@article{bb365100,
        AUTHOR = "Wang, C.T. and Hu, J. and Bian, S. and Ni, J.Q. and Zhang, X.P.",
        TITLE = "A Customized Deep Network Based Encryption-Then-Lossy-Compression
Scheme of Color Images Achieving Arbitrary Compression Ratios",
        JOURNAL = CirSysVideo,
        VOLUME = "33",
        YEAR = "2023",
        NUMBER = "8",
        MONTH = "August",
        PAGES = "4322-4336",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359274"}

@article{bb365101,
        AUTHOR = "Wang, C.T. and Zhang, T.J. and Chen, H. and Huang, Q. and Ni, J.Q. and Zhang, X.P.",
        TITLE = "A Novel Encryption-Then-Lossy-Compression Scheme of Color Images
Using Customized Residual Dense Spatial Network",
        JOURNAL = MultMed,
        VOLUME = "25",
        YEAR = "2023",
        PAGES = "4026-4040",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359275"}

@article{bb365102,
        AUTHOR = "Wang, H. and Yang, X. and Xiang, Z.R. and Tang, R.Q. and Ning, Q.",
        TITLE = "Synchronization of Switched Neural Networks via Attacked
Mode-Dependent Event-Triggered Control and Its Application in Image
Encryption",
        JOURNAL = Cyber,
        VOLUME = "53",
        YEAR = "2023",
        NUMBER = "9",
        MONTH = "September",
        PAGES = "5994-6003",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359276"}

@article{bb365103,
        AUTHOR = "Meng, K. and Wo, Y.",
        TITLE = "An image compression and encryption scheme for similarity retrieval",
        JOURNAL = SP:IC,
        VOLUME = "119",
        YEAR = "2023",
        PAGES = "117044",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359277"}

@article{bb365104,
        AUTHOR = "Jameel, S.K. and Majidpour, J.",
        TITLE = "BCS-AE: Integrated Image Compression-Encryption Model Based on AE and
Block-CS",
        JOURNAL = IJIG,
        VOLUME = "23",
        YEAR = "2023",
        NUMBER = "5 2023",
        PAGES = "2350047",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359278"}

@article{bb365105,
        AUTHOR = "Jansen van Rensburg, B. and Puech, W. and Pedeboy, J.P.",
        TITLE = "A Format Compliant Encryption Method for 3D Objects Allowing
Hierarchical Decryption",
        JOURNAL = MultMed,
        VOLUME = "25",
        YEAR = "2023",
        PAGES = "7196-7207",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359279"}

@article{bb365106,
        AUTHOR = "Sajitha, A.S. and Priya, S.S.S.",
        TITLE = "Analysis of Various Visual Cryptographic Techniques and their Issues
Based on Optimization Algorithms",
        JOURNAL = IJIG,
        VOLUME = "23",
        YEAR = "2023",
        NUMBER = "6 2023",
        PAGES = "2350059",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359280"}

@article{bb365107,
        AUTHOR = "Zhang, C.R. and Chen, J.X. and Chen, D.M. and Wang, W. and Zhang, Y.S. and Zhou, Y.C.",
        TITLE = "Exploiting Substitution Box for Cryptanalyzing Image Encryption
Schemes With DNA Coding and Nonlinear Dynamics",
        JOURNAL = MultMed,
        VOLUME = "26",
        YEAR = "2024",
        PAGES = "1114-1128",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359281"}

@article{bb365108,
        AUTHOR = "Li, C.Q. and Shen, X.H. and Liu, S.",
        TITLE = "Cryptanalyzing an Image Encryption Algorithm Underpinned by 2-D
Lag-Complex Logistic Map",
        JOURNAL = MultMedMag,
        VOLUME = "31",
        YEAR = "2024",
        NUMBER = "1",
        MONTH = "January",
        PAGES = "99-109",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359282"}

@article{bb365109,
        AUTHOR = "Shi, J.L. and Hu, C. and Zhang, S.L. and Zhou, Q. and Mei, Z.L. and Yao, S.M. and Deng, A.",
        TITLE = "An Efficient and Expressive Fully Policy-Hidden Ciphertext-Policy
Attribute-Based Encryption Scheme for Satellite Service Systems",
        JOURNAL = IJGI,
        VOLUME = "13",
        YEAR = "2024",
        NUMBER = "9",
        PAGES = "321",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359283"}

