
Maniccam, S.S.,
Bourbakis, N.G.,
Lossless image compression and encryption using SCAN,
PR(34), No. 6, June 2001, pp. 1229-1245.
Elsevier DOI
0103
Encryption.
BibRef
Maniccam, S.S.,
Bourbakis, N.G.,
Image and video encryption using SCAN patterns,
PR(37), No. 4, April 2004, pp. 725-737.
Elsevier DOI
0403
BibRef
Chang, C.C.[Chin-Chen],
Chuang, J.C.[Jun-Chou],
An image intellectual property protection scheme for gray-level images
using visual secret sharing strategy,
PRL(23), No. 8, June 2002, pp. 931-941.
Elsevier DOI
0204
BibRef
Chang, C.C.[Chin-Chen],
Yu, T.X.[Tai-Xing],
Cryptanalysis of an encryption scheme for binary images,
PRL(23), No. 14, December 2002, pp. 1847-1852.
Elsevier DOI
0208
Shows how earlier method (
See also Large Encrypting Binary Images with Higher Security. ) can be broken.
BibRef
Chang, C.C.,
Hwang, K.F.,
Hwang, M.S.,
Robust authentication scheme for protecting copyrights of images and
graphics,
VISP(149), No. 1, February 2002, pp. 43-50.
IEEE Top Reference.
0205
BibRef
Lin, C.C.[Chang-Chou],
Tsai, W.H.[Wen-Hsiang],
Visual cryptography for gray-level images by dithering techniques,
PRL(24), No. 1-3, January 2003, pp. 349-358.
Elsevier DOI
0211
BibRef
Hou, Y.C.[Young-Chang],
Visual cryptography for color images,
PR(36), No. 7, July 2003, pp. 1619-1629.
Elsevier DOI
0304
BibRef
Zhao, Y.,
Campisi, P.,
Kundur, D.,
Dual Domain Watermarking for Authentication and Compression of Cultural
Heritage Images,
IP(13), No. 3, March 2004, pp. 430-448.
IEEE DOI
0404
BibRef
Maiorana, E.[Emanuele],
Campisi, P.[Patrizio],
High-capacity watermarking of high dynamic range images,
JIVP(2016), No. 1, 2016, pp. 3.
DOI Link
1601
BibRef
Lukac, R.[Rastislav],
Plataniotis, K.N.[Konstantinos N.],
Bit-level based secret sharing for image encryption,
PR(38), No. 5, May 2005, pp. 767-772.
Elsevier DOI
0501
BibRef
Earlier:
Document image secret sharing using bit-level processing,
ICIP04(V: 2893-2896).
IEEE DOI
0505
BibRef
Lukac, R.[Rastislav],
Plataniotis, K.N.[Konstantinos N.],
A cost-effective encryption scheme for color images,
RealTimeImg(11), No. 5-6, October-December 2005, pp. 454-464.
Elsevier DOI
0510
BibRef
Heidarinejad, M.[Mohsen],
Plataniotis, K.N.[Konstantinos N.],
A second generation Visual Secret Sharing scheme for color images,
ICIP08(481-484).
IEEE DOI
0810
BibRef
Celik, M.U.,
Sharma, G.,
Tekalp, A.M.,
Lossless Watermarking for Image Authentication:
A New Framework and an Implementation,
IP(15), No. 4, April 2006, pp. 1042-1049.
IEEE DOI
0604
BibRef
Wang, R.Z.[Ran-Zan],
Region Incrementing Visual Cryptography,
SPLetters(16), No. 8, August 2009, pp. 659-662.
IEEE DOI
0906
BibRef
Amador, J.J.[José J.],
Green, R.W.[Robert W.],
Symmetric-key block cipher for image and text cryptography,
IJIST(15), No. 3, 2005, pp. 178-188.
DOI Link
0510
BibRef
Hu, C.M.,
Tzeng, W.G.,
Cheating Prevention in Visual Cryptography,
IP(16), No. 1, January 2007, pp. 36-45.
IEEE DOI
0701
See also Comment on Cheating Prevention in Visual Cryptography.
BibRef
Chen, R.J.[Rong-Jian],
Lai, J.L.[Jui-Lin],
Image security system using recursive cellular automata substitution,
PR(40), No. 5, May 2007, pp. 1621-1631.
Elsevier DOI
0702
Image processing; Cellular automata; Image security; Encryption; Decryption
BibRef
Wang, D.S.[Dao-Shun],
Zhang, L.[Lei],
Ma, N.[Ning],
Li, X.B.[Xiao-Bo],
Two secret sharing schemes based on Boolean operations,
PR(40), No. 10, October 2007, pp. 2776-2785.
Elsevier DOI
0707
Secret sharing scheme; Visual secret sharing; Visual cryptography;
Computation complexity; Pixel expansion
BibRef
Yang, C.N.[Ching-Nung],
Yu, K.H.[Kun-Hsuan],
Lukac, R.[Rastislav],
User-friendly image sharing using polynomials with different primes,
IJIST(17), No. 1, 2007, pp. 40-47.
DOI Link
0707
BibRef
Lin, S.J.[Sian-Jheng],
Lin, J.C.[Ja-Chen],
VCPSS: A two-in-one two-decoding-options image sharing method combining
visual cryptography (VC) and polynomial-style sharing (PSS) approaches,
PR(40), No. 12, December 2007, pp. 3652-3666.
Elsevier DOI
0709
Hiding using block-types; Image sharing; (t,n) threshold scheme;
Halftone version; Compression
BibRef
Shyu, S.J.[Shyong Jian],
Huang, S.Y.[Shih-Yu],
Lee, Y.K.[Yeuan-Kuen],
Wang, R.Z.[Ran-Zan],
Chen, K.[Kun],
Sharing multiple secrets in visual cryptography,
PR(40), No. 12, December 2007, pp. 3633-3651.
Elsevier DOI
0709
Secret sharing; Visual cryptography; Visual multi-secret sharing
BibRef
Fang, W.P.[Wen-Pinn],
Friendly progressive visual secret sharing,
PR(41), No. 4, April 2008, pp. 1410-1414.
Elsevier DOI
0801
Visual cryptography; Progress; Secret sharing; Friendly
BibRef
Li, S.,
Li, C.,
Lo, K.T.,
Chen, G.,
Cryptanalysis of an Image Scrambling Scheme Without Bandwidth Expansion,
CirSysVideo(18), No. 3, March 2008, pp. 338-349.
IEEE DOI
0804
BibRef
Lin, Q.H.[Qiu-Hua],
Yin, F.L.[Fu-Liang],
Mei, T.M.[Tie-Min],
Liang, H.L.[Hua-Lou],
A blind source separation-based method for multiple images encryption,
IVC(26), No. 6, 1 June 2008, pp. 788-798.
Elsevier DOI
0804
Blind source separation; Independent component analysis; Image encryption
BibRef
Yang, C.N.[Ching-Nung],
Chen, T.S.[Tse-Shih],
Colored visual cryptography scheme based on additive color mixing,
PR(41), No. 10, October 2008, pp. 3114-3129.
Elsevier DOI
0808
Visual cryptography; Visual secret sharing; Colored visual cryptography;
Additive color mixing
BibRef
Naughton, T.J.[Thomas J.],
Hennelly, B.M.[Bryan M.],
Dowling, T.[Tom],
Introducing secure modes of operation for optical encryption,
JOSA-A(25), No. 10, October 2008, pp. 2608-2617.
WWW Link.
0810
BibRef
Leung, B.W.[Bert W.],
Ng, F.Y.[Felix Y.],
Wong, D.S.[Duncan S.],
On the security of a visual cryptography scheme for color images,
PR(42), No. 5, May 2009, pp. 929-940.
Elsevier DOI
0902
Visual cryptography; Dithering technology; Color decomposition; Secret
sharing; Cryptanalysis
BibRef
Wang, D.S.[Dao-Shun],
Yi, F.[Feng],
Li, X.B.[Xiao-Bo],
On general construction for extended visual cryptography schemes,
PR(42), No. 11, November 2009, pp. 3071-3082.
Elsevier DOI
0907
Visual cryptography; Secret sharing scheme; Multi-secret images
BibRef
Liu, W.,
Zeng, W.,
Dong, L.,
Yao, Q.,
Efficient Compression of Encrypted Grayscale Images,
IP(19), No. 4, April 2010, pp. 1097-1102.
IEEE DOI
1003
BibRef
Kang, I.,
Arce, G.R.,
Lee, H.K.,
Color Extended Visual Cryptography Using Error Diffusion,
IP(20), No. 1, January 2011, pp. 132-145.
IEEE DOI
1101
BibRef
Hou, Y.C.,
Quan, Z.Y.,
Progressive Visual Cryptography With Unexpanded Shares,
CirSysVideo(21), No. 11, November 2011, pp. 1760-1764.
IEEE DOI
1111
BibRef
Wang, R.Z.[Ran-Zan],
Hsu, S.F.[Shuo-Fang],
Tagged Visual Cryptography,
SPLetters(18), No. 11, November 2011, pp. 627-630.
IEEE DOI
1112
BibRef
Liu, F.[Feng],
Guo, T.[Teng],
Wu, C.K.[Chuan-Kun],
Qian, L.[Lina],
Improving the visual quality of size invariant visual cryptography
scheme,
JVCIR(23), No. 2, February 2012, pp. 331-342.
Elsevier DOI
1201
Visual cryptography; Visual quality; Size invariant; Secret sharing;
Thin line problem; Variance; Multi-pixel encryption; Probabilistic
visual cryptography scheme
BibRef
Imaizumi, S.[Shoko],
Kiya, H.[Hitoshi],
A Block-Permutation-Based Encryption Scheme with Independent Processing
of RGB Components,
IEICE(E101-D), No. 12, December 2018, pp. 3150-3157.
WWW Link.
1812
BibRef
Imaizumi, S.[Shoko],
Ogasawara, T.[Takeshi],
Kiya, H.[Hitoshi],
Block-Permutation-Based Encryption Scheme with Enhanced Color
Scrambling,
SCIA17(I: 562-573).
Springer DOI
1706
BibRef
Shyu, S.J.,
Jiang, H.W.,
Efficient Construction for Region Incrementing Visual Cryptography,
CirSysVideo(22), No. 5, May 2012, pp. 769-777.
