×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
Title
Creator
Date Issued
Subject Area
Keyword
Document Type
Source Publication
Date Accessioned
Indexed By
Publisher
Funding Project
MOST Discipline Catalogue
Study Hall
Image search
Paste the image URL
Home
Collections
Authors
DocType
Subjects
K-Map
Evaluation
K-Integration
News
Search in the results
Collection
Faculty o... [18]
Authors
ZHOU YICO... [11]
ZHOU JIANT... [4]
PUN CHI MA... [2]
CHEN CHUN ... [1]
WONG PAK K... [1]
VONG CHI M... [1]
More...
Document Type
Journal a... [10]
Conference... [9]
论文 [2]
Date Issued
2019 [2]
2018 [3]
2017 [7]
2016 [1]
2015 [3]
2014 [4]
More...
Language
英语 [20]
英語 [1]
Source Publication
IEEE Trans... [3]
Informatio... [3]
SIGNAL PRO... [2]
2014 IEEE ... [1]
2015 IEEE ... [1]
2015 IEEE ... [1]
More...
Funding Project
Indexed By
SCI [19]
Funding Organization
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-10 of 21
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Submit date Ascending
Submit date Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
Title Ascending
Title Descending
Issue Date Ascending
Issue Date Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Author Ascending
Author Descending
Reversible Data Hiding in Encrypted Images using Prediction-error Encoding
Conference paper
IEEE International Conference on Systems, Man, and Cybernetics (SMC), Miyazaki, Japan, Japan, 7-10 Oct. 2018
Authors:
Shuang Yi
;
Yicong Zhou
Favorite
|
View/Download:14/0
|
TC[WOS]:
0
TC[Scopus]:
0
|
Submit date:2019/03/26
Reversible Data Hiding
Encrypted Image
Prediction-error Encoding
Weighted Checkerboard-based Prediction Privacy Protection
Separable and Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling
Journal article
IEEE TRANSACTIONS ON MULTIMEDIA, 2019,Volume: 21,Issue: 1,Page: 51-64
Authors:
Yi, Shuang
;
Zhou, Yicong
Favorite
|
View/Download:17/0
|
TC[WOS]:
17
TC[Scopus]:
27
|
Submit date:2019/01/17
Reversible data hiding
encrypted images
parametric binary tree labeling scheme
privacy protection
Parametric reversible data hiding in encrypted images using adaptive bit-level data embedding and checkerboard based prediction
Journal article
SIGNAL PROCESSING, 2018,Volume: 150,Page: 171-182
Authors:
Yi, Shuang
;
Zhou, Yicong
Favorite
|
View/Download:11/0
|
TC[WOS]:
8
TC[Scopus]:
9
|
Submit date:2018/10/30
Reversible Data Hiding
Encrypted Images
High Capacity
Privacy Protection
Adaptive Bit-level Data Embedding
Adaptive Checkerboard Based Prediction
Reversible data hiding in encrypted images using adaptive block-level prediction-error expansion
Journal article
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2018,Volume: 64,Page: 78-88
Authors:
Yi, Shuang
;
Zhou, Yicong
;
Hua, Zhongyun
Favorite
|
View/Download:27/0
|
TC[WOS]:
23
TC[Scopus]:
32
|
Submit date:2018/10/30
Reversible Data Hiding
Encrypted Images
Adaptive Embedding
Block-level Prediction-error Expansion
Adaptive code embedding for reversible data hiding in encrypted images
Conference paper
Proceedings - International Conference on Image Processing, ICIP, Beijing, PEOPLES R CHINA, SEP 17-20, 2017
Authors:
Yi S.
;
Zhou Y.
Favorite
|
View/Download:16/0
|
TC[WOS]:
1
TC[Scopus]:
5
|
Submit date:2018/12/21
Adaptive Code Embedding
Encrypted Image
Privacy Protection
Reversible Data Hiding
Reversible data-hiding in encrypted images by redundant space transfer
Journal article
Information Sciences, 2017,Volume: 433,Page: 188-203
Authors:
Zi-Long Liu
;
Chi-Man Pun
Favorite
|
View/Download:17/0
|
TC[WOS]:
18
TC[Scopus]:
36
|
Submit date:2019/07/30
Reversible Data Hiding
Encrypted Image
Redundant Space Transfer
A DCT-based information hiding method for network authentication
Conference paper
ACM International Conference Proceeding Series
Authors:
Song W.
;
Zou S.
;
Tian Y.
;
Li C.
;
Sun S.
;
Fong S.
Favorite
|
View/Download:5/0
|
TC[WOS]:
0
TC[Scopus]:
0
|
Submit date:2019/02/13
Discrete cosine transform
Image processing
Information hiding
Network authentication
Adaptive image encryption for high capacity reversible data hiding
Conference paper
2017 IEEE Conference on Dependable and Secure Computing, Taipei, Taiwan, August 7—10, 2017
Authors:
Choi K.-C.
;
Pun C.-M.
Favorite
|
View/Download:12/0
|
TC[WOS]:
0
TC[Scopus]:
0
|
Submit date:2019/02/14
Burrow's-wheeler Transform
Generalized Integer Transform
Image Encryption
Lossless Data Hiding
Encrypted image classification based on multilayer extreme learning machine
Journal article
MULTIDIMENSIONAL SYSTEMS AND SIGNAL PROCESSING, 2017,Volume: 28,Issue: 3,Page: 851-865
Authors:
Wang, Weiru
;
Vong, Chi-Man
;
Yang, Yilong
;
Wong, Pak-Kin
Favorite
|
View/Download:31/0
|
TC[WOS]:
5
TC[Scopus]:
7
|
Submit date:2018/10/30
Encrypted Image Classification
Privacy Preservation
Multi Layer Extreme Learning Machine
Elm Auto Encoder
Privacy-Preserving Image Denoising from External Cloud Databases
Journal article
IEEE Transactions on Information Forensics and Security, 2017,Volume: 12,Issue: 6,Page: 1285-1298
Authors:
Zheng Y.
;
Cui H.
;
Wang C.
;
Zhou J.
Favorite
|
View/Download:12/0
|
TC[WOS]:
13
TC[Scopus]:
17
|
Submit date:2018/12/22
Cloud Computing
External Database
Image Denoising
Privacy
Security