Main Article Content
Abstract
Keywords
Article Details
Authors retain the copyright without restrictions for their published content in this journal. IJSRTM is a SHERPA ROMEO Journal.
Publishing License
This is an open-access article distributed under the terms of
References
- W. J. Lu, A. Varna, and M. Wu, “Secure video processing: Problems and challenges,†in Proc. IEEE Int. Conf. Acoust., Speech, Signal Processing, Prague, Czech Republic, May 2011, pp. 5856–5859.
- B. Zhao, W. D. Kou, and H. Li, “Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol,†Inf. Sci., vol. 180, no. 23, pp. 4672–4684, 2010. DOI: https://doi.org/10.1016/j.ins.2010.08.003
- W. Puech, M. Chaumont, and O. Strauss, “A reversible data hiding method for encrypted images,†Proc. SPIE, vol. 6819, pp. 68191E-1–68191E-9, Jan. 2008 DOI: https://doi.org/10.1117/12.766754
- X. P. Zhang, “Reversible data hiding in encrypted image,†IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255–258, Apr. 2011. DOI: https://doi.org/10.1109/LSP.2011.2114651
- W. Hong, T. S. Chen, and H. Y. Wu, “An improved reversible data hiding in encrypted images using side match,†IEEE Signal Process. Lett., vol. 19, no. 4, pp. 199–202, Apr. 2012. DOI: https://doi.org/10.1109/LSP.2012.2187334
- X. P. Zhang, “Separable reversible data hiding in encrypted image,†IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 826–832, Apr. 2012 DOI: https://doi.org/10.1109/TIFS.2011.2176120
- K. D. Ma, W. M. Zhang, X. F. Zhao, N. Yu, and F. Li, “Reversible data hiding in encrypted images by reserving room before encryption,†IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, pp. 553–562, Mar. 2013. DOI: https://doi.org/10.1109/TIFS.2013.2248725
References
W. J. Lu, A. Varna, and M. Wu, “Secure video processing: Problems and challenges,†in Proc. IEEE Int. Conf. Acoust., Speech, Signal Processing, Prague, Czech Republic, May 2011, pp. 5856–5859.
B. Zhao, W. D. Kou, and H. Li, “Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol,†Inf. Sci., vol. 180, no. 23, pp. 4672–4684, 2010. DOI: https://doi.org/10.1016/j.ins.2010.08.003
W. Puech, M. Chaumont, and O. Strauss, “A reversible data hiding method for encrypted images,†Proc. SPIE, vol. 6819, pp. 68191E-1–68191E-9, Jan. 2008 DOI: https://doi.org/10.1117/12.766754
X. P. Zhang, “Reversible data hiding in encrypted image,†IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255–258, Apr. 2011. DOI: https://doi.org/10.1109/LSP.2011.2114651
W. Hong, T. S. Chen, and H. Y. Wu, “An improved reversible data hiding in encrypted images using side match,†IEEE Signal Process. Lett., vol. 19, no. 4, pp. 199–202, Apr. 2012. DOI: https://doi.org/10.1109/LSP.2012.2187334
X. P. Zhang, “Separable reversible data hiding in encrypted image,†IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 826–832, Apr. 2012 DOI: https://doi.org/10.1109/TIFS.2011.2176120
K. D. Ma, W. M. Zhang, X. F. Zhao, N. Yu, and F. Li, “Reversible data hiding in encrypted images by reserving room before encryption,†IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, pp. 553–562, Mar. 2013. DOI: https://doi.org/10.1109/TIFS.2013.2248725