@article{bb281800,
        AUTHOR = "Xian, Y.J. and Wang, X.Y. and Teng, L.",
        TITLE = "Double Parameters Fractal Sorting Matrix and Its Application in Image
Encryption",
        JOURNAL = CirSysVideo,
        VOLUME = "32",
        YEAR = "2022",
        NUMBER = "6",
        MONTH = "June",
        PAGES = "4028-4037",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276430"}

@article{bb281801,
        AUTHOR = "Wen, Y. and Su, J.M. and Hong, Y. and Gong, P.S.",
        TITLE = "Hybrid mapping algorithm based on 1-DCM and Lorenz",
        JOURNAL = IET-IPR,
        VOLUME = "16",
        YEAR = "2022",
        NUMBER = "9",
        PAGES = "2467-2482",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276431"}

@inproceedings{bb281802,
        AUTHOR = "Puteaux, P. and Puech, W.",
        TITLE = "Localization and Correction of Corrupted Pixel Blocks in Noisy
Encrypted Images",
        BOOKTITLE = IPTA20,
        YEAR = "2020",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276432"}

@inproceedings{bb281803,
        AUTHOR = "Zheng, H.Y. and Huang, Y. and Li, L. and Xiao, D.",
        TITLE = "Compressive Sensing-Based Image Encryption and Authentication in
Edge-Clouds",
        BOOKTITLE = MMMod22,
        YEAR = "2022",
        PAGES = "II:382-393",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276433"}

@inproceedings{bb281804,
        AUTHOR = "Zhang, Y. and Chen, A. and Tang, Y.J. and Ding, X. and Jiang, N. and Sun, Q.F.",
        TITLE = "Comments on Test Methods of Encryption and Decryption Speeds of Image
Cryptosystems",
        BOOKTITLE = ICIVC21,
        YEAR = "2021",
        PAGES = "284-288",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276434"}

@inproceedings{bb281805,
        AUTHOR = "Tian, J. and Zhou, J.T. and Duan, J.",
        TITLE = "Probabilistic Selective Encryption of Convolutional Neural Networks
for Hierarchical Services",
        BOOKTITLE = CVPR21,
        YEAR = "2021",
        PAGES = "2205-2214",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276435"}

@inproceedings{bb281806,
        AUTHOR = "Yao, L.S. and Xu, G.M. and Zhao, F.",
        TITLE = "Application of Fish-swarm and Genetic Algorithm in Optimization of
Chaotic Image Encryption",
        BOOKTITLE = CVIDL20,
        YEAR = "2020",
        PAGES = "76-83",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276436"}

@inproceedings{bb281807,
        AUTHOR = "Chen, Q.Q. and Dai, Y. and Niu, Z.Y.",
        TITLE = "An Image Encryption Algorithm Based on Combination of Chaos and DNA
Encoding",
        BOOKTITLE = CVIDL20,
        YEAR = "2020",
        PAGES = "182-185",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276437"}

@inproceedings{bb281808,
        AUTHOR = "Chmielewski, L.J. and Orlowski, A.",
        TITLE = "Does Randomness in the Random Visual Cryptography Protocol Depend on
the Period of Pseudorandom Number Generators?",
        BOOKTITLE = ICCVG20,
        YEAR = "2020",
        PAGES = "36-47",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276438"}

@inproceedings{bb281809,
        AUTHOR = "Bian, S. and Wang, T.C. and Hiromoto, M. and Shi, Y. and Sato, T.",
        TITLE = "ENSEI: Efficient Secure Inference via Frequency-Domain Homomorphic
Convolution for Privacy-Preserving Visual Recognition",
        BOOKTITLE = CVPR20,
        YEAR = "2020",
        PAGES = "9400-9409",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276439"}

@inproceedings{bb281810,
        AUTHOR = "Sedighi, M. and Mahmoudi, S.K. and Amini, A.S.",
        TITLE = "Proposing a New Method for Encrypting Satellite Images Based On Hash
Function and Chaos Parameters",
        BOOKTITLE = SMPR19,
        YEAR = "2019",
        PAGES = "949-953",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276440"}