IEEE DOI
1202
BibRef
Yang, C.N.,
Shih, H.W.,
Wu, C.C.,
Harn, L.,
k Out of n Region Incrementing Scheme in Visual Cryptography,
CirSysVideo(22), No. 5, May 2012, pp. 799-810.
IEEE DOI
1202
BibRef
Yang, C.N.[Ching-Nung],
Wu, C.C.[Chih-Cheng],
Lin, Y.C.[Yi-Chin],
k Out of n Region-Based Progressive Visual Cryptography,
CirSysVideo(29), No. 1, January 2019, pp. 252-262.
IEEE DOI
1901
BibRef
Earlier: A1, A3, A2:
Cheating Immune Block-Based Progressive Visual Cryptography,
IWDW13(95-108).
Springer DOI
1407
Visualization, Cryptography, Image color analysis,
Image reconstruction, Stacking, Decoding, Visual secret sharing,
progressive decoding
BibRef
Win, L.L.,
Thomas, T.,
Emmanuel, S.,
Privacy Enabled Digital Rights Management Without Trusted Third Party
Assumption,
MultMed(14), No. 3, 2012, pp. 546-554.
IEEE DOI
1202
BibRef
Chen, Y.C.,
Horng, G.,
Tsai, D.S.,
Comment on 'Cheating Prevention in Visual Cryptography',
IP(21), No. 7, July 2012, pp. 3319-3323.
IEEE DOI
1206
See also Cheating Prevention in Visual Cryptography.
BibRef
Dalhoum, A.L.A.[Abdel Latif Abu],
Mahafzah, B.A.[Basel A.],
Awwad, A.A.[Aiman Ayyal],
Aldhamari, I.[Ibraheem],
Ortega, A.[Alfonso],
Alfonseca, M.[Manuel],
Digital Image Scrambling Using 2D Cellular Automata,
MultMedMag(19), No. 4, 2012, pp. 28-36.
IEEE DOI
1210
based on game of life.
BibRef
Lin, H.C.[Hsiao-Ching],
Yang, C.N.[Ching-Nung],
Laih, C.S.[Chi-Sung],
Lin, H.T.[Hui-Tang],
Natural language letter based visual cryptography scheme,
JVCIR(24), No. 3, April 2013, pp. 318-331.
Elsevier DOI
1303
Deterministic VCS; Letter-based; Natural language; Probabilistic VCS;
Secret sharing; Subpixel; Visual cryptography scheme; Visual secret
sharing
BibRef
Lima, J.B.,
Lima, E.A.O.,
Madeiro, F.,
Image encryption based on the finite field cosine transform,
SP:IC(28), No. 10, 2013, pp. 1537-1547.
Elsevier DOI
1312
Image encryption
BibRef
Lima, J.B.,
da Silva, E.S.,
Campello de Souza, R.M.,
Cosine transforms over fields of characteristic 2: Fast computation
and application to image encryption,
SP:IC(54), No. 1, 2017, pp. 130-139.
Elsevier DOI
1704
Finite field cosine transform
BibRef
Lima, J.B.,
Madeiro, F.,
Sales, F.J.R.,
Encryption of medical images based on the cosine number transform,
SP:IC(35), No. 1, 2015, pp. 1-8.
Elsevier DOI
1506
Medical images
BibRef
Li, P.[Peng],
Yang, C.N.[Ching-Nung],
Kong, Q.[Qian],
Ma, Y.P.[Yan-Peng],
Liu, Z.[Zheng],
Sharing more information in gray visual cryptography scheme,
JVCIR(24), No. 8, 2013, pp. 1380-1393.
Elsevier DOI
1312
Visual cryptography
BibRef
Yang, C.N.[Ching-Nung],
Wang, D.S.[Dao-Shun],
Property Analysis of XOR-Based Visual Cryptography,
CirSysVideo(24), No. 2, February 2014, pp. 189-197.
IEEE DOI
1403
cryptography
BibRef
Wang, X.,
Pei, Q.,
Li, H.,
A Lossless Tagged Visual Cryptography Scheme,
SPLetters(21), No. 7, July 2014, pp. 853-856.
IEEE DOI
1405
Cryptography
BibRef
Czaplewski, B.[Bartosz],
Dzwonkowski, M.[Mariusz],
Rykaczewski, R.[Roman],
Digital fingerprinting for color images based on the quaternion
encryption scheme,
PRL(46), No. 1, 2014, pp. 11-19.
Elsevier DOI
1407
Cryptography
BibRef
Czaplewski, B.[Bartosz],
Joint fingerprinting and decryption method for color images based on
quaternion rotation with cipher quaternion chaining,
JVCIR(40, Part A), No. 1, 2016, pp. 1-13.
Elsevier DOI
1609
Fingerprinting
BibRef
Li, C.Q.[Cheng-Qing],
Liu, Y.S.[Yuan-Sheng],
Zhang, L.Y.[Leo Yu],
Wong, K.W.[Kwok-Wo],
Cryptanalyzing a class of image encryption schemes based on Chinese
remainder theorem,
SP:IC(29), No. 8, 2014, pp. 914-920.
Elsevier DOI
1410
Compression
BibRef
Ziyabar, H.M.[Hashem Moradmand],
Sinaie, M.[Mahnaz],
Payandeh, A.[Ali],
Payandeh, A.[Ali],
Vakili, V.T.[Vahid Tabataba],
Secure FSM-based arithmetic codes,
SIViP(8), No. 7, October 2014, pp. 1263-1272.
Springer DOI
1410
atithmetic coding for compression and secrecy.
BibRef
Abd-El-Hafiz, S.K.,
Radwan, A.G.,
Haleem, S.H.A.[S.H. Abdel],
Barakat, M.L.,
A fractal-based image encryption system,
IET-IPR(8), No. 12, 2014, pp. 742-752.
DOI Link
1412
cryptography
BibRef
Bai, X.[Xiao],
Yang, H.[Haichuan],
Zhou, J.[Jun],
Ren, P.[Peng],
Cheng, J.[Jian],
Data-Dependent Hashing Based on p-Stable Distribution,
IP(23), No. 12, December 2014, pp. 5033-5046.
IEEE DOI
1412
cryptography
BibRef
Ullagaddi, V.[Vishwanath],
Hassan, F.[Firas],
Devabhaktuni, V.[Vijay],
Symmetric synchronous stream encryption using images,
SIViP(9), No. 1, January 2015, pp. 1-8.
Springer DOI
1503
Use bit plane from an image for encryption of stream.
(Not encrypt an image.)
BibRef
Sun, Y.Y.[Yuan-Yuan],
Xu, R.[Rudan],
Chen, L.[Lina],
Hu, X.P.[Xiao-Peng],
Image compression and encryption scheme using fractal dictionary and
Julia set,
IET-IPR(9), No. 3, 2015, pp. 173-183.
DOI Link
1504
cryptography
BibRef
Wadi, S.M.,
Zainal, N.,
Decomposition by binary codes-based speedy image encryption algorithm
for multiple applications,
IET-IPR(9), No. 5, 2015, pp. 413-423.
DOI Link
1506
binary codes
BibRef
Nini, B.,
Lemmouchi, C.,
Security analysis of a three-dimensional rotation-based image
encryption,
IET-IPR(9), No. 8, 2015, pp. 680-689.
DOI Link
1506
cryptography
BibRef
Shyu, S.J.,
Chen, M.C.,
Minimizing Pixel Expansion in Visual Cryptographic Scheme for General
Access Structures,
CirSysVideo(25), No. 9, September 2015, pp. 1557-1561.
IEEE DOI
1509
Cryptography
BibRef
Dzwonkowski, M.,
Papaj, M.,
Rykaczewski, R.,
A New Quaternion-Based Encryption Method for DICOM Images,
IP(24), No. 11, November 2015, pp. 4614-4622.
IEEE DOI
1509
DICOM
BibRef
Yang, C.N.[Ching-Nung],
Wu, C.C.[Chih-Cheng],
Lin, Y.C.[Yi-Chin],
Kim, C.[Cheonshik],
Constructions and Properties of General (k, n) Block-Based Progressive
Visual Cryptography,
ETRI(37), No. 5, October 2015, pp. 979-989.
DOI Link
1511
BibRef
Zhang, Y.S.[Yu-Shu],
Wong, K.W.[Kwok-Wo],
Zhang, L.Y.[Leo Yu],
Wen, W.Y.[Wen-Ying],
Zhou, J.T.[Jian-Tao],
He, X.[Xing],
Robust coding of encrypted images via structural matrix,
SP:IC(39, Part A), No. 1, 2015, pp. 202-211.
Elsevier DOI
1512
Multiple description code
BibRef
Islam, N.[Naveed],
Shahid, Z.[Zafar],
Puech, W.[William],
Denoising and error correction in noisy AES-encrypted images using
statistical measures,
SP:IC(41), No. 1, 2016, pp. 15-27.
Elsevier DOI
1602
BibRef
And: A1, A3, Only:
Decryption of noisy encrypted images by statistical analysis,
EUVIP11(192-198).
IEEE DOI
1110
Cryptosystem.
BibRef
Fawaz, Z.[Zeinab],
Noura, H.[Hassan],
Mostefaoui, A.[Ahmed],
An efficient and secure cipher scheme for images confidentiality
preservation,
SP:IC(42), No. 1, 2016, pp. 90-108.
Elsevier DOI
1603
Security
BibRef
Ye, G.,
Huang, X.,
An Image Encryption Algorithm Based on Autoblocking and
Electrocardiography,
MultMedMag(23), No. 2, April 2016, pp. 64-71.
IEEE DOI
1605
Algorithm design and analysis
BibRef
Chen, C.C.[Chien-Chang],
Chen, S.C.[Shih-Chang],
Two-layered structure for optimally essential secret image sharing
scheme,
JVCIR(38), No. 1, 2016, pp. 595-601.
Elsevier DOI
1605
Secret image sharing
BibRef
Chen, C.C.[Chien-Chang],
Essential secret image sharing scheme with equal-sized shadows
generation,
JVCIR(52), 2018, pp. 143 - 150.
Elsevier DOI
1804
Secret image sharing, Essential, Non-essential, Three-layered structure
BibRef
Yang, C.N.[Ching-Nung],
Sun, L.Z.[Li-Zhe],
Yan, X.[Xuehu],
Kim, C.[Cheonshik],
Design a new visual cryptography for human-verifiable authentication in
accessing a database,
RealTimeIP(12), No. 2, August 2016, pp. 483-494.
