25.3.12.8 Encryption, Visual Cryptography, Authentication

Chapter Contents (Back)
Encryption. Image Encryption. Cryptography. Visual Cryptography. Not really watermarks. Usually the more specific papers. chaos-encrypt-section
And:
See also Encryption or JPEG Coded Images, JPEG and Encryption.
See also Video Encryption, Video Cryptography, Authentication.

Chuang, T.J., Lin, J.C.,
New Approach to Image Encryption,
JEI(7), No. 2, April 1998, pp. 350-356. 9807
BibRef

Chung, K.L., Chang, L.C.,
Large Encrypting Binary Images with Higher Security,
PRL(19), No. 5-6, April 1998, pp. 461-468. 9808

See also Cryptanalysis of an encryption scheme for binary images. BibRef

Aikawa, M., Takaragi, K., Furuya, S., Sasamoto, M.,
A Lightweight Encryption Method Suitable For Copyright Protection,
Consumer(44), No. 3, August 1998, pp. 902-910. 9810
BibRef

Maniccam, S.S., Bourbakis, N.G.,
Lossless image compression and encryption using SCAN,
PR(34), No. 6, June 2001, pp. 1229-1245.
Elsevier DOI 0103
Encryption. BibRef

Maniccam, S.S., Bourbakis, N.G.,
Image and video encryption using SCAN patterns,
PR(37), No. 4, April 2004, pp. 725-737.
Elsevier DOI 0403
BibRef

Chang, C.C.[Chin-Chen], Chuang, J.C.[Jun-Chou],
An image intellectual property protection scheme for gray-level images using visual secret sharing strategy,
PRL(23), No. 8, June 2002, pp. 931-941.
Elsevier DOI 0204
BibRef

Chang, C.C.[Chin-Chen], Yu, T.X.[Tai-Xing],
Cryptanalysis of an encryption scheme for binary images,
PRL(23), No. 14, December 2002, pp. 1847-1852.
Elsevier DOI 0208
Shows how earlier method (
See also Large Encrypting Binary Images with Higher Security. ) can be broken. BibRef

Chang, C.C., Hwang, K.F., Hwang, M.S.,
Robust authentication scheme for protecting copyrights of images and graphics,
VISP(149), No. 1, February 2002, pp. 43-50.
IEEE Top Reference. 0205
BibRef

Lin, C.C.[Chang-Chou], Tsai, W.H.[Wen-Hsiang],
Visual cryptography for gray-level images by dithering techniques,
PRL(24), No. 1-3, January 2003, pp. 349-358.
Elsevier DOI 0211
BibRef

Hou, Y.C.[Young-Chang],
Visual cryptography for color images,
PR(36), No. 7, July 2003, pp. 1619-1629.
Elsevier DOI 0304
BibRef

Zhao, Y., Campisi, P., Kundur, D.,
Dual Domain Watermarking for Authentication and Compression of Cultural Heritage Images,
IP(13), No. 3, March 2004, pp. 430-448.
IEEE DOI 0404
BibRef

Maiorana, E.[Emanuele], Campisi, P.[Patrizio],
High-capacity watermarking of high dynamic range images,
JIVP(2016), No. 1, 2016, pp. 3.
DOI Link 1601
BibRef

Lukac, R.[Rastislav], Plataniotis, K.N.[Konstantinos N.],
Bit-level based secret sharing for image encryption,
PR(38), No. 5, May 2005, pp. 767-772.
Elsevier DOI 0501
BibRef
Earlier:
Document image secret sharing using bit-level processing,
ICIP04(V: 2893-2896).
IEEE DOI 0505
BibRef

Lukac, R.[Rastislav], Plataniotis, K.N.[Konstantinos N.],
A cost-effective encryption scheme for color images,
RealTimeImg(11), No. 5-6, October-December 2005, pp. 454-464.
Elsevier DOI 0510
BibRef

Heidarinejad, M.[Mohsen], Plataniotis, K.N.[Konstantinos N.],
A second generation Visual Secret Sharing scheme for color images,
ICIP08(481-484).
IEEE DOI 0810
BibRef

Celik, M.U., Sharma, G., Tekalp, A.M.,
Lossless Watermarking for Image Authentication: A New Framework and an Implementation,
IP(15), No. 4, April 2006, pp. 1042-1049.
IEEE DOI 0604
BibRef

Wang, R.Z.[Ran-Zan],
Region Incrementing Visual Cryptography,
SPLetters(16), No. 8, August 2009, pp. 659-662.
IEEE DOI 0906
BibRef

Amador, J.J.[José J.], Green, R.W.[Robert W.],
Symmetric-key block cipher for image and text cryptography,
IJIST(15), No. 3, 2005, pp. 178-188.
DOI Link 0510
BibRef

Hu, C.M., Tzeng, W.G.,
Cheating Prevention in Visual Cryptography,
IP(16), No. 1, January 2007, pp. 36-45.
IEEE DOI 0701

See also Comment on Cheating Prevention in Visual Cryptography. BibRef

Chen, R.J.[Rong-Jian], Lai, J.L.[Jui-Lin],
Image security system using recursive cellular automata substitution,
PR(40), No. 5, May 2007, pp. 1621-1631.
Elsevier DOI 0702
Image processing; Cellular automata; Image security; Encryption; Decryption BibRef

Wang, D.S.[Dao-Shun], Zhang, L.[Lei], Ma, N.[Ning], Li, X.B.[Xiao-Bo],
Two secret sharing schemes based on Boolean operations,
PR(40), No. 10, October 2007, pp. 2776-2785.
Elsevier DOI 0707
Secret sharing scheme; Visual secret sharing; Visual cryptography; Computation complexity; Pixel expansion BibRef

Yang, C.N.[Ching-Nung], Yu, K.H.[Kun-Hsuan], Lukac, R.[Rastislav],
User-friendly image sharing using polynomials with different primes,
IJIST(17), No. 1, 2007, pp. 40-47.
DOI Link 0707
BibRef

Lin, S.J.[Sian-Jheng], Lin, J.C.[Ja-Chen],
VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches,
PR(40), No. 12, December 2007, pp. 3652-3666.
Elsevier DOI 0709
Hiding using block-types; Image sharing; (t,n) threshold scheme; Halftone version; Compression BibRef

Shyu, S.J.[Shyong Jian], Huang, S.Y.[Shih-Yu], Lee, Y.K.[Yeuan-Kuen], Wang, R.Z.[Ran-Zan], Chen, K.[Kun],
Sharing multiple secrets in visual cryptography,
PR(40), No. 12, December 2007, pp. 3633-3651.
Elsevier DOI 0709
Secret sharing; Visual cryptography; Visual multi-secret sharing BibRef

Fang, W.P.[Wen-Pinn],
Friendly progressive visual secret sharing,
PR(41), No. 4, April 2008, pp. 1410-1414.
Elsevier DOI 0801
Visual cryptography; Progress; Secret sharing; Friendly BibRef

Li, S., Li, C., Lo, K.T., Chen, G.,
Cryptanalysis of an Image Scrambling Scheme Without Bandwidth Expansion,
CirSysVideo(18), No. 3, March 2008, pp. 338-349.
IEEE DOI 0804
BibRef

Lin, Q.H.[Qiu-Hua], Yin, F.L.[Fu-Liang], Mei, T.M.[Tie-Min], Liang, H.L.[Hua-Lou],
A blind source separation-based method for multiple images encryption,
IVC(26), No. 6, 1 June 2008, pp. 788-798.
Elsevier DOI 0804
Blind source separation; Independent component analysis; Image encryption BibRef

Yang, C.N.[Ching-Nung], Chen, T.S.[Tse-Shih],
Colored visual cryptography scheme based on additive color mixing,
PR(41), No. 10, October 2008, pp. 3114-3129.
Elsevier DOI 0808
Visual cryptography; Visual secret sharing; Colored visual cryptography; Additive color mixing BibRef

Naughton, T.J.[Thomas J.], Hennelly, B.M.[Bryan M.], Dowling, T.[Tom],
Introducing secure modes of operation for optical encryption,
JOSA-A(25), No. 10, October 2008, pp. 2608-2617.
WWW Link. 0810
BibRef

Leung, B.W.[Bert W.], Ng, F.Y.[Felix Y.], Wong, D.S.[Duncan S.],
On the security of a visual cryptography scheme for color images,
PR(42), No. 5, May 2009, pp. 929-940.
Elsevier DOI 0902
Visual cryptography; Dithering technology; Color decomposition; Secret sharing; Cryptanalysis BibRef

Wang, D.S.[Dao-Shun], Yi, F.[Feng], Li, X.B.[Xiao-Bo],
On general construction for extended visual cryptography schemes,
PR(42), No. 11, November 2009, pp. 3071-3082.
Elsevier DOI 0907
Visual cryptography; Secret sharing scheme; Multi-secret images BibRef

Liu, W., Zeng, W., Dong, L., Yao, Q.,
Efficient Compression of Encrypted Grayscale Images,
IP(19), No. 4, April 2010, pp. 1097-1102.
IEEE DOI 1003
BibRef

Kang, I., Arce, G.R., Lee, H.K.,
Color Extended Visual Cryptography Using Error Diffusion,
IP(20), No. 1, January 2011, pp. 132-145.
IEEE DOI 1101
BibRef

Hou, Y.C., Quan, Z.Y.,
Progressive Visual Cryptography With Unexpanded Shares,
CirSysVideo(21), No. 11, November 2011, pp. 1760-1764.
IEEE DOI 1111
BibRef

Wang, R.Z.[Ran-Zan], Hsu, S.F.[Shuo-Fang],
Tagged Visual Cryptography,
SPLetters(18), No. 11, November 2011, pp. 627-630.
IEEE DOI 1112
BibRef

Liu, F.[Feng], Guo, T.[Teng], Wu, C.K.[Chuan-Kun], Qian, L.[Lina],
Improving the visual quality of size invariant visual cryptography scheme,
JVCIR(23), No. 2, February 2012, pp. 331-342.
Elsevier DOI 1201
Visual cryptography; Visual quality; Size invariant; Secret sharing; Thin line problem; Variance; Multi-pixel encryption; Probabilistic visual cryptography scheme BibRef