@article{bb365110,
        AUTHOR = "Zhang, L. and Wang, Q. and Yu, Z. and Li, J.X. and Bai, X. and Zhou, X. and Wu, Y.Y.",
        TITLE = "Non-Cascaded and Crosstalk-Free Multi-Image Encryption Based on
Optical Scanning Holography Using 2D Orthogonal Compressive Sensing",
        JOURNAL = IP,
        VOLUME = "33",
        YEAR = "2024",
        PAGES = "5688-5702",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359284"}

@article{bb365111,
        AUTHOR = "Li, J.H. and Hou, X.S.",
        TITLE = "The Design of an Adaptive Enhanced AMP-Based Image Block Compressed
Sensing and Its Application to Image Encryption",
        JOURNAL = CirSysVideo,
        VOLUME = "34",
        YEAR = "2024",
        NUMBER = "11",
        MONTH = "November",
        PAGES = "11128-11141",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359285"}

@article{bb365112,
        AUTHOR = "Jia, X.X. and Yu, T. and Luo, X.Y. and Wang, D. and Zhou, H.Y.",
        TITLE = "Maximizing Contrast in XOR-Based Visual Cryptography Schemes",
        JOURNAL = CirSysVideo,
        VOLUME = "34",
        YEAR = "2024",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "12849-12861",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359286"}

@article{bb365113,
        AUTHOR = "Zheng, J. and Qian, Y. and Wang, C.Y.",
        TITLE = "Design and Cryptographic Implementation of an Evolutionary Digital
Chaotic Model",
        JOURNAL = CirSysVideo,
        VOLUME = "34",
        YEAR = "2024",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "12510-12523",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359287"}

@article{bb365114,
        AUTHOR = "Yu, J. and Zhang, J. and Wang, Z. and Li, F.Y. and Zhang, X.P.",
        TITLE = "Cover Selection in Encrypted Images",
        JOURNAL = CirSysVideo,
        VOLUME = "34",
        YEAR = "2024",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "13626-13641",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359288"}

@article{bb365115,
        AUTHOR = "You, K. and Chen, P.B. and Li, C.Q.",
        TITLE = "Cryptanalyzing an Image Encryption Algorithm Underpinned by a 3-D
Boolean Convolution Neural Network",
        JOURNAL = MultMedMag,
        VOLUME = "31",
        YEAR = "2024",
        NUMBER = "4",
        MONTH = "October",
        PAGES = "17-24",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359289"}

@article{bb365116,
        AUTHOR = "Yan, S.H. and Cui, Y. and Li, L. and Zhang, Y.Y. and Jiang, D. and Zhang, H.",
        TITLE = "Development of an Image Encryption Algorithm Based on Compressed
Sensing and Chaotic Mapping",
        JOURNAL = MultMedMag,
        VOLUME = "31",
        YEAR = "2024",
        NUMBER = "4",
        MONTH = "October",
        PAGES = "49-59",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359290"}

@article{bb365117,
        AUTHOR = "Zhao, R. and Zhang, Y.S. and Lan, R. and Yi, S. and Hua, Z.Y. and Weng, J.",
        TITLE = "All Roads Lead to Rome: Achieving 3D Object Encryption Through 2D
Image Encryption Methods",
        JOURNAL = IP,
        VOLUME = "34",
        YEAR = "2025",
        PAGES = "1075-1089",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359291"}

@article{bb365118,
        AUTHOR = "Wu, X.T. and Song, B. and Fang, J. and Yan, W. and Peng, Q.Y.",
        TITLE = "CRP2-VCS: Contrast-Oriented Region-Based Progressive Probabilistic
Visual Cryptography Schemes",
        JOURNAL = CirSysVideo,
        VOLUME = "35",
        YEAR = "2025",
        NUMBER = "6",
        MONTH = "June",
        PAGES = "5501-5517",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359292"}

@article{bb365119,
        AUTHOR = "He, G.H. and Ren, Y.L. and Cai, X.Q. and Feng, G.R. and Zhang, X.P.",
        TITLE = "Private Sampling of Latent Diffusion Models for Encrypted Prompt",
        JOURNAL = CirSysVideo,
        VOLUME = "35",
        YEAR = "2025",
        NUMBER = "6",
        MONTH = "June",
        PAGES = "5833-5843",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359293"}