Springer DOI
1608
BibRef
Karabina, K.[Koray],
Canpolat, O.[Onur],
A new cryptographic primitive for noise tolerant template security,
PRL(80), No. 1, 2016, pp. 70-75.
Elsevier DOI
1609
Template security
BibRef
Yap, W.S.[Wun-She],
Phan, R.C.W.[Raphael C.W.],
Goi, B.M.[Bok-Min],
Yau, W.C.[Wei-Chuen],
Heng, S.H.[Swee-Huay],
On the effective subkey space of some image encryption algorithms
using external key,
JVCIR(40, Part A), No. 1, 2016, pp. 51-57.
Elsevier DOI
1609
Image encryption
BibRef
Murugan, B.,
Gounder, A.G.N.[A. G. Nanjappa],
Image encryption scheme based on block-based confusion and multiple
levels of diffusion,
IET-CV(10), No. 6, 2016, pp. 593-602.
DOI Link
1609
cryptography
BibRef
Shao, Z.H.[Zhu-Hong],
Shang, Y.Y.[Yuan-Yuan],
Zeng, R.[Rui],
Shu, H.Z.[Hua-Zhong],
Coatrieux, G.[Gouenou],
Wu, J.S.[Jia-Song],
Robust watermarking scheme for color image based on quaternion-type
moment invariants and visual cryptography,
SP:IC(48), No. 1, 2016, pp. 12-21.
Elsevier DOI
1609
Color image
BibRef
Wang, Y.F.[Yun-Fei],
Shang, Y.Y.[Yuan-Yuan],
Shao, Z.H.[Zhu-Hong],
Zhang, Y.[Yan],
Coatrieux, G.[Gouenou],
Ding, H.[Hui],
Liu, T.[Tie],
Multiple color image encryption based on cascaded quaternion gyrator
transforms,
SP:IC(107), 2022, pp. 116793.
Elsevier DOI
2208
Multiple color image encryption,
Cascaded encryption structure, Quaternion gyrator transform
BibRef
Shao, Z.H.[Zhu-Hong],
Wu, J.S.[Jia-Song],
Coatrieux, J.L.[Jean Louis],
Coatrieux, G.[Gouenou],
Shu, H.Z.[Hua-Zhong],
Quaternion gyrator transform and its application to color image
encryption,
ICIP13(4579-4582)
IEEE DOI
1402
Quaternion gyrator transform; color image; encryption
BibRef
Annaby, M.H.,
Rushdi, M.A.,
Nehary, E.A.,
Image encryption via discrete fractional Fourier-type transforms
generated by random matrices,
SP:IC(49), No. 1, 2016, pp. 25-46.
Elsevier DOI
1609
Discrete fractional Fourier transform
BibRef
Yang, C.N.[Ching-Nung],
Liao, J.K.[Jung-Kuo],
Wang, D.S.[Dao-Shun],
New privilege-based visual cryptography with arbitrary privilege
levels,
JVCIR(42), No. 1, 2017, pp. 121-131.
Elsevier DOI
1701
Visual cryptography
BibRef
Cao, X.W.[Xing-Wu],
Wei, X.X.[Xing-Xing],
Guo, R.[Rui],
Wang, C.C.[Chang-Chun],
No embedding: A novel image cryptosystem for meaningful encryption,
JVCIR(44), No. 1, 2017, pp. 236-249.
Elsevier DOI
1703
Image encryption
BibRef
Huang, H.Q.[Hui-Qing],
Yang, S.Z.[Shou-Zhi],
Colour image encryption based on logistic mapping and double
random-phase encoding,
IET-IPR(11), No. 4, April 2017, pp. 211-216.
DOI Link
1704
BibRef
Li, C.,
Lin, D.,
Lü, J.,
Cryptanalyzing an Image-Scrambling Encryption Algorithm of Pixel Bits,
MultMedMag(24), No. 3, 2017, pp. 64-71.
IEEE DOI
1708
Algorithm design and analysis, Ciphers, Cryptography, Encryption,
Image processing, Mathematical model, Multimedia communication,
Visualization, ciphertext-only attack, cryptanalysis, cryptography,
graphics, image encryption, known-plaintext attack, multimedia,
security, template, matching
BibRef
Yang, C.N.[Ching-Nung],
Wu, X.T.[Xiao-Tian],
Chou, Y.C.[Yung-Chien],
Fu, Z.J.[Zhang-Jie],
Constructions of general reversible AMBTC-based visual cryptography
with two decryption options,
JVCIR(48), No. 1, 2017, pp. 182-194.
Elsevier DOI
1708
Visual, cryptography
BibRef
Bao, L.,
Yi, S.,
Zhou, Y.,
Combination of Sharing Matrix and Image Encryption for Lossless
(k,n)-Secret Image Sharing,
IP(26), No. 12, December 2017, pp. 5618-5631.
IEEE DOI
1710
cryptography, image reconstruction,
sharing matrix, Algorithm design and analysis, Distortion,
BibRef
Boussif, M.[Mohamed],
Aloui, N.[Noureddine],
Cherif, A.[Adnane],
Smartphone application for medical images secured exchange based on
encryption using the matrix product and the exclusive addition,
IET-IPR(11), No. 11, November 2017, pp. 1020-1026.
DOI Link
1711
BibRef
Cho, W.,
Yu, N.Y.,
Secure Communications With Asymptotically Gaussian Compressed
Encryption,
SPLetters(25), No. 1, January 2018, pp. 80-84.
IEEE DOI
1801
Gaussian processes, cryptography, telecommunication security,
wireless channels, Hellinger distance, TV distance,
total variation (TV) distance
BibRef
Wang, C.T.[Chun-Tao],
Xiao, D.Q.[De-Qing],
Peng, H.X.[Hong-Xing],
Zhang, R.Y.[Rong-Yue],
A lossy compression scheme for encrypted images exploiting Cauchy
distribution and weighted rate distortion optimization,
JVCIR(51), 2018, pp. 122-130.
Elsevier DOI
1802
Compression of encrypted signals, Statistical model,
Rate-distortion optimization, Lifting wavelet
BibRef
Jia, X.,
Wang, D.,
Nie, D.,
Zhang, C.,
Collaborative Visual Cryptography Schemes,
CirSysVideo(28), No. 5, May 2018, pp. 1056-1070.
IEEE DOI
1805
Collaboration, Cryptography, Image reconstruction,
Information security, Integer linear programming, Visualization,
visual cryptography (VC) scheme
BibRef
Kaur, M.[Manjit],
Kumar, V.[Vijay],
Colour image encryption technique using differential evolution in
non-subsampled contourlet transform domain,
IET-IPR(12), No. 7, July 2018, pp. 1273-1283.
DOI Link
1806
BibRef
Yang, C.N.[Ching-Nung],
Wu, F.H.[Fu-Heng],
Peng, S.L.[Sheng-Lung],
Enhancing multi-factor cheating prevention in visual cryptography
based minimum (k, n)-connected graph,
JVCIR(55), 2018, pp. 660-676.
Elsevier DOI
1809
Visual cryptography, Cheating attack, Cheating prevention,
Verification image, Shadow image
BibRef
Dzwonkowski, M.,
Rykaczewski, R.,
Secure Quaternion Feistel Cipher for DICOM Images,
IP(28), No. 1, January 2019, pp. 371-380.
IEEE DOI
1810
Quaternions, Encryption, DICOM, Ciphers,
Cryptography, medical data, quaternion rotation, lossless scheme,
Julia sets
BibRef
Singh, H.[Hukum],
Watermarking image encryption using deterministic phase mask and
singular value decomposition in fractional Mellin transform domain,
IET-IPR(12), No. 11, November 2018, pp. 1994-2001.
DOI Link
1810
BibRef
Yan, B.,
Xiang, Y.,
Hua, G.,
Improving the Visual Quality of Size-Invariant Visual Cryptography
for Grayscale Images: An Analysis-by-Synthesis (AbS) Approach,
IP(28), No. 2, February 2019, pp. 896-911.
IEEE DOI
1811
Gray-scale, Visualization, Cryptography, Stacking,
Image reconstruction, Measurement,
vector visual cryptography
BibRef
Lobachev, O.[Oleg],
Direct visualization of cryptographic keys for enhanced security,
VC(34), No. 12, December 2018, pp. 1749-1759.
WWW Link.
1811
BibRef
Sharma, H.[Himani],
Mishra, D.C.,
Sharma, R.K.,
Kumar, N.[Naveen],
Crypto-stego System for Securing Text and Image Data,
IJIG(18), No. 4 2018, pp. 1850020.
DOI Link
1812
BibRef
Li, R.Z.[Ren-Zhi],
Liu, Q.[Qian],
Liu, L.F.[Ling-Feng],
Novel image encryption algorithm based on improved logistic map,
IET-IPR(13), No. 1, January 2019, pp. 125-134.
DOI Link
1812
BibRef
Chen, B.J.[Bei-Jing],
Yu, M.[Ming],
Tian, Y.H.[Yu-Hang],
Li, L.[Leida],
Wang, D.C.[Ding-Cheng],
Sun, X.M.[Xing-Ming],
Multiple-parameter fractional quaternion Fourier transform and its
application in colour image encryption,
IET-IPR(12), No. 12, December 2018, pp. 2238-2249.
DOI Link
1812
BibRef
Su, Y.R.[Ying-Ri],
Wo, Y.[Yan],
Han, G.Q.[Guo-Qiang],
Reversible cellular automata image encryption for similarity search,
SP:IC(72), 2019, pp. 134-147.
Elsevier DOI
1902
Image encryption, Image similarity search, Multi-granularity,
Reversible cellular automata
BibRef
Wu, X.T.[Xiao-Tian],
Chen, D.[Dong],
Yang, C.N.[Ching-Nung],
Yang, Y.Y.[Yi-Yun],
A (k,n) threshold partial reversible AMBTC-based visual cryptography
using one reference image,
JVCIR(59), 2019, pp. 550-562.
Elsevier DOI
1903
Visual cryptography, Block truncation coding,
Partial reversible, Meaningful share, Contrast, Reference image
BibRef
Gondim, M.A.A.[Marcos A.A.],
de Oliveira Neto, J.R.[José R.],
Lima, J.B.[Juliano B.],
Steerable Fourier number transform with application to image
encryption,
SP:IC(74), 2019, pp. 89-95.
