Author:
Erkin Zekeriya,Piva Alessandro,Katzenbeisser Stefan,Lagendijk RL,Shokrollahi Jamshid,Neven Gregory,Barni Mauro
Publisher
Springer Science and Business Media LLC
Subject
Computer Science Applications,Signal Processing
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Exploiting the Homomorphic Property of Visual Cryptography;Cryptography;2020
2. Secure Image Watermarking in a Compressed SPIHT Domain Using Paillier Cryptosystem;International Journal of Information System Modeling and Design;2019-10
3. A Secure CBIR Method based on Bag-of-Visual-Words Model under Cloud Environment;Proceedings of the 2019 3rd International Symposium on Computer Science and Intelligent Control;2019-09-25
4. Securing Speech Noise Reduction in Outsourced Environment;ACM Transactions on Multimedia Computing, Communications, and Applications;2017-10-26
5. Exploiting the Homomorphic Property of Visual Cryptography;International Journal of Digital Crime and Forensics;2017-04