Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. W. J. Lu, A. Varna, and M. Wu, “Secure video processing: Problems and challenges,” in Proc. IEEE Int. Conf. Acoust., Speech, Signal Processing, Prague, Czech Republic, May 2011, pp. 5856–5859.
    2. B. Zhao, W. D. Kou, and H. Li, “Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol,” Inf. Sci., vol. 180, no. 23, pp. 4672–4684, 2010.
    3. P. J. Zheng and J. W. Huang, “Walsh-Hadamard transform in the homomorphic encrypted domain and its application in image watermarking,” in Proc. 14th Inf. Hiding Conf., Berkeley, CA, USA, 2012, pp. 1–15.
    4. Mehdi Fallahpour, Shervin Shirmohammadi, Mehdi Semsarzadeh, and Jiying Zhao, “Tampering detection in compressed digital video using watermarking” IEEE Trans. Instrumentation and Measurement, vol. 63, no. 5, May 2014
    5. I. E. G. Richardson, H.264 and MPEG-4 Video Compression: Video Coding for Next Generation Multimedia. Hoboken, NJ, USA: Wiley, 2003
    6. https://en.wikipedia.org/wiki/RC4
    7. https://staff.najah.edu/sites/default/files/Evaluation_of_t he_RC4_Algorithm_for_Data_Encryption.pdf
    8. Dawen Xu, Rangding Wang, and Yun Q.Shi, “Data Hiding in Encrypted H.264/AVC Video Streams by Codeword Substitution”, in IEEE Trans., Inf. Security vol. 9, April 2014 
    9. http://link.springer.com/referenceworkentry/10.1007%2 F978-1-4419-5906-5_229

    1. W. J. Lu, A. Varna, and M. Wu, “Secure video processing: Problems and challenges,” in Proc. IEEE Int. Conf. Acoust., Speech, Signal Processing, Prague, Czech Republic, May 2011, pp. 5856–5859.
    2. B. Zhao, W. D. Kou, and H. Li, “Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol,” Inf. Sci., vol. 180, no. 23, pp. 4672–4684, 2010.
    3. P. J. Zheng and J. W. Huang, “Walsh-Hadamard transform in the homomorphic encrypted domain and its application in image watermarking,” in Proc. 14th Inf. Hiding Conf., Berkeley, CA, USA, 2012, pp. 1–15.
    4. Mehdi Fallahpour, Shervin Shirmohammadi, Mehdi Semsarzadeh, and Jiying Zhao, “Tampering detection in compressed digital video using watermarking” IEEE Trans. Instrumentation and Measurement, vol. 63, no. 5, May 2014.
    5. I. E. G. Richardson, H.264 and MPEG-4 Video Compression: Video Coding for Next Generation Multimedia. Hoboken, NJ, USA: Wiley, 2003
    6. https://en.wikipedia.org/wiki/RC4
    7. https://staff.najah.edu/sites/default/files/Evaluation_of_t he_RC4_Algorithm_for_Data_Encryption.pdf
    8. Dawen Xu, Rangding Wang, and Yun Q.Shi, “Data Hiding in Encrypted H.264/AVC Video Streams by Codeword Substitution”, in IEEE Trans., Inf. Security vol. 9, April 2014.
    9. http://link.springer.com/referenceworkentry/10.1007%2 F978-1-4419-5906-5_229

Recent Article