Elsevier DOI
1904
Number-theoretic transforms, Steerable transforms,
Graph signal processing, Image encryption
BibRef
de Oliveira Neto, J.R.[José R.],
Lima, J.B.[Juliano B.],
Panario, D.,
The Design of a Novel Multiple-Parameter Fractional Number-Theoretic
Transform and Its Application to Image Encryption,
CirSysVideo(30), No. 8, August 2020, pp. 2489-2502.
IEEE DOI
2008
Encryption, Eigenvalues and eigenfunctions, Cats,
Discrete Fourier transforms, Systematics,
image encryption
BibRef
Cao, H.,
Lin, S.,
Zhang, W.,
Han, Y.S.,
On the Security of Secret Sharing Over a Ring and the Fast
Implementation,
SPLetters(26), No. 5, May 2019, pp. 705-709.
IEEE DOI
1905
computational complexity, cryptography, fast Fourier transforms,
polynomials, polynomial secret sharing, secret sharing scheme,
fast fourier transform
BibRef
Abdmouleh, M.K.[Med Karim],
Khalfallah, A.[Ali],
Bouhlel, M.S.[Med Salim],
Crypto-compression scheme based on the DWT for medical image security,
IJCVR(9), No. 4, 2019, pp. 340-350.
DOI Link
1908
BibRef
Melgar, M.E.V.[Max E. Vizcarra],
Farias, M.C.Q.[Mylène C.Q.],
A (2,2) XOR-based visual cryptography scheme without pixel expansion,
JVCIR(63), 2019, pp. 102592.
Elsevier DOI
1909
Visual cryptography, Visual secret sharing, Color interference
BibRef
Noura, H.N.[Hassan N.],
Chehab, A.[Ali],
Couturier, R.[Raphaël],
Efficient and secure cipher scheme with dynamic key-dependent mode of
operation,
SP:IC(78), 2019, pp. 448-464.
Elsevier DOI
1909
Lightweight flexible key-dependent cipher scheme,
Dynamic operation mode, Security and performance analysis
BibRef
Yu, C.Z.[Chang-Zhi],
Li, H.J.[Heng-Jian],
Wang, X.[Xiyu],
SVD-based image compression, encryption, and identity authentication
algorithm on cloud,
IET-IPR(13), No. 12, October 2019, pp. 2224-2232.
DOI Link
1911
BibRef
Sfar, A.R.[A. Riahi],
Challal, Y.,
Moyal, P.,
Natalizio, E.,
A Game Theoretic Approach for Privacy Preserving Model in IoT-Based
Transportation,
ITS(20), No. 12, December 2019, pp. 4405-4414.
IEEE DOI
2001
Privacy, Games, Sensors, Game theory, Cryptography, Vehicles,
Internet of Things, intelligent transportation, privacy,
Markov chains
BibRef
Zhang, H.[Hao],
Wang, X.Q.[Xiao-Qing],
Wang, X.Y.[Xing-Yuan],
Yan, P.F.[Peng-Fei],
Novel multiple images encryption algorithm using CML system and DNA
encoding,
IET-IPR(14), No. 3, 28 February 2020, pp. 518-529.
DOI Link
2002
BibRef
Zhou, L.[Longfu],
Bai, S.[Sen],
Cao, Y.Q.[Yu-Qiang],
Wang, Y.L.[Ying-Long],
Image Visually Meaningful Cryptography Based on Julia Set Generating
and Information Hiding,
IWDW19(393-406).
Springer DOI
2003
BibRef
Kaur, M.[Manjit],
Singh, D.[Dilbag],
Uppal, R.S.[Raminder Singh],
Parallel strength Pareto evolutionary algorithm-II based image
encryption,
IET-IPR(14), No. 6, 11 May 2020, pp. 1015-1026.
DOI Link
2005
BibRef
Boussif, M.[Mohamed],
Aloui, N.[Noureddine],
Cherif, A.[Adnene],
Securing DICOM images by a new encryption algorithm using Arnold
transform and Vigenère cipher,
IET-IPR(14), No. 6, 11 May 2020, pp. 1209-1216.
DOI Link
2005
BibRef
Sudeepa, K.B.,
Aithal, G.[Ganesh],
Rajinikanth, V.,
Satapathy, S.C.[Suresh Chandra],
Genetic algorithm based key sequence generation for cipher system,
PRL(133), 2020, pp. 341-348.
Elsevier DOI
2005
Feedback shift register, Genetic algorithm,
Stream cipher system, Pseudo random number generator, Mutation
BibRef
Melkemi, M.[Mahmoud],
Hammoudi, K.[Karim],
Voronoi-based image representation applied to binary visual
cryptography,
SP:IC(87), 2020, pp. 115913.
Elsevier DOI
2007
Visual cryptography, Image communication, Visual communication,
Image sharing, Voronoi diagram, Visual representation
BibRef
Umoh, E.A.[Edwin A.],
Iloanusi, O.N.[Ogechukwu N.],
Nnolim, U.A.[Uche A.],
Image multi-encryption architecture based on hybrid keystream sequence
interspersed with Haar discrete wavelet transform,
IET-IPR(14), No. 10, August 2020, pp. 2081-2091.
DOI Link
2008
BibRef
Peng, F.,
Zhang, X.,
Lin, Z.,
Long, M.,
A Tunable Selective Encryption Scheme for H.265/HEVC Based on Chroma
IPM and Coefficient Scrambling,
CirSysVideo(30), No. 8, August 2020, pp. 2765-2780.
IEEE DOI
2008
Encryption, Syntactics, Streaming media, Bit rate, Visualization,
Encoding, H.265/HEVC, selective encryption,
edge extraction
BibRef
Zheng, J.Y.[Jie-Yu],
Liu, L.F.[Ling-Feng],
Novel image encryption by combining dynamic DNA sequence encryption and
the improved 2D logistic sine map,
IET-IPR(14), No. 11, September 2020, pp. 2310-2320.
DOI Link
2009
BibRef
Nakachi, T.[Takayuki],
Kiya, H.[Hitoshi],
Secure OMP Computation Maintaining Sparse Representations and Its
Application to EtC Systems,
IEICE(E103-D), No. 9, September 2020, pp. 1988-1997.
WWW Link.
2009
Encryption-then-Compression.
Orthogonal Matching Pursuit.
BibRef
Xiang, T.,
Yang, Y.,
Liu, H.,
Guo, S.,
Visual Security Evaluation of Perceptually Encrypted Images Based on
Image Importance,
CirSysVideo(30), No. 11, November 2020, pp. 4129-4142.
IEEE DOI
2011
Visualization, Encryption, Feature extraction, Image resolution,
Measurement, Visual security index, perceptual encryption,
log-Gabor filter
BibRef
Yang, Y.[Ying],
Xiang, T.[Tao],
Lv, X.[Xiao],
Guo, S.W.[Shang-Wei],
Zeng, T.Y.[Tie-Yong],
The Illusion of Visual Security:
Reconstructing Perceptually Encrypted Images,
CirSysVideo(34), No. 5, May 2024, pp. 3998-4010.
IEEE DOI
2405
Encryption, Visualization, Distortion, Image restoration,
Image reconstruction, Feature extraction, Threat modeling,
image restoration
BibRef
Sivaraman, R.[Rethinam],
Rajagopalan, S.[Sundararaman],
Rayappan, J.B.B.[John Bosco Balaguru],
Amirtharajan, R.[Rengarajan],
Ring oscillator as confusion- diffusion agent:
A complete TRNG drove image security,
IET-IPR(14), No. 13, November 2020, pp. 2987-2997.
DOI Link
2012
TRNG: true random number generators
BibRef
Sun, E.Y.N.[Elaine Y.N.],
Wu, H.C.[Hsiao-Chun],
Busch, C.[Costas],
Huang, S.C.H.[Scott C.H.],
Kuan, Y.C.[Yen-Cheng],
Chang, S.Y.[Shih Yu],
Efficient Recoverable Cryptographic Mosaic Technique by Permutations,
CirSysVideo(31), No. 1, January 2021, pp. 112-125.
IEEE DOI
2101
Sun, Receivers, Indexes, Encryption, Discrete cosine transforms,
Recoverable cryptographic mosaic, permutation,
Kullback-Leibler divergence of discrete cosine transform (DCT-KLD)
BibRef
Gao, L.,
Qi, L.,
Guan, L.,
The Property of Frequency Shift in 2D-FRFT Domain With Application to
Image Encryption,
SPLetters(28), 2021, pp. 185-189.
IEEE DOI
2102
Mathematical model, Encryption, Image reconstruction,
Transforms, Time-frequency analysis,
image encryption
BibRef
Wang, X.L.[Xiao-Long],
Yan, H.W.[Hao-Wen],
Zhang, L.M.[Li-Ming],
Vector Map Encryption Algorithm Based on Double Random Position
Permutation Strategy,
IJGI(10), No. 5, 2021, pp. xx-yy.
DOI Link
2106
BibRef
Zhao, T.Y.[Tie-Yu],
Yuan, L.[Lin],
Chi, Y.Y.[Ying-Ying],
Image encryption using linear weighted fractional-order transform,
JVCIR(77), 2021, pp. 103098.
Elsevier DOI
2106
Fractional-order Fourier transform,
Weighted fractional-order transform, Image encryption
BibRef
Yang, C.N.[Ching-Nung],
Yang, Y.Y.[Yi-Yun],
On the Analysis and Design of Visual Cryptography With Error
Correcting Capability,
CirSysVideo(31), No. 6, June 2021, pp. 2465-2479.
IEEE DOI
2106
Interference, Visualization, Decoding, Stacking, Cryptography,
Image reconstruction, Image color analysis, Secret sharing, error correction
BibRef
Oravec, J.[Jakub],
Ovseník, L.[Luboš],
Papaj, J.[Ján],
An image encryption algorithm with a plaintext-related quantisation
scheme,
IET-IPR(15), No. 9, 2021, pp. 2039-2055.
DOI Link
2106
BibRef
Zhang, D.H.[Deng-Hui],
Zhu, H.B.[Hong-Bin],
Liu, S.L.[Sheng-Long],
Wei, X.[Xu],
HP-VCS:
A high-quality and printer-friendly visual cryptography scheme,
JVCIR(78), 2021, pp. 103186.