Imaizumi, S.[Shoko], Kiya, H.[Hitoshi],
A Block-Permutation-Based Encryption Scheme with Independent Processing of RGB Components,
IEICE(E101-D), No. 12, December 2018, pp. 3150-3157.
WWW Link. 1812
BibRef

Imaizumi, S.[Shoko], Ogasawara, T.[Takeshi], Kiya, H.[Hitoshi],
Block-Permutation-Based Encryption Scheme with Enhanced Color Scrambling,
SCIA17(I: 562-573).
Springer DOI 1706
BibRef

Shyu, S.J., Jiang, H.W.,
Efficient Construction for Region Incrementing Visual Cryptography,
CirSysVideo(22), No. 5, May 2012, pp. 769-777.
IEEE DOI 1202
BibRef

Yang, C.N., Shih, H.W., Wu, C.C., Harn, L.,
k Out of n Region Incrementing Scheme in Visual Cryptography,
CirSysVideo(22), No. 5, May 2012, pp. 799-810.
IEEE DOI 1202
BibRef

Yang, C.N.[Ching-Nung], Wu, C.C.[Chih-Cheng], Lin, Y.C.[Yi-Chin],
k Out of n Region-Based Progressive Visual Cryptography,
CirSysVideo(29), No. 1, January 2019, pp. 252-262.
IEEE DOI 1901
BibRef
Earlier: A1, A3, A2:
Cheating Immune Block-Based Progressive Visual Cryptography,
IWDW13(95-108).
Springer DOI 1407
Visualization, Cryptography, Image color analysis, Image reconstruction, Stacking, Decoding, Visual secret sharing, progressive decoding BibRef

Win, L.L., Thomas, T., Emmanuel, S.,
Privacy Enabled Digital Rights Management Without Trusted Third Party Assumption,
MultMed(14), No. 3, 2012, pp. 546-554.
IEEE DOI 1202
BibRef

Chen, Y.C., Horng, G., Tsai, D.S.,
Comment on 'Cheating Prevention in Visual Cryptography',
IP(21), No. 7, July 2012, pp. 3319-3323.
IEEE DOI 1206

See also Cheating Prevention in Visual Cryptography. BibRef

Dalhoum, A.L.A.[Abdel Latif Abu], Mahafzah, B.A.[Basel A.], Awwad, A.A.[Aiman Ayyal], Aldhamari, I.[Ibraheem], Ortega, A.[Alfonso], Alfonseca, M.[Manuel],
Digital Image Scrambling Using 2D Cellular Automata,
MultMedMag(19), No. 4, 2012, pp. 28-36.
IEEE DOI 1210
based on game of life. BibRef

Lin, H.C.[Hsiao-Ching], Yang, C.N.[Ching-Nung], Laih, C.S.[Chi-Sung], Lin, H.T.[Hui-Tang],
Natural language letter based visual cryptography scheme,
JVCIR(24), No. 3, April 2013, pp. 318-331.
Elsevier DOI 1303
Deterministic VCS; Letter-based; Natural language; Probabilistic VCS; Secret sharing; Subpixel; Visual cryptography scheme; Visual secret sharing BibRef

Lima, J.B., Lima, E.A.O., Madeiro, F.,
Image encryption based on the finite field cosine transform,
SP:IC(28), No. 10, 2013, pp. 1537-1547.
Elsevier DOI 1312
Image encryption BibRef

Lima, J.B., da Silva, E.S., Campello de Souza, R.M.,
Cosine transforms over fields of characteristic 2: Fast computation and application to image encryption,
SP:IC(54), No. 1, 2017, pp. 130-139.
Elsevier DOI 1704
Finite field cosine transform BibRef

Lima, J.B., Madeiro, F., Sales, F.J.R.,
Encryption of medical images based on the cosine number transform,
SP:IC(35), No. 1, 2015, pp. 1-8.
Elsevier DOI 1506
Medical images BibRef

Li, P.[Peng], Yang, C.N.[Ching-Nung], Kong, Q.[Qian], Ma, Y.P.[Yan-Peng], Liu, Z.[Zheng],
Sharing more information in gray visual cryptography scheme,
JVCIR(24), No. 8, 2013, pp. 1380-1393.
Elsevier DOI 1312
Visual cryptography BibRef

Yang, C.N.[Ching-Nung], Wang, D.S.[Dao-Shun],
Property Analysis of XOR-Based Visual Cryptography,
CirSysVideo(24), No. 2, February 2014, pp. 189-197.
IEEE DOI 1403
cryptography BibRef

Wang, X., Pei, Q., Li, H.,
A Lossless Tagged Visual Cryptography Scheme,
SPLetters(21), No. 7, July 2014, pp. 853-856.
IEEE DOI 1405
Cryptography BibRef

Czaplewski, B.[Bartosz], Dzwonkowski, M.[Mariusz], Rykaczewski, R.[Roman],
Digital fingerprinting for color images based on the quaternion encryption scheme,
PRL(46), No. 1, 2014, pp. 11-19.
Elsevier DOI 1407
Cryptography BibRef

Czaplewski, B.[Bartosz],
Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher quaternion chaining,
JVCIR(40, Part A), No. 1, 2016, pp. 1-13.
Elsevier DOI 1609
Fingerprinting BibRef

Li, C.Q.[Cheng-Qing], Liu, Y.S.[Yuan-Sheng], Zhang, L.Y.[Leo Yu], Wong, K.W.[Kwok-Wo],
Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem,
SP:IC(29), No. 8, 2014, pp. 914-920.
Elsevier DOI 1410
Compression BibRef

Ziyabar, H.M.[Hashem Moradmand], Sinaie, M.[Mahnaz], Payandeh, A.[Ali], Payandeh, A.[Ali], Vakili, V.T.[Vahid Tabataba],
Secure FSM-based arithmetic codes,
SIViP(8), No. 7, October 2014, pp. 1263-1272.
Springer DOI 1410
atithmetic coding for compression and secrecy. BibRef

Abd-El-Hafiz, S.K., Radwan, A.G., Haleem, S.H.A.[S.H. Abdel], Barakat, M.L.,
A fractal-based image encryption system,
IET-IPR(8), No. 12, 2014, pp. 742-752.
DOI Link 1412
cryptography BibRef

Bai, X.[Xiao], Yang, H.[Haichuan], Zhou, J.[Jun], Ren, P.[Peng], Cheng, J.[Jian],
Data-Dependent Hashing Based on p-Stable Distribution,
IP(23), No. 12, December 2014, pp. 5033-5046.
IEEE DOI 1412
cryptography BibRef

Ullagaddi, V.[Vishwanath], Hassan, F.[Firas], Devabhaktuni, V.[Vijay],
Symmetric synchronous stream encryption using images,
SIViP(9), No. 1, January 2015, pp. 1-8.
Springer DOI 1503
Use bit plane from an image for encryption of stream. (Not encrypt an image.) BibRef

Sun, Y.Y.[Yuan-Yuan], Xu, R.[Rudan], Chen, L.[Lina], Hu, X.P.[Xiao-Peng],
Image compression and encryption scheme using fractal dictionary and Julia set,
IET-IPR(9), No. 3, 2015, pp. 173-183.
DOI Link 1504
cryptography BibRef

Wadi, S.M., Zainal, N.,
Decomposition by binary codes-based speedy image encryption algorithm for multiple applications,
IET-IPR(9), No. 5, 2015, pp. 413-423.
DOI Link 1506
binary codes BibRef

Nini, B., Lemmouchi, C.,
Security analysis of a three-dimensional rotation-based image encryption,
IET-IPR(9), No. 8, 2015, pp. 680-689.
DOI Link 1506
cryptography BibRef

Shyu, S.J., Chen, M.C.,
Minimizing Pixel Expansion in Visual Cryptographic Scheme for General Access Structures,
CirSysVideo(25), No. 9, September 2015, pp. 1557-1561.
IEEE DOI 1509
Cryptography BibRef

Dzwonkowski, M., Papaj, M., Rykaczewski, R.,
A New Quaternion-Based Encryption Method for DICOM Images,
IP(24), No. 11, November 2015, pp. 4614-4622.
IEEE DOI 1509
DICOM BibRef

Yang, C.N.[Ching-Nung], Wu, C.C.[Chih-Cheng], Lin, Y.C.[Yi-Chin], Kim, C.[Cheonshik],
Constructions and Properties of General (k, n) Block-Based Progressive Visual Cryptography,
ETRI(37), No. 5, October 2015, pp. 979-989.
DOI Link 1511
BibRef

Zhang, Y.S.[Yu-Shu], Wong, K.W.[Kwok-Wo], Zhang, L.Y.[Leo Yu], Wen, W.Y.[Wen-Ying], Zhou, J.T.[Jian-Tao], He, X.[Xing],
Robust coding of encrypted images via structural matrix,
SP:IC(39, Part A), No. 1, 2015, pp. 202-211.
Elsevier DOI 1512
Multiple description code BibRef

Islam, N.[Naveed], Shahid, Z.[Zafar], Puech, W.[William],
Denoising and error correction in noisy AES-encrypted images using statistical measures,
SP:IC(41), No. 1, 2016, pp. 15-27.
Elsevier DOI 1602
BibRef
And: A1, A3, Only:
Decryption of noisy encrypted images by statistical analysis,
EUVIP11(192-198).
IEEE DOI 1110
Cryptosystem. BibRef

Fawaz, Z.[Zeinab], Noura, H.[Hassan], Mostefaoui, A.[Ahmed],
An efficient and secure cipher scheme for images confidentiality preservation,
SP:IC(42), No. 1, 2016, pp. 90-108.
Elsevier DOI 1603
Security BibRef

Ye, G., Huang, X.,
An Image Encryption Algorithm Based on Autoblocking and Electrocardiography,
MultMedMag(23), No. 2, April 2016, pp. 64-71.
IEEE DOI 1605
Algorithm design and analysis BibRef

Chen, C.C.[Chien-Chang], Chen, S.C.[Shih-Chang],
Two-layered structure for optimally essential secret image sharing scheme,
JVCIR(38), No. 1, 2016, pp. 595-601.
Elsevier DOI 1605
Secret image sharing BibRef

