Citation: | MA Zhaofeng, HUANG Jianqing, JIANG Ming, et al., “A Novel Image Digital Rights Management Scheme with High-Level Security, Usage Control and Traceability,” Chinese Journal of Electronics, vol. 25, no. 3, pp. 481-494, 2016, doi: 10.1049/cje.2016.05.014 |
A. Uhl and A. Pommer, Image and Video Encryption, Springer Press, pp.45-134, 2005.
|
Lini Abraham and Neenu Daniel, "Secure image encryption algorithms: A review", International Journal of Science & technology, Vol.2, No.4, pp.186-189, 2013.
|
N.K. Pareek, V. Patidar and K.K. Sud, "Image encryption using chaotic logistic map", Image and Vision Computing, Vol.24, No.9, pp.926-934, 2006.
|
S.J. Shyu, "Image encryption by random grids", Pattern Recognition, Vol.40, No.3, pp.1014-1031, 2007.
|
S. Lian, J. Sun and Z.Wang, "A block cipher based on a suitable use of the chaotic standard map", Chaos, Solitons and Fractals, Vol.26, No.1, pp.117-129, 2005.
|
R. Luka and K.N. Plataniotis, "Bit-level based secret sharing for image encryption", Pattern Recognition, Vol.38, No.5, pp.767- 772, 2005.
|
Y. Xu, H. Wang, Y.G. Li, et al., "Image encryption based on synchronization of fractional chaotic systems", Commun Nonlinear Science Numeric Simulation, Vol.19, No.10, pp.3735- 3744, 2014.
|
C.E. Dong, "Color image encryption using one-time keys and coupled chaotic systems", Signal Processing: Image Communication, Vol.29, No.5, pp.628-640, 2014.
|
A.K. Osama and A.M. Zin, "An efficient adaptive of transparent spatial digital image encryption", Procedia Technology, Vol.11, No.1, pp.288-297, 2013.
|
K. Ramani, E.V. Prasad, S. Varadarajan, et al., "A robust watermarking scheme for information hiding", International Conference on Advanced Computing and Communications, pp.58- 64, 2008.
|
D.M. Ferdinando and S. Salvatore, "Fragile watermarking tamper detection with images compressed by fuzzy transform", Information Sciences, Vol.195, No.13, pp.62-90, 2012.
|
S. Rawat and B. Raman, "A chaotic system based fragile watermarking scheme for image tamper detection", AEUInternational Journal of Electronics and Communications, Vol.62, No.10, pp.840-847, 2011.
|
X.P. Zhang, S.Z. Wang, Z.X. Qian, et al., "Reversible fragile watermarking for locating tampered blocks in JPEG images", Signal Processing, Vol.90, No.12, pp.3026-3036, 2010.
|
M. Moniruzzaman, M.A. Hawlader and M.F. Hossain, "An image fragile watermarking scheme based on chaotic system for image tamper detection", International Conference on Informatics, Electronics & Vision, pp.1-6, 2014.
|
P. Patil and S. Sonavane, "Fragile watermarking scheme for image tamper detection", International Conference on Communication Systems and Network Technologies, pp.531-535, 2011.
|
R.O. Preda, "Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain", Measurement, Vol.46, No.1, pp.367-373, 2013.
|
X.Z. Zhu and T.S. Anthony, "A new semi-fragile image watermarking with robust tampering restoration using irregular sampling", Signal Processing: Image Communication, Vol.22, No.5, pp.515-528, 2007.
|
I.J. Cox, M.L. Miller and J.A. Bloom, Digital Watermarking, Morgan Kauffman Publishers, San Francisco, CA, USA, 2001.
|
M. Naor and A. Shamir, "Visual cryptography, Advances in cryptology", Eurocrypt '94 Proceeding LNCS, Vol.950, pp.1-12, 1995.
|
G. Ateniese, C. Blundo, A. De Santis, et al., "Extended capabilities for visual cryptography", Theoretical Computer Science, Vol.250, No.1-2, pp.143-161, 2001.
|
N. Askari and C. Moloney, "Application of visual cryptography to biometric authentication", NECEC, 2011.
|
Microsoft, "Windows Media DRM", https://msdn.microsoft.com, 2009-11-09.
|
Microsoft, "Playready", http://www.microsoft.com/playready, 2014-08-17.
|
Adobe, "Adobe Access ", http://www.adobe.com, 2014-03-12.
|
Armjisoft, "Adobe Flash (SWF, FLV) Protection, DRM, Security and Distribution Management Solution", http://www. armjisoft. com. 2015-11-11.
|
Apple, "HTTP Live Streaming", https://developer.apple.com/ streaming. 2012-09-21.
|
Overdigital, "The difference between encrypted HLS, PHLS and HLS with DRM", available at http://www.overdigital. com/online-video/content-protection. 2015-06-18.
|
Q. LiuR. Safavi-Nain and N.P. Sheppard, "Digital rights management for content distribution", Proceedings of the Australasian Information Security Workshop Conference on Acsw Frontiers, Vol.21, pp.49-58, 2003.
|
J. Park and R. Sandhu, "The UCON ABC usage control model", ACM Transactions on Information & System Security, Vol.7, pp.128-174, 2002.
|
P.W. Wong and N. Memon, "Secret and public key image watermarking schemes for image authentication and ownership verification", IEEE Transactions on Image Processing, Vol.10, No.10, pp.1593-601, 2001.
|
S. Walton, "Image authentication for a slippery new age", Dr. Dobbe's Journal, Vol.20, No.9, pp.35-42, 1995.
|
Y.Q. Zhao, M. Liao, et al., "Tampered region detection of inpainting JPEG images. Optik", International Journal for Light and Electron Optics, Vol.124, No.16, pp.2487-2492, 2013.
|
Z.C. Lin, J.F. He, et al., "Fast, automatic and fine-grained tampered JPEG image detection via DCT coefficient analysis", Pattern Recognition, Vol.42, No.11, pp.2492-2501, 2009.
|
H.C. Wu and C.C. Chang, "Detection and restoration of tampered JPEG compressed images", Journal of Systems and Software, Vol.64, No.2, pp.151-161, 2002.
|
P.W. Wong, "A public key watermark for image verification and authentication", Proceedings of IEEE international conference on image processing, pp.455-463, 1998.
|
M.Y. Syue and L.J. Wang, "A Wavelet-based multipurpose watermarking for image authentication and recovery", International Journal of Communications, Vol.2, No.4, pp.35-39, 2013.
|
B.Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, John Wiley & Sons, Inc., 1996.
|
A.J. Menezes, S.A. Vanstone and P.C.V. Oorschot, Handbook of Applied Cryptography, CRC Press, 1996.
|
FIPS 197-2001, Advanced Encryption Standard (AES), http:// csrc.nist.gov/publications/fips/fips197, 2001-03-08.
|
FIPS 186-3-2009, Digital Signature Standard (DSS), http:// csrc.nist.gov/publications/fips/fips186-3, 2009-10-04.
|