@article{bb365120,
        AUTHOR = "Gao, S. and Iu, H.H.C. and Erkan, U. and Simsek, C. and Toktas, A. and Cao, Y. and Wu, R. and Mou, J. and Li, Q. and Wang, C.P.",
        TITLE = "A 3D Memristive Cubic Map With Dual Discrete Memristors: Design,
Implementation, and Application in Image Encryption",
        JOURNAL = CirSysVideo,
        VOLUME = "35",
        YEAR = "2025",
        NUMBER = "8",
        MONTH = "August",
        PAGES = "7706-7718",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359294"}

@article{bb365121,
        AUTHOR = "Tang, J.B. and Jiang, X.X. and Huang, C.Y. and Ding, C. and Deng, M. and Huang, Z.Y. and Duan, J. and Zhu, X.Y.",
        TITLE = "Texture-Adaptive Hierarchical Encryption Method for Large-Scale HR
Remote Sensing Image Data",
        JOURNAL = RS,
        VOLUME = "17",
        YEAR = "2025",
        NUMBER = "17",
        PAGES = "2940",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359295"}

@article{bb365122,
        AUTHOR = "Safdar, M.U. and Shah, T. and Ali, A.",
        TITLE = "Multiple-image encryption algorithm based on S-boxes and DNA
sequences",
        JOURNAL = SP:IC,
        VOLUME = "138",
        YEAR = "2025",
        PAGES = "117353",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359296"}

@article{bb365123,
        AUTHOR = "Xiao, H.F. and Yang, Y. and Xiang, T.",
        TITLE = "Visual Content Revealing From Perceptually Encrypted Images",
        JOURNAL = CirSysVideo,
        VOLUME = "35",
        YEAR = "2025",
        NUMBER = "9",
        MONTH = "September",
        PAGES = "8893-8906",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359297"}

@article{bb365124,
        AUTHOR = "Nikhil, U.V. and Stamenkovic, Z. and Raja, S.P.",
        TITLE = "A Study of Elliptic Curve Cryptography and Its Applications",
        JOURNAL = IJIG,
        VOLUME = "25",
        YEAR = "2025",
        NUMBER = "6",
        MONTH = "November",
        PAGES = "2550062",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359298"}

@article{bb365125,
        AUTHOR = "Yung, C. and Huang, S.C.H. and Wu, H.C. and Li, C.H.",
        TITLE = "Novel Secure and Robust Recoverable Cryptographic Mosaic Technique",
        JOURNAL = MultMed,
        VOLUME = "27",
        YEAR = "2025",
        PAGES = "7137-7151",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359299"}

@article{bb365126,
        AUTHOR = "Zhou, R. and Yu, S.",
        TITLE = "Breaking a New Image Cryptosystem From Three Perspectives",
        JOURNAL = CirSysVideo,
        VOLUME = "35",
        YEAR = "2025",
        NUMBER = "12",
        MONTH = "December",
        PAGES = "11993-12006",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359300"}

@inproceedings{bb365127,
        AUTHOR = "Zhao, Z. and Zhou, X.Y. and Ou, W.",
        TITLE = "Non-uniform Thumbnail-preserving Encryption with Color Retention
after Channel Scrambling",
        BOOKTITLE = ICIVC24,
        YEAR = "2024",
        PAGES = "251-256",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359301"}

@inproceedings{bb365128,
        AUTHOR = "Chen, Z.K. and Jiang, M. and Chen, J.H. and Zhou, Y.G.",
        TITLE = "Visual cryptography scheme by freeform optics based on optimal mass
transport",
        BOOKTITLE = CVIDL23,
        YEAR = "2023",
        PAGES = "42-46",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359302"}

@inproceedings{bb365129,
        AUTHOR = "Rai, D. and Rajput, S.S. and Arya, K.V. and Pranav, P. and Singh, S. and Sinha, A.",
        TITLE = "Advanced Encryption Standard (AES) Based Robust Watermarking Scheme",
        BOOKTITLE = ICCVMI23,
        YEAR = "2023",
        PAGES = "1-4",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359303"}

@inproceedings{bb365130,
        AUTHOR = "Peng, H.W. and Huang, S.Y. and Zhou, T. and Luo, Y. and Wang, C.H. and Wang, Z. and Zhao, J.H. and Xie, X. and Li, A. and Geng, T. and Mahmood, K. and Wen, W. and Xu, X.L. and Ding, C.",
        TITLE = "AutoReP: Automatic ReLU Replacement for Fast Private Network
Inference",
        BOOKTITLE = ICCV23,
        YEAR = "2023",
        PAGES = "5155-5165",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359304"}

