@inproceedings{bb268000,
        AUTHOR = "Bellafqira, R. and Coatrieux, G. and Genin, E. and Cozic, M.",
        TITLE = "Secure Multilayer Perceptron Based on Homomorphic Encryption",
        BOOKTITLE = IWDW18,
        YEAR = "2018",
        PAGES = "322-336",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262696"}

@inproceedings{bb268001,
        AUTHOR = "Liu, Z. and Yang, M.L. and Yan, W.Q.",
        TITLE = "Image encryption based on double random phase encoding",
        BOOKTITLE = IVCNZ17,
        YEAR = "2017",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262697"}

@inproceedings{bb268002,
        AUTHOR = "Touil, H. and Akkad, N.E. and Satori, K.",
        TITLE = "Text Encryption:
Hybrid cryptographic method using Vigenere and Hill Ciphers.",
        BOOKTITLE = ISCV20,
        YEAR = "2020",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262698"}

@inproceedings{bb268003,
        AUTHOR = "Es sabry, M. and El Akkad, N. and Merras, M. and Saaidi, A. and Satori, K.",
        TITLE = "Grayscale image encryption using shift bits operations",
        BOOKTITLE = ISCV18,
        YEAR = "2018",
        PAGES = "1-7",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262699"}

@inproceedings{bb268004,
        AUTHOR = "Hamici, Z.",
        TITLE = "Image cryptography based on the imitation of gene fusion and
horizontal gene transfer",
        BOOKTITLE = IPTA17,
        YEAR = "2017",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262700"}

@inproceedings{bb268005,
        AUTHOR = "Kang, X. and Han, Z. and Yu, A. and Duan, P.",
        TITLE = "Double random scrambling encoding in the RPMPFrHT domain",
        BOOKTITLE = ICIP17,
        YEAR = "2017",
        PAGES = "4362-4366",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262701"}

@inproceedings{bb268006,
        AUTHOR = "Yonetani, R. and Boddeti, V.N. and Kitani, K.M. and Sato, Y.",
        TITLE = "Privacy-Preserving Visual Learning Using Doubly Permuted Homomorphic
Encryption",
        BOOKTITLE = ICCV17,
        YEAR = "2017",
        PAGES = "2059-2069",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262702"}

@inproceedings{bb268007,
        AUTHOR = "Zhang, Y. and Li, X.Q. and Hou, W.G.",
        TITLE = "A fast image encryption scheme based on AES",
        BOOKTITLE = ICIVC17,
        YEAR = "2017",
        PAGES = "624-628",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262703"}

@inproceedings{bb268008,
        AUTHOR = "Yan, B. and Bai, S.",
        TITLE = "Design of image confusion-diffusion cryptosystem based on vector
quantization and cross chaotic map",
        BOOKTITLE = ICIVC17,
        YEAR = "2017",
        PAGES = "639-644",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262704"}

@inproceedings{bb268009,
        AUTHOR = "Shen, G. and Liu, F. and Fu, Z.X. and Yu, B. and Wang, W.",
        TITLE = "Halftone Visual Cryptography with Complementary Cover Images",
        BOOKTITLE = IWDW16,
        YEAR = "2016",
        PAGES = "223-237",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262705"}

@inproceedings{bb268010,
        AUTHOR = "Wang, W. and Liu, F. and Guo, T. and Ren, Y.W.",
        TITLE = "Temporal Integration Based Visual Cryptography Scheme and Its
Application",
        BOOKTITLE = IWDW17,
        YEAR = "2017",
        PAGES = "406-419",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262706"}

@inproceedings{bb268011,
        AUTHOR = "Ren, Y.W. and Liu, F. and Wang, W.",
        TITLE = "Collusive Attacks to Partition Authentication Visual Cryptography
Scheme",
        BOOKTITLE = IWDW16,
        YEAR = "2016",
        PAGES = "238-250",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262707"}

@inproceedings{bb268012,
        AUTHOR = "Dutta, S. and Roy, P.S. and Adhikari, A. and Sakurai, K.",
        TITLE = "On the Robustness of Visual Cryptographic Schemes",
        BOOKTITLE = IWDW16,
        YEAR = "2016",
        PAGES = "251-262",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262708"}

