UM

Browse/Search Results:  1-10 of 11 Help

Selected(0)Clear Items/Page:    Sort:
High-Performance Thin-Layer Chromatographic Fingerprints of Triterpenoids for Distinguishing Between Isodon lophanthoides and Isodon lophanthoides var. gerardianus Journal article
JOURNAL OF AOAC INTERNATIONAL, 2019,Volume: 102,Issue: 3,Page: 714-719
Authors:  Chaozhan Lin;  Fangle Liu;  Runjing Zhang;  Meiting Liu;  Chenchen Zhu 1;  Jing Zhao;  Shaoping Li
Favorite | View/Download:20/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/11/22
Liquid-chromatography  Quality Assessment  Radix  
Locating splicing forgery by fully convolutional networks and conditional random field Journal article
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2018,Volume: 66,Page: 103-112
Authors:  Liu, Bo;  Pun, Chi-Man
Favorite | View/Download:26/0 | TC[WOS]:4 TC[Scopus]:0 | Submit date:2018/10/30
Splicing Forgery  Deep Neural Network  Fully Convolutional Network  Conditional Random Field  
A DCT-based information hiding method for network authentication Conference paper
ACM International Conference Proceeding Series
Authors:  Song W.;  Zou S.;  Tian Y.;  Li C.;  Sun S.;  Fong S.
Favorite | View/Download:3/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/13
Discrete cosine transform  Image processing  Information hiding  Network authentication  
Facial feature based secure information transmission Conference paper
ACM International Conference Proceeding Series
Authors:  Li C.;  Wang Y.;  Fong S.;  Duan C.;  Song W.
Favorite | View/Download:4/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/13
Biometric cryptosystems  Gabor features  Secret key generation  
Robust image hashing using progressive feature selection for tampering detection Journal article
MULTIMEDIA TOOLS AND APPLICATIONS, 2017,Volume: 77,Issue: 10,Page: 11609-11633
Authors:  Pun, Chi-Man;  Yan, Cai-Ping;  Yuan, Xiao-Chen
Favorite | View/Download:26/0 | TC[WOS]:3 TC[Scopus]:0 | Submit date:2018/10/30
Robust Image Hashing  Progressive Feature Point Selection  Tampering Detection  Image Authentication  Horizontal Location-context Hashing (Hlch)  Vertical Location-context Hashing (Vlch)  
Online 3D ear recognition by combining global and local features Journal article
PLoS ONE, 2016,Volume: 11,Issue: 12
Authors:  Liu Y.;  Zhang B.;  Lu G.;  Zhang D.
Favorite | View/Download:6/0 | TC[WOS]:3 TC[Scopus]:0 | Submit date:2019/04/04
Multi-scale image hashing using adaptive local feature extraction for robust tampering detection Journal article
Signal Processing, 2015,Volume: 121,Page: 1-16
Authors:  Yan C.-P.;  Pun C.-M.;  Yuan X.-C.
Favorite | View/Download:6/0 | TC[WOS]:28 TC[Scopus]:0 | Submit date:2019/02/14
Adaptive Feature Point Detection  Image Authentication  Multi-scale Image Hashing  Tampering Detection  
Framework of Lightweight Secure Media Transfer for Mobile Law Enforcement Apps Conference paper
Communications in Computer and Information Science, Galgotias Coll of Engn & Technol, Delhi, INDIA, SEP 24-27, 2014
Authors:  Deb, Suash;  Fong, Simon;  Thampi, Sabu M
Favorite | View/Download:10/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2018/11/06
Video  Security  Digital Watermarking  
Application of a generalized difference expansion based reversible audio data hiding algorithm Journal article
Multimedia Tools and Applications, 2013,Volume: 74,Issue: 6,Page: 1961-1982
Authors:  Choi K.-C.;  Pun C.-M.;  Chen C.L.P.
Favorite | View/Download:6/0 | TC[WOS]:8 TC[Scopus]:0 | Submit date:2019/02/11
Audio  Data Hiding  Reversible Watermarking  Steganography  Waveform  
A biometric authentication model using hand gesture images Journal article
BioMedical Engineering Online, 2013,Volume: 12,Issue: 1
Authors:  Simon Fong;  Yan Zhuang;  Iztok Fister;  Iztok Fister Jr
Favorite | View/Download:8/0 | TC[WOS]:16 TC[Scopus]:0 | Submit date:2019/02/13
Biometric Authentication  Hand Gesture  Hand Sign Recognition  Machine Learning