Chen, C.C.[Chien-Chang],
Essential secret image sharing scheme with equal-sized shadows generation,
JVCIR(52), 2018, pp. 143 - 150.
Elsevier DOI 1804
Secret image sharing, Essential, Non-essential, Three-layered structure BibRef

Yang, C.N.[Ching-Nung], Sun, L.Z.[Li-Zhe], Yan, X.[Xuehu], Kim, C.[Cheonshik],
Design a new visual cryptography for human-verifiable authentication in accessing a database,
RealTimeIP(12), No. 2, August 2016, pp. 483-494.
Springer DOI 1608
BibRef

Karabina, K.[Koray], Canpolat, O.[Onur],
A new cryptographic primitive for noise tolerant template security,
PRL(80), No. 1, 2016, pp. 70-75.
Elsevier DOI 1609
Template security BibRef

Yap, W.S.[Wun-She], Phan, R.C.W.[Raphael C.W.], Goi, B.M.[Bok-Min], Yau, W.C.[Wei-Chuen], Heng, S.H.[Swee-Huay],
On the effective subkey space of some image encryption algorithms using external key,
JVCIR(40, Part A), No. 1, 2016, pp. 51-57.
Elsevier DOI 1609
Image encryption BibRef

Murugan, B., Gounder, A.G.N.[A. G. Nanjappa],
Image encryption scheme based on block-based confusion and multiple levels of diffusion,
IET-CV(10), No. 6, 2016, pp. 593-602.
DOI Link 1609
cryptography BibRef

Shao, Z.H.[Zhu-Hong], Shang, Y.Y.[Yuan-Yuan], Zeng, R.[Rui], Shu, H.Z.[Hua-Zhong], Coatrieux, G.[Gouenou], Wu, J.S.[Jia-Song],
Robust watermarking scheme for color image based on quaternion-type moment invariants and visual cryptography,
SP:IC(48), No. 1, 2016, pp. 12-21.
Elsevier DOI 1609
Color image BibRef

Wang, Y.F.[Yun-Fei], Shang, Y.Y.[Yuan-Yuan], Shao, Z.H.[Zhu-Hong], Zhang, Y.[Yan], Coatrieux, G.[Gouenou], Ding, H.[Hui], Liu, T.[Tie],
Multiple color image encryption based on cascaded quaternion gyrator transforms,
SP:IC(107), 2022, pp. 116793.
Elsevier DOI 2208
Multiple color image encryption, Cascaded encryption structure, Quaternion gyrator transform BibRef

Shao, Z.H.[Zhu-Hong], Wu, J.S.[Jia-Song], Coatrieux, J.L.[Jean Louis], Coatrieux, G.[Gouenou], Shu, H.Z.[Hua-Zhong],
Quaternion gyrator transform and its application to color image encryption,
ICIP13(4579-4582)
IEEE DOI 1402
Quaternion gyrator transform; color image; encryption BibRef

Annaby, M.H., Rushdi, M.A., Nehary, E.A.,
Image encryption via discrete fractional Fourier-type transforms generated by random matrices,
SP:IC(49), No. 1, 2016, pp. 25-46.
Elsevier DOI 1609
Discrete fractional Fourier transform BibRef

Yang, C.N.[Ching-Nung], Liao, J.K.[Jung-Kuo], Wang, D.S.[Dao-Shun],
New privilege-based visual cryptography with arbitrary privilege levels,
JVCIR(42), No. 1, 2017, pp. 121-131.
Elsevier DOI 1701
Visual cryptography BibRef

Cao, X.W.[Xing-Wu], Wei, X.X.[Xing-Xing], Guo, R.[Rui], Wang, C.C.[Chang-Chun],
No embedding: A novel image cryptosystem for meaningful encryption,
JVCIR(44), No. 1, 2017, pp. 236-249.
Elsevier DOI 1703
Image encryption BibRef

Huang, H.Q.[Hui-Qing], Yang, S.Z.[Shou-Zhi],
Colour image encryption based on logistic mapping and double random-phase encoding,
IET-IPR(11), No. 4, April 2017, pp. 211-216.
DOI Link 1704
BibRef

Li, C., Lin, D., Lü, J.,
Cryptanalyzing an Image-Scrambling Encryption Algorithm of Pixel Bits,
MultMedMag(24), No. 3, 2017, pp. 64-71.
IEEE DOI 1708
Algorithm design and analysis, Ciphers, Cryptography, Encryption, Image processing, Mathematical model, Multimedia communication, Visualization, ciphertext-only attack, cryptanalysis, cryptography, graphics, image encryption, known-plaintext attack, multimedia, security, template, matching BibRef

Yang, C.N.[Ching-Nung], Wu, X.T.[Xiao-Tian], Chou, Y.C.[Yung-Chien], Fu, Z.J.[Zhang-Jie],
Constructions of general reversible AMBTC-based visual cryptography with two decryption options,
JVCIR(48), No. 1, 2017, pp. 182-194.
Elsevier DOI 1708
Visual, cryptography BibRef

Bao, L., Yi, S., Zhou, Y.,
Combination of Sharing Matrix and Image Encryption for Lossless (k,n)-Secret Image Sharing,
IP(26), No. 12, December 2017, pp. 5618-5631.
IEEE DOI 1710
cryptography, image reconstruction, sharing matrix, Algorithm design and analysis, Distortion, BibRef

Boussif, M.[Mohamed], Aloui, N.[Noureddine], Cherif, A.[Adnane],
Smartphone application for medical images secured exchange based on encryption using the matrix product and the exclusive addition,
IET-IPR(11), No. 11, November 2017, pp. 1020-1026.
DOI Link 1711
BibRef

Cho, W., Yu, N.Y.,
Secure Communications With Asymptotically Gaussian Compressed Encryption,
SPLetters(25), No. 1, January 2018, pp. 80-84.
IEEE DOI 1801
Gaussian processes, cryptography, telecommunication security, wireless channels, Hellinger distance, TV distance, total variation (TV) distance BibRef

Wang, C.T.[Chun-Tao], Xiao, D.Q.[De-Qing], Peng, H.X.[Hong-Xing], Zhang, R.Y.[Rong-Yue],
A lossy compression scheme for encrypted images exploiting Cauchy distribution and weighted rate distortion optimization,
JVCIR(51), 2018, pp. 122-130.
Elsevier DOI 1802
Compression of encrypted signals, Statistical model, Rate-distortion optimization, Lifting wavelet BibRef

Jia, X., Wang, D., Nie, D., Zhang, C.,
Collaborative Visual Cryptography Schemes,
CirSysVideo(28), No. 5, May 2018, pp. 1056-1070.
IEEE DOI 1805
Collaboration, Cryptography, Image reconstruction, Information security, Integer linear programming, Visualization, visual cryptography (VC) scheme BibRef

Kaur, M.[Manjit], Kumar, V.[Vijay],
Colour image encryption technique using differential evolution in non-subsampled contourlet transform domain,
IET-IPR(12), No. 7, July 2018, pp. 1273-1283.
DOI Link 1806
BibRef

Yang, C.N.[Ching-Nung], Wu, F.H.[Fu-Heng], Peng, S.L.[Sheng-Lung],
Enhancing multi-factor cheating prevention in visual cryptography based minimum (k, n)-connected graph,
JVCIR(55), 2018, pp. 660-676.
Elsevier DOI 1809
Visual cryptography, Cheating attack, Cheating prevention, Verification image, Shadow image BibRef

Dzwonkowski, M., Rykaczewski, R.,
Secure Quaternion Feistel Cipher for DICOM Images,
IP(28), No. 1, January 2019, pp. 371-380.
IEEE DOI 1810
Quaternions, Encryption, DICOM, Ciphers, Cryptography, medical data, quaternion rotation, lossless scheme, Julia sets BibRef

Singh, H.[Hukum],
Watermarking image encryption using deterministic phase mask and singular value decomposition in fractional Mellin transform domain,
IET-IPR(12), No. 11, November 2018, pp. 1994-2001.
DOI Link 1810
BibRef

Yan, B., Xiang, Y., Hua, G.,
Improving the Visual Quality of Size-Invariant Visual Cryptography for Grayscale Images: An Analysis-by-Synthesis (AbS) Approach,
IP(28), No. 2, February 2019, pp. 896-911.
IEEE DOI 1811
Gray-scale, Visualization, Cryptography, Stacking, Image reconstruction, Measurement, vector visual cryptography BibRef

Lobachev, O.[Oleg],
Direct visualization of cryptographic keys for enhanced security,
VC(34), No. 12, December 2018, pp. 1749-1759.
WWW Link. 1811
BibRef

Sharma, H.[Himani], Mishra, D.C., Sharma, R.K., Kumar, N.[Naveen],
Crypto-stego System for Securing Text and Image Data,
IJIG(18), No. 4 2018, pp. 1850020.
DOI Link 1812
BibRef

Li, R.Z.[Ren-Zhi], Liu, Q.[Qian], Liu, L.F.[Ling-Feng],
Novel image encryption algorithm based on improved logistic map,
IET-IPR(13), No. 1, January 2019, pp. 125-134.
DOI Link 1812
BibRef

Chen, B.J.[Bei-Jing], Yu, M.[Ming], Tian, Y.H.[Yu-Hang], Li, L.[Leida], Wang, D.C.[Ding-Cheng], Sun, X.M.[Xing-Ming],
Multiple-parameter fractional quaternion Fourier transform and its application in colour image encryption,
IET-IPR(12), No. 12, December 2018, pp. 2238-2249.
DOI Link 1812
BibRef

Su, Y.R.[Ying-Ri], Wo, Y.[Yan], Han, G.Q.[Guo-Qiang],
Reversible cellular automata image encryption for similarity search,
SP:IC(72), 2019, pp. 134-147.
Elsevier DOI 1902
Image encryption, Image similarity search, Multi-granularity, Reversible cellular automata BibRef

Wu, X.T.[Xiao-Tian], Chen, D.[Dong], Yang, C.N.[Ching-Nung], Yang, Y.Y.[Yi-Yun],
A (k,n) threshold partial reversible AMBTC-based visual cryptography using one reference image,
JVCIR(59), 2019, pp. 550-562.
Elsevier DOI 1903
Visual cryptography, Block truncation coding, Partial reversible, Meaningful share, Contrast, Reference image BibRef