@inproceedings{bb268013,
        AUTHOR = "Goel, A. and Chaudhari, K.",
        TITLE = "Median based pixel selection for partial image encryption",
        BOOKTITLE = IPTA16,
        YEAR = "2016",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262709"}

@inproceedings{bb268014,
        AUTHOR = "Wen, W. and Zhang, Y. and Fang, Y. and Fang, Z.",
        TITLE = "A novel selective image encryption method based on saliency detection",
        BOOKTITLE = VCIP16,
        YEAR = "2016",
        PAGES = "1-4",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262710"}

@inproceedings{bb268015,
        AUTHOR = "Maqbool, S. and Ahmad, N. and Muhammad, A. and Enriquez, A.M.M.",
        TITLE = "Simultaneous Encryption and Compression of Digital Images Based on
Secure-JPEG Encoding",
        BOOKTITLE = MCPR16,
        YEAR = "2016",
        PAGES = "145-154",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262711"}

@inproceedings{bb268016,
        AUTHOR = "Abdmouleh, M.K. and Khalfallah, A. and Bouhlel, M.S.",
        TITLE = "A Chaotic Cryptosystem for Color Image with Dynamic Look-Up Table",
        BOOKTITLE = ICISP16,
        YEAR = "2016",
        PAGES = "91-100",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262712"}

@inproceedings{bb268017,
        AUTHOR = "Fatahbeygi, A. and Akhlaghian, F.",
        TITLE = "A new robust semi-blind image watermarking based on block
classification and visual cryptography",
        BOOKTITLE = IPRIA15,
        YEAR = "2015",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262713"}

@inproceedings{bb268018,
        AUTHOR = "Belkaid, B.M. and Mourad, L. and Mehdi, C. and Soltane, A.",
        TITLE = "Secure transfer of medical images using hybrid encryption:
Authentication, confidentiality, integrity",
        BOOKTITLE = ICCVIA15,
        YEAR = "2015",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262714"}

@inproceedings{bb268019,
        AUTHOR = "Jolfaei, A. and Wu, X.W. and Muthukkumarasamy, V.",
        TITLE = "A Secure Lightweight Texture Encryption Scheme",
        BOOKTITLE = VSWS15,
        YEAR = "2015",
        PAGES = "344-356",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262715"}

@inproceedings{bb268020,
        AUTHOR = "Wang, D.S. and Yi, F. and Yang, C.N.",
        TITLE = "Visual Cryptography Scheme with Autostereogram",
        BOOKTITLE = IWDW14,
        YEAR = "2014",
        PAGES = "364-375",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262716"}

@inproceedings{bb268021,
        AUTHOR = "Chen, Y.C. and Lu, K. and Tso, R. and Wu, M.E.",
        TITLE = "An Improved Visual Cryptography with Cheating Prevention",
        BOOKTITLE = IWDW14,
        YEAR = "2014",
        PAGES = "444-454",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262717"}

@inproceedings{bb268022,
        AUTHOR = "Liu, F. and Wu, C.K.",
        TITLE = "Optimal XOR Based (2,n)-Visual Cryptography Schemes",
        BOOKTITLE = IWDW14,
        YEAR = "2014",
        PAGES = "333-349",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262718"}

@inproceedings{bb268023,
        AUTHOR = "Hofbauer, H. and Unterweger, A. and Uhl, A.",
        TITLE = "Encrypting only AC coefficient signs considered harmful",
        BOOKTITLE = ICIP15,
        YEAR = "2015",
        PAGES = "3740-3744",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262719"}

@inproceedings{bb268024,
        AUTHOR = "Liu, S.C. and Fujiyoshi, M. and Kiya, H.",
        TITLE = "A cheat preventing method with efficient pixel expansion for
Naor-Shamir's visual cryptography",
        BOOKTITLE = ICIP14,
        YEAR = "2014",
        PAGES = "5527-5531",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262720"}

@inproceedings{bb268025,
        AUTHOR = "Eluard, M. and Maetz, Y. and Doerr, G.",
        TITLE = "Impact of geometry-preserving encryption on rendering time",
        BOOKTITLE = ICIP14,
        YEAR = "2014",
        PAGES = "4787-4791",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262721"}

