Author:
Qian Zhenxing,Zhang Xinpeng,Ren Yanli,Feng Guorui
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference22 articles.
1. Deng M, Bianchi T, Piva A, Preneel B (2009) An efficient buyer-seller watermarking protocol based on composite signal representation. in Proc. 11th ACM Workshop Multimedia and Security. pp. 9–18.
2. Erkin Z, Piva A, Katzenbeisser S, et al. (2008) Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing. EURASIP J Inf Secur 2007
3. Fridrich J, Goljan M (2002) “Lossless data embedding for all image formats, vol 4675. Proc. SPIE Proc. Photonics West, Electronic Imaging, Security and Watermarking of Multimedia Contents, San Jose, pp 572–583
4. Fu Z, Sun X, Liu Q, et al. (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun 98(1):190–200.
5. Hong W, Chen T, Wu H (2012) An improved reversible data hiding in encrypted images using side match. IEEE Signal Process Lett 19(4):199–202
Cited by
35 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献