Author:
Rezaei Mehdi,Taheri Hassan
Subject
Electrical and Electronic Engineering,Atomic and Molecular Physics, and Optics,Electronic, Optical and Magnetic Materials
Reference36 articles.
1. S. Rajput, N. Mishra, S. Sharma, Towards the growth of image encryption and authentication schemes. In: Proceedings of the 2013 2nd International Conference on Advances in Computing, Communications and Informatics, ICACCI 2013, pp. 454–459.
2. Thermal imaging as a biometrics approach to facial signature authentication;Guzman;IEEE J. Biomed. Health Inf.,2013
3. A watermarking-based image ownership and tampering authentication scheme;Chang;Pattern Recognit. Lett.,2006
4. Image authentication with tamper localization and self-recovery in encrypted domain based on compressive sensing;Zhang;Secur. Commun. Netw.,2018
5. Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing;Fu;IEICE Trans. Commun.,2015
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献