@inproceedings{bb268026,
        AUTHOR = "Korshunov, P. and Ebrahimi, T.",
        TITLE = "Scrambling-based tool for secure protection of JPEG images",
        BOOKTITLE = ICIP14,
        YEAR = "2014",
        PAGES = "3423-3425",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262722"}

@inproceedings{bb268027,
        AUTHOR = "Moreno Canadas, A. and Palma Vanegas, N.P. and Hernandez Quitian, M.",
        TITLE = "Visual Cryptography Schemes Based in k -Linear Maps",
        BOOKTITLE = IWDW13,
        YEAR = "2013",
        PAGES = "288-302",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262723"}

@inproceedings{bb268028,
        AUTHOR = "Pinto, M. and Puech, W. and Subsol, G.",
        TITLE = "Protection of JPEG compressed e-comics by selective encryption",
        BOOKTITLE = ICIP13,
        YEAR = "2013",
        PAGES = "4588-4592",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262724"}

@inproceedings{bb268029,
        AUTHOR = "Panduranga, H.T. and Kumar, H.S.S. and Kumar, S.K.N.",
        TITLE = "Hybrid approach for dual image encryption using nibble exchange and
Hill-cipher",
        BOOKTITLE = IMVIP12,
        YEAR = "2012",
        PAGES = "101-104",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262725"}

@inproceedings{bb268030,
        AUTHOR = "Liu, F. and Guo, T. and Wu, C. and Yang, C.N.",
        TITLE = "Flexible Visual Cryptography Scheme without Distortion",
        BOOKTITLE = IWDW11,
        YEAR = "2011",
        PAGES = "211-227",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262726"}

@inproceedings{bb268031,
        AUTHOR = "Di, H. and Zheng, K.F. and Niu, X.X. and Zhang, X.",
        TITLE = "Multiple-image compressed encryption and decryption by compressive
holography",
        BOOKTITLE = VCIP11,
        YEAR = "2011",
        PAGES = "1-4",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262727"}

@inproceedings{bb268032,
        AUTHOR = "Bajaj, N. and Thakur, A.",
        TITLE = "Enhancement of RC5 for image encryption",
        BOOKTITLE = ICIIP11,
        YEAR = "2011",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262728"}

@inproceedings{bb268033,
        AUTHOR = "Goumidi, D.E. and Hachouf, F.",
        TITLE = "Modified confusion-diffusion based satellite image cipher using chaotic
standard, logistic and sine maps",
        BOOKTITLE = EUVIP10,
        YEAR = "2010",
        PAGES = "204-209",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262729"}

@inproceedings{bb268034,
        AUTHOR = "Petrauskiene, V. and Ragulskiene, J. and Sakyte, E. and Ragulskis, M.",
        TITLE = "Near-Optimal Time Function for Secure Dynamic Visual Cryptography",
        BOOKTITLE = ISVC11,
        YEAR = "2011",
        PAGES = "II: 300-309",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262730"}

@inproceedings{bb268035,
        AUTHOR = "Nien, H.H. and Changchien, S.K. and Wu, S.Y. and Huang, C.K.",
        TITLE = "A new Pixel-Chaotic-Shuffle method for image encryption",
        BOOKTITLE = ICARCV08,
        YEAR = "2008",
        PAGES = "883-887",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262731"}

@inproceedings{bb268036,
        AUTHOR = "Chen, B. and Chandran, V.",
        TITLE = "Robust Image Hashing Using Higher Order Spectral Features",
        BOOKTITLE = DICTA10,
        YEAR = "2010",
        PAGES = "100-104",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262732"}

@inproceedings{bb268037,
        AUTHOR = "Ahmed, F. and Siyal, M.Y. and Abbas, V.U.",
        TITLE = "A Perceptually Scalable and JPEG Compression Tolerant Image Encryption
Scheme",
        BOOKTITLE = PSIVT10,
        YEAR = "2010",
        PAGES = "232-238",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262733"}

@inproceedings{bb268038,
        AUTHOR = "Zhao, L. and Adhikari, A. and Sakurai, K.",
        TITLE = "A New Scrambling Evaluation Scheme Based on Spatial Distribution
Entropy and Centroid Difference of Bit-Plane",
        BOOKTITLE = DW10,
        YEAR = "2010",
        PAGES = "29-44",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262734"}