@inproceedings{bb365131,
        AUTHOR = "Ma, L.F. and Fang, H. and Wei, T.Y. and Yang, Z.J. and Ma, Z. and Zhang, W.M. and Yu, N.H.",
        TITLE = "A Geometric Distortion Immunized Deep Watermarking Framework with
Robustness Generalizability",
        BOOKTITLE = ECCV24,
        YEAR = "2024",
        PAGES = "LXVII: 268-285",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359305"}

@inproceedings{bb365132,
        AUTHOR = "Chen, Y.L. and Yao, Y.Z. and Yu, N.H.",
        TITLE = "Image Translation-Based Deniable Encryption against Model Extraction
Attack",
        BOOKTITLE = ICIP23,
        YEAR = "2023",
        PAGES = "1330-1334",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359306"}

@inproceedings{bb365133,
        AUTHOR = "Puteaux, P. and Puech, W.",
        TITLE = "Localization and Correction of Corrupted Pixel Blocks in Noisy
Encrypted Images",
        BOOKTITLE = IPTA20,
        YEAR = "2020",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359307"}

@inproceedings{bb365134,
        AUTHOR = "Zheng, H.Y. and Huang, Y.W. and Li, L. and Xiao, D.",
        TITLE = "Compressive Sensing-Based Image Encryption and Authentication in
Edge-Clouds",
        BOOKTITLE = MMMod22,
        YEAR = "2022",
        PAGES = "II:382-393",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359308"}

@inproceedings{bb365135,
        AUTHOR = "Tian, J. and Zhou, J.T. and Duan, J.",
        TITLE = "Probabilistic Selective Encryption of Convolutional Neural Networks
for Hierarchical Services",
        BOOKTITLE = CVPR21,
        YEAR = "2021",
        PAGES = "2205-2214",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359309"}

@inproceedings{bb365136,
        AUTHOR = "Chmielewski, L.J. and Orlowski, A.",
        TITLE = "Does Randomness in the Random Visual Cryptography Protocol Depend on
the Period of Pseudorandom Number Generators?",
        BOOKTITLE = ICCVG20,
        YEAR = "2020",
        PAGES = "36-47",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359310"}

@inproceedings{bb365137,
        AUTHOR = "Bian, S. and Wang, T.C. and Hiromoto, M. and Shi, Y. and Sato, T.",
        TITLE = "ENSEI: Efficient Secure Inference via Frequency-Domain Homomorphic
Convolution for Privacy-Preserving Visual Recognition",
        BOOKTITLE = CVPR20,
        YEAR = "2020",
        PAGES = "9400-9409",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359311"}

@inproceedings{bb365138,
        AUTHOR = "Puteaux, P. and Puech, W.",
        TITLE = "Image Analysis and Processing in the Encrypted Domain",
        BOOKTITLE = ICIP19,
        YEAR = "2019",
        PAGES = "3020-3022",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359312"}

@inproceedings{bb365139,
        AUTHOR = "Lee, S. and Huang, Y. and Lin, J.",
        TITLE = "WEB-VC: Visual Cryptography for Web Image",
        BOOKTITLE = ICIP19,
        YEAR = "2019",
        PAGES = "4055-4059",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359313"}

@inproceedings{bb365140,
        AUTHOR = "Bellafqira, R. and Coatrieux, G. and Genin, E. and Cozic, M.",
        TITLE = "Secure Multilayer Perceptron Based on Homomorphic Encryption",
        BOOKTITLE = IWDW18,
        YEAR = "2018",
        PAGES = "322-336",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359314"}

@inproceedings{bb365141,
        AUTHOR = "Liu, Z. and Yang, M.L. and Yan, W.Q.",
        TITLE = "Image encryption based on double random phase encoding",
        BOOKTITLE = IVCNZ17,
        YEAR = "2017",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359315"}

@inproceedings{bb365142,
        AUTHOR = "Touil, H. and Akkad, N.E. and Satori, K.",
        TITLE = "Text Encryption:
Hybrid cryptographic method using Vigenere and Hill Ciphers.",
        BOOKTITLE = ISCV20,
        YEAR = "2020",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359316"}

@inproceedings{bb365143,
        AUTHOR = "Es sabry, M. and El Akkad, N. and Merras, M. and Saaidi, A. and Satori, K.",
        TITLE = "Grayscale image encryption using shift bits operations",
        BOOKTITLE = ISCV18,
        YEAR = "2018",
        PAGES = "1-7",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359317"}

@inproceedings{bb365144,
        AUTHOR = "Hamici, Z.",
        TITLE = "Image cryptography based on the imitation of gene fusion and
horizontal gene transfer",
        BOOKTITLE = IPTA17,
        YEAR = "2017",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359318"}