Gondim, M.A.A.[Marcos A.A.], de Oliveira Neto, J.R.[José R.], Lima, J.B.[Juliano B.],
Steerable Fourier number transform with application to image encryption,
SP:IC(74), 2019, pp. 89-95.
Elsevier DOI 1904
Number-theoretic transforms, Steerable transforms, Graph signal processing, Image encryption BibRef

de Oliveira Neto, J.R.[José R.], Lima, J.B.[Juliano B.], Panario, D.,
The Design of a Novel Multiple-Parameter Fractional Number-Theoretic Transform and Its Application to Image Encryption,
CirSysVideo(30), No. 8, August 2020, pp. 2489-2502.
IEEE DOI 2008
Encryption, Eigenvalues and eigenfunctions, Cats, Discrete Fourier transforms, Systematics, image encryption BibRef

Cao, H., Lin, S., Zhang, W., Han, Y.S.,
On the Security of Secret Sharing Over a Ring and the Fast Implementation,
SPLetters(26), No. 5, May 2019, pp. 705-709.
IEEE DOI 1905
computational complexity, cryptography, fast Fourier transforms, polynomials, polynomial secret sharing, secret sharing scheme, fast fourier transform BibRef

Abdmouleh, M.K.[Med Karim], Khalfallah, A.[Ali], Bouhlel, M.S.[Med Salim],
Crypto-compression scheme based on the DWT for medical image security,
IJCVR(9), No. 4, 2019, pp. 340-350.
DOI Link 1908
BibRef

Melgar, M.E.V.[Max E. Vizcarra], Farias, M.C.Q.[Mylène C.Q.],
A (2,2) XOR-based visual cryptography scheme without pixel expansion,
JVCIR(63), 2019, pp. 102592.
Elsevier DOI 1909
Visual cryptography, Visual secret sharing, Color interference BibRef

Noura, H.N.[Hassan N.], Chehab, A.[Ali], Couturier, R.[Raphaël],
Efficient and secure cipher scheme with dynamic key-dependent mode of operation,
SP:IC(78), 2019, pp. 448-464.
Elsevier DOI 1909
Lightweight flexible key-dependent cipher scheme, Dynamic operation mode, Security and performance analysis BibRef

Yu, C.Z.[Chang-Zhi], Li, H.J.[Heng-Jian], Wang, X.[Xiyu],
SVD-based image compression, encryption, and identity authentication algorithm on cloud,
IET-IPR(13), No. 12, October 2019, pp. 2224-2232.
DOI Link 1911
BibRef

Sfar, A.R.[A. Riahi], Challal, Y., Moyal, P., Natalizio, E.,
A Game Theoretic Approach for Privacy Preserving Model in IoT-Based Transportation,
ITS(20), No. 12, December 2019, pp. 4405-4414.
IEEE DOI 2001
Privacy, Games, Sensors, Game theory, Cryptography, Vehicles, Internet of Things, intelligent transportation, privacy, Markov chains BibRef

Zhang, H.[Hao], Wang, X.Q.[Xiao-Qing], Wang, X.Y.[Xing-Yuan], Yan, P.F.[Peng-Fei],
Novel multiple images encryption algorithm using CML system and DNA encoding,
IET-IPR(14), No. 3, 28 February 2020, pp. 518-529.
DOI Link 2002
BibRef

Zhou, L.[Longfu], Bai, S.[Sen], Cao, Y.Q.[Yu-Qiang], Wang, Y.L.[Ying-Long],
Image Visually Meaningful Cryptography Based on Julia Set Generating and Information Hiding,
IWDW19(393-406).
Springer DOI 2003
BibRef

Kaur, M.[Manjit], Singh, D.[Dilbag], Uppal, R.S.[Raminder Singh],
Parallel strength Pareto evolutionary algorithm-II based image encryption,
IET-IPR(14), No. 6, 11 May 2020, pp. 1015-1026.
DOI Link 2005
BibRef

Boussif, M.[Mohamed], Aloui, N.[Noureddine], Cherif, A.[Adnene],
Securing DICOM images by a new encryption algorithm using Arnold transform and Vigenère cipher,
IET-IPR(14), No. 6, 11 May 2020, pp. 1209-1216.
DOI Link 2005
BibRef

Sudeepa, K.B., Aithal, G.[Ganesh], Rajinikanth, V., Satapathy, S.C.[Suresh Chandra],
Genetic algorithm based key sequence generation for cipher system,
PRL(133), 2020, pp. 341-348.
Elsevier DOI 2005
Feedback shift register, Genetic algorithm, Stream cipher system, Pseudo random number generator, Mutation BibRef

Melkemi, M.[Mahmoud], Hammoudi, K.[Karim],
Voronoi-based image representation applied to binary visual cryptography,
SP:IC(87), 2020, pp. 115913.
Elsevier DOI 2007
Visual cryptography, Image communication, Visual communication, Image sharing, Voronoi diagram, Visual representation BibRef

Umoh, E.A.[Edwin A.], Iloanusi, O.N.[Ogechukwu N.], Nnolim, U.A.[Uche A.],
Image multi-encryption architecture based on hybrid keystream sequence interspersed with Haar discrete wavelet transform,
IET-IPR(14), No. 10, August 2020, pp. 2081-2091.
DOI Link 2008
BibRef

Peng, F., Zhang, X., Lin, Z., Long, M.,
A Tunable Selective Encryption Scheme for H.265/HEVC Based on Chroma IPM and Coefficient Scrambling,
CirSysVideo(30), No. 8, August 2020, pp. 2765-2780.
IEEE DOI 2008
Encryption, Syntactics, Streaming media, Bit rate, Visualization, Encoding, H.265/HEVC, selective encryption, edge extraction BibRef

Zheng, J.Y.[Jie-Yu], Liu, L.F.[Ling-Feng],
Novel image encryption by combining dynamic DNA sequence encryption and the improved 2D logistic sine map,
IET-IPR(14), No. 11, September 2020, pp. 2310-2320.
DOI Link 2009
BibRef

Nakachi, T.[Takayuki], Kiya, H.[Hitoshi],
Secure OMP Computation Maintaining Sparse Representations and Its Application to EtC Systems,
IEICE(E103-D), No. 9, September 2020, pp. 1988-1997.
WWW Link. 2009
Encryption-then-Compression. Orthogonal Matching Pursuit. BibRef

Xiang, T., Yang, Y., Liu, H., Guo, S.,
Visual Security Evaluation of Perceptually Encrypted Images Based on Image Importance,
CirSysVideo(30), No. 11, November 2020, pp. 4129-4142.
IEEE DOI 2011
Visualization, Encryption, Feature extraction, Image resolution, Measurement, Visual security index, perceptual encryption, log-Gabor filter BibRef

Yang, Y.[Ying], Xiang, T.[Tao], Lv, X.[Xiao], Guo, S.W.[Shang-Wei], Zeng, T.Y.[Tie-Yong],
The Illusion of Visual Security: Reconstructing Perceptually Encrypted Images,
CirSysVideo(34), No. 5, May 2024, pp. 3998-4010.
IEEE DOI 2405
Encryption, Visualization, Distortion, Image restoration, Image reconstruction, Feature extraction, Threat modeling, image restoration BibRef

Sivaraman, R.[Rethinam], Rajagopalan, S.[Sundararaman], Rayappan, J.B.B.[John Bosco Balaguru], Amirtharajan, R.[Rengarajan],
Ring oscillator as confusion- diffusion agent: A complete TRNG drove image security,
IET-IPR(14), No. 13, November 2020, pp. 2987-2997.
DOI Link 2012
TRNG: true random number generators BibRef

Sun, E.Y.N.[Elaine Y.N.], Wu, H.C.[Hsiao-Chun], Busch, C.[Costas], Huang, S.C.H.[Scott C.H.], Kuan, Y.C.[Yen-Cheng], Chang, S.Y.[Shih Yu],
Efficient Recoverable Cryptographic Mosaic Technique by Permutations,
CirSysVideo(31), No. 1, January 2021, pp. 112-125.
IEEE DOI 2101
Sun, Receivers, Indexes, Encryption, Discrete cosine transforms, Recoverable cryptographic mosaic, permutation, Kullback-Leibler divergence of discrete cosine transform (DCT-KLD) BibRef

Gao, L., Qi, L., Guan, L.,
The Property of Frequency Shift in 2D-FRFT Domain With Application to Image Encryption,
SPLetters(28), 2021, pp. 185-189.
IEEE DOI 2102
Mathematical model, Encryption, Image reconstruction, Transforms, Time-frequency analysis, image encryption BibRef

Wang, X.L.[Xiao-Long], Yan, H.W.[Hao-Wen], Zhang, L.M.[Li-Ming],
Vector Map Encryption Algorithm Based on Double Random Position Permutation Strategy,
IJGI(10), No. 5, 2021, pp. xx-yy.
DOI Link 2106
BibRef

Zhao, T.Y.[Tie-Yu], Yuan, L.[Lin], Chi, Y.Y.[Ying-Ying],
Image encryption using linear weighted fractional-order transform,
JVCIR(77), 2021, pp. 103098.
Elsevier DOI 2106
Fractional-order Fourier transform, Weighted fractional-order transform, Image encryption BibRef

Yang, C.N.[Ching-Nung], Yang, Y.Y.[Yi-Yun],
On the Analysis and Design of Visual Cryptography With Error Correcting Capability,
CirSysVideo(31), No. 6, June 2021, pp. 2465-2479.
IEEE DOI 2106
Interference, Visualization, Decoding, Stacking, Cryptography, Image reconstruction, Image color analysis, Secret sharing, error correction BibRef

Oravec, J.[Jakub], Ovseník, L.[Luboš], Papaj, J.[Ján],
An image encryption algorithm with a plaintext-related quantisation scheme,
IET-IPR(15), No. 9, 2021, pp. 2039-2055.
DOI Link 2106
BibRef

Zhang, D.H.[Deng-Hui], Zhu, H.B.[Hong-Bin], Liu, S.L.[Sheng-Long], Wei, X.[Xu],
HP-VCS: A high-quality and printer-friendly visual cryptography scheme,
JVCIR(78), 2021, pp. 103186.
Elsevier DOI 2107
Visual cryptography scheme, Image security, Halftoning, Color VCS BibRef