@inproceedings{bb268039,
        AUTHOR = "Zhao, L. and Adhikari, A. and Xiao, D. and Sakurai, K.",
        TITLE = "Cryptanalysis on an Image Scrambling Encryption Scheme Based on Pixel
Bit",
        BOOKTITLE = DW10,
        YEAR = "2010",
        PAGES = "45-59",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262735"}

@inproceedings{bb268040,
        AUTHOR = "Faridnia, S. and Faez, K.",
        TITLE = "Image Encryption through Using Chaotic Function and Graph",
        BOOKTITLE = ICCVG10,
        YEAR = "2010",
        PAGES = "I: 352-359",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262736"}

@inproceedings{bb268041,
        AUTHOR = "Ratan, R.",
        TITLE = "Key Independent Retrieval of Chaotic Encrypted Images",
        BOOKTITLE = PReMI09,
        YEAR = "2009",
        PAGES = "483-488",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262737"}

@inproceedings{bb268042,
        AUTHOR = "Mayouf, M.A. and Shukur, Z.",
        TITLE = "Using Animation in Active Learning Tool to Detect Possible Attacks in
Cryptographic Protocols",
        BOOKTITLE = IVIC09,
        YEAR = "2009",
        PAGES = "510-520",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262738"}

@inproceedings{bb268043,
        AUTHOR = "Rane, S.D. and Sun, W. and Vetro, A.",
        TITLE = "Secure distortion computation among untrusting parties using
homomorphic encryption",
        BOOKTITLE = ICIP09,
        YEAR = "2009",
        PAGES = "1485-1488",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262739"}

@inproceedings{bb268044,
        AUTHOR = "Zhang, J.H. and Chen, H. and Geng, Q.",
        TITLE = "Cryptoanalysis of Certificateless Partially Blind Signature and Proxy
Blind Signature Scheme",
        BOOKTITLE = CISP09,
        YEAR = "2009",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262740"}

@inproceedings{bb268045,
        AUTHOR = "Zhang, J.H. and Gao, S.N.",
        TITLE = "Cryptoanlaysis of Two Proxy Blind Signature Schemes with Proxy
Revocation",
        BOOKTITLE = CISP09,
        YEAR = "2009",
        PAGES = "1-4",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262741"}

@inproceedings{bb268046,
        AUTHOR = "Lang, J. and Tao, R. and Wang, Y.",
        TITLE = "The Generalized Weighted Fractional Fourier Transform and its
Application to Image Encryption",
        BOOKTITLE = CISP09,
        YEAR = "2009",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262742"}

@inproceedings{bb268047,
        AUTHOR = "Cao, Y. and Qiu, R. and Fu, Y.",
        TITLE = "Color Image Encryption Based on Hyper-Chaos",
        BOOKTITLE = CISP09,
        YEAR = "2009",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262743"}

@inproceedings{bb268048,
        AUTHOR = "He, B. and Zhang, F. and Luo, L.Y. and Du, M.K. and Wang, Y.",
        TITLE = "An Image Encryption Algorithm Based on Spatiotemporal Chaos",
        BOOKTITLE = CISP09,
        YEAR = "2009",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262744"}

@inproceedings{bb268049,
        AUTHOR = "Zhang, S. and Cai, R. and Jiang, Y.C. and Guo, S.P.",
        TITLE = "An Image Encryption Algorithm Based on Multiple Chaos and Wavelet
Transform",
        BOOKTITLE = CISP09,
        YEAR = "2009",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262745"}

@inproceedings{bb268050,
        AUTHOR = "Xiao, Y. and Zhang, H.Y. and Ran, Q.W. and Zhang, J. and Tan, L.Y.",
        TITLE = "Image Encryption and Two Dimensional Discrete M-Parameter Fractional
Fourier Transform",
        BOOKTITLE = CISP09,
        YEAR = "2009",
        PAGES = "1-4",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262746"}

@inproceedings{bb268051,
        AUTHOR = "Podoba, T. and Giesl, J. and Vlcek, K.",
        TITLE = "Image Encryption In Wavelet Domain Based on Chaotic Maps",
        BOOKTITLE = CISP09,
        YEAR = "2009",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262747"}