@inproceedings{bb281811,
        AUTHOR = "Puteaux, P. and Puech, W.",
        TITLE = "Image Analysis and Processing in the Encrypted Domain",
        BOOKTITLE = ICIP19,
        YEAR = "2019",
        PAGES = "3020-3022",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276441"}

@inproceedings{bb281812,
        AUTHOR = "Lee, S. and Huang, Y. and Lin, J.",
        TITLE = "WEB-VC: Visual Cryptography for Web Image",
        BOOKTITLE = ICIP19,
        YEAR = "2019",
        PAGES = "4055-4059",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276442"}

@inproceedings{bb281813,
        AUTHOR = "Orlowski, A. and Chmielewski, L.J.",
        TITLE = "Color Visual Cryptography with Completely Randomly Coded Colors",
        BOOKTITLE = CAIP19,
        YEAR = "2019",
        PAGES = "I:589-599",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276443"}

@inproceedings{bb281814,
        AUTHOR = "Bellafqira, R. and Coatrieux, G. and Genin, E. and Cozic, M.",
        TITLE = "Secure Multilayer Perceptron Based on Homomorphic Encryption",
        BOOKTITLE = IWDW18,
        YEAR = "2018",
        PAGES = "322-336",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276444"}

@inproceedings{bb281815,
        AUTHOR = "Liu, Z. and Yang, M.L. and Yan, W.Q.",
        TITLE = "Image encryption based on double random phase encoding",
        BOOKTITLE = IVCNZ17,
        YEAR = "2017",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276445"}

@inproceedings{bb281816,
        AUTHOR = "Touil, H. and Akkad, N.E. and Satori, K.",
        TITLE = "Text Encryption:
Hybrid cryptographic method using Vigenere and Hill Ciphers.",
        BOOKTITLE = ISCV20,
        YEAR = "2020",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276446"}

@inproceedings{bb281817,
        AUTHOR = "Es sabry, M. and El Akkad, N. and Merras, M. and Saaidi, A. and Satori, K.",
        TITLE = "Grayscale image encryption using shift bits operations",
        BOOKTITLE = ISCV18,
        YEAR = "2018",
        PAGES = "1-7",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276447"}

@inproceedings{bb281818,
        AUTHOR = "Hamici, Z.",
        TITLE = "Image cryptography based on the imitation of gene fusion and
horizontal gene transfer",
        BOOKTITLE = IPTA17,
        YEAR = "2017",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276448"}

@inproceedings{bb281819,
        AUTHOR = "Kang, X. and Han, Z. and Yu, A. and Duan, P.",
        TITLE = "Double random scrambling encoding in the RPMPFrHT domain",
        BOOKTITLE = ICIP17,
        YEAR = "2017",
        PAGES = "4362-4366",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276449"}

@inproceedings{bb281820,
        AUTHOR = "Yonetani, R. and Boddeti, V.N. and Kitani, K.M. and Sato, Y.",
        TITLE = "Privacy-Preserving Visual Learning Using Doubly Permuted Homomorphic
Encryption",
        BOOKTITLE = ICCV17,
        YEAR = "2017",
        PAGES = "2059-2069",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276450"}

@inproceedings{bb281821,
        AUTHOR = "Zhang, Y. and Li, X.Q. and Hou, W.G.",
        TITLE = "A fast image encryption scheme based on AES",
        BOOKTITLE = ICIVC17,
        YEAR = "2017",
        PAGES = "624-628",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276451"}

@inproceedings{bb281822,
        AUTHOR = "Yan, B. and Bai, S.",
        TITLE = "Design of image confusion-diffusion cryptosystem based on vector
quantization and cross chaotic map",
        BOOKTITLE = ICIVC17,
        YEAR = "2017",
        PAGES = "639-644",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276452"}

@inproceedings{bb281823,
        AUTHOR = "Shen, G. and Liu, F. and Fu, Z.X. and Yu, B. and Wang, W.",
        TITLE = "Halftone Visual Cryptography with Complementary Cover Images",
        BOOKTITLE = IWDW16,
        YEAR = "2016",
        PAGES = "223-237",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276453"}