Elsevier DOI
2107
Visual cryptography scheme, Image security, Halftoning, Color VCS
BibRef
Chen, L.P.[Li-Ping],
Yin, H.[Hao],
Yuan, L.G.[Li-Guo],
Machado, J.A.T.[J.A. Tenreiro],
Wu, R.C.[Ran-Chao],
Alam, Z.[Zeeshan],
Double color image encryption based on fractional order discrete
improved Henon map and Rubik's cube transform,
SP:IC(97), 2021, pp. 116363.
Elsevier DOI
2107
Fractional-order discrete systems, Henon map, DNA encryption,
Double color image encryption
BibRef
Chen, J.X.[Jun-Xin],
Chen, L.[Lei],
Zhou, Y.C.[Yi-Cong],
Universal Chosen-Ciphertext Attack for a Family of Image Encryption
Schemes,
MultMed(23), 2021, pp. 2372-2385.
IEEE DOI
2108
Encryption, Nonlinear dynamical systems, Standards,
Technological innovation, Matrices, Cryptanalysis,
chosen-ciphertext attack
BibRef
Wang, X.Y.[Xing-Yuan],
Zhang, M.[Maozhen],
High-sensitivity synchronous image encryption based on improved
one-dimensional compound sine map,
IET-IPR(15), No. 10, 2021, pp. 2247-2265.
DOI Link
2108
BibRef
Yang, Y.[Ying],
Xiang, T.[Tao],
Liu, H.C.[Hang-Cheng],
Liao, X.F.[Xiao-Feng],
Convolutional Neural Network for Visual Security Evaluation,
CirSysVideo(31), No. 8, August 2021, pp. 3293-3307.
IEEE DOI
2108
Objective visual security evaluation of selectively encrypted images.
Visualization, Feature extraction, Indexes, Measurement, Encryption,
Visual security index, convolutional neural network,
weighted pooling
BibRef
Inoue, K.[Kotaro],
Cho, M.[Myungjin],
Amplitude based keyless optical encryption system using deep neural
network,
JVCIR(79), 2021, pp. 103251.
Elsevier DOI
2109
Optical encryption, Deep neural network,
Amplitude-based double random phase encryption
BibRef
Puteaux, P.[Pauline],
Puech, W.[William],
CFB-Then-ECB Mode-Based Image Encryption for an Efficient Correction
of Noisy Encrypted Images,
CirSysVideo(31), No. 9, September 2021, pp. 3338-3351.
IEEE DOI
2109
Cryptography, Encryption, Noise measurement, Ciphers,
Noise reduction, Forward error correction, Statistical analysis,
statistical analysis
BibRef
Man, Z.L.[Zhen-Long],
Li, J.Q.[Jin-Qing],
Di, X.Q.[Xiao-Qiang],
Medical image encryption scheme based on self-verification matrix,
IET-IPR(15), No. 12, 2021, pp. 2787-2798.
DOI Link
2109
BibRef
Mishra, P.[Pooja],
Bhaya, C.[Chiranjeev],
Pal, A.K.[Arup Kumar],
Singh, A.K.[Abhay Kumar],
A novel binary operator for designing medical and natural image
cryptosystems,
SP:IC(98), 2021, pp. 116377.
Elsevier DOI
2109
Abelian group, DICOM, DNA encoding, Image cryptosystem
BibRef
Li, Y.[Yu],
Zhang, L.M.[Li-Ming],
Wang, X.L.[Xiao-Long],
Zhang, X.G.[Xin-Gang],
Zhang, Q.H.[Qi-Hang],
A Novel Invariant Based Commutative Encryption and Watermarking
Algorithm for Vector Maps,
IJGI(10), No. 11, 2021, pp. xx-yy.
DOI Link
2112
BibRef
Chen, J.X.[Jun-Xin],
Zhang, L.Y.[Leo Yu],
Zhou, Y.C.[Yi-Cong],
Re-Evaluation of the Security of a Family of Image Diffusion
Mechanisms,
CirSysVideo(31), No. 12, December 2021, pp. 4747-4758.
IEEE DOI
2112
Cryptography, Encryption, Ciphers,
Standards, Information science, Image resolution, Cryptanalysis,
bitwise exclusive OR
BibRef
Zhao, Y.K.[Yong-Kang],
Fu, F.W.[Fang-Wei],
A contrast improved OR and XOR based (k,n) visual cryptography scheme
without pixel expansion,
JVCIR(82), 2022, pp. 103408.
Elsevier DOI
2201
Visual cryptography, Multiple decryptions, Contrast,
Perfect recovery, Threshold
BibRef
Zhang, Y.S.[Yu-Shu],
Zhao, R.[Ruoyu],
Xiao, X.L.[Xiang-Li],
Lan, R.[Rushi],
Liu, Z.[Zhe],
Zhang, X.P.[Xin-Peng],
HF-TPE: High-Fidelity Thumbnail- Preserving Encryption,
CirSysVideo(32), No. 3, March 2022, pp. 947-961.
IEEE DOI
2203
Encryption, Privacy, Usability, Cloud computing, Visualization,
Software, Indexes, Balancing privacy and usability, cloud storage
BibRef
Huang, S.F.[Shu-Feng],
Huang, L.Q.[Lin-Qing],
Cai, S.T.[Shu-Ting],
Xiong, X.M.[Xiao-Ming],
Liu, Y.[Yuan],
Novel and secure plaintext-related image encryption algorithm based
on compressive sensing and tent-sine system,
IET-IPR(16), No. 6, 2022, pp. 1544-1557.
DOI Link
2204
BibRef
Chen, Y.C.[Yu-Chi],
Horng, G.[Gwoboa],
Cheating in (halftone-secret) visual cryptography:
Analysis of blind authentication schemes,
JVCIR(85), 2022, pp. 103489.
Elsevier DOI
2205
Visual cryptography, Human vision system, Binocular cheating,
Cheating prevention, Security
BibRef
Xian, Y.J.[Yong-Jin],
Wang, X.Y.[Xing-Yuan],
Teng, L.[Lin],
Double Parameters Fractal Sorting Matrix and Its Application in Image
Encryption,
CirSysVideo(32), No. 6, June 2022, pp. 4028-4037.
IEEE DOI
2206
Sorting, Fractals, Security, Encryption, Iterative algorithms,
Information security, Frequency modulation,
image security
BibRef
Wen, Y.[Yan],
Su, J.M.[Jing-Ming],
Hong, Y.[Yan],
Gong, P.S.[Ping-Shun],
Hybrid mapping algorithm based on 1-DCM and Lorenz,
IET-IPR(16), No. 9, 2022, pp. 2467-2482.
DOI Link
2206
BibRef
Sheng, Y.H.[Yao-Hui],
Li, J.Q.[Jin-Qing],
Di, X.Q.[Xiao-Qiang],
Man, Z.L.[Zhen-Long],
Liu, Z.F.[Ze-Fei],
Bit-level image encryption algorithm based on fully-connected-like
network and random modification of edge pixels,
IET-IPR(16), No. 10, 2022, pp. 2769-2790.
DOI Link
2207
BibRef
Maksud, A.[Ahmed],
Hua, Y.[Yingbo],
Secret Key Generation by Continuous Encryption Before Quantization,
SPLetters(29), 2022, pp. 1497-1501.
IEEE DOI
2208
Quantization (signal), Biometrics (access control), Security,
Encryption, Communication system security, Signal to noise ratio,
wireless security
BibRef
Tan, X.G.[Xue-Gang],
Xiang, C.C.[Chang-Cheng],
Cao, J.[Jinde],
Xu, W.Y.[Wen-Ying],
Wen, G.H.[Guang-Hui],
Rutkowski, L.[Leszek],
Synchronization of Neural Networks via Periodic Self-Triggered
Impulsive Control and Its Application in Image Encryption,
Cyber(52), No. 8, August 2022, pp. 8246-8257.
IEEE DOI
2208
Artificial neural networks, Synchronization, Real-time systems,
Signal processing algorithms, Neurons, Monitoring, Encryption,
synchronization
BibRef
Zhang, B.[Bo],
Xiao, D.[Di],
Li, Y.[Ying],
Yang, L.[Lei],
2D Compressed Sensing Using Nonlocal Low-Rank Prior Reconstruction
for Cipher-Image Coding,
SPLetters(29), 2022, pp. 2033-2037.
IEEE DOI
2210
Ciphers, Image coding, Image reconstruction, Encryption, Privacy,
Iterative algorithms, Approximation algorithms, encryption-then-compression
BibRef
Wu, X.T.[Xiao-Tian],
Luo, Z.L.[Zhong-Lin],
Block-based progressive visual cryptography scheme with uniform
progressive recovery and consistent background,
JVCIR(88), 2022, pp. 103631.
Elsevier DOI
2210
Secret sharing, Visual cryptography, Progressive recovery,
Consistent background, Image block
BibRef
Zhang, Y.[Yike],
Luo, W.B.[Wen-Bin],
Vector-Based Efficient Data Hiding in Encrypted Images via Multi-MSB
Replacement,
CirSysVideo(32), No. 11, November 2022, pp. 7359-7372.
IEEE DOI
2211
Image reconstruction, Encryption, Data privacy, Visualization,
Image coding, Image restoration, Decoding, Reversible data hiding,
location map
BibRef
Wu, X.T.[Xiao-Tian],
An, N.[Na],
Xu, Z.[Zishuo],
Sharing Multiple Secrets in XOR-Based Visual Cryptography by
Non-Monotonic Threshold Property,
CirSysVideo(33), No. 1, January 2023, pp. 88-103.
IEEE DOI
2301
Stacking, Visualization, Cryptography, Image reconstruction,
Image quality, Authentication, Visual systems, Secret sharing,
fully incrementing
BibRef
Alsubaei, F.S.[Faisal S.],
Alneil, A.A.[Amani A.],
Mohamed, A.[Abdullah],
Hilal, A.M.[Anwer Mustafa],
Block-Scrambling-Based Encryption with Deep-Learning-Driven Remote
Sensing Image Classification,
RS(15), No. 4, 2023, pp. xx-yy.
DOI Link
2303
BibRef
Sundaram, G.[Gaurav],
Panna, B.[Bhaskar],
Jha, R.K.[Rajib Kumar],
Kumar, S.[Sumit],
Image encryption based on fractional discrete cosine transform and
DWT with interplane arrangements in dost domain,
IET-IPR(17), No. 4, 2023, pp. 1195-1207.