Chen, L.P.[Li-Ping], Yin, H.[Hao], Yuan, L.G.[Li-Guo], Machado, J.A.T.[J.A. Tenreiro], Wu, R.C.[Ran-Chao], Alam, Z.[Zeeshan],
Double color image encryption based on fractional order discrete improved Henon map and Rubik's cube transform,
SP:IC(97), 2021, pp. 116363.
Elsevier DOI 2107
Fractional-order discrete systems, Henon map, DNA encryption, Double color image encryption BibRef

Chen, J.X.[Jun-Xin], Chen, L.[Lei], Zhou, Y.C.[Yi-Cong],
Universal Chosen-Ciphertext Attack for a Family of Image Encryption Schemes,
MultMed(23), 2021, pp. 2372-2385.
IEEE DOI 2108
Encryption, Nonlinear dynamical systems, Standards, Technological innovation, Matrices, Cryptanalysis, chosen-ciphertext attack BibRef

Wang, X.Y.[Xing-Yuan], Zhang, M.[Maozhen],
High-sensitivity synchronous image encryption based on improved one-dimensional compound sine map,
IET-IPR(15), No. 10, 2021, pp. 2247-2265.
DOI Link 2108
BibRef

Yang, Y.[Ying], Xiang, T.[Tao], Liu, H.C.[Hang-Cheng], Liao, X.F.[Xiao-Feng],
Convolutional Neural Network for Visual Security Evaluation,
CirSysVideo(31), No. 8, August 2021, pp. 3293-3307.
IEEE DOI 2108
Objective visual security evaluation of selectively encrypted images. Visualization, Feature extraction, Indexes, Measurement, Encryption, Visual security index, convolutional neural network, weighted pooling BibRef

Inoue, K.[Kotaro], Cho, M.[Myungjin],
Amplitude based keyless optical encryption system using deep neural network,
JVCIR(79), 2021, pp. 103251.
Elsevier DOI 2109
Optical encryption, Deep neural network, Amplitude-based double random phase encryption BibRef

Puteaux, P.[Pauline], Puech, W.[William],
CFB-Then-ECB Mode-Based Image Encryption for an Efficient Correction of Noisy Encrypted Images,
CirSysVideo(31), No. 9, September 2021, pp. 3338-3351.
IEEE DOI 2109
Cryptography, Encryption, Noise measurement, Ciphers, Noise reduction, Forward error correction, Statistical analysis, statistical analysis BibRef

Man, Z.L.[Zhen-Long], Li, J.Q.[Jin-Qing], Di, X.Q.[Xiao-Qiang],
Medical image encryption scheme based on self-verification matrix,
IET-IPR(15), No. 12, 2021, pp. 2787-2798.
DOI Link 2109
BibRef

Mishra, P.[Pooja], Bhaya, C.[Chiranjeev], Pal, A.K.[Arup Kumar], Singh, A.K.[Abhay Kumar],
A novel binary operator for designing medical and natural image cryptosystems,
SP:IC(98), 2021, pp. 116377.
Elsevier DOI 2109
Abelian group, DICOM, DNA encoding, Image cryptosystem BibRef

Li, Y.[Yu], Zhang, L.M.[Li-Ming], Wang, X.L.[Xiao-Long], Zhang, X.G.[Xin-Gang], Zhang, Q.H.[Qi-Hang],
A Novel Invariant Based Commutative Encryption and Watermarking Algorithm for Vector Maps,
IJGI(10), No. 11, 2021, pp. xx-yy.
DOI Link 2112
BibRef

Chen, J.X.[Jun-Xin], Zhang, L.Y.[Leo Yu], Zhou, Y.C.[Yi-Cong],
Re-Evaluation of the Security of a Family of Image Diffusion Mechanisms,
CirSysVideo(31), No. 12, December 2021, pp. 4747-4758.
IEEE DOI 2112
Cryptography, Encryption, Ciphers, Standards, Information science, Image resolution, Cryptanalysis, bitwise exclusive OR BibRef

Zhao, Y.K.[Yong-Kang], Fu, F.W.[Fang-Wei],
A contrast improved OR and XOR based (k,n) visual cryptography scheme without pixel expansion,
JVCIR(82), 2022, pp. 103408.
Elsevier DOI 2201
Visual cryptography, Multiple decryptions, Contrast, Perfect recovery, Threshold BibRef

Zhang, Y.S.[Yu-Shu], Zhao, R.[Ruoyu], Xiao, X.L.[Xiang-Li], Lan, R.[Rushi], Liu, Z.[Zhe], Zhang, X.P.[Xin-Peng],
HF-TPE: High-Fidelity Thumbnail- Preserving Encryption,
CirSysVideo(32), No. 3, March 2022, pp. 947-961.
IEEE DOI 2203
Encryption, Privacy, Usability, Cloud computing, Visualization, Software, Indexes, Balancing privacy and usability, cloud storage BibRef

Huang, S.F.[Shu-Feng], Huang, L.Q.[Lin-Qing], Cai, S.T.[Shu-Ting], Xiong, X.M.[Xiao-Ming], Liu, Y.[Yuan],
Novel and secure plaintext-related image encryption algorithm based on compressive sensing and tent-sine system,
IET-IPR(16), No. 6, 2022, pp. 1544-1557.
DOI Link 2204
BibRef

Chen, Y.C.[Yu-Chi], Horng, G.[Gwoboa],
Cheating in (halftone-secret) visual cryptography: Analysis of blind authentication schemes,
JVCIR(85), 2022, pp. 103489.
Elsevier DOI 2205
Visual cryptography, Human vision system, Binocular cheating, Cheating prevention, Security BibRef

Xian, Y.J.[Yong-Jin], Wang, X.Y.[Xing-Yuan], Teng, L.[Lin],
Double Parameters Fractal Sorting Matrix and Its Application in Image Encryption,
CirSysVideo(32), No. 6, June 2022, pp. 4028-4037.
IEEE DOI 2206
Sorting, Fractals, Security, Encryption, Iterative algorithms, Information security, Frequency modulation, image security BibRef

Wen, Y.[Yan], Su, J.M.[Jing-Ming], Hong, Y.[Yan], Gong, P.S.[Ping-Shun],
Hybrid mapping algorithm based on 1-DCM and Lorenz,
IET-IPR(16), No. 9, 2022, pp. 2467-2482.
DOI Link 2206
BibRef

Sheng, Y.H.[Yao-Hui], Li, J.Q.[Jin-Qing], Di, X.Q.[Xiao-Qiang], Man, Z.L.[Zhen-Long], Liu, Z.F.[Ze-Fei],
Bit-level image encryption algorithm based on fully-connected-like network and random modification of edge pixels,
IET-IPR(16), No. 10, 2022, pp. 2769-2790.
DOI Link 2207
BibRef

Maksud, A.[Ahmed], Hua, Y.[Yingbo],
Secret Key Generation by Continuous Encryption Before Quantization,
SPLetters(29), 2022, pp. 1497-1501.
IEEE DOI 2208
Quantization (signal), Biometrics (access control), Security, Encryption, Communication system security, Signal to noise ratio, wireless security BibRef

Tan, X.G.[Xue-Gang], Xiang, C.C.[Chang-Cheng], Cao, J.[Jinde], Xu, W.Y.[Wen-Ying], Wen, G.H.[Guang-Hui], Rutkowski, L.[Leszek],
Synchronization of Neural Networks via Periodic Self-Triggered Impulsive Control and Its Application in Image Encryption,
Cyber(52), No. 8, August 2022, pp. 8246-8257.
IEEE DOI 2208
Artificial neural networks, Synchronization, Real-time systems, Signal processing algorithms, Neurons, Monitoring, Encryption, synchronization BibRef

Zhang, B.[Bo], Xiao, D.[Di], Li, Y.[Ying], Yang, L.[Lei],
2D Compressed Sensing Using Nonlocal Low-Rank Prior Reconstruction for Cipher-Image Coding,
SPLetters(29), 2022, pp. 2033-2037.
IEEE DOI 2210
Ciphers, Image coding, Image reconstruction, Encryption, Privacy, Iterative algorithms, Approximation algorithms, encryption-then-compression BibRef

Wu, X.T.[Xiao-Tian], Luo, Z.L.[Zhong-Lin],
Block-based progressive visual cryptography scheme with uniform progressive recovery and consistent background,
JVCIR(88), 2022, pp. 103631.
Elsevier DOI 2210
Secret sharing, Visual cryptography, Progressive recovery, Consistent background, Image block BibRef

Zhang, Y.[Yike], Luo, W.B.[Wen-Bin],
Vector-Based Efficient Data Hiding in Encrypted Images via Multi-MSB Replacement,
CirSysVideo(32), No. 11, November 2022, pp. 7359-7372.
IEEE DOI 2211
Image reconstruction, Encryption, Data privacy, Visualization, Image coding, Image restoration, Decoding, Reversible data hiding, location map BibRef

Wu, X.T.[Xiao-Tian], An, N.[Na], Xu, Z.[Zishuo],
Sharing Multiple Secrets in XOR-Based Visual Cryptography by Non-Monotonic Threshold Property,
CirSysVideo(33), No. 1, January 2023, pp. 88-103.
IEEE DOI 2301
Stacking, Visualization, Cryptography, Image reconstruction, Image quality, Authentication, Visual systems, Secret sharing, fully incrementing BibRef

Alsubaei, F.S.[Faisal S.], Alneil, A.A.[Amani A.], Mohamed, A.[Abdullah], Hilal, A.M.[Anwer Mustafa],
Block-Scrambling-Based Encryption with Deep-Learning-Driven Remote Sensing Image Classification,
RS(15), No. 4, 2023, pp. xx-yy.
DOI Link 2303
BibRef

Sundaram, G.[Gaurav], Panna, B.[Bhaskar], Jha, R.K.[Rajib Kumar], Kumar, S.[Sumit],
Image encryption based on fractional discrete cosine transform and DWT with interplane arrangements in dost domain,
IET-IPR(17), No. 4, 2023, pp. 1195-1207.
DOI Link 2303
adaptive signal processing, image processing BibRef