@inproceedings{bb281824,
        AUTHOR = "Wang, W. and Liu, F. and Guo, T. and Ren, Y.W.",
        TITLE = "Temporal Integration Based Visual Cryptography Scheme and Its
Application",
        BOOKTITLE = IWDW17,
        YEAR = "2017",
        PAGES = "406-419",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276454"}

@inproceedings{bb281825,
        AUTHOR = "Ren, Y.W. and Liu, F. and Wang, W.",
        TITLE = "Collusive Attacks to Partition Authentication Visual Cryptography
Scheme",
        BOOKTITLE = IWDW16,
        YEAR = "2016",
        PAGES = "238-250",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276455"}

@inproceedings{bb281826,
        AUTHOR = "Dutta, S. and Roy, P.S. and Adhikari, A. and Sakurai, K.",
        TITLE = "On the Robustness of Visual Cryptographic Schemes",
        BOOKTITLE = IWDW16,
        YEAR = "2016",
        PAGES = "251-262",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276456"}

@inproceedings{bb281827,
        AUTHOR = "Goel, A. and Chaudhari, K.",
        TITLE = "Median based pixel selection for partial image encryption",
        BOOKTITLE = IPTA16,
        YEAR = "2016",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276457"}

@inproceedings{bb281828,
        AUTHOR = "Wen, W. and Zhang, Y. and Fang, Y. and Fang, Z.",
        TITLE = "A novel selective image encryption method based on saliency detection",
        BOOKTITLE = VCIP16,
        YEAR = "2016",
        PAGES = "1-4",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276458"}

@inproceedings{bb281829,
        AUTHOR = "Maqbool, S. and Ahmad, N. and Muhammad, A. and Enriquez, A.M.M.",
        TITLE = "Simultaneous Encryption and Compression of Digital Images Based on
Secure-JPEG Encoding",
        BOOKTITLE = MCPR16,
        YEAR = "2016",
        PAGES = "145-154",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276459"}

@inproceedings{bb281830,
        AUTHOR = "Abdmouleh, M.K. and Khalfallah, A. and Bouhlel, M.S.",
        TITLE = "A Chaotic Cryptosystem for Color Image with Dynamic Look-Up Table",
        BOOKTITLE = ICISP16,
        YEAR = "2016",
        PAGES = "91-100",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276460"}

@inproceedings{bb281831,
        AUTHOR = "Fatahbeygi, A. and Akhlaghian, F.",
        TITLE = "A new robust semi-blind image watermarking based on block
classification and visual cryptography",
        BOOKTITLE = IPRIA15,
        YEAR = "2015",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276461"}

@inproceedings{bb281832,
        AUTHOR = "Belkaid, B.M. and Mourad, L. and Mehdi, C. and Soltane, A.",
        TITLE = "Secure transfer of medical images using hybrid encryption:
Authentication, confidentiality, integrity",
        BOOKTITLE = ICCVIA15,
        YEAR = "2015",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276462"}

@inproceedings{bb281833,
        AUTHOR = "Jolfaei, A. and Wu, X.W. and Muthukkumarasamy, V.",
        TITLE = "A Secure Lightweight Texture Encryption Scheme",
        BOOKTITLE = VSWS15,
        YEAR = "2015",
        PAGES = "344-356",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276463"}

@inproceedings{bb281834,
        AUTHOR = "Wang, D.S. and Yi, F. and Yang, C.N.",
        TITLE = "Visual Cryptography Scheme with Autostereogram",
        BOOKTITLE = IWDW14,
        YEAR = "2014",
        PAGES = "364-375",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276464"}

@inproceedings{bb281835,
        AUTHOR = "Chen, Y.C. and Lu, K.H. and Tso, R.L. and Wu, M.E.",
        TITLE = "An Improved Visual Cryptography with Cheating Prevention",
        BOOKTITLE = IWDW14,
        YEAR = "2014",
        PAGES = "444-454",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276465"}

@inproceedings{bb281836,
        AUTHOR = "Liu, F. and Wu, C.K.",
        TITLE = "Optimal XOR Based (2,n)-Visual Cryptography Schemes",
        BOOKTITLE = IWDW14,
        YEAR = "2014",
        PAGES = "333-349",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276466"}