DOI Link
2303
adaptive signal processing, image processing
BibRef
Tang, B.[Bo],
Yang, C.[Cheng],
Zhang, Y.[Yana],
A Format Compliant Framework for HEVC Selective Encryption After
Encoding,
CirSysVideo(33), No. 3, March 2023, pp. 1140-1156.
IEEE DOI
2303
Encoding, Encryption, Cryptography, Syntactics, Arithmetic, Symbols,
Prediction algorithms, HEVC, encrypted after encoding,
bit flipping and insertion-deletion
BibRef
Wu, X.T.[Xiao-Tian],
Fang, J.[Jia],
Yan, W.Q.[Wei Qi],
Contrast Optimization for Size Invariant Visual Cryptography Scheme,
IP(32), 2023, pp. 2174-2189.
IEEE DOI
2304
Optimization, Linear programming, Cryptography, Visualization,
Stacking, Image quality, Image reconstruction, Secret sharing, size invariant
BibRef
Li, D.M.[Dong-Mei],
Liu, H.K.[Hai-Kuan],
Provable image encryption scheme via trapdoor permutation,
IET-IPR(17), No. 5, 2023, pp. 1355-1363.
DOI Link
2304
image encryption, one-way function, random reuse, trapdoor permutation
BibRef
Chen, Z.[Zan],
Ma, C.C.[Chao-Cheng],
Wang, T.[Tao],
Feng, Y.J.[Yuan-Jing],
Hou, X.S.[Xing-Song],
Qian, X.M.[Xue-Ming],
Robust image compression-encryption via scrambled block bernoulli
sampling with diffusion noise,
IET-IPR(17), No. 5, 2023, pp. 1478-1492.
DOI Link
2304
compressed sensing, image coding
BibRef
Liu, Z.N.[Zi-Nan],
Liu, T.[Tao],
Yan, B.[Bin],
Pan, J.S.[Jeng-Shyang],
Yang, H.M.[Hong-Mei],
Multitone reconstruction visual cryptography based on phase
periodicity,
JVCIR(93), 2023, pp. 103827.
Elsevier DOI
2305
Grayscale image, Visual cryptography, Phase periodicity, Light polarization
BibRef
Sammeta, N.[Naresh],
Parthiban, L.[Latha],
Data Ownership and Secure Medical Data Transmission using Optimal
Multiple Key-Based Homomorphic Encryption with Hyperledger Blockchain,
IJIG(23), No. 3 2023, pp. 2240003.
DOI Link
2306
BibRef
Xu, G.W.[Guo-Wen],
Li, G.L.[Guan-Lin],
Guo, S.W.[Shang-Wei],
Zhang, T.W.[Tian-Wei],
Li, H.W.[Hong-Wei],
Secure Decentralized Image Classification With Multiparty Homomorphic
Encryption,
CirSysVideo(33), No. 7, July 2023, pp. 3185-3198.
IEEE DOI
2307
Training, Servers, Homomorphic encryption, Differential privacy,
Deep learning, Public key, Data models, Privacy protection,
homomorphic encryption
BibRef
Chen, F.[Fan],
Yang, Y.L.[Yao-Lin],
He, H.J.[Hong-Jie],
Yuan, Y.[Yuan],
Adaptive Coding and Ordered-Index Extended Scrambling Based RDH in
Encrypted Images,
MultMed(25), 2023, pp. 2864-2875.
IEEE DOI
2307
Cryptography, Encryption, Image coding, Encoding, Correlation, Resists,
Receivers, Reversible data hiding, image encryption,
chosen plaintext attack (CPA)
BibRef
Tang, Y.[Yun],
Cheng, L.[Lulu],
Lyu, W.L.[Wan-Li],
Yin, Z.X.[Zhao-Xia],
High Capacity Reversible Data Hiding for Encrypted 3d Mesh Models Based
on Topology,
IWDW22(205-218).
Springer DOI
2307
BibRef
Lata, N.[Navdeep],
Kumar, R.[Raman],
DSIT: A Dynamic Lightweight Cryptography Algorithm for Securing Image
in IoT Communication,
IJIG(23), No. 4 2023, pp. 2350035.
DOI Link
2308
BibRef
Nazari, H.[Hadi],
Bidgoli, M.M.[Mahmoud Mahlouji],
Ghasvari, H.[Hossein],
Integration of lightweight cryptography and watermarking with
compression for high speed and reliable communication of digital
images in IoT,
IET-IPR(17), No. 10, 2023, pp. 2984-3001.
DOI Link
2308
compressed sensing, cryptography, watermarking, wavelet transforms
BibRef
Wang, C.T.[Chun-Tao],
Hu, J.[Juan],
Bian, S.[Shan],
Ni, J.Q.[Jiang-Qun],
Zhang, X.P.[Xin-Peng],
A Customized Deep Network Based Encryption-Then-Lossy-Compression
Scheme of Color Images Achieving Arbitrary Compression Ratios,
CirSysVideo(33), No. 8, August 2023, pp. 4322-4336.
IEEE DOI
2308
Image coding, Cryptography, Image reconstruction, Encryption, Color,
Receivers, Optimization, Encrypted image compression, downsampling,
downsampling constraint
BibRef
Wang, C.T.[Chun-Tao],
Zhang, T.J.[Tian-Jian],
Chen, H.[Hao],
Huang, Q.[Qiong],
Ni, J.Q.[Jiang-Qun],
Zhang, X.P.[Xin-Peng],
A Novel Encryption-Then-Lossy-Compression Scheme of Color Images
Using Customized Residual Dense Spatial Network,
MultMed(25), 2023, pp. 4026-4040.
IEEE DOI
2310
BibRef
Wang, H.[Hao],
Yang, X.[Xinsong],
Xiang, Z.R.[Zheng-Rong],
Tang, R.Q.[Rong-Qiang],
Ning, Q.[Qian],
Synchronization of Switched Neural Networks via Attacked
Mode-Dependent Event-Triggered Control and Its Application in Image
Encryption,
Cyber(53), No. 9, September 2023, pp. 5994-6003.
IEEE DOI
2309
BibRef
Meng, K.[Ke],
Wo, Y.[Yan],
An image compression and encryption scheme for similarity retrieval,
SP:IC(119), 2023, pp. 117044.
Elsevier DOI
2310
Information bottleneck, Compressed domain retrieval, Retrieval encryption,
Cascade compression encryption, Image similarity retrieval
BibRef
Jameel, S.K.[Samer Kais],
Majidpour, J.[Jafar],
BCS-AE: Integrated Image Compression-Encryption Model Based on AE and
Block-CS,
IJIG(23), No. 5 2023, pp. 2350047.
DOI Link
2310
BibRef
Jansen-van Rensburg, B.[Bianca],
Puech, W.[William],
Pedeboy, J.P.[Jean-Pierre],
A Format Compliant Encryption Method for 3D Objects Allowing
Hierarchical Decryption,
MultMed(25), 2023, pp. 7196-7207.
IEEE DOI
2311
BibRef
Sajitha, A.S.,
Priya, S.S.S.[S. Sridevi Sathya],
Analysis of Various Visual Cryptographic Techniques and their Issues
Based on Optimization Algorithms,
IJIG(23), No. 6 2023, pp. 2350059.
DOI Link
2312
BibRef
Zhang, C.[Chengrui],
Chen, J.X.[Jun-Xin],
Chen, D.M.[Dong-Ming],
Wang, W.[Wei],
Zhang, Y.S.[Yu-Shu],
Zhou, Y.C.[Yi-Cong],
Exploiting Substitution Box for Cryptanalyzing Image Encryption
Schemes With DNA Coding and Nonlinear Dynamics,
MultMed(26), 2024, pp. 1114-1128.
IEEE DOI
2402
Encryption, DNA, Encoding, Ciphers, Image coding, Security, Decoding,
Chosen-plaintext attack, DNA coding, image encryption, S-box matrix
BibRef
Li, C.Q.[Cheng-Qing],
Shen, X.H.[Xian-Hui],
Liu, S.[Sheng],
Cryptanalyzing an Image Encryption Algorithm Underpinned by 2-D
Lag-Complex Logistic Map,
MultMedMag(31), No. 1, January 2024, pp. 99-109.
IEEE DOI
2404
Encryption, Logistics, Heuristic algorithms,
Social networking (online), Resists,
Algorithm design and analysis
BibRef
Shi, J.L.[Jiao-Li],
Hu, C.[Chao],
Zhang, S.L.[Shun-Li],
Zhou, Q.[Qing],
Mei, Z.L.[Zhuo-Lin],
Yao, S.M.[Shi-Mao],
Deng, A.[Anyuan],
An Efficient and Expressive Fully Policy-Hidden Ciphertext-Policy
Attribute-Based Encryption Scheme for Satellite Service Systems,
IJGI(13), No. 9, 2024, pp. 321.
DOI Link
2410
BibRef
Zhang, L.[Luozhi],
Wang, Q.[Qionghua],
Yu, Z.[Zhan],
Li, J.X.[Jin-Xi],
Bai, X.[Xing],
Zhou, X.[Xin],
Wu, Y.Y.[Yuan-Yuan],
Non-Cascaded and Crosstalk-Free Multi-Image Encryption Based on
Optical Scanning Holography Using 2D Orthogonal Compressive Sensing,
IP(33), 2024, pp. 5688-5702.
IEEE DOI
2410
Encryption, Compressed sensing, Pupils, Holography, Security,
Crosstalk, Noise, Image coding, Optical sensors, Optical imaging,
synthesis pupil encoding
BibRef
Li, J.H.[Jun-Hui],
Hou, X.S.[Xing-Song],
The Design of an Adaptive Enhanced AMP-Based Image Block Compressed
Sensing and Its Application to Image Encryption,
CirSysVideo(34), No. 11, November 2024, pp. 11128-11141.
IEEE DOI
2412
Encryption, Image reconstruction, Security, Image coding,
Signal processing algorithms, Filtering algorithms, Noise,
Haar transform
BibRef
Jia, X.X.[Xing-Xing],
Yu, T.[Ting],
Luo, X.Y.[Xiang-Yang],
Wang, D.[Daoshun],
Zhou, H.Y.[Hui-Yu],
Maximizing Contrast in XOR-Based Visual Cryptography Schemes,
CirSysVideo(34), No. 12, December 2024, pp. 12849-12861.
