All Stories

  1. Counterfeiting Attacks on an RDH-EI Scheme Based on Block-Permutation and Co-XOR
  2. On the Security of Selectively Encrypted HEVC Video Bitstreams