@inproceedings{bb365145,
        AUTHOR = "Kang, X. and Han, Z. and Yu, A. and Duan, P.",
        TITLE = "Double random scrambling encoding in the RPMPFrHT domain",
        BOOKTITLE = ICIP17,
        YEAR = "2017",
        PAGES = "4362-4366",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359319"}

@inproceedings{bb365146,
        AUTHOR = "Yonetani, R. and Boddeti, V.N. and Kitani, K.M. and Sato, Y.",
        TITLE = "Privacy-Preserving Visual Learning Using Doubly Permuted Homomorphic
Encryption",
        BOOKTITLE = ICCV17,
        YEAR = "2017",
        PAGES = "2059-2069",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359320"}

@inproceedings{bb365147,
        AUTHOR = "Zhang, Y. and Li, X.Q. and Hou, W.G.",
        TITLE = "A fast image encryption scheme based on AES",
        BOOKTITLE = ICIVC17,
        YEAR = "2017",
        PAGES = "624-628",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359321"}

@inproceedings{bb365148,
        AUTHOR = "Shen, G. and Liu, F. and Fu, Z.X. and Yu, B. and Wang, W.",
        TITLE = "Halftone Visual Cryptography with Complementary Cover Images",
        BOOKTITLE = IWDW16,
        YEAR = "2016",
        PAGES = "223-237",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359322"}

@inproceedings{bb365149,
        AUTHOR = "Wang, W. and Liu, F. and Guo, T. and Ren, Y.W.",
        TITLE = "Temporal Integration Based Visual Cryptography Scheme and Its
Application",
        BOOKTITLE = IWDW17,
        YEAR = "2017",
        PAGES = "406-419",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359323"}

@inproceedings{bb365150,
        AUTHOR = "Ren, Y.W. and Liu, F. and Wang, W.",
        TITLE = "Collusive Attacks to Partition Authentication Visual Cryptography
Scheme",
        BOOKTITLE = IWDW16,
        YEAR = "2016",
        PAGES = "238-250",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359324"}

@inproceedings{bb365151,
        AUTHOR = "Dutta, S. and Roy, P.S. and Adhikari, A. and Sakurai, K.",
        TITLE = "On the Robustness of Visual Cryptographic Schemes",
        BOOKTITLE = IWDW16,
        YEAR = "2016",
        PAGES = "251-262",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359325"}

@inproceedings{bb365152,
        AUTHOR = "Goel, A. and Chaudhari, K.",
        TITLE = "Median based pixel selection for partial image encryption",
        BOOKTITLE = IPTA16,
        YEAR = "2016",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359326"}

@inproceedings{bb365153,
        AUTHOR = "Wen, W. and Zhang, Y. and Fang, Y. and Fang, Z.",
        TITLE = "A novel selective image encryption method based on saliency detection",
        BOOKTITLE = VCIP16,
        YEAR = "2016",
        PAGES = "1-4",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359327"}

@inproceedings{bb365154,
        AUTHOR = "Fatahbeygi, A. and Akhlaghian, F.",
        TITLE = "A new robust semi-blind image watermarking based on block
classification and visual cryptography",
        BOOKTITLE = IPRIA15,
        YEAR = "2015",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359328"}

@inproceedings{bb365155,
        AUTHOR = "Jolfaei, A. and Wu, X.W. and Muthukkumarasamy, V.",
        TITLE = "A Secure Lightweight Texture Encryption Scheme",
        BOOKTITLE = VSWS15,
        YEAR = "2015",
        PAGES = "344-356",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359329"}

@inproceedings{bb365156,
        AUTHOR = "Wang, D.S. and Yi, F. and Yang, C.N.",
        TITLE = "Visual Cryptography Scheme with Autostereogram",
        BOOKTITLE = IWDW14,
        YEAR = "2014",
        PAGES = "364-375",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359330"}

@inproceedings{bb365157,
        AUTHOR = "Chen, Y.C. and Lu, K.H. and Tso, R.L. and Wu, M.E.",
        TITLE = "An Improved Visual Cryptography with Cheating Prevention",
        BOOKTITLE = IWDW14,
        YEAR = "2014",
        PAGES = "444-454",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359331"}

@inproceedings{bb365158,
        AUTHOR = "Liu, F. and Wu, C.K.",
        TITLE = "Optimal XOR Based (2,n)-Visual Cryptography Schemes",
        BOOKTITLE = IWDW14,
        YEAR = "2014",
        PAGES = "333-349",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359332"}