@inproceedings{bb281837,
        AUTHOR = "Hofbauer, H. and Unterweger, A. and Uhl, A.",
        TITLE = "Encrypting only AC coefficient signs considered harmful",
        BOOKTITLE = ICIP15,
        YEAR = "2015",
        PAGES = "3740-3744",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276467"}

@inproceedings{bb281838,
        AUTHOR = "Liu, S.C. and Fujiyoshi, M. and Kiya, H.",
        TITLE = "A cheat preventing method with efficient pixel expansion for
Naor-Shamir's visual cryptography",
        BOOKTITLE = ICIP14,
        YEAR = "2014",
        PAGES = "5527-5531",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276468"}

@inproceedings{bb281839,
        AUTHOR = "Eluard, M. and Maetz, Y. and Doerr, G.",
        TITLE = "Impact of geometry-preserving encryption on rendering time",
        BOOKTITLE = ICIP14,
        YEAR = "2014",
        PAGES = "4787-4791",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276469"}

@inproceedings{bb281840,
        AUTHOR = "Korshunov, P. and Ebrahimi, T.",
        TITLE = "Scrambling-based tool for secure protection of JPEG images",
        BOOKTITLE = ICIP14,
        YEAR = "2014",
        PAGES = "3423-3425",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276470"}

@inproceedings{bb281841,
        AUTHOR = "Moreno Canadas, A. and Palma Vanegas, N.P. and Hernandez Quitian, M.",
        TITLE = "Visual Cryptography Schemes Based in k -Linear Maps",
        BOOKTITLE = IWDW13,
        YEAR = "2013",
        PAGES = "288-302",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276471"}

@inproceedings{bb281842,
        AUTHOR = "Pinto, M. and Puech, W. and Subsol, G.",
        TITLE = "Protection of JPEG compressed e-comics by selective encryption",
        BOOKTITLE = ICIP13,
        YEAR = "2013",
        PAGES = "4588-4592",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276472"}

@inproceedings{bb281843,
        AUTHOR = "Panduranga, H.T. and Kumar, H.S.S. and Kumar, S.K.N.",
        TITLE = "Hybrid approach for dual image encryption using nibble exchange and
Hill-cipher",
        BOOKTITLE = IMVIP12,
        YEAR = "2012",
        PAGES = "101-104",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276473"}

@inproceedings{bb281844,
        AUTHOR = "Liu, F. and Guo, T. and Wu, C. and Yang, C.N.",
        TITLE = "Flexible Visual Cryptography Scheme without Distortion",
        BOOKTITLE = IWDW11,
        YEAR = "2011",
        PAGES = "211-227",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276474"}

@inproceedings{bb281845,
        AUTHOR = "Di, H. and Zheng, K.F. and Niu, X.X. and Zhang, X.",
        TITLE = "Multiple-image compressed encryption and decryption by compressive
holography",
        BOOKTITLE = VCIP11,
        YEAR = "2011",
        PAGES = "1-4",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276475"}

@inproceedings{bb281846,
        AUTHOR = "Bajaj, N. and Thakur, A.",
        TITLE = "Enhancement of RC5 for image encryption",
        BOOKTITLE = ICIIP11,
        YEAR = "2011",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276476"}

@inproceedings{bb281847,
        AUTHOR = "Goumidi, D.E. and Hachouf, F.",
        TITLE = "Modified confusion-diffusion based satellite image cipher using chaotic
standard, logistic and sine maps",
        BOOKTITLE = EUVIP10,
        YEAR = "2010",
        PAGES = "204-209",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276477"}

@inproceedings{bb281848,
        AUTHOR = "Petrauskiene, V. and Ragulskiene, J. and Sakyte, E. and Ragulskis, M.",
        TITLE = "Near-Optimal Time Function for Secure Dynamic Visual Cryptography",
        BOOKTITLE = ISVC11,
        YEAR = "2011",
        PAGES = "II: 300-309",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276478"}