IEEE DOI
2501
Visualization, Linear programming, Image reconstruction,
Circuits and systems, Vectors, Encryption,
contrast
BibRef
Zheng, J.[Jun],
Qian, Y.[Yining],
Wang, C.Y.[Chen-Yu],
Design and Cryptographic Implementation of an Evolutionary Digital
Chaotic Model,
CirSysVideo(34), No. 12, December 2024, pp. 12510-12523.
IEEE DOI
2501
Security, Chaotic communication, Degradation, Chaos,
Perturbation methods, Computational modeling, Numerical models,
psedorandom number generator (PRNG)
BibRef
Yu, J.[Jiang],
Zhang, J.[Jing],
Wang, Z.[Zichi],
Li, F.Y.[Feng-Yong],
Zhang, X.P.[Xin-Peng],
Cover Selection in Encrypted Images,
CirSysVideo(34), No. 12, December 2024, pp. 13626-13641.
IEEE DOI
2501
Cryptography, Encryption, Steganography, Complexity theory,
Distortion, Security, Payloads, Batch steganography, cover selection,
SLBP
BibRef
You, K.[Ke],
Chen, P.[Pengbo],
Li, C.Q.[Cheng-Qing],
Cryptanalyzing an Image Encryption Algorithm Underpinned by a 3-D
Boolean Convolution Neural Network,
MultMedMag(31), No. 4, October 2024, pp. 17-24.
IEEE DOI
2501
Encryption, Convolution, Security, Kernel, Neural networks, Entropy,
Digital images, Rendering (computer graphics), Measurement, Flowcharts
BibRef
Yan, S.H.[Shao-Hui],
Cui, Y.[Yu],
Li, L.[Lin],
Zhang, Y.Y.[Yu-Yan],
Jiang, D.[Defeng],
Zhang, H.[Hanbing],
Development of an Image Encryption Algorithm Based on Compressed
Sensing and Chaotic Mapping,
MultMedMag(31), No. 4, October 2024, pp. 49-59.
IEEE DOI
2501
Encryption, Chaotic communication, Bifurcation, Compressed sensing,
Vectors, Boosting, Signal processing algorithms
BibRef
Rai, D.[Deepak],
Rajput, S.S.[Shayam Singh],
Arya, K.V.,
Pranav, P.[Prince],
Singh, S.[Shikha],
Sinha, A.[Aditi],
Advanced Encryption Standard (AES) Based Robust Watermarking Scheme,
ICCVMI23(1-4)
IEEE DOI
2403
Resistance, Low-pass filters, Watermarking, Rate distortion theory,
Intellectual property, Media, Robustness, Watermarking, Encryption, DWT
BibRef
Peng, H.[Hongwu],
Huang, S.[Shaoyi],
Zhou, T.[Tong],
Luo, Y.[Yukui],
Wang, C.H.[Cheng-Hong],
Wang, Z.[Zigeng],
Zhao, J.[Jiahui],
Xie, X.[Xi],
Li, A.[Ang],
Geng, T.[Tony],
Mahmood, K.[Kaleel],
Wen, W.[Wujie],
Xu, X.L.[Xiao-Lin],
Ding, C.[Caiwen],
AutoReP: Automatic ReLU Replacement for Fast Private Network
Inference,
ICCV23(5155-5165)
IEEE DOI
2401
Machine learning as a service. Data security.
BibRef
Ma, L.F.[Lin-Feng],
Fang, H.[Han],
Wei, T.Y.[Tian-Yi],
Yang, Z.J.[Zi-Jin],
Ma, Z.[Zehua],
Zhang, W.M.[Wei-Ming],
Yu, N.H.[Neng-Hai],
A Geometric Distortion Immunized Deep Watermarking Framework with
Robustness Generalizability,
ECCV24(LXVII: 268-285).
Springer DOI
2412
BibRef
Chen, Y.L.[Yi-Ling],
Yao, Y.Z.[Yuan-Zhi],
Yu, N.H.[Neng-Hai],
Image Translation-Based Deniable Encryption against Model Extraction
Attack,
ICIP23(1330-1334)
IEEE DOI
2312
BibRef
Puteaux, P.[Pauline],
Puech, W.[William],
Localization and Correction of Corrupted Pixel Blocks in Noisy
Encrypted Images,
IPTA20(1-6)
IEEE DOI
2206
Training, Tools, Elliptic curve cryptography,
Error correction codes, Cryptography, Noise measurement,
signal processing in the encrypted domain
BibRef
Zheng, H.Y.[Hong-Ying],
Huang, Y.W.[Ya-Wen],
Li, L.[Lin],
Xiao, D.[Di],
Compressive Sensing-Based Image Encryption and Authentication in
Edge-Clouds,
MMMod22(II:382-393).
Springer DOI
2203
BibRef
Tian, J.[Jinyu],
Zhou, J.T.[Jian-Tao],
Duan, J.[Jia],
Probabilistic Selective Encryption of Convolutional Neural Networks
for Hierarchical Services,
CVPR21(2205-2214)
IEEE DOI
2111
Training, Degradation, Costs,
Computational modeling, Noise reduction, Probabilistic logic
BibRef
Chmielewski, L.J.[Leszek J.],
Orlowski, A.[Arkadiusz],
Does Randomness in the Random Visual Cryptography Protocol Depend on
the Period of Pseudorandom Number Generators?,
ICCVG20(36-47).
Springer DOI
2009
BibRef
Bian, S.[Song],
Wang, T.C.[Tian-Chen],
Hiromoto, M.[Masayuki],
Shi, Y.[Yiyu],
Sato, T.[Takashi],
ENSEI: Efficient Secure Inference via Frequency-Domain Homomorphic
Convolution for Privacy-Preserving Visual Recognition,
CVPR20(9400-9409)
IEEE DOI
2008
Convolution, Protocols, Frequency-domain analysis, Neural networks,
Encryption, Visualization
BibRef
Puteaux, P.[Pauline],
Puech, W.[William],
Image Analysis and Processing in the Encrypted Domain,
ICIP19(3020-3022)
IEEE DOI
1910
Direct processing in encrypted domain.
Multimedia security, image encryption,
signal processing in the encrypted domain
BibRef
Lee, S.,
Huang, Y.,
Lin, J.,
WEB-VC: Visual Cryptography for Web Image,
ICIP19(4055-4059)
IEEE DOI
1910
Visual cryptography, flip visual cryptography,
secret image sharing, visual secret sharing, Web VC
BibRef
Bellafqira, R.[Reda],
Coatrieux, G.[Gouenou],
Genin, E.[Emmanuelle],
Cozic, M.[Michel],
Secure Multilayer Perceptron Based on Homomorphic Encryption,
IWDW18(322-336).
Springer DOI
1905
BibRef
Liu, Z.,
Yang, M.L.,
Yan, W.Q.,
Image encryption based on double random phase encoding,
IVCNZ17(1-6)
IEEE DOI
1902
cryptography, discrete cosine transforms,
discrete Fourier transforms, image coding, matrix algebra,
logistic map
BibRef
Touil, H.,
Akkad, N.E.,
Satori, K.,
Text Encryption:
Hybrid cryptographic method using Vigenere and Hill Ciphers.,
ISCV20(1-6)
IEEE DOI
2011
cryptography, data privacy, text analysis, computer networks,
cryptography, Cesar encryption algorithm,
Statistical attack.
BibRef
Es-sabry, M.,
El Akkad, N.,
Merras, M.,
Saaidi, A.,
Satori, K.,
Grayscale image encryption using shift bits operations,
ISCV18(1-7)
IEEE DOI
1807
cryptography, image processing, (N-1) generated images,
cryptography, decryption process, grayscale image encryption,
Key
BibRef
Hamici, Z.,
Image cryptography based on the imitation of gene fusion and
horizontal gene transfer,
IPTA17(1-6)
IEEE DOI
1804
cryptography, feature extraction, genetic algorithms, image coding,
image fusion, image representation, random sequences, HGT,
obfuscation
BibRef
Kang, X.,
Han, Z.,
Yu, A.,
Duan, P.,
Double random scrambling encoding in the RPMPFrHT domain,
ICIP17(4362-4366)
IEEE DOI
1803
Cryptography, Encoding, Indexes, Performance analysis,
Robustness, Sensitivity, Hartley transform, Image encryption,
logistic map
BibRef
Yonetani, R.,
Boddeti, V.N.,
Kitani, K.M.,
Sato, Y.,
Privacy-Preserving Visual Learning Using Doubly Permuted Homomorphic
Encryption,
ICCV17(2059-2069)
IEEE DOI
1802
cryptography, data privacy, image processing,
learning (artificial intelligence),
Visualization
BibRef
Zhang, Y.,
Li, X.Q.[Xue-Qian],
Hou, W.G.[Wen-Gang],
A fast image encryption scheme based on AES,
ICIVC17(624-628)
IEEE DOI
1708
Ciphers, Correlation, Encryption, Histograms, Information entropy,
Sensitivity, aes, cipher block chaining, image encryption,
information, security
BibRef
Shen, G.[Gang],
Liu, F.[Feng],
Fu, Z.X.[Zheng-Xin],
Yu, B.[Bin],
Wang, W.[Wen],
Halftone Visual Cryptography with Complementary Cover Images,
IWDW16(223-237).
Springer DOI
1703
BibRef
Wang, W.[Wen],
Liu, F.[Feng],
Guo, T.[Teng],
Ren, Y.W.[Ya-Wei],
Temporal Integration Based Visual Cryptography Scheme and Its
Application,
IWDW17(406-419).
Springer DOI
1708
BibRef
Earlier: A4, A2, A1, Only:
Collusive Attacks to Partition Authentication Visual Cryptography
Scheme,
IWDW16(238-250).
Springer DOI
1703
BibRef
Dutta, S.[Sabyasachi],
Roy, P.S.[Partha Sarathi],
Adhikari, A.[Avishek],
Sakurai, K.[Kouichi],
On the Robustness of Visual Cryptographic Schemes,
IWDW16(251-262).
