UM

Browse/Search Results:  1-10 of 10 Help

Selected(0)Clear Items/Page:    Sort:
Locating splicing forgery by fully convolutional networks and conditional random field Journal article
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2018,Volume: 66,Page: 103-112
Authors:  Liu, Bo;  Pun, Chi-Man
Favorite  |  View/Download:14/0  |  Submit date:2018/10/30
Splicing Forgery  Deep Neural Network  Fully Convolutional Network  Conditional Random Field  
A DCT-based information hiding method for network authentication Conference paper
ACM International Conference Proceeding Series
Authors:  Song W.;  Zou S.;  Tian Y.;  Li C.;  Sun S.;  Fong S.
Favorite  |  View/Download:1/0  |  Submit date:2019/02/13
Discrete cosine transform  Image processing  Information hiding  Network authentication  
Facial feature based secure information transmission Conference paper
ACM International Conference Proceeding Series
Authors:  Li C.;  Wang Y.;  Fong S.;  Duan C.;  Song W.
Favorite  |  View/Download:2/0  |  Submit date:2019/02/13
Biometric cryptosystems  Gabor features  Secret key generation  
Robust image hashing using progressive feature selection for tampering detection Journal article
MULTIMEDIA TOOLS AND APPLICATIONS, 2017,Volume: 77,Issue: 10,Page: 11609-11633
Authors:  Pun, Chi-Man;  Yan, Cai-Ping;  Yuan, Xiao-Chen
Favorite  |  View/Download:13/0  |  Submit date:2018/10/30
Robust Image Hashing  Progressive Feature Point Selection  Tampering Detection  Image Authentication  Horizontal Location-context Hashing (Hlch)  Vertical Location-context Hashing (Vlch)  
Online 3D ear recognition by combining global and local features Journal article
PLoS ONE, 2016,Volume: 11,Issue: 12
Authors:  Liu Y.;  Zhang B.;  Lu G.;  Zhang D.
Favorite  |  View/Download:1/0  |  Submit date:2019/04/04
Multi-scale image hashing using adaptive local feature extraction for robust tampering detection Journal article
Signal Processing, 2015,Volume: 121,Page: 1-16
Authors:  Yan C.-P.;  Pun C.-M.;  Yuan X.-C.
Favorite  |  View/Download:1/0  |  Submit date:2019/02/14
Adaptive Feature Point Detection  Image Authentication  Multi-scale Image Hashing  Tampering Detection  
Framework of Lightweight Secure Media Transfer for Mobile Law Enforcement Apps Conference paper
Communications in Computer and Information Science, Galgotias Coll of Engn & Technol, Delhi, INDIA, SEP 24-27, 2014
Authors:  Deb, Suash;  Fong, Simon;  Thampi, Sabu M
Favorite  |  View/Download:3/0  |  Submit date:2018/11/06
Video  Security  Digital Watermarking  
Application of a generalized difference expansion based reversible audio data hiding algorithm Journal article
Multimedia Tools and Applications, 2013,Volume: 74,Issue: 6,Page: 1961-1982
Authors:  Choi K.-C.;  Pun C.-M.;  Chen C.L.P.
Favorite  |  View/Download:2/0  |  Submit date:2019/02/11
Audio  Data Hiding  Reversible Watermarking  Steganography  Waveform  
A biometric authentication model using hand gesture images Journal article
BioMedical Engineering Online, 2013,Volume: 12,Issue: 1
Authors:  Simon Fong;  Yan Zhuang;  Iztok Fister;  Iztok Fister Jr
Favorite  |  View/Download:2/0  |  Submit date:2019/02/13
Biometric Authentication  Hand Gesture  Hand Sign Recognition  Machine Learning  
Cyber security and privacy issues in smart grids Journal article
IEEE Communications Surveys and Tutorials, 2012,Volume: 14,Issue: 4,Page: 981
Authors:  Liu J.;  Xiao Y.;  Li S.;  Liang W.;  Chen C.L.P.
View  |  Adobe PDF(1244Kb)  |  Favorite  |  View/Download:212/6  |  Submit date:2018/10/30
Accountability  Ami  Privacy  Scada  Security  Smart Grid