@inproceedings{bb281849,
        AUTHOR = "Nien, H.H. and Changchien, S.K. and Wu, S.Y. and Huang, C.K.",
        TITLE = "A new Pixel-Chaotic-Shuffle method for image encryption",
        BOOKTITLE = ICARCV08,
        YEAR = "2008",
        PAGES = "883-887",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276479"}

@inproceedings{bb281850,
        AUTHOR = "Chen, B. and Chandran, V.",
        TITLE = "Robust Image Hashing Using Higher Order Spectral Features",
        BOOKTITLE = DICTA10,
        YEAR = "2010",
        PAGES = "100-104",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276480"}

@inproceedings{bb281851,
        AUTHOR = "Ahmed, F. and Siyal, M.Y. and Abbas, V.U.",
        TITLE = "A Perceptually Scalable and JPEG Compression Tolerant Image Encryption
Scheme",
        BOOKTITLE = PSIVT10,
        YEAR = "2010",
        PAGES = "232-238",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276481"}

@inproceedings{bb281852,
        AUTHOR = "Zhao, L. and Adhikari, A. and Sakurai, K.",
        TITLE = "A New Scrambling Evaluation Scheme Based on Spatial Distribution
Entropy and Centroid Difference of Bit-Plane",
        BOOKTITLE = DW10,
        YEAR = "2010",
        PAGES = "29-44",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276482"}

@inproceedings{bb281853,
        AUTHOR = "Zhao, L. and Adhikari, A. and Xiao, D. and Sakurai, K.",
        TITLE = "Cryptanalysis on an Image Scrambling Encryption Scheme Based on Pixel
Bit",
        BOOKTITLE = DW10,
        YEAR = "2010",
        PAGES = "45-59",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276483"}

@inproceedings{bb281854,
        AUTHOR = "Faridnia, S. and Faez, K.",
        TITLE = "Image Encryption through Using Chaotic Function and Graph",
        BOOKTITLE = ICCVG10,
        YEAR = "2010",
        PAGES = "I: 352-359",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276484"}

@inproceedings{bb281855,
        AUTHOR = "Ratan, R.",
        TITLE = "Key Independent Retrieval of Chaotic Encrypted Images",
        BOOKTITLE = PReMI09,
        YEAR = "2009",
        PAGES = "483-488",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276485"}

@inproceedings{bb281856,
        AUTHOR = "Mayouf, M.A. and Shukur, Z.",
        TITLE = "Using Animation in Active Learning Tool to Detect Possible Attacks in
Cryptographic Protocols",
        BOOKTITLE = IVIC09,
        YEAR = "2009",
        PAGES = "510-520",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276486"}

@inproceedings{bb281857,
        AUTHOR = "Rane, S.D. and Sun, W. and Vetro, A.",
        TITLE = "Secure distortion computation among untrusting parties using
homomorphic encryption",
        BOOKTITLE = ICIP09,
        YEAR = "2009",
        PAGES = "1485-1488",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276487"}

@inproceedings{bb281858,
        AUTHOR = "Zhang, J.H. and Chen, H. and Geng, Q.",
        TITLE = "Cryptoanalysis of Certificateless Partially Blind Signature and Proxy
Blind Signature Scheme",
        BOOKTITLE = CISP09,
        YEAR = "2009",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276488"}

@inproceedings{bb281859,
        AUTHOR = "Zhang, J.H. and Gao, S.N.",
        TITLE = "Cryptoanlaysis of Two Proxy Blind Signature Schemes with Proxy
Revocation",
        BOOKTITLE = CISP09,
        YEAR = "2009",
        PAGES = "1-4",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276489"}

@inproceedings{bb281860,
        AUTHOR = "Lang, J. and Tao, R. and Wang, Y.",
        TITLE = "The Generalized Weighted Fractional Fourier Transform and its
Application to Image Encryption",
        BOOKTITLE = CISP09,
        YEAR = "2009",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276490"}

@inproceedings{bb281861,
        AUTHOR = "Cao, Y. and Qiu, R. and Fu, Y.",
        TITLE = "Color Image Encryption Based on Hyper-Chaos",
        BOOKTITLE = CISP09,
        YEAR = "2009",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276491"}