@inproceedings{bb365159,
        AUTHOR = "Liu, S.C. and Fujiyoshi, M. and Kiya, H.",
        TITLE = "A cheat preventing method with efficient pixel expansion for
Naor-Shamir's visual cryptography",
        BOOKTITLE = ICIP14,
        YEAR = "2014",
        PAGES = "5527-5531",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359333"}

@inproceedings{bb365160,
        AUTHOR = "Eluard, M. and Maetz, Y. and Doerr, G.",
        TITLE = "Impact of geometry-preserving encryption on rendering time",
        BOOKTITLE = ICIP14,
        YEAR = "2014",
        PAGES = "4787-4791",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359334"}

@inproceedings{bb365161,
        AUTHOR = "Moreno Canadas, A. and Palma Vanegas, N.P. and Hernandez Quitian, M.",
        TITLE = "Visual Cryptography Schemes Based in k -Linear Maps",
        BOOKTITLE = IWDW13,
        YEAR = "2013",
        PAGES = "288-302",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359335"}

@inproceedings{bb365162,
        AUTHOR = "Panduranga, H.T. and Kumar, H.S.S. and Kumar, S.K.N.",
        TITLE = "Hybrid approach for dual image encryption using nibble exchange and
Hill-cipher",
        BOOKTITLE = IMVIP12,
        YEAR = "2012",
        PAGES = "101-104",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359336"}

@inproceedings{bb365163,
        AUTHOR = "Liu, F. and Guo, T. and Wu, C. and Yang, C.N.",
        TITLE = "Flexible Visual Cryptography Scheme without Distortion",
        BOOKTITLE = IWDW11,
        YEAR = "2011",
        PAGES = "211-227",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359337"}

@inproceedings{bb365164,
        AUTHOR = "Di, H. and Zheng, K.F. and Niu, X.X. and Zhang, X.",
        TITLE = "Multiple-image compressed encryption and decryption by compressive
holography",
        BOOKTITLE = VCIP11,
        YEAR = "2011",
        PAGES = "1-4",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359338"}

@inproceedings{bb365165,
        AUTHOR = "Bajaj, N. and Thakur, A.",
        TITLE = "Enhancement of RC5 for image encryption",
        BOOKTITLE = ICIIP11,
        YEAR = "2011",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359339"}

@inproceedings{bb365166,
        AUTHOR = "Petrauskiene, V. and Ragulskiene, J. and Sakyte, E. and Ragulskis, M.",
        TITLE = "Near-Optimal Time Function for Secure Dynamic Visual Cryptography",
        BOOKTITLE = ISVC11,
        YEAR = "2011",
        PAGES = "II: 300-309",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359340"}

@inproceedings{bb365167,
        AUTHOR = "Zhao, L. and Adhikari, A. and Sakurai, K.",
        TITLE = "A New Scrambling Evaluation Scheme Based on Spatial Distribution
Entropy and Centroid Difference of Bit-Plane",
        BOOKTITLE = DW10,
        YEAR = "2010",
        PAGES = "29-44",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359341"}

@inproceedings{bb365168,
        AUTHOR = "Zhao, L. and Adhikari, A. and Xiao, D. and Sakurai, K.",
        TITLE = "Cryptanalysis on an Image Scrambling Encryption Scheme Based on Pixel
Bit",
        BOOKTITLE = DW10,
        YEAR = "2010",
        PAGES = "45-59",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359342"}

@inproceedings{bb365169,
        AUTHOR = "Mayouf, M.A. and Shukur, Z.",
        TITLE = "Using Animation in Active Learning Tool to Detect Possible Attacks in
Cryptographic Protocols",
        BOOKTITLE = IVIC09,
        YEAR = "2009",
        PAGES = "510-520",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359343"}

@inproceedings{bb365170,
        AUTHOR = "Rane, S.D. and Sun, W. and Vetro, A.",
        TITLE = "Secure distortion computation among untrusting parties using
homomorphic encryption",
        BOOKTITLE = ICIP09,
        YEAR = "2009",
        PAGES = "1485-1488",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359344"}

@inproceedings{bb365171,
        AUTHOR = "Zhang, J.H. and Chen, H. and Geng, Q.",
        TITLE = "Cryptoanalysis of Certificateless Partially Blind Signature and Proxy
Blind Signature Scheme",
        BOOKTITLE = CISP09,
        YEAR = "2009",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359345"}