Tang, B.[Bo], Yang, C.[Cheng], Zhang, Y.[Yana],
A Format Compliant Framework for HEVC Selective Encryption After Encoding,
CirSysVideo(33), No. 3, March 2023, pp. 1140-1156.
IEEE DOI 2303
Encoding, Encryption, Cryptography, Syntactics, Arithmetic, Symbols, Prediction algorithms, HEVC, encrypted after encoding, bit flipping and insertion-deletion BibRef

Wu, X.T.[Xiao-Tian], Fang, J.[Jia], Yan, W.Q.[Wei Qi],
Contrast Optimization for Size Invariant Visual Cryptography Scheme,
IP(32), 2023, pp. 2174-2189.
IEEE DOI 2304
Optimization, Linear programming, Cryptography, Visualization, Stacking, Image quality, Image reconstruction, Secret sharing, size invariant BibRef

Li, D.M.[Dong-Mei], Liu, H.K.[Hai-Kuan],
Provable image encryption scheme via trapdoor permutation,
IET-IPR(17), No. 5, 2023, pp. 1355-1363.
DOI Link 2304
image encryption, one-way function, random reuse, trapdoor permutation BibRef

Chen, Z.[Zan], Ma, C.C.[Chao-Cheng], Wang, T.[Tao], Feng, Y.J.[Yuan-Jing], Hou, X.S.[Xing-Song], Qian, X.M.[Xue-Ming],
Robust image compression-encryption via scrambled block bernoulli sampling with diffusion noise,
IET-IPR(17), No. 5, 2023, pp. 1478-1492.
DOI Link 2304
compressed sensing, image coding BibRef

Liu, Z.N.[Zi-Nan], Liu, T.[Tao], Yan, B.[Bin], Pan, J.S.[Jeng-Shyang], Yang, H.M.[Hong-Mei],
Multitone reconstruction visual cryptography based on phase periodicity,
JVCIR(93), 2023, pp. 103827.
Elsevier DOI 2305
Grayscale image, Visual cryptography, Phase periodicity, Light polarization BibRef

Sammeta, N.[Naresh], Parthiban, L.[Latha],
Data Ownership and Secure Medical Data Transmission using Optimal Multiple Key-Based Homomorphic Encryption with Hyperledger Blockchain,
IJIG(23), No. 3 2023, pp. 2240003.
DOI Link 2306
BibRef

Xu, G.W.[Guo-Wen], Li, G.L.[Guan-Lin], Guo, S.W.[Shang-Wei], Zhang, T.W.[Tian-Wei], Li, H.W.[Hong-Wei],
Secure Decentralized Image Classification With Multiparty Homomorphic Encryption,
CirSysVideo(33), No. 7, July 2023, pp. 3185-3198.
IEEE DOI 2307
Training, Servers, Homomorphic encryption, Differential privacy, Deep learning, Public key, Data models, Privacy protection, homomorphic encryption BibRef

Chen, F.[Fan], Yang, Y.L.[Yao-Lin], He, H.J.[Hong-Jie], Yuan, Y.[Yuan],
Adaptive Coding and Ordered-Index Extended Scrambling Based RDH in Encrypted Images,
MultMed(25), 2023, pp. 2864-2875.
IEEE DOI 2307
Cryptography, Encryption, Image coding, Encoding, Correlation, Resists, Receivers, Reversible data hiding, image encryption, chosen plaintext attack (CPA) BibRef

Tang, Y.[Yun], Cheng, L.[Lulu], Lyu, W.L.[Wan-Li], Yin, Z.X.[Zhao-Xia],
High Capacity Reversible Data Hiding for Encrypted 3d Mesh Models Based on Topology,
IWDW22(205-218).
Springer DOI 2307
BibRef

Lata, N.[Navdeep], Kumar, R.[Raman],
DSIT: A Dynamic Lightweight Cryptography Algorithm for Securing Image in IoT Communication,
IJIG(23), No. 4 2023, pp. 2350035.
DOI Link 2308
BibRef

Nazari, H.[Hadi], Bidgoli, M.M.[Mahmoud Mahlouji], Ghasvari, H.[Hossein],
Integration of lightweight cryptography and watermarking with compression for high speed and reliable communication of digital images in IoT,
IET-IPR(17), No. 10, 2023, pp. 2984-3001.
DOI Link 2308
compressed sensing, cryptography, watermarking, wavelet transforms BibRef

Wang, C.T.[Chun-Tao], Hu, J.[Juan], Bian, S.[Shan], Ni, J.Q.[Jiang-Qun], Zhang, X.P.[Xin-Peng],
A Customized Deep Network Based Encryption-Then-Lossy-Compression Scheme of Color Images Achieving Arbitrary Compression Ratios,
CirSysVideo(33), No. 8, August 2023, pp. 4322-4336.
IEEE DOI 2308
Image coding, Cryptography, Image reconstruction, Encryption, Color, Receivers, Optimization, Encrypted image compression, downsampling, downsampling constraint BibRef

Wang, C.T.[Chun-Tao], Zhang, T.J.[Tian-Jian], Chen, H.[Hao], Huang, Q.[Qiong], Ni, J.Q.[Jiang-Qun], Zhang, X.P.[Xin-Peng],
A Novel Encryption-Then-Lossy-Compression Scheme of Color Images Using Customized Residual Dense Spatial Network,
MultMed(25), 2023, pp. 4026-4040.
IEEE DOI 2310
BibRef

Wang, H.[Hao], Yang, X.[Xinsong], Xiang, Z.R.[Zheng-Rong], Tang, R.Q.[Rong-Qiang], Ning, Q.[Qian],
Synchronization of Switched Neural Networks via Attacked Mode-Dependent Event-Triggered Control and Its Application in Image Encryption,
Cyber(53), No. 9, September 2023, pp. 5994-6003.
IEEE DOI 2309
BibRef

Meng, K.[Ke], Wo, Y.[Yan],
An image compression and encryption scheme for similarity retrieval,
SP:IC(119), 2023, pp. 117044.
Elsevier DOI 2310
Information bottleneck, Compressed domain retrieval, Retrieval encryption, Cascade compression encryption, Image similarity retrieval BibRef

Jameel, S.K.[Samer Kais], Majidpour, J.[Jafar],
BCS-AE: Integrated Image Compression-Encryption Model Based on AE and Block-CS,
IJIG(23), No. 5 2023, pp. 2350047.
DOI Link 2310
BibRef

Jansen-van Rensburg, B.[Bianca], Puech, W.[William], Pedeboy, J.P.[Jean-Pierre],
A Format Compliant Encryption Method for 3D Objects Allowing Hierarchical Decryption,
MultMed(25), 2023, pp. 7196-7207.
IEEE DOI 2311
BibRef

Sajitha, A.S., Priya, S.S.S.[S. Sridevi Sathya],
Analysis of Various Visual Cryptographic Techniques and their Issues Based on Optimization Algorithms,
IJIG(23), No. 6 2023, pp. 2350059.
DOI Link 2312
BibRef

Zhang, C.[Chengrui], Chen, J.X.[Jun-Xin], Chen, D.M.[Dong-Ming], Wang, W.[Wei], Zhang, Y.S.[Yu-Shu], Zhou, Y.C.[Yi-Cong],
Exploiting Substitution Box for Cryptanalyzing Image Encryption Schemes With DNA Coding and Nonlinear Dynamics,
MultMed(26), 2024, pp. 1114-1128.
IEEE DOI 2402
Encryption, DNA, Encoding, Ciphers, Image coding, Security, Decoding, Chosen-plaintext attack, DNA coding, image encryption, S-box matrix BibRef

Li, C.Q.[Cheng-Qing], Shen, X.H.[Xian-Hui], Liu, S.[Sheng],
Cryptanalyzing an Image Encryption Algorithm Underpinned by 2-D Lag-Complex Logistic Map,
MultMedMag(31), No. 1, January 2024, pp. 99-109.
IEEE DOI 2404
Encryption, Logistics, Heuristic algorithms, Social networking (online), Resists, Algorithm design and analysis BibRef

Shi, J.L.[Jiao-Li], Hu, C.[Chao], Zhang, S.L.[Shun-Li], Zhou, Q.[Qing], Mei, Z.L.[Zhuo-Lin], Yao, S.M.[Shi-Mao], Deng, A.[Anyuan],
An Efficient and Expressive Fully Policy-Hidden Ciphertext-Policy Attribute-Based Encryption Scheme for Satellite Service Systems,
IJGI(13), No. 9, 2024, pp. 321.
DOI Link 2410
BibRef

Zhang, L.[Luozhi], Wang, Q.[Qionghua], Yu, Z.[Zhan], Li, J.X.[Jin-Xi], Bai, X.[Xing], Zhou, X.[Xin], Wu, Y.Y.[Yuan-Yuan],
Non-Cascaded and Crosstalk-Free Multi-Image Encryption Based on Optical Scanning Holography Using 2D Orthogonal Compressive Sensing,
IP(33), 2024, pp. 5688-5702.
IEEE DOI 2410
Encryption, Compressed sensing, Pupils, Holography, Security, Crosstalk, Noise, Image coding, Optical sensors, Optical imaging, synthesis pupil encoding BibRef

Li, J.H.[Jun-Hui], Hou, X.S.[Xing-Song],
The Design of an Adaptive Enhanced AMP-Based Image Block Compressed Sensing and Its Application to Image Encryption,
CirSysVideo(34), No. 11, November 2024, pp. 11128-11141.
IEEE DOI 2412
Encryption, Image reconstruction, Security, Image coding, Signal processing algorithms, Filtering algorithms, Noise, Haar transform BibRef

Jia, X.X.[Xing-Xing], Yu, T.[Ting], Luo, X.Y.[Xiang-Yang], Wang, D.[Daoshun], Zhou, H.Y.[Hui-Yu],
Maximizing Contrast in XOR-Based Visual Cryptography Schemes,
CirSysVideo(34), No. 12, December 2024, pp. 12849-12861.
IEEE DOI 2501
Visualization, Linear programming, Image reconstruction, Circuits and systems, Vectors, Encryption, contrast BibRef