@inproceedings{bb281862,
        AUTHOR = "He, B. and Zhang, F. and Luo, L.Y. and Du, M.K. and Wang, Y.",
        TITLE = "An Image Encryption Algorithm Based on Spatiotemporal Chaos",
        BOOKTITLE = CISP09,
        YEAR = "2009",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276492"}

@inproceedings{bb281863,
        AUTHOR = "Zhang, S. and Cai, R. and Jiang, Y.C. and Guo, S.P.",
        TITLE = "An Image Encryption Algorithm Based on Multiple Chaos and Wavelet
Transform",
        BOOKTITLE = CISP09,
        YEAR = "2009",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276493"}

@inproceedings{bb281864,
        AUTHOR = "Xiao, Y. and Zhang, H.Y. and Ran, Q.W. and Zhang, J. and Tan, L.Y.",
        TITLE = "Image Encryption and Two Dimensional Discrete M-Parameter Fractional
Fourier Transform",
        BOOKTITLE = CISP09,
        YEAR = "2009",
        PAGES = "1-4",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276494"}

@inproceedings{bb281865,
        AUTHOR = "Podoba, T. and Giesl, J. and Vlcek, K.",
        TITLE = "Image Encryption In Wavelet Domain Based on Chaotic Maps",
        BOOKTITLE = CISP09,
        YEAR = "2009",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276495"}

@inproceedings{bb281866,
        AUTHOR = "Weir, J. and Yan, W.Q.",
        TITLE = "Authenticating Visual Cryptography Shares Using 2D Barcodes",
        BOOKTITLE = IWDW11,
        YEAR = "2011",
        PAGES = "196-210",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276496"}

@inproceedings{bb281867,
        AUTHOR = "Weir, J. and Yan, W.Q.",
        TITLE = "Plane Transform Visual Cryptography",
        BOOKTITLE = DW10,
        YEAR = "2010",
        PAGES = "60-74",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276497"}

@inproceedings{bb281868,
        AUTHOR = "Weir, J. and Yan, W.Q.",
        TITLE = "Image Hatching for Visual Cryptography",
        BOOKTITLE = IMVIP09,
        YEAR = "2009",
        PAGES = "59-64",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276498"}

@inproceedings{bb281869,
        AUTHOR = "Weir, J. and Yan, W.Q.",
        TITLE = "Dot-Size Variant Visual Cryptography",
        BOOKTITLE = DW09,
        YEAR = "2009",
        PAGES = "136-148",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276499"}

@inproceedings{bb281870,
        AUTHOR = "Piper, F.",
        TITLE = "The Changing Face of Cryptography",
        BOOKTITLE = DW09,
        YEAR = "2009",
        PAGES = "2",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276500"}

@inproceedings{bb281871,
        AUTHOR = "Chen, W.B. and Zhang, X.",
        TITLE = "Image encryption algorithm based on Henon chaotic system",
        BOOKTITLE = IASP09,
        YEAR = "2009",
        PAGES = "94-97",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276501"}

@inproceedings{bb281872,
        AUTHOR = "Du, Y.F. and Zhang, J. and Su, Y.T.",
        TITLE = "Watermarking for Authentication of LZ-77 Compressed Documents",
        BOOKTITLE = DW07,
        YEAR = "2007",
        PAGES = "365-372",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276502"}

@inproceedings{bb281873,
        AUTHOR = "Luo, H. and Lu, Z.M. and Pan, J.S.",
        TITLE = "Multiple Watermarking in Visual Cryptography",
        BOOKTITLE = DW07,
        YEAR = "2007",
        PAGES = "60-70",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276503"}

@inproceedings{bb281874,
        AUTHOR = "Sadeghi, A.R.",
        TITLE = "The Marriage of Cryptography and Watermarking:
Beneficial and Challenging for Secure Watermarking and Detection",
        BOOKTITLE = DW07,
        YEAR = "2007",
        PAGES = "2-18",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276504"}

@inproceedings{bb281875,
        AUTHOR = "He, D. and Jagmohan, A. and Lu, L.G.",
        TITLE = "Secure collaboration using Slepian-Wolf codes",
        BOOKTITLE = ICIP08,
        YEAR = "2008",
        PAGES = "2216-2219",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276505"}

