Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference40 articles.
1. Chang CC, Chen KN, Lee CF, Liu LJ (2011) A secure Fragile watermarking scheme based on chaos-and-hamming code. J Syst Softw 84(9):1462–1470
2. Chen J, Chen TS, Cheng CY (2005) New image tampering detection and recovery system of JPEG2000 region of interest area. The Imaging Science Journal 53(1):12–19
3. Chen X, Chen S, Wu Y (2017) Coverless information hiding method based on the Chinese character encoding. Journal of Internet Technology 18(2):91–98
4. Delp E, Mitchell O (1979) Image compression using block truncation coding. IEEE Trans Commun 27(9):1335–1342
5. Fu Z, Wu X, Guan C, Sun X, Ren K (2016) Toward efficient multi-keyword fuzzy Search over encrypted outsourced data with accuracy improvement. IEEE Transactions on Information Forensics and Security 11(12):2706–2716
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献