Springer DOI
1703
BibRef
Goel, A.,
Chaudhari, K.,
Median based pixel selection for partial image encryption,
IPTA16(1-5)
IEEE DOI
1703
cryptography
BibRef
Wen, W.,
Zhang, Y.,
Fang, Y.,
Fang, Z.,
A novel selective image encryption method based on saliency detection,
VCIP16(1-4)
IEEE DOI
1701
Discrete wavelet transforms
BibRef
Fatahbeygi, A.,
Akhlaghian, F.,
A new robust semi-blind image watermarking based on block
classification and visual cryptography,
IPRIA15(1-6)
IEEE DOI
1603
cryptography
BibRef
Belkaid, B.M.,
Mourad, L.,
Mehdi, C.,
Soltane, A.,
Secure transfer of medical images using hybrid encryption:
Authentication, confidentiality, integrity,
ICCVIA15(1-6)
IEEE DOI
1603
authorisation
BibRef
Jolfaei, A.[Alireza],
Wu, X.W.[Xin-Wen],
Muthukkumarasamy, V.[Vallipuram],
A Secure Lightweight Texture Encryption Scheme,
VSWS15(344-356).
Springer DOI
1603
BibRef
Wang, D.S.[Dao-Shun],
Yi, F.[Feng],
Yang, C.N.[Ching-Nung],
Visual Cryptography Scheme with Autostereogram,
IWDW14(364-375).
Springer DOI
1602
BibRef
Chen, Y.C.[Yu-Chi],
Lu, K.H.[Kun-Han],
Tso, R.L.[Ray-Lin],
Wu, M.E.[Mu-En],
An Improved Visual Cryptography with Cheating Prevention,
IWDW14(444-454).
Springer DOI
1602
BibRef
Liu, F.[Feng],
Wu, C.K.[Chuan-Kun],
Optimal XOR Based (2,n)-Visual Cryptography Schemes,
IWDW14(333-349).
Springer DOI
1602
BibRef
Liu, S.C.[Shen-Chuan],
Fujiyoshi, M.[Masaaki],
Kiya, H.[Hitoshi],
A cheat preventing method with efficient pixel expansion for
Naor-Shamir's visual cryptography,
ICIP14(5527-5531)
IEEE DOI
1502
Cloud computing
BibRef
Eluard, M.[Marc],
Maetz, Y.[Yves],
Doerr, G.[Gwenael],
Impact of geometry-preserving encryption on rendering time,
ICIP14(4787-4791)
IEEE DOI
1502
Collaboration
BibRef
Moreno Cañadas, A.[Agustín],
Palma Vanegas, N.P.[Nelly Paola],
Hernández Quitián, M.[Margoth],
Visual Cryptography Schemes Based in k -Linear Maps,
IWDW13(288-302).
Springer DOI
1407
BibRef
Panduranga, H.T.,
Kumar, H.S.S.[H.S. Sharath],
Kumar, S.K.N.[S.K. Naveen],
Hybrid approach for dual image encryption using nibble exchange and
Hill-cipher,
IMVIP12(101-104).
IEEE DOI
1302
BibRef
Liu, F.[Feng],
Guo, T.[Teng],
Wu, C.[ChuanKun],
Yang, C.N.[Ching-Nung],
Flexible Visual Cryptography Scheme without Distortion,
IWDW11(211-227).
Springer DOI
1208
BibRef
Di, H.[Hong],
Zheng, K.F.[Kang-Feng],
Niu, X.X.[Xin-Xin],
Zhang, X.[Xin],
Multiple-image compressed encryption and decryption by compressive
holography,
VCIP11(1-4).
IEEE DOI
1201
BibRef
Bajaj, N.[Nikesh],
Thakur, A.[Amit],
Enhancement of RC5 for image encryption,
ICIIP11(1-5).
IEEE DOI
1112
BibRef
Petrauskiene, V.,
Ragulskiene, J.,
Sakyte, E.,
Ragulskis, M.,
Near-Optimal Time Function for Secure Dynamic Visual Cryptography,
ISVC11(II: 300-309).
Springer DOI
1109
BibRef
Zhao, L.[Liang],
Adhikari, A.[Avishek],
Sakurai, K.[Kouichi],
A New Scrambling Evaluation Scheme Based on Spatial Distribution
Entropy and Centroid Difference of Bit-Plane,
DW10(29-44).
Springer DOI
1010
BibRef
Zhao, L.[Liang],
Adhikari, A.[Avishek],
Xiao, D.[Di],
Sakurai, K.[Kouichi],
Cryptanalysis on an Image Scrambling Encryption Scheme Based on Pixel
Bit,
DW10(45-59).
Springer DOI
1010
BibRef
Mayouf, M.A.[Mabroka Ali],
Shukur, Z.[Zarina],
Using Animation in Active Learning Tool to Detect Possible Attacks in
Cryptographic Protocols,
IVIC09(510-520).
Springer DOI
0911
BibRef
Rane, S.D.[Shantanu D.],
Sun, W.[Wei],
Vetro, A.[Anthony],
Secure distortion computation among untrusting parties using
homomorphic encryption,
ICIP09(1485-1488).
IEEE DOI
0911
BibRef
Zhang, J.H.[Jian-Hong],
Chen, H.[Hua],
Geng, Q.[Qin],
Cryptoanalysis of Certificateless Partially Blind Signature and Proxy
Blind Signature Scheme,
CISP09(1-5).
IEEE DOI
0910
BibRef
Zhang, J.H.[Jian-Hong],
Gao, S.N.[Sheng-Nan],
Cryptoanlaysis of Two Proxy Blind Signature Schemes with Proxy
Revocation,
CISP09(1-4).
IEEE DOI
0910
BibRef
Lang, J.[Jun],
Tao, R.[Ran],
Wang, Y.[Yue],
The Generalized Weighted Fractional Fourier Transform and its
Application to Image Encryption,
CISP09(1-5).
IEEE DOI
0910
BibRef
Xiao, Y.[Yu],
Zhang, H.Y.[Hai-Ying],
Ran, Q.W.[Qi-Wen],
Zhang, J.[Jin],
Tan, L.Y.[Li-Ying],
Image Encryption and Two Dimensional Discrete M-Parameter Fractional
Fourier Transform,
CISP09(1-4).
IEEE DOI
0910
BibRef
Weir, J.[Jonathan],
Yan, W.Q.[Wei-Qi],
Authenticating Visual Cryptography Shares Using 2D Barcodes,
IWDW11(196-210).
Springer DOI
1208
BibRef
Earlier:
Plane Transform Visual Cryptography,
DW10(60-74).
Springer DOI
1010
BibRef
Earlier:
Image Hatching for Visual Cryptography,
IMVIP09(59-64).
IEEE DOI
0909
BibRef
And:
Dot-Size Variant Visual Cryptography,
DW09(136-148).
Springer DOI
0908
BibRef
Piper, F.[Fred],
The Changing Face of Cryptography,
DW09(2).
Springer DOI
0908
BibRef
Du, Y.F.[Yan-Fang],
Zhang, J.[Jing],
Su, Y.T.[Yu-Ting],
Watermarking for Authentication of LZ-77 Compressed Documents,
DW07(365-372).
Springer DOI
0712
BibRef
Luo, H.[Hao],
Lu, Z.M.[Zhe-Ming],
Pan, J.S.[Jeng-Shyang],
Multiple Watermarking in Visual Cryptography,
DW07(60-70).
Springer DOI
0712
BibRef
Sadeghi, A.R.[Ahmad-Reza],
The Marriage of Cryptography and Watermarking:
Beneficial and Challenging for Secure Watermarking and Detection,
DW07(2-18).
Springer DOI
0712
BibRef
He, D.[Dake],
Jagmohan, A.[Ashish],
Lu, L.G.[Li-Gang],
Secure collaboration using Slepian-Wolf codes,
ICIP08(2216-2219).
IEEE DOI
0810
BibRef
Seshadrinathan, M.[Manoj],
Dempski, K.L.[Kelly L.],
Implementation of Advanced Encryption Standard for encryption and
decryption of images and text on a GPU,
CVGPU08(1-6).
IEEE DOI
0806
BibRef
Alface, P.R.[Patrice Rondao],
Macq, B.[Benoit],
Cayre, F.[Francois],
Blind and Robust Watermarking of 3D Models:
How to Withstand the Cropping Attack?,
ICIP07(V: 465-468).
IEEE DOI
0709
BibRef
Huang, T.J.[Tie-Jun],
Evolvement of DRM Schema: From Encryption to Interoperability and
Monitoring,
MCAM07(65-75).
Springer DOI
0706
BibRef
Lai, J.C.[Jen-Chieh],
Wang, C.H.[Chia-Hui],
Buffer Occupancy Feedback Security Control and Changing Encryption Keys
to Protect MOD Services,
PSIVT06(888-897).
Springer DOI
0612
BibRef
Li, W.H.[Wei-Hai],
Yuan, Y.[Yuan],
Visual Information Encryption in Frequency Domain: Risk and Enhancement,
IWICPAS06(225-234).
Springer DOI
0608
BibRef
Wong, A.,
Bishop, W.,
Expert Knowledge Based Automatic Regions-of-Interest (ROI) Selection in
Scanned Documents for Digital Image Encryption,
CRV06(51-51).
IEEE DOI
0607
BibRef
Said, A.,
Measuring the Strength of Partial Encryption Schemes,
ICIP05(II: 1126-1129).
IEEE DOI
0512
BibRef
Katzenbeisser, S.[Stefan],
On the Integration of Watermarks and Cryptography,
DW03(50-60).
Springer DOI
0405
BibRef
Li, S.J.[Shu-Jun],
Zheng, X.[Xuan],
On the security of an image encryption method,
ICIP02(II: 925-928).
IEEE DOI
0210
BibRef
Yamaguchi, Y.S.[Yasu-Shi],
An Extended Visual Cryptography Scheme for Continuous-Tone Images,
IWDW11(228-242).
Springer DOI
1208
BibRef
Nakajima, M.,
Yamaguchi, Y.S.[Yasu-Shi],
Extended Visual Cryptography for Natural Images,
WSCG02(303).
HTML Version.
0209
BibRef
Chen, Y.C.,
Chang, L.W.,
A Secure and Robust Digital Watermarking Technique by the Block Cipher
Rc6 and Secure Hash Algorithm,
ICIP01(II: 518-521).
IEEE DOI
0108
BibRef
Bhattacharjee, S.,
Kutter, M.,
Compression tolerant image authentication,
ICIP98(I: 435-439).
IEEE DOI
9810
BibRef
Creusere, C.D.,
Mitra, S.K.,
Efficient image scrambling using polyphase filter banks,
ICIP94(II: 81-85).
IEEE DOI
9411
BibRef
Chapter on OCR, Document Analysis and Character Recognition Systems continues in
Encryption based on Chaos, Chaotic Process .