2007
DOI: 10.1007/978-3-540-71169-8_1
|View full text |Cite
|
Sign up to set email alerts
|

An Introduction to Intelligent Multimedia Data Hiding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2008
2008
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…For many image‐processing applications, such a PSNR value is an acceptable quality image reconstruction. Obviously, our technique can directly reconstruct the 3D image information by the encryption and decryption based on the CS algorithm, which differs from previous methods, where only the 2D image information can be reconstructed . Here, we use one quantum key to encrypt and decrypt the 3D information that contains nine images, and therefore fewer random codes are required in our scheme, which is very helpful for improving the information transmission bandwidth.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…For many image‐processing applications, such a PSNR value is an acceptable quality image reconstruction. Obviously, our technique can directly reconstruct the 3D image information by the encryption and decryption based on the CS algorithm, which differs from previous methods, where only the 2D image information can be reconstructed . Here, we use one quantum key to encrypt and decrypt the 3D information that contains nine images, and therefore fewer random codes are required in our scheme, which is very helpful for improving the information transmission bandwidth.…”
Section: Resultsmentioning
confidence: 99%
“…To overcome several limitations of previous classical‐quantum cryptographic methods, here we present a new cryptographic scheme to realize the information and communication security by combining the QKD system and compressed sensing (CS) algorithm. The CS algorithm has been demonstrated to be a well‐established tool for encoding and decoding the image information based on the image sparsity, and therefore was considered to be a potential information and communication security technology. However, the key in the classical cryptographic method, which is generated by a computer, comprises the pseudo‐random codes, and so the key may be vulnerable to an eavesdropper's attack.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation