Author:
Zhang Leo Yu,Liu Yuansheng,Wang Cong,Zhou Jiantao,Zhang Yushu,Chen Guanrong
Funder
National Natural Science Foundation of China
University of Macau
Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference42 articles.
1. Cryptanalysis of video encryption based on space-filling curves;Bertilsson,1989
2. Efficient linear filtering of encrypted signals via composite representation;Bianchi,2009
3. Composite signal representation for fast and storage-efficient processing of encrypted signals;Bianchi;IEEE Trans. Inf. Forensics Secur.,2010
4. Processing in the encrypted domain using a composite signal representation: pros and cons;Bianchi,2009
5. SCAN-Based compression-encryption-hiding for video on demand;Bourbakis;IEEE Multimed.,2003
Cited by
60 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献