@inproceedings{bb365172,
        AUTHOR = "Zhang, J.H. and Gao, S.N.",
        TITLE = "Cryptoanlaysis of Two Proxy Blind Signature Schemes with Proxy
Revocation",
        BOOKTITLE = CISP09,
        YEAR = "2009",
        PAGES = "1-4",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359346"}

@inproceedings{bb365173,
        AUTHOR = "Lang, J. and Tao, R. and Wang, Y.",
        TITLE = "The Generalized Weighted Fractional Fourier Transform and its
Application to Image Encryption",
        BOOKTITLE = CISP09,
        YEAR = "2009",
        PAGES = "1-5",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359347"}

@inproceedings{bb365174,
        AUTHOR = "Xiao, Y. and Zhang, H.Y. and Ran, Q.W. and Zhang, J. and Tan, L.Y.",
        TITLE = "Image Encryption and Two Dimensional Discrete M-Parameter Fractional
Fourier Transform",
        BOOKTITLE = CISP09,
        YEAR = "2009",
        PAGES = "1-4",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359348"}

@inproceedings{bb365175,
        AUTHOR = "Weir, J. and Yan, W.Q.",
        TITLE = "Authenticating Visual Cryptography Shares Using 2D Barcodes",
        BOOKTITLE = IWDW11,
        YEAR = "2011",
        PAGES = "196-210",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359349"}

@inproceedings{bb365176,
        AUTHOR = "Weir, J. and Yan, W.Q.",
        TITLE = "Plane Transform Visual Cryptography",
        BOOKTITLE = DW10,
        YEAR = "2010",
        PAGES = "60-74",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359350"}

@inproceedings{bb365177,
        AUTHOR = "Weir, J. and Yan, W.Q.",
        TITLE = "Image Hatching for Visual Cryptography",
        BOOKTITLE = IMVIP09,
        YEAR = "2009",
        PAGES = "59-64",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359351"}

@inproceedings{bb365178,
        AUTHOR = "Weir, J. and Yan, W.Q.",
        TITLE = "Dot-Size Variant Visual Cryptography",
        BOOKTITLE = DW09,
        YEAR = "2009",
        PAGES = "136-148",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359352"}

@inproceedings{bb365179,
        AUTHOR = "Piper, F.",
        TITLE = "The Changing Face of Cryptography",
        BOOKTITLE = DW09,
        YEAR = "2009",
        PAGES = "2",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359353"}

@inproceedings{bb365180,
        AUTHOR = "Du, Y.F. and Zhang, J. and Su, Y.T.",
        TITLE = "Watermarking for Authentication of LZ-77 Compressed Documents",
        BOOKTITLE = DW07,
        YEAR = "2007",
        PAGES = "365-372",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359354"}

@inproceedings{bb365181,
        AUTHOR = "Luo, H. and Lu, Z.M. and Pan, J.S.",
        TITLE = "Multiple Watermarking in Visual Cryptography",
        BOOKTITLE = DW07,
        YEAR = "2007",
        PAGES = "60-70",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359355"}

@inproceedings{bb365182,
        AUTHOR = "Sadeghi, A.R.",
        TITLE = "The Marriage of Cryptography and Watermarking:
Beneficial and Challenging for Secure Watermarking and Detection",
        BOOKTITLE = DW07,
        YEAR = "2007",
        PAGES = "2-18",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359356"}

@inproceedings{bb365183,
        AUTHOR = "He, D. and Jagmohan, A. and Lu, L.G.",
        TITLE = "Secure collaboration using Slepian-Wolf codes",
        BOOKTITLE = ICIP08,
        YEAR = "2008",
        PAGES = "2216-2219",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359357"}

@inproceedings{bb365184,
        AUTHOR = "Seshadrinathan, M. and Dempski, K.L.",
        TITLE = "Implementation of Advanced Encryption Standard for encryption and
decryption of images and text on a GPU",
        BOOKTITLE = CVGPU08,
        YEAR = "2008",
        PAGES = "1-6",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359358"}

@inproceedings{bb365185,
        AUTHOR = "Alface, P.R. and Macq, B. and Cayre, F.",
        TITLE = "Blind and Robust Watermarking of 3D Models:
How to Withstand the Cropping Attack?",
        BOOKTITLE = ICIP07,
        YEAR = "2007",
        PAGES = "V: 465-468",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359359"}