Zheng, J.[Jun], Qian, Y.[Yining], Wang, C.Y.[Chen-Yu],
Design and Cryptographic Implementation of an Evolutionary Digital Chaotic Model,
CirSysVideo(34), No. 12, December 2024, pp. 12510-12523.
IEEE DOI 2501
Security, Chaotic communication, Degradation, Chaos, Perturbation methods, Computational modeling, Numerical models, psedorandom number generator (PRNG) BibRef

Yu, J.[Jiang], Zhang, J.[Jing], Wang, Z.[Zichi], Li, F.Y.[Feng-Yong], Zhang, X.P.[Xin-Peng],
Cover Selection in Encrypted Images,
CirSysVideo(34), No. 12, December 2024, pp. 13626-13641.
IEEE DOI 2501
Cryptography, Encryption, Steganography, Complexity theory, Distortion, Security, Payloads, Batch steganography, cover selection, SLBP BibRef

You, K.[Ke], Chen, P.[Pengbo], Li, C.Q.[Cheng-Qing],
Cryptanalyzing an Image Encryption Algorithm Underpinned by a 3-D Boolean Convolution Neural Network,
MultMedMag(31), No. 4, October 2024, pp. 17-24.
IEEE DOI 2501
Encryption, Convolution, Security, Kernel, Neural networks, Entropy, Digital images, Rendering (computer graphics), Measurement, Flowcharts BibRef

Yan, S.H.[Shao-Hui], Cui, Y.[Yu], Li, L.[Lin], Zhang, Y.Y.[Yu-Yan], Jiang, D.[Defeng], Zhang, H.[Hanbing],
Development of an Image Encryption Algorithm Based on Compressed Sensing and Chaotic Mapping,
MultMedMag(31), No. 4, October 2024, pp. 49-59.
IEEE DOI 2501
Encryption, Chaotic communication, Bifurcation, Compressed sensing, Vectors, Boosting, Signal processing algorithms BibRef


Chen, Z.K.[Zi-Kang], Jiang, M.[Min], Chen, J.H.[Jia-Hua], Zhou, Y.G.[Yan-Gui],
Visual cryptography scheme by freeform optics based on optimal mass transport,
CVIDL23(42-46)
IEEE DOI 2403
Visualization, Privacy, Simulation, Virtual environments, Optics, Encryption, Internet, information hiding, visual cryptography, freeform optics BibRef

Rai, D.[Deepak], Rajput, S.S.[Shayam Singh], Arya, K.V., Pranav, P.[Prince], Singh, S.[Shikha], Sinha, A.[Aditi],
Advanced Encryption Standard (AES) Based Robust Watermarking Scheme,
ICCVMI23(1-4)
IEEE DOI 2403
Resistance, Low-pass filters, Watermarking, Rate distortion theory, Intellectual property, Media, Robustness, Watermarking, Encryption, DWT BibRef

Peng, H.[Hongwu], Huang, S.[Shaoyi], Zhou, T.[Tong], Luo, Y.[Yukui], Wang, C.H.[Cheng-Hong], Wang, Z.[Zigeng], Zhao, J.[Jiahui], Xie, X.[Xi], Li, A.[Ang], Geng, T.[Tony], Mahmood, K.[Kaleel], Wen, W.[Wujie], Xu, X.L.[Xiao-Lin], Ding, C.[Caiwen],
AutoReP: Automatic ReLU Replacement for Fast Private Network Inference,
ICCV23(5155-5165)
IEEE DOI 2401
Machine learning as a service. Data security. BibRef

Ma, L.F.[Lin-Feng], Fang, H.[Han], Wei, T.Y.[Tian-Yi], Yang, Z.J.[Zi-Jin], Ma, Z.[Zehua], Zhang, W.M.[Wei-Ming], Yu, N.H.[Neng-Hai],
A Geometric Distortion Immunized Deep Watermarking Framework with Robustness Generalizability,
ECCV24(LXVII: 268-285).
Springer DOI 2412
BibRef

Chen, Y.L.[Yi-Ling], Yao, Y.Z.[Yuan-Zhi], Yu, N.H.[Neng-Hai],
Image Translation-Based Deniable Encryption against Model Extraction Attack,
ICIP23(1330-1334)
IEEE DOI 2312
BibRef

Puteaux, P.[Pauline], Puech, W.[William],
Localization and Correction of Corrupted Pixel Blocks in Noisy Encrypted Images,
IPTA20(1-6)
IEEE DOI 2206
Training, Tools, Elliptic curve cryptography, Error correction codes, Cryptography, Noise measurement, signal processing in the encrypted domain BibRef

Zheng, H.Y.[Hong-Ying], Huang, Y.W.[Ya-Wen], Li, L.[Lin], Xiao, D.[Di],
Compressive Sensing-Based Image Encryption and Authentication in Edge-Clouds,
MMMod22(II:382-393).
Springer DOI 2203
BibRef

Tian, J.[Jinyu], Zhou, J.T.[Jian-Tao], Duan, J.[Jia],
Probabilistic Selective Encryption of Convolutional Neural Networks for Hierarchical Services,
CVPR21(2205-2214)
IEEE DOI 2111
Training, Degradation, Costs, Computational modeling, Noise reduction, Probabilistic logic BibRef

Chmielewski, L.J.[Leszek J.], Orlowski, A.[Arkadiusz],
Does Randomness in the Random Visual Cryptography Protocol Depend on the Period of Pseudorandom Number Generators?,
ICCVG20(36-47).
Springer DOI 2009
BibRef

Bian, S.[Song], Wang, T.C.[Tian-Chen], Hiromoto, M.[Masayuki], Shi, Y.[Yiyu], Sato, T.[Takashi],
ENSEI: Efficient Secure Inference via Frequency-Domain Homomorphic Convolution for Privacy-Preserving Visual Recognition,
CVPR20(9400-9409)
IEEE DOI 2008
Convolution, Protocols, Frequency-domain analysis, Neural networks, Encryption, Visualization BibRef

Puteaux, P.[Pauline], Puech, W.[William],
Image Analysis and Processing in the Encrypted Domain,
ICIP19(3020-3022)
IEEE DOI 1910
Direct processing in encrypted domain. Multimedia security, image encryption, signal processing in the encrypted domain BibRef

Lee, S., Huang, Y., Lin, J.,
WEB-VC: Visual Cryptography for Web Image,
ICIP19(4055-4059)
IEEE DOI 1910
Visual cryptography, flip visual cryptography, secret image sharing, visual secret sharing, Web VC BibRef

Bellafqira, R.[Reda], Coatrieux, G.[Gouenou], Genin, E.[Emmanuelle], Cozic, M.[Michel],
Secure Multilayer Perceptron Based on Homomorphic Encryption,
IWDW18(322-336).
Springer DOI 1905
BibRef

Liu, Z., Yang, M.L., Yan, W.Q.,
Image encryption based on double random phase encoding,
IVCNZ17(1-6)
IEEE DOI 1902
cryptography, discrete cosine transforms, discrete Fourier transforms, image coding, matrix algebra, logistic map BibRef

Touil, H., Akkad, N.E., Satori, K.,
Text Encryption: Hybrid cryptographic method using Vigenere and Hill Ciphers.,
ISCV20(1-6)
IEEE DOI 2011
cryptography, data privacy, text analysis, computer networks, cryptography, Cesar encryption algorithm, Statistical attack. BibRef

Es-sabry, M., El Akkad, N., Merras, M., Saaidi, A., Satori, K.,
Grayscale image encryption using shift bits operations,
ISCV18(1-7)
IEEE DOI 1807
cryptography, image processing, (N-1) generated images, cryptography, decryption process, grayscale image encryption, Key BibRef

Hamici, Z.,
Image cryptography based on the imitation of gene fusion and horizontal gene transfer,
IPTA17(1-6)
IEEE DOI 1804
cryptography, feature extraction, genetic algorithms, image coding, image fusion, image representation, random sequences, HGT, obfuscation BibRef

Kang, X., Han, Z., Yu, A., Duan, P.,
Double random scrambling encoding in the RPMPFrHT domain,
ICIP17(4362-4366)
IEEE DOI 1803
Cryptography, Encoding, Indexes, Performance analysis, Robustness, Sensitivity, Hartley transform, Image encryption, logistic map BibRef

Yonetani, R., Boddeti, V.N., Kitani, K.M., Sato, Y.,
Privacy-Preserving Visual Learning Using Doubly Permuted Homomorphic Encryption,
ICCV17(2059-2069)
IEEE DOI 1802
cryptography, data privacy, image processing, learning (artificial intelligence), Visualization BibRef

Zhang, Y., Li, X.Q.[Xue-Qian], Hou, W.G.[Wen-Gang],
A fast image encryption scheme based on AES,
ICIVC17(624-628)
IEEE DOI 1708
Ciphers, Correlation, Encryption, Histograms, Information entropy, Sensitivity, aes, cipher block chaining, image encryption, information, security BibRef

Shen, G.[Gang], Liu, F.[Feng], Fu, Z.X.[Zheng-Xin], Yu, B.[Bin], Wang, W.[Wen],
Halftone Visual Cryptography with Complementary Cover Images,
IWDW16(223-237).
Springer DOI 1703
BibRef

Wang, W.[Wen], Liu, F.[Feng], Guo, T.[Teng], Ren, Y.W.[Ya-Wei],
Temporal Integration Based Visual Cryptography Scheme and Its Application,
IWDW17(406-419).
Springer DOI 1708
BibRef
Earlier: A4, A2, A1, Only:
Collusive Attacks to Partition Authentication Visual Cryptography Scheme,
IWDW16(238-250).
Springer DOI 1703
BibRef

Dutta, S.[Sabyasachi], Roy, P.S.[Partha Sarathi], Adhikari, A.[Avishek], Sakurai, K.[Kouichi],
On the Robustness of Visual Cryptographic Schemes,
IWDW16(251-262).
Springer DOI 1703
BibRef

Goel, A., Chaudhari, K.,
Median based pixel selection for partial image encryption,
IPTA16(1-5)
IEEE DOI 1703
cryptography BibRef

Wen, W., Zhang, Y., Fang, Y., Fang, Z.,
A novel selective image encryption method based on saliency detection,
VCIP16(1-4)
IEEE DOI 1701
Discrete wavelet transforms BibRef