@inproceedings{bb281876,
        AUTHOR = "Seshadrinathan, M. and Dempski, K.L.",
        TITLE = "Implementation of Advanced Encryption Standard for encryption and
decryption of images and text on a GPU",
        BOOKTITLE = CVGPU08,
        YEAR = "2008",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276506"}

@inproceedings{bb281877,
        AUTHOR = "Alface, P.R. and Macq, B. and Cayre, F.",
        TITLE = "Blind and Robust Watermarking of 3D Models:
How to Withstand the Cropping Attack?",
        BOOKTITLE = ICIP07,
        YEAR = "2007",
        PAGES = "V: 465-468",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276507"}

@inproceedings{bb281878,
        AUTHOR = "Huang, T.J.",
        TITLE = "Evolvement of DRM Schema: From Encryption to Interoperability and
Monitoring",
        BOOKTITLE = MCAM07,
        YEAR = "2007",
        PAGES = "65-75",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276508"}

@inproceedings{bb281879,
        AUTHOR = "Lai, J.C. and Wang, C.H.",
        TITLE = "Buffer Occupancy Feedback Security Control and Changing Encryption Keys
to Protect MOD Services",
        BOOKTITLE = PSIVT06,
        YEAR = "2006",
        PAGES = "888-897",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276509"}

@inproceedings{bb281880,
        AUTHOR = "Li, W.H. and Yuan, Y.",
        TITLE = "Visual Information Encryption in Frequency Domain: Risk and Enhancement",
        BOOKTITLE = IWICPAS06,
        YEAR = "2006",
        PAGES = "225-234",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276510"}

@inproceedings{bb281881,
        AUTHOR = "Wong, A. and Bishop, W.",
        TITLE = "Expert Knowledge Based Automatic Regions-of-Interest (ROI) Selection in
Scanned Documents for Digital Image Encryption",
        BOOKTITLE = CRV06,
        YEAR = "2006",
        PAGES = "51-51",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276511"}

@inproceedings{bb281882,
        AUTHOR = "Said, A.",
        TITLE = "Measuring the Strength of Partial Encryption Schemes",
        BOOKTITLE = ICIP05,
        YEAR = "2005",
        PAGES = "II: 1126-1129",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276512"}

@inproceedings{bb281883,
        AUTHOR = "Watanabe, O. and Nakazaki, A. and Kiya, H.",
        TITLE = "A fast image-scramble method using public-key encryption allowing
backward compatibility with jpeg2000",
        BOOKTITLE = ICIP04,
        YEAR = "2004",
        PAGES = "V: 3435-3438",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276513"}

@inproceedings{bb281884,
        AUTHOR = "Katzenbeisser, S.",
        TITLE = "On the Integration of Watermarks and Cryptography",
        BOOKTITLE = DW03,
        YEAR = "2003",
        PAGES = "50-60",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276514"}

@inproceedings{bb281885,
        AUTHOR = "Li, S.J. and Zheng, X.",
        TITLE = "On the security of an image encryption method",
        BOOKTITLE = ICIP02,
        YEAR = "2002",
        PAGES = "II: 925-928",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276515"}

@inproceedings{bb281886,
        AUTHOR = "Yamaguchi, Y.S.",
        TITLE = "An Extended Visual Cryptography Scheme for Continuous-Tone Images",
        BOOKTITLE = IWDW11,
        YEAR = "2011",
        PAGES = "228-242",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276516"}

@inproceedings{bb281887,
        AUTHOR = "Nakajima, M. and Yamaguchi, Y.S.",
        TITLE = "Extended Visual Cryptography for Natural Images",
        BOOKTITLE = WSCG02,
        YEAR = "2002",
        PAGES = "303",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276517"}

@inproceedings{bb281888,
        AUTHOR = "Han, K. and Tewfik, A.",
        TITLE = "Scalable Cryptographic Scheme for Networked Multimedia Applications",
        BOOKTITLE = ICIP01,
        YEAR = "2001",
        PAGES = "III: 987-990",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276518"}