@inproceedings{bb268052,
        AUTHOR = "Weir, J. and Yan, W.Q.",
        TITLE = "Authenticating Visual Cryptography Shares Using 2D Barcodes",
        BOOKTITLE = IWDW11,
        YEAR = "2011",
        PAGES = "196-210",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262748"}

@inproceedings{bb268053,
        AUTHOR = "Weir, J. and Yan, W.Q.",
        TITLE = "Plane Transform Visual Cryptography",
        BOOKTITLE = DW10,
        YEAR = "2010",
        PAGES = "60-74",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262749"}

@inproceedings{bb268054,
        AUTHOR = "Weir, J. and Yan, W.Q.",
        TITLE = "Image Hatching for Visual Cryptography",
        BOOKTITLE = IMVIP09,
        YEAR = "2009",
        PAGES = "59-64",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262750"}

@inproceedings{bb268055,
        AUTHOR = "Weir, J. and Yan, W.Q.",
        TITLE = "Dot-Size Variant Visual Cryptography",
        BOOKTITLE = DW09,
        YEAR = "2009",
        PAGES = "136-148",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262751"}

@inproceedings{bb268056,
        AUTHOR = "Piper, F.",
        TITLE = "The Changing Face of Cryptography",
        BOOKTITLE = DW09,
        YEAR = "2009",
        PAGES = "2",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262752"}

@inproceedings{bb268057,
        AUTHOR = "Chen, W.B. and Zhang, X.",
        TITLE = "Image encryption algorithm based on Henon chaotic system",
        BOOKTITLE = IASP09,
        YEAR = "2009",
        PAGES = "94-97",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262753"}

@inproceedings{bb268058,
        AUTHOR = "Du, Y.F. and Zhang, J. and Su, Y.T.",
        TITLE = "Watermarking for Authentication of LZ-77 Compressed Documents",
        BOOKTITLE = DW07,
        YEAR = "2007",
        PAGES = "365-372",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262754"}

@inproceedings{bb268059,
        AUTHOR = "Luo, H. and Lu, Z.M. and Pan, J.S.",
        TITLE = "Multiple Watermarking in Visual Cryptography",
        BOOKTITLE = DW07,
        YEAR = "2007",
        PAGES = "60-70",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262755"}

@inproceedings{bb268060,
        AUTHOR = "Sadeghi, A.R.",
        TITLE = "The Marriage of Cryptography and Watermarking:
Beneficial and Challenging for Secure Watermarking and Detection",
        BOOKTITLE = DW07,
        YEAR = "2007",
        PAGES = "2-18",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262756"}

@inproceedings{bb268061,
        AUTHOR = "He, D. and Jagmohan, A. and Lu, L.G.",
        TITLE = "Secure collaboration using Slepian-Wolf codes",
        BOOKTITLE = ICIP08,
        YEAR = "2008",
        PAGES = "2216-2219",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262757"}

@inproceedings{bb268062,
        AUTHOR = "Seshadrinathan, M. and Dempski, K.L.",
        TITLE = "Implementation of Advanced Encryption Standard for encryption and
decryption of images and text on a GPU",
        BOOKTITLE = CVGPU08,
        YEAR = "2008",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262758"}

@inproceedings{bb268063,
        AUTHOR = "Alface, P.R. and Macq, B. and Cayre, F.",
        TITLE = "Blind and Robust Watermarking of 3D Models:
How to Withstand the Cropping Attack?",
        BOOKTITLE = ICIP07,
        YEAR = "2007",
        PAGES = "V: 465-468",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262759"}

@inproceedings{bb268064,
        AUTHOR = "Huang, T.J.",
        TITLE = "Evolvement of DRM Schema: From Encryption to Interoperability and
Monitoring",
        BOOKTITLE = MCAM07,
        YEAR = "2007",
        PAGES = "65-75",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262760"}

@inproceedings{bb268065,
        AUTHOR = "Lai, J.C. and Wang, C.H.",
        TITLE = "Buffer Occupancy Feedback Security Control and Changing Encryption Keys
to Protect MOD Services",
        BOOKTITLE = PSIVT06,
        YEAR = "2006",
        PAGES = "888-897",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262761"}

