UM

浏览/检索结果: 共21条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Reversible Data Hiding in Encrypted Images using Prediction-error Encoding Conference paper
IEEE International Conference on Systems, Man, and Cybernetics (SMC), Miyazaki, Japan, Japan, 7-10 Oct. 2018
作者:  Shuang Yi;  Yicong Zhou
收藏  |  浏览/下载:4/0  |  提交时间:2019/03/26
Reversible Data Hiding  Encrypted Image  Prediction-error Encoding  Weighted Checkerboard-based Prediction Privacy Protection  
Separable and Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling Journal article
IEEE TRANSACTIONS ON MULTIMEDIA, 2019,Volume: 21,Issue: 1,Page: 51-64
作者:  Yi, Shuang;  Zhou, Yicong
收藏  |  浏览/下载:5/0  |  提交时间:2019/01/17
Reversible data hiding  encrypted images  parametric binary tree labeling scheme  privacy protection  
Parametric reversible data hiding in encrypted images using adaptive bit-level data embedding and checkerboard based prediction Journal article
SIGNAL PROCESSING, 2018,Volume: 150,Page: 171-182
作者:  Yi, Shuang;  Zhou, Yicong
收藏  |  浏览/下载:2/0  |  提交时间:2018/10/30
Reversible Data Hiding  Encrypted Images  High Capacity  Privacy Protection  Adaptive Bit-level Data Embedding  Adaptive Checkerboard Based Prediction  
Reversible data hiding in encrypted images using adaptive block-level prediction-error expansion Journal article
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2018,Volume: 64,Page: 78-88
作者:  Yi, Shuang;  Zhou, Yicong;  Hua, Zhongyun
收藏  |  浏览/下载:12/0  |  提交时间:2018/10/30
Reversible Data Hiding  Encrypted Images  Adaptive Embedding  Block-level Prediction-error Expansion  
Adaptive code embedding for reversible data hiding in encrypted images Conference paper
Proceedings - International Conference on Image Processing, ICIP, Beijing, PEOPLES R CHINA, SEP 17-20, 2017
作者:  Yi S.;  Zhou Y.
收藏  |  浏览/下载:4/0  |  提交时间:2018/12/21
Adaptive Code Embedding  Encrypted Image  Privacy Protection  Reversible Data Hiding  
Reversible data-hiding in encrypted images by redundant space transfer Journal article
Information Sciences, 2017,Volume: 433,Page: 188-203
作者:  Zi-Long Liu;  Chi-Man Pun
收藏  |  浏览/下载:0/0  |  提交时间:2019/07/30
Reversible Data Hiding  Encrypted Image  Redundant Space Transfer  
A DCT-based information hiding method for network authentication Conference paper
ACM International Conference Proceeding Series
作者:  Song W.;  Zou S.;  Tian Y.;  Li C.;  Sun S.;  Fong S.
收藏  |  浏览/下载:1/0  |  提交时间:2019/02/13
Discrete cosine transform  Image processing  Information hiding  Network authentication  
Adaptive image encryption for high capacity reversible data hiding Conference paper
2017 IEEE Conference on Dependable and Secure Computing, Taipei, Taiwan, August 7—10, 2017
作者:  Choi K.-C.;  Pun C.-M.
收藏  |  浏览/下载:2/0  |  提交时间:2019/02/14
Burrow's-wheeler Transform  Generalized Integer Transform  Image Encryption  Lossless Data Hiding  
Encrypted image classification based on multilayer extreme learning machine Journal article
MULTIDIMENSIONAL SYSTEMS AND SIGNAL PROCESSING, 2017,Volume: 28,Issue: 3,Page: 851-865
作者:  Wang, Weiru;  Vong, Chi-Man;  Yang, Yilong;  Wong, Pak-Kin
收藏  |  浏览/下载:15/0  |  提交时间:2018/10/30
Encrypted Image Classification  Privacy Preservation  Multi Layer Extreme Learning Machine  Elm Auto Encoder  
Privacy-Preserving Image Denoising from External Cloud Databases Journal article
IEEE Transactions on Information Forensics and Security, 2017,Volume: 12,Issue: 6,Page: 1285-1298
作者:  Zheng Y.;  Cui H.;  Wang C.;  Zhou J.
收藏  |  浏览/下载:5/0  |  提交时间:2018/12/22
Cloud Computing  External Database  Image Denoising  Privacy  Security