@inproceedings{bb365186,
        AUTHOR = "Huang, T.J.",
        TITLE = "Evolvement of DRM Schema: From Encryption to Interoperability and
Monitoring",
        BOOKTITLE = MCAM07,
        YEAR = "2007",
        PAGES = "65-75",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359360"}

@inproceedings{bb365187,
        AUTHOR = "Lai, J.C. and Wang, C.H.",
        TITLE = "Buffer Occupancy Feedback Security Control and Changing Encryption Keys
to Protect MOD Services",
        BOOKTITLE = PSIVT06,
        YEAR = "2006",
        PAGES = "888-897",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359361"}

@inproceedings{bb365188,
        AUTHOR = "Li, W.H. and Yuan, Y.",
        TITLE = "Visual Information Encryption in Frequency Domain: Risk and Enhancement",
        BOOKTITLE = IWICPAS06,
        YEAR = "2006",
        PAGES = "225-234",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359362"}

@inproceedings{bb365189,
        AUTHOR = "Wong, A. and Bishop, W.",
        TITLE = "Expert Knowledge Based Automatic Regions-of-Interest (ROI) Selection in
Scanned Documents for Digital Image Encryption",
        BOOKTITLE = CRV06,
        YEAR = "2006",
        PAGES = "51-51",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359363"}

@inproceedings{bb365190,
        AUTHOR = "Said, A.",
        TITLE = "Measuring the Strength of Partial Encryption Schemes",
        BOOKTITLE = ICIP05,
        YEAR = "2005",
        PAGES = "II: 1126-1129",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359364"}

@inproceedings{bb365191,
        AUTHOR = "Katzenbeisser, S.",
        TITLE = "On the Integration of Watermarks and Cryptography",
        BOOKTITLE = DW03,
        YEAR = "2003",
        PAGES = "50-60",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359365"}

@inproceedings{bb365192,
        AUTHOR = "Li, S.J. and Zheng, X.",
        TITLE = "On the security of an image encryption method",
        BOOKTITLE = ICIP02,
        YEAR = "2002",
        PAGES = "II: 925-928",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359366"}

@inproceedings{bb365193,
        AUTHOR = "Yamaguchi, Y.S.",
        TITLE = "An Extended Visual Cryptography Scheme for Continuous-Tone Images",
        BOOKTITLE = IWDW11,
        YEAR = "2011",
        PAGES = "228-242",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359367"}

@inproceedings{bb365194,
        AUTHOR = "Nakajima, M. and Yamaguchi, Y.S.",
        TITLE = "Extended Visual Cryptography for Natural Images",
        BOOKTITLE = WSCG02,
        YEAR = "2002",
        PAGES = "303",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359368"}

@inproceedings{bb365195,
        AUTHOR = "Chen, Y.C. and Chang, L.W.",
        TITLE = "A Secure and Robust Digital Watermarking Technique by the Block Cipher
Rc6 and Secure Hash Algorithm",
        BOOKTITLE = ICIP01,
        YEAR = "2001",
        PAGES = "II: 518-521",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359369"}

@inproceedings{bb365196,
        AUTHOR = "Bhattacharjee, S. and Kutter, M.",
        TITLE = "Compression tolerant image authentication",
        BOOKTITLE = ICIP98,
        YEAR = "1998",
        PAGES = "I: 435-439",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359370"}

@inproceedings{bb365197,
        AUTHOR = "Creusere, C.D. and Mitra, S.K.",
        TITLE = "Efficient image scrambling using polyphase filter banks",
        BOOKTITLE = ICIP94,
        YEAR = "1994",
        PAGES = "II: 81-85",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char995.html#TT359371"}

@article{bb365198,
        AUTHOR = "Scharinger, J.",
        TITLE = "Fast Encryption of Image Data Using Chaotic Kolmogorov Flows",
        JOURNAL = JEI,
        VOLUME = "7",
        YEAR = "1998",
        NUMBER = "2",
        MONTH = "April",
        PAGES = "318-325",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996chaocry4.html#TT359372"}

@article{bb365199,
        AUTHOR = "Yen, J.C. and Guo, J.I.",
        TITLE = "Efficient hierarchical chaotic image encryption algorithm and its VLSI
realisation",
        JOURNAL = VISP,
        VOLUME = "147",
        YEAR = "2000",
        NUMBER = "2",
        MONTH = "April",
        PAGES = "167",
        BIBSOURCE = "http://www.visionbib.com/bibliography/char996chaocry4.html#TT359373"}

Last update:Feb 26, 2026 at 10:58:24