@inproceedings{bb268066,
        AUTHOR = "Li, W.H. and Yuan, Y.",
        TITLE = "Visual Information Encryption in Frequency Domain: Risk and Enhancement",
        BOOKTITLE = IWICPAS06,
        YEAR = "2006",
        PAGES = "225-234",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262762"}

@inproceedings{bb268067,
        AUTHOR = "Wong, A. and Bishop, W.",
        TITLE = "Expert Knowledge Based Automatic Regions-of-Interest (ROI) Selection in
Scanned Documents for Digital Image Encryption",
        BOOKTITLE = CRV06,
        YEAR = "2006",
        PAGES = "51-51",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262763"}

@inproceedings{bb268068,
        AUTHOR = "Said, A.",
        TITLE = "Measuring the Strength of Partial Encryption Schemes",
        BOOKTITLE = ICIP05,
        YEAR = "2005",
        PAGES = "II: 1126-1129",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262764"}

@inproceedings{bb268069,
        AUTHOR = "Watanabe, O. and Nakazaki, A. and Kiya, H.",
        TITLE = "A fast image-scramble method using public-key encryption allowing
backward compatibility with jpeg2000",
        BOOKTITLE = ICIP04,
        YEAR = "2004",
        PAGES = "V: 3435-3438",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262765"}

@inproceedings{bb268070,
        AUTHOR = "Katzenbeisser, S.",
        TITLE = "On the Integration of Watermarks and Cryptography",
        BOOKTITLE = DW03,
        YEAR = "2003",
        PAGES = "50-60",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262766"}

@inproceedings{bb268071,
        AUTHOR = "Li, S.J. and Zheng, X.",
        TITLE = "On the security of an image encryption method",
        BOOKTITLE = ICIP02,
        YEAR = "2002",
        PAGES = "II: 925-928",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262767"}

@inproceedings{bb268072,
        AUTHOR = "Yamaguchi, Y.S.",
        TITLE = "An Extended Visual Cryptography Scheme for Continuous-Tone Images",
        BOOKTITLE = IWDW11,
        YEAR = "2011",
        PAGES = "228-242",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262768"}

@inproceedings{bb268073,
        AUTHOR = "Nakajima, M. and Yamaguchi, Y.S.",
        TITLE = "Extended Visual Cryptography for Natural Images",
        BOOKTITLE = WSCG02,
        YEAR = "2002",
        PAGES = "303",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262769"}

@inproceedings{bb268074,
        AUTHOR = "Han, K. and Tewfik, A.",
        TITLE = "Scalable Cryptographic Scheme for Networked Multimedia Applications",
        BOOKTITLE = ICIP01,
        YEAR = "2001",
        PAGES = "III: 987-990",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262770"}

@inproceedings{bb268075,
        AUTHOR = "Chen, Y.C. and Chang, L.W.",
        TITLE = "A Secure and Robust Digital Watermarking Technique by the Block Cipher
Rc6 and Secure Hash Algorithm",
        BOOKTITLE = ICIP01,
        YEAR = "2001",
        PAGES = "II: 518-521",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262771"}

@inproceedings{bb268076,
        AUTHOR = "Depovere, G. and Kalker, T.",
        TITLE = "Secret Key Watermarking with Changing Keys",
        BOOKTITLE = ICIP00,
        YEAR = "2000",
        PAGES = "Vol I: 427-429",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262772"}

@inproceedings{bb268077,
        AUTHOR = "Bhattacharjee, S. and Kutter, M.",
        TITLE = "Compression tolerant image authentication",
        BOOKTITLE = ICIP98,
        YEAR = "1998",
        PAGES = "I: 435-439",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262773"}

@inproceedings{bb268078,
        AUTHOR = "Creusere, C.D. and Mitra, S.K.",
        TITLE = "Efficient image scrambling using polyphase filter banks",
        BOOKTITLE = ICIP94,
        YEAR = "1994",
        PAGES = "II: 81-85",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT262774"}

