×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
Title
Creator
Date Issued
Subject Area
Keyword
Document Type
Source Publication
Date Accessioned
Indexed By
Publisher
Funding Project
MOST Discipline Catalogue
Study Hall
Image search
Paste the image URL
Home
Collections
Authors
DocType
Subjects
K-Map
Evaluation
K-Integration
News
Search in the results
Collection
Faculty of... [7]
Authors
ZHOU YICON... [4]
ZHOU JIANT... [2]
CHEN CHUN ... [1]
Document Type
Journal ar... [6]
Conference... [4]
论文 [1]
Date Issued
2019 [1]
2018 [1]
2017 [2]
2016 [1]
2014 [3]
2013 [2]
More...
Language
英语 [10]
英語 [1]
Source Publication
IEEE Trans... [2]
2014 IEEE ... [1]
ACM Intern... [1]
ICASSP, IE... [1]
IEEE Commu... [1]
IEEE TRANS... [1]
More...
Funding Project
Indexed By
SCI [9]
Funding Organization
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-10 of 11
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Submit date Ascending
Submit date Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
Title Ascending
Title Descending
Issue Date Ascending
Issue Date Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Author Ascending
Author Descending
Separable and Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling
Journal article
IEEE TRANSACTIONS ON MULTIMEDIA, 2019,Volume: 21,Issue: 1,Page: 51-64
Authors:
Yi, Shuang
;
Zhou, Yicong
Favorite
|
View/Download:17/0
|
TC[WOS]:
17
TC[Scopus]:
27
|
Submit date:2019/01/17
Reversible data hiding
encrypted images
parametric binary tree labeling scheme
privacy protection
Reversible data hiding in encrypted images using adaptive block-level prediction-error expansion
Journal article
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2018,Volume: 64,Page: 78-88
Authors:
Yi, Shuang
;
Zhou, Yicong
;
Hua, Zhongyun
Favorite
|
View/Download:27/0
|
TC[WOS]:
23
TC[Scopus]:
32
|
Submit date:2018/10/30
Reversible Data Hiding
Encrypted Images
Adaptive Embedding
Block-level Prediction-error Expansion
A DCT-based information hiding method for network authentication
Conference paper
ACM International Conference Proceeding Series
Authors:
Song W.
;
Zou S.
;
Tian Y.
;
Li C.
;
Sun S.
;
Fong S.
Favorite
|
View/Download:5/0
|
TC[WOS]:
0
TC[Scopus]:
0
|
Submit date:2019/02/13
Discrete cosine transform
Image processing
Information hiding
Network authentication
Binary-block embedding for reversible data hiding in encrypted images
Journal article
SIGNAL PROCESSING, 2017,Volume: 133,Page: 40-51
Authors:
Yi, Shuang
;
Zhou, Yicong
Favorite
|
View/Download:27/0
|
TC[WOS]:
32
TC[Scopus]:
51
|
Submit date:2018/10/30
Binary-block Embedding (Bee)
Reversible Data Hiding
Image Encryption
Encrypted Domain
Secure Reversible Image Data Hiding Over Encrypted Domain via Key Modulation
Journal article
IEEE Transactions on Circuits and Systems for Video Technology, 2016,Volume: 26,Issue: 3,Page: 441 - 452
Authors:
Jiantao Zhou
;
Weiwei Sun
;
Li Dong
;
Xianming Liu
;
Oscar C. Au,
;
Yuan Yan Tang
Favorite
|
View/Download:27/0
|
TC[WOS]:
64
TC[Scopus]:
105
|
Submit date:2018/10/30
Feature Extraction
Reversible Image Data Hiding (Ridh)
Signal Processing Over Encrypted Domain
Svm
Scalable Compression of Stream Cipher Encrypted Images Through Context-Adaptive Sampling
Journal article
IEEE Transactions on Information Forensics and Security, 2014,Volume: 9,Issue: 11,Page: 1857-1868
Authors:
Jiantao Zhou
;
Oscar C. Au
;
Guangtao Zhai
;
Yuan Yan Tang
;
Xianming Liu
Favorite
|
View/Download:9/0
|
TC[WOS]:
14
TC[Scopus]:
27
|
Submit date:2018/12/22
Adaptive Sampling
Image Compression
Scalable Coding
Signal ProcessIng In Encrypted domaIn
Scalable coding of stream cipher encrypted images via adaptive sampling
Conference paper
2014 IEEE International Conference on Image Processing, ICIP 2014, Paris, FRANCE, OCT 27-30, 2014
Authors:
Zhou J.
;
Au O.C.
Favorite
|
View/Download:7/0
|
TC[WOS]:
0
TC[Scopus]:
0
|
Submit date:2018/12/22
Image Compression Over Encrypted Domain
Scalable Image Coding
Designing an efficient image encryption-then-compression system via prediction error clustering and random permutation
Journal article
IEEE Transactions on Information Forensics and Security, 2014,Volume: 9,Issue: 1,Page: 39-50
Authors:
Jiantao Zhou
;
Xianming Liu
;
Oscar C. Au
;
Yuan Yan Tang
Favorite
|
View/Download:21/0
|
TC[WOS]:
65
TC[Scopus]:
96
|
Submit date:2018/10/30
Compression Of Encrypted Image
Encrypted Domain Signal Processing
On the design of an efficient encryption-then-compression system
Conference paper
ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, Vancouver, CANADA, MAY 26-31, 2013
Authors:
Zhou J.
;
Liu X.
;
Au O.C.
Favorite
|
View/Download:10/0
|
TC[WOS]:
5
TC[Scopus]:
5
|
Submit date:2018/12/22
Image Compression
Image Encryption
Image encryption in the wavelet domain
Conference paper
Proceedings of SPIE - The International Society for Optical Engineering, Baltimore, MD, APR 29-30, 2013
Authors:
Bao L.
;
Zhou Y.
;
Chen C.L.P.
Favorite
|
View/Download:11/0
|
TC[WOS]:
10
TC[Scopus]:
10
|
Submit date:2018/12/21
Discrete Wavelet Transform
Image Encryptio