UM

Browse/Search Results:  1-10 of 11 Help

Selected(0)Clear Items/Page:    Sort:
Reversible data hiding in encrypted images using adaptive block-level prediction-error expansion Journal article
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2018,Volume: 64,Page: 78-88
Authors:  Yi, Shuang;  Zhou, Yicong;  Hua, Zhongyun
Favorite  |  View/Download:9/0  |  Submit date:2018/10/30
Reversible Data Hiding  Encrypted Images  Adaptive Embedding  Block-level Prediction-error Expansion  
Improved known-plaintext attack to permutation-only multimedia ciphers Journal article
INFORMATION SCIENCES, 2018,Volume: 430,Page: 228-239
Authors:  Zhang, Leo Yu;  Liu, Yuansheng;  Wang, Cong;  Zhou, Jiantao;  Zhang, Yushu;  Chen, Guanrong
Favorite  |  View/Download:11/0  |  Submit date:2018/10/30
Cryptanalysis  Known-plaintext Attack (Kpa)  Multimedia Encryption  Permutation  Transposition  
Design of image cipher using block-based scrambling and image filtering Journal article
INFORMATION SCIENCES, 2017,Volume: 396,Page: 97-113
Authors:  Hua, Zhongyun;  Zhou, Yicong
Favorite  |  View/Download:7/0  |  Submit date:2018/10/30
Block-based Scrambling  Cryptosystem  Image Encryption  Image Filtering  
A Review of Compressive Sensing in Information Security Field Journal article
IEEE Access, 2016,Volume: 4,Page: 2507 - 2519
Authors:  YUSHU ZHANG;  LEO YU ZHANG;  JIANTAO ZHOU;  LICHENG LIU;  FEI CHEN;  XING HE
Favorite  |  View/Download:0/0  |  Submit date:2019/04/16
Compressive Sensing  Theoretical Security  Application Security  Image Cipher  Chaos  Optics  
Image Cipher Using a New Interactive Two-Dimensional Chaotic Map Conference paper
Proceedings - 2015 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2015, City Univ Hong Kong, Hong Kong, PEOPLES R CHINA, OCT 09-12, 2015
Authors:  Hua Z.;  Wang Y.;  Zhou Y.
Favorite  |  View/Download:8/0  |  Submit date:2018/12/21
Chaotic Map  Image Encryption  Two-dimensional (2d) Tent-cascade-logistic Map (2d-tclm)  
Image encryption using 2D Logistic-adjusted-Sine map Journal article
Information Sciences, 2016,Volume: 339,Page: 237
Authors:  Hua Z.;  Zhou Y.
Favorite  |  View/Download:4/0  |  Submit date:2018/10/30
Chaotic Encryption  Chaotic Map  Confusion And Diffusion  Image Encryption  
Scalable Compression of Stream Cipher Encrypted Images Through Context-Adaptive Sampling Journal article
IEEE Transactions on Information Forensics and Security, 2014,Volume: 9,Issue: 11,Page: 1857-1868
Authors:  Jiantao Zhou;  Oscar C. Au;  Guangtao Zhai;  Yuan Yan Tang;  Xianming Liu
Favorite  |  View/Download:5/0  |  Submit date:2018/12/22
Adaptive Sampling  Image Compression  Scalable Coding  Signal ProcessIng In Encrypted domaIn  
A symmetric image cipher using wave perturbations Journal article
Signal Processing, 2014,Volume: 102,Page: 122-131
Authors:  Wu Y.;  Zhou Y.;  Agaian S.;  Noonan J.P.
Favorite  |  View/Download:1/0  |  Submit date:2018/12/21
Data Protection  Image Shuffling  Symmetric Image Cipher  Wave Perturbation  
Scalable coding of stream cipher encrypted images via adaptive sampling Conference paper
2014 IEEE International Conference on Image Processing, ICIP 2014, Paris, FRANCE, OCT 27-30, 2014
Authors:  Zhou J.;  Au O.C.
Favorite  |  View/Download:2/0  |  Submit date:2018/12/22
Image Compression Over Encrypted Domain  Scalable Image Coding  
Design of image cipher using latin squares Journal article
Information Sciences, 2014,Volume: 264,Page: 317
Authors:  Wu Y.;  Zhou Y.;  Noonan J.P.;  Agaian S.
Favorite  |  View/Download:3/0  |  Submit date:2018/10/30
Confusion-diffusion  Error Tolerance  Image Encryption  Latin Square  Substitution-permutation Network