@article{bb268079,
        AUTHOR = "Li, S.J. and Li, C.Q. and Chen, G.R. and Bourbakis, N.G. and Lo, K.T.",
        TITLE = "A general quantitative cryptanalysis of permutation-only multimedia
ciphers against plaintext attacks",
        JOURNAL = SP:IC,
        VOLUME = "23",
        YEAR = "2008",
        NUMBER = "3",
        MONTH = "March",
        PAGES = "212-223",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT262775"}

@article{bb268080,
        AUTHOR = "Wang, X.F. and Zheng, N.N. and Tian, L.",
        TITLE = "Hash key-based video encryption scheme for H.264/AVC",
        JOURNAL = SP:IC,
        VOLUME = "25",
        YEAR = "2010",
        NUMBER = "6",
        MONTH = "July",
        PAGES = "427-437",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT262776"}

@article{bb268081,
        AUTHOR = "Yeung, S.K.A. and Zhu, S. and Zeng, B.",
        TITLE = "Design of New Unitary Transforms for Perceptual Video Encryption",
        JOURNAL = CirSysVideo,
        VOLUME = "21",
        YEAR = "2011",
        NUMBER = "9",
        MONTH = "September",
        PAGES = "1341-1345",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT262777"}

@inproceedings{bb268082,
        AUTHOR = "Yeung, S.K.A. and Zeng, B.",
        TITLE = "A new design of multiple transforms for perceptual video encryption",
        BOOKTITLE = ICIP12,
        YEAR = "2012",
        PAGES = "2637-2640",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT262778"}

@article{bb268083,
        AUTHOR = "Thorpe, C. and Li, F. and Li, Z.J. and Yu, Z. and Saunders, D. and Yu, J.Y.",
        TITLE = "A Coprime Blur Scheme for Data Security in Video Surveillance",
        JOURNAL = PAMI,
        VOLUME = "35",
        YEAR = "2013",
        NUMBER = "12",
        PAGES = "3066-3072",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT262779"}

@article{bb268084,
        AUTHOR = "Asghar, M.N. and Ghanbari, M. and Fleury, M. and Reed, M.J.",
        TITLE = "Confidentiality of a selectively encrypted H.264 coded video
bit-stream",
        JOURNAL = JVCIR,
        VOLUME = "25",
        YEAR = "2014",
        NUMBER = "2",
        PAGES = "487-498",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT262780"}

@article{bb268085,
        AUTHOR = "Asghar, M.N. and Kousar, R. and Majid, H. and Fleury, M.",
        TITLE = "Transparent encryption with scalable video communication:
Lower-latency, CABAC-based schemes",
        JOURNAL = JVCIR,
        VOLUME = "45",
        YEAR = "2017",
        NUMBER = "1",
        PAGES = "122-136",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT262781"}

@article{bb268086,
        AUTHOR = "Benrhouma, O. and Hermassi, H. and El Latif, A.A.A. and Belghith, S.",
        TITLE = "Cryptanalysis of a video encryption method based on mixing and
permutation operations in the DCT domain",
        JOURNAL = SIViP,
        VOLUME = "9",
        YEAR = "2015",
        NUMBER = "6",
        MONTH = "September",
        PAGES = "1281-1286",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT262782"}

@article{bb268087,
        AUTHOR = "Xu, H. and Tong, X.J. and Zhang, M. and Wang, Z. and Li, L.H.",
        TITLE = "Dynamic video encryption algorithm for H.264/AVC based on a
spatiotemporal chaos system",
        JOURNAL = JOSA-A,
        VOLUME = "33",
        YEAR = "2016",
        NUMBER = "6",
        MONTH = "June",
        PAGES = "1166-1174",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT262783"}

@article{bb268088,
        AUTHOR = "Boyadjis, B. and Bergeron, C. and Pesquet Popescu, B. and DuFaux, F.",
        TITLE = "Extended Selective Encryption of H.264/AVC (CABAC)- and HEVC-Encoded
Video Streams",
        JOURNAL = CirSysVideo,
        VOLUME = "27",
        YEAR = "2017",
        NUMBER = "4",
        MONTH = "April",
        PAGES = "892-906",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT262784"}