@inproceedings{bb281889,
        AUTHOR = "Chen, Y.C. and Chang, L.W.",
        TITLE = "A Secure and Robust Digital Watermarking Technique by the Block Cipher
Rc6 and Secure Hash Algorithm",
        BOOKTITLE = ICIP01,
        YEAR = "2001",
        PAGES = "II: 518-521",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276519"}

@inproceedings{bb281890,
        AUTHOR = "Depovere, G. and Kalker, T.",
        TITLE = "Secret Key Watermarking with Changing Keys",
        BOOKTITLE = ICIP00,
        YEAR = "2000",
        PAGES = "Vol I: 427-429",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276520"}

@inproceedings{bb281891,
        AUTHOR = "Bhattacharjee, S. and Kutter, M.",
        TITLE = "Compression tolerant image authentication",
        BOOKTITLE = ICIP98,
        YEAR = "1998",
        PAGES = "I: 435-439",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276521"}

@inproceedings{bb281892,
        AUTHOR = "Creusere, C.D. and Mitra, S.K.",
        TITLE = "Efficient image scrambling using polyphase filter banks",
        BOOKTITLE = ICIP94,
        YEAR = "1994",
        PAGES = "II: 81-85",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT276522"}

@article{bb281893,
        AUTHOR = "Li, S.J. and Li, C.Q. and Chen, G.R. and Bourbakis, N.G. and Lo, K.T.",
        TITLE = "A general quantitative cryptanalysis of permutation-only multimedia
ciphers against plaintext attacks",
        JOURNAL = SP:IC,
        VOLUME = "23",
        YEAR = "2008",
        NUMBER = "3",
        MONTH = "March",
        PAGES = "212-223",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT276523"}

@article{bb281894,
        AUTHOR = "Wang, X.F. and Zheng, N.N. and Tian, L.",
        TITLE = "Hash key-based video encryption scheme for H.264/AVC",
        JOURNAL = SP:IC,
        VOLUME = "25",
        YEAR = "2010",
        NUMBER = "6",
        MONTH = "July",
        PAGES = "427-437",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT276524"}

@article{bb281895,
        AUTHOR = "Yeung, S.K.A. and Zhu, S. and Zeng, B.",
        TITLE = "Design of New Unitary Transforms for Perceptual Video Encryption",
        JOURNAL = CirSysVideo,
        VOLUME = "21",
        YEAR = "2011",
        NUMBER = "9",
        MONTH = "September",
        PAGES = "1341-1345",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT276525"}

@inproceedings{bb281896,
        AUTHOR = "Yeung, S.K.A. and Zeng, B.",
        TITLE = "A new design of multiple transforms for perceptual video encryption",
        BOOKTITLE = ICIP12,
        YEAR = "2012",
        PAGES = "2637-2640",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT276526"}

@article{bb281897,
        AUTHOR = "Thorpe, C. and Li, F. and Li, Z.J. and Yu, Z. and Saunders, D. and Yu, J.Y.",
        TITLE = "A Coprime Blur Scheme for Data Security in Video Surveillance",
        JOURNAL = PAMI,
        VOLUME = "35",
        YEAR = "2013",
        NUMBER = "12",
        PAGES = "3066-3072",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT276527"}

@article{bb281898,
        AUTHOR = "Asghar, M.N. and Ghanbari, M. and Fleury, M. and Reed, M.J.",
        TITLE = "Confidentiality of a selectively encrypted H.264 coded video
bit-stream",
        JOURNAL = JVCIR,
        VOLUME = "25",
        YEAR = "2014",
        NUMBER = "2",
        PAGES = "487-498",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT276528"}

@article{bb281899,
        AUTHOR = "Asghar, M.N. and Kousar, R. and Majid, H. and Fleury, M.",
        TITLE = "Transparent encryption with scalable video communication:
Lower-latency, CABAC-based schemes",
        JOURNAL = JVCIR,
        VOLUME = "45",
        YEAR = "2017",
        NUMBER = "1",
        PAGES = "122-136",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996vcry2.html#TT276529"}

Last update:Jun 19, 2022 at 13:58:21