Fatahbeygi, A., Akhlaghian, F.,
A new robust semi-blind image watermarking based on block classification and visual cryptography,
IPRIA15(1-6)
IEEE DOI 1603
cryptography BibRef

Belkaid, B.M., Mourad, L., Mehdi, C., Soltane, A.,
Secure transfer of medical images using hybrid encryption: Authentication, confidentiality, integrity,
ICCVIA15(1-6)
IEEE DOI 1603
authorisation BibRef

Jolfaei, A.[Alireza], Wu, X.W.[Xin-Wen], Muthukkumarasamy, V.[Vallipuram],
A Secure Lightweight Texture Encryption Scheme,
VSWS15(344-356).
Springer DOI 1603
BibRef

Wang, D.S.[Dao-Shun], Yi, F.[Feng], Yang, C.N.[Ching-Nung],
Visual Cryptography Scheme with Autostereogram,
IWDW14(364-375).
Springer DOI 1602
BibRef

Chen, Y.C.[Yu-Chi], Lu, K.H.[Kun-Han], Tso, R.L.[Ray-Lin], Wu, M.E.[Mu-En],
An Improved Visual Cryptography with Cheating Prevention,
IWDW14(444-454).
Springer DOI 1602
BibRef

Liu, F.[Feng], Wu, C.K.[Chuan-Kun],
Optimal XOR Based (2,n)-Visual Cryptography Schemes,
IWDW14(333-349).
Springer DOI 1602
BibRef

Liu, S.C.[Shen-Chuan], Fujiyoshi, M.[Masaaki], Kiya, H.[Hitoshi],
A cheat preventing method with efficient pixel expansion for Naor-Shamir's visual cryptography,
ICIP14(5527-5531)
IEEE DOI 1502
Cloud computing BibRef

Eluard, M.[Marc], Maetz, Y.[Yves], Doerr, G.[Gwenael],
Impact of geometry-preserving encryption on rendering time,
ICIP14(4787-4791)
IEEE DOI 1502
Collaboration BibRef

Moreno Cañadas, A.[Agustín], Palma Vanegas, N.P.[Nelly Paola], Hernández Quitián, M.[Margoth],
Visual Cryptography Schemes Based in k -Linear Maps,
IWDW13(288-302).
Springer DOI 1407
BibRef

Panduranga, H.T., Kumar, H.S.S.[H.S. Sharath], Kumar, S.K.N.[S.K. Naveen],
Hybrid approach for dual image encryption using nibble exchange and Hill-cipher,
IMVIP12(101-104).
IEEE DOI 1302
BibRef

Liu, F.[Feng], Guo, T.[Teng], Wu, C.[ChuanKun], Yang, C.N.[Ching-Nung],
Flexible Visual Cryptography Scheme without Distortion,
IWDW11(211-227).
Springer DOI 1208
BibRef

Di, H.[Hong], Zheng, K.F.[Kang-Feng], Niu, X.X.[Xin-Xin], Zhang, X.[Xin],
Multiple-image compressed encryption and decryption by compressive holography,
VCIP11(1-4).
IEEE DOI 1201
BibRef

Bajaj, N.[Nikesh], Thakur, A.[Amit],
Enhancement of RC5 for image encryption,
ICIIP11(1-5).
IEEE DOI 1112
BibRef

Petrauskiene, V., Ragulskiene, J., Sakyte, E., Ragulskis, M.,
Near-Optimal Time Function for Secure Dynamic Visual Cryptography,
ISVC11(II: 300-309).
Springer DOI 1109
BibRef

Zhao, L.[Liang], Adhikari, A.[Avishek], Sakurai, K.[Kouichi],
A New Scrambling Evaluation Scheme Based on Spatial Distribution Entropy and Centroid Difference of Bit-Plane,
DW10(29-44).
Springer DOI 1010
BibRef

Zhao, L.[Liang], Adhikari, A.[Avishek], Xiao, D.[Di], Sakurai, K.[Kouichi],
Cryptanalysis on an Image Scrambling Encryption Scheme Based on Pixel Bit,
DW10(45-59).
Springer DOI 1010
BibRef

Mayouf, M.A.[Mabroka Ali], Shukur, Z.[Zarina],
Using Animation in Active Learning Tool to Detect Possible Attacks in Cryptographic Protocols,
IVIC09(510-520).
Springer DOI 0911
BibRef

Rane, S.D.[Shantanu D.], Sun, W.[Wei], Vetro, A.[Anthony],
Secure distortion computation among untrusting parties using homomorphic encryption,
ICIP09(1485-1488).
IEEE DOI 0911
BibRef

Zhang, J.H.[Jian-Hong], Chen, H.[Hua], Geng, Q.[Qin],
Cryptoanalysis of Certificateless Partially Blind Signature and Proxy Blind Signature Scheme,
CISP09(1-5).
IEEE DOI 0910
BibRef

Zhang, J.H.[Jian-Hong], Gao, S.N.[Sheng-Nan],
Cryptoanlaysis of Two Proxy Blind Signature Schemes with Proxy Revocation,
CISP09(1-4).
IEEE DOI 0910
BibRef

Lang, J.[Jun], Tao, R.[Ran], Wang, Y.[Yue],
The Generalized Weighted Fractional Fourier Transform and its Application to Image Encryption,
CISP09(1-5).
IEEE DOI 0910
BibRef

Xiao, Y.[Yu], Zhang, H.Y.[Hai-Ying], Ran, Q.W.[Qi-Wen], Zhang, J.[Jin], Tan, L.Y.[Li-Ying],
Image Encryption and Two Dimensional Discrete M-Parameter Fractional Fourier Transform,
CISP09(1-4).
IEEE DOI 0910
BibRef

Weir, J.[Jonathan], Yan, W.Q.[Wei-Qi],
Authenticating Visual Cryptography Shares Using 2D Barcodes,
IWDW11(196-210).
Springer DOI 1208
BibRef
Earlier:
Plane Transform Visual Cryptography,
DW10(60-74).
Springer DOI 1010
BibRef
Earlier:
Image Hatching for Visual Cryptography,
IMVIP09(59-64).
IEEE DOI 0909
BibRef
And:
Dot-Size Variant Visual Cryptography,
DW09(136-148).
Springer DOI 0908
BibRef

Piper, F.[Fred],
The Changing Face of Cryptography,
DW09(2).
Springer DOI 0908
BibRef

Du, Y.F.[Yan-Fang], Zhang, J.[Jing], Su, Y.T.[Yu-Ting],
Watermarking for Authentication of LZ-77 Compressed Documents,
DW07(365-372).
Springer DOI 0712
BibRef

Luo, H.[Hao], Lu, Z.M.[Zhe-Ming], Pan, J.S.[Jeng-Shyang],
Multiple Watermarking in Visual Cryptography,
DW07(60-70).
Springer DOI 0712
BibRef

Sadeghi, A.R.[Ahmad-Reza],
The Marriage of Cryptography and Watermarking: Beneficial and Challenging for Secure Watermarking and Detection,
DW07(2-18).
Springer DOI 0712
BibRef

He, D.[Dake], Jagmohan, A.[Ashish], Lu, L.G.[Li-Gang],
Secure collaboration using Slepian-Wolf codes,
ICIP08(2216-2219).
IEEE DOI 0810
BibRef

Seshadrinathan, M.[Manoj], Dempski, K.L.[Kelly L.],
Implementation of Advanced Encryption Standard for encryption and decryption of images and text on a GPU,
CVGPU08(1-6).
IEEE DOI 0806
BibRef

Alface, P.R.[Patrice Rondao], Macq, B.[Benoit], Cayre, F.[Francois],
Blind and Robust Watermarking of 3D Models: How to Withstand the Cropping Attack?,
ICIP07(V: 465-468).
IEEE DOI 0709
BibRef

Huang, T.J.[Tie-Jun],
Evolvement of DRM Schema: From Encryption to Interoperability and Monitoring,
MCAM07(65-75).
Springer DOI 0706
BibRef

Lai, J.C.[Jen-Chieh], Wang, C.H.[Chia-Hui],
Buffer Occupancy Feedback Security Control and Changing Encryption Keys to Protect MOD Services,
PSIVT06(888-897).
Springer DOI 0612
BibRef

Li, W.H.[Wei-Hai], Yuan, Y.[Yuan],
Visual Information Encryption in Frequency Domain: Risk and Enhancement,
IWICPAS06(225-234).
Springer DOI 0608
BibRef

Wong, A., Bishop, W.,
Expert Knowledge Based Automatic Regions-of-Interest (ROI) Selection in Scanned Documents for Digital Image Encryption,
CRV06(51-51).
IEEE DOI 0607
BibRef

Said, A.,
Measuring the Strength of Partial Encryption Schemes,
ICIP05(II: 1126-1129).
IEEE DOI 0512
BibRef

Katzenbeisser, S.[Stefan],
On the Integration of Watermarks and Cryptography,
DW03(50-60).
Springer DOI 0405
BibRef

Li, S.J.[Shu-Jun], Zheng, X.[Xuan],
On the security of an image encryption method,
ICIP02(II: 925-928).
IEEE DOI 0210
BibRef

Yamaguchi, Y.S.[Yasu-Shi],
An Extended Visual Cryptography Scheme for Continuous-Tone Images,
IWDW11(228-242).
Springer DOI 1208
BibRef

Nakajima, M., Yamaguchi, Y.S.[Yasu-Shi],
Extended Visual Cryptography for Natural Images,
WSCG02(303).
HTML Version. 0209
BibRef

Chen, Y.C., Chang, L.W.,
A Secure and Robust Digital Watermarking Technique by the Block Cipher Rc6 and Secure Hash Algorithm,
ICIP01(II: 518-521).
IEEE DOI 0108
BibRef

Bhattacharjee, S., Kutter, M.,
Compression tolerant image authentication,
ICIP98(I: 435-439).
IEEE DOI 9810
BibRef

Creusere, C.D., Mitra, S.K.,
Efficient image scrambling using polyphase filter banks,
ICIP94(II: 81-85).
IEEE DOI 9411
BibRef

Chapter on OCR, Document Analysis and Character Recognition Systems continues in
Encryption based on Chaos, Chaotic Process .


Last update:Jan 20, 2025 at 11:36:25