@article{bb268089,
        AUTHOR = "Minemura, K. and Wong, K. and Phan, R.C.W. and Tanaka, K.",
        TITLE = "A Novel Sketch Attack for H.264/AVC Format-Compliant Encrypted Video",
        JOURNAL = CirSysVideo,
        VOLUME = "27",
        YEAR = "2017",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "2309-2321",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT262785"}

@article{bb268090,
        AUTHOR = "Khlif, N. and Masmoudi, A. and Kammoun, F. and Masmoudi, N.",
        TITLE = "Secure chaotic dual encryption scheme for H.264/AVC video conferencing
protection",
        JOURNAL = IET-IPR,
        VOLUME = "12",
        YEAR = "2018",
        NUMBER = "1",
        MONTH = "January",
        PAGES = "42-52",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT262786"}

@article{bb268091,
        AUTHOR = "Thiyagarajan, K. and Lu, R. and El Sankary, K. and Zhu, H.",
        TITLE = "Energy-Aware Encryption for Securing Video Transmission in Internet
of Multimedia Things",
        JOURNAL = CirSysVideo,
        VOLUME = "29",
        YEAR = "2019",
        NUMBER = "3",
        MONTH = "March",
        PAGES = "610-624",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT262787"}

@article{bb268092,
        AUTHOR = "Elkamchouchi, H. and Salama, W.M. and Abouelseoud, Y.",
        TITLE = "New video encryption schemes based on chaotic maps",
        JOURNAL = IET-IPR,
        VOLUME = "14",
        YEAR = "2020",
        NUMBER = "2",
        MONTH = "February",
        PAGES = "397-406",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT262788"}

@article{bb268093,
        AUTHOR = "Ghimire, S. and Choi, J.Y. and Lee, B.",
        TITLE = "Using Blockchain for Improved Video Integrity Verification",
        JOURNAL = MultMed,
        VOLUME = "22",
        YEAR = "2020",
        NUMBER = "1",
        MONTH = "January",
        PAGES = "108-121",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT262789"}

@article{bb268094,
        AUTHOR = "Panwar, K. and Purwar, R.K. and Srivastava, G.",
        TITLE = "A Fast Encryption Scheme Suitable for Video Surveillance Applications
Using SHA-256 Hash Function and 1D Sine-Sine Chaotic Map",
        JOURNAL = IJIG,
        VOLUME = "21",
        YEAR = "2021",
        NUMBER = "2 2021",
        PAGES = "2150022",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT262790"}

@inproceedings{bb268095,
        AUTHOR = "Li, D. and Zhang, X. and Zhai, G. and Yang, X. and Zhu, W. and Gu, X.",
        TITLE = "Modeling Thermal Sequence Signal Decreasing for Dual Modal Password
Breaking",
        BOOKTITLE = ICIP18,
        YEAR = "2018",
        PAGES = "1703-1707",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT262791"}

@inproceedings{bb268096,
        AUTHOR = "Kim, J. and Lee, S. and Yoon, J. and Ko, H. and Kim, S. and Oh, H.",
        TITLE = "PASS: Privacy aware secure signature scheme for surveillance systems",
        BOOKTITLE = AVSS17,
        YEAR = "2017",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT262792"}

@inproceedings{bb268097,
        AUTHOR = "Hu, Y. and Zhou, W. and Zhao, S. and Chen, Z. and Li, W.",
        TITLE = "SDM: Semantic Distortion Measurement for Video Encryption",
        BOOKTITLE = FG18,
        YEAR = "2018",
        PAGES = "764-768",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT262793"}

@inproceedings{bb268098,
        AUTHOR = "Chang, Y.T. and Lin, Y.C. and Chen, Y.C. and Liou, Y.T.",
        TITLE = "Scrambling Cryptography Using Programmable SLM-Based Filter for Video
Streaming Over a WDM Network",
        BOOKTITLE = CompIMAGE16,
        YEAR = "2016",
        PAGES = "241-250",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT262794"}

@inproceedings{bb268099,
        AUTHOR = "Almarashda, K. and Dawood, A. and Martin, T. and Al Mualla, M. and Bhaskar, H.",
        TITLE = "An Optimized Selective Encryption for Video Confidentiality",
        BOOKTITLE = ICIAR15,
        YEAR = "2015",
        PAGES = "109-118",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT262795"}

Last update:Nov 30, 2021 at 22:19:38