UM

Browse/Search Results:  1-9 of 9 Help

Selected(0)Clear Items/Page:    Sort:
Reversible data hiding in encrypted images using adaptive block-level prediction-error expansion Journal article
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2018,Volume: 64,Page: 78-88
Authors:  Yi, Shuang;  Zhou, Yicong;  Hua, Zhongyun
Favorite  |  View/Download:20/0  |  Submit date:2018/10/30
Reversible Data Hiding  Encrypted Images  Adaptive Embedding  Block-level Prediction-error Expansion  
Robust Privacy-Preserving Image Sharing over Online Social Networks (OSNs) Journal article
ACM Transactions on Multimedia Computing and Applications, 2018,Volume: 14,Issue: 1
Authors:  WEIWEI SUN;  JIANTAO ZHOU;  SHUYUAN ZHU;  YUAN YAN TANG
Favorite  |  View/Download:12/0  |  Submit date:2018/12/22
Image Sharing  Jpeg  Online Social Networks  Privacy-preserving  
Binary-block embedding for reversible data hiding in encrypted images Journal article
SIGNAL PROCESSING, 2017,Volume: 133,Page: 40-51
Authors:  Yi, Shuang;  Zhou, Yicong
Favorite  |  View/Download:19/0  |  Submit date:2018/10/30
Binary-block Embedding (Bee)  Reversible Data Hiding  Image Encryption  Encrypted Domain  
Secure Reversible Image Data Hiding Over Encrypted Domain via Key Modulation Journal article
IEEE Transactions on Circuits and Systems for Video Technology, 2016,Volume: 26,Issue: 3,Page: 441 - 452
Authors:  Jiantao Zhou;  Weiwei Sun;  Li Dong;  Xianming Liu;  Oscar C. Au,;  Yuan Yan Tang
Favorite  |  View/Download:20/0  |  Submit date:2018/10/30
Feature Extraction  Reversible Image Data Hiding (Ridh)  Signal Processing Over Encrypted Domain  Svm  
A new reversible data hiding algorithm in the encryption domain Conference paper
Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics, San Diego, CA, OCT 05-08, 2014
Authors:  Yi S.;  Zhou Y.;  Pun C.-M.;  Chen C.L.P.
Favorite  |  View/Download:5/0  |  Submit date:2018/12/21
Differential Attack  Encryption Domain  Reversible Data Hiding  
Designing an efficient image encryption-then-compression system via prediction error clustering and random permutation Journal article
IEEE Transactions on Information Forensics and Security, 2014,Volume: 9,Issue: 1,Page: 39-50
Authors:  Jiantao Zhou;  Xianming Liu;  Oscar C. Au;  Yuan Yan Tang
Favorite  |  View/Download:18/0  |  Submit date:2018/10/30
Compression Of Encrypted Image  Encrypted Domain Signal Processing  
On the design of an efficient encryption-then-compression system Conference paper
ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, Vancouver, CANADA, MAY 26-31, 2013
Authors:  Zhou J.;  Liu X.;  Au O.C.
Favorite  |  View/Download:7/0  |  Submit date:2018/12/22
Image Compression  Image Encryption  
Image encryption in the wavelet domain Conference paper
Proceedings of SPIE - The International Society for Optical Engineering, Baltimore, MD, APR 29-30, 2013
Authors:  Bao L.;  Zhou Y.;  Chen C.L.P.
Favorite  |  View/Download:6/0  |  Submit date:2018/12/21
Discrete Wavelet Transform  Image Encryptio  
Cyber security and privacy issues in smart grids Journal article
IEEE Communications Surveys and Tutorials, 2012,Volume: 14,Issue: 4,Page: 981
Authors:  Liu J.;  Xiao Y.;  Li S.;  Liang W.;  Chen C.L.P.
View  |  Adobe PDF(1244Kb)  |  Favorite  |  View/Download:949/218  |  Submit date:2018/10/30
Accountability  Ami  Privacy  Scada  Security  Smart Grid