UM

Browse/Search Results:  1-10 of 49 Help

Selected(0)Clear Items/Page:    Sort:
Quantum color image watermarking based on fast bit-plane scramble and dual embedded Journal article
International Journal of Quantum Information, 2018,Volume: 16,Issue: 7
Authors:  Zhou R.-G.;  Yang P.L.;  Liu X.A.;  Ian H.
Favorite  |  View/Download:0/0  |  Submit date:2019/04/08
dual embedding  fast bit-plane scrambling  least significant bit  Quantum image watermarking  reversible logic circuit  
Reversible data hiding in encrypted images using adaptive block-level prediction-error expansion Journal article
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2018,Volume: 64,Page: 78-88
Authors:  Yi, Shuang;  Zhou, Yicong;  Hua, Zhongyun
Favorite  |  View/Download:9/0  |  Submit date:2018/10/30
Reversible Data Hiding  Encrypted Images  Adaptive Embedding  Block-level Prediction-error Expansion  
Quantum Watermarking Scheme Based on INEQR Journal article
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2018,Volume: 57,Issue: 4,Page: 1120-1131
Authors:  Zhou, Ri-Gui;  Zhou, Yang;  Zhu, Changming;  Wei, Lai;  Zhang, Xiafen;  Ian, Hou
Favorite  |  View/Download:8/0  |  Submit date:2018/10/30
Quantum watermarking  XOR operation  Swap operation  LSB algorithm  
Medical image encryption using high-speed scrambling and pixel adaptive diffusion Journal article
SIGNAL PROCESSING, 2018,Volume: 144,Page: 134-144
Authors:  Hua, Zhongyun;  Yi, Shuang;  Zhou, Yicong
Favorite  |  View/Download:8/0  |  Submit date:2018/10/30
Cryptosystem  Image Encryption  Medical Image  High-speed Scrambling  Pixel Adaptive Diffusion  
Improved known-plaintext attack to permutation-only multimedia ciphers Journal article
INFORMATION SCIENCES, 2018,Volume: 430,Page: 228-239
Authors:  Zhang, Leo Yu;  Liu, Yuansheng;  Wang, Cong;  Zhou, Jiantao;  Zhang, Yushu;  Chen, Guanrong
Favorite  |  View/Download:11/0  |  Submit date:2018/10/30
Cryptanalysis  Known-plaintext Attack (Kpa)  Multimedia Encryption  Permutation  Transposition  
Adaptive code embedding for reversible data hiding in encrypted images Conference paper
Proceedings - International Conference on Image Processing, ICIP, Beijing, PEOPLES R CHINA, SEP 17-20, 2017
Authors:  Yi S.;  Zhou Y.
Favorite  |  View/Download:3/0  |  Submit date:2018/12/21
Adaptive Code Embedding  Encrypted Image  Privacy Protection  Reversible Data Hiding  
Robust Privacy-Preserving Image Sharing over Online Social Networks (OSNs) Journal article
ACM Transactions on Multimedia Computing and Applications, 2018,Volume: 14,Issue: 1
Authors:  WEIWEI SUN;  JIANTAO ZHOU;  SHUYUAN ZHU;  YUAN YAN TANG
Favorite  |  View/Download:8/0  |  Submit date:2018/12/22
Image Sharing  Jpeg  Online Social Networks  Privacy-preserving  
Facial feature based secure information transmission Conference paper
ACM International Conference Proceeding Series
Authors:  Li C.;  Wang Y.;  Fong S.;  Duan C.;  Song W.
Favorite  |  View/Download:2/0  |  Submit date:2019/02/13
Biometric cryptosystems  Gabor features  Secret key generation  
Combination of Sharing Matrix and Image Encryption for Lossless (k,n)-Secret Image Sharing Journal article
IEEE Transactions on Image Processing, 2017,Volume: 26,Issue: 12,Page: 5618-5631
Authors:  Bao L.;  Yi S.;  Zhou Y.
Favorite  |  View/Download:1/0  |  Submit date:2018/12/21
image encryption  Secret image sharing  sharing matrix  visual cryptography  
Combination of Sharing Matrix and Image Encryption for Lossless (k, n)-Secret Image Sharing Journal article
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2017,Volume: 26,Issue: 12,Page: 5618-5631
Authors:  Bao, Long;  Yi, Shuang;  Zhou, Yicong
Favorite  |  View/Download:9/0  |  Submit date:2018/10/30
Secret Image Sharing  Visual Cryptography  Sharing Matrix  Image Encryption