2016
DOI: 10.1016/j.image.2016.04.002
|View full text |Cite
|
Sign up to set email alerts
|

Robust and hierarchical watermarking of encrypted images based on Compressive Sensing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
23
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 47 publications
(25 citation statements)
references
References 32 publications
0
23
0
Order By: Relevance
“…These keys will be used for encryption and decryption process so these keys have to be kept secret from the intruders. Data transmitted over internet using copious dimensions are secretive and trust worthy [4]. Encryption is used to transmit the information accurately and securely.…”
Section: Introductionmentioning
confidence: 99%
“…These keys will be used for encryption and decryption process so these keys have to be kept secret from the intruders. Data transmitted over internet using copious dimensions are secretive and trust worthy [4]. Encryption is used to transmit the information accurately and securely.…”
Section: Introductionmentioning
confidence: 99%
“…In the meantime, considering the convenience and security of data storage and transmission, the compressive sensing (CS) theory is simultaneously introduced to image cryptosystem [42]- [47]. There are two types of measurements matrices that can be used in compressive sensing.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, certain methods of CS can be implemented on existing devices with no hardware changes required [2]. CS reconstruction is also inherently immune to data loss [3] and the transferred data are naturally encrypted [4]. Since its introduction, CS was tested with WSNs performing temperature [5], EM emission [6], and ECG [7] monitoring, video streaming [8], etc.…”
Section: Introductionmentioning
confidence: 99%