UM

Browse/Search Results:  1-10 of 13 Help

Selected(0)Clear Items/Page:    Sort:
Quantum Watermarking Scheme Based on INEQR Journal article
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2018,Volume: 57,Issue: 4,Page: 1120-1131
Authors:  Zhou, Ri-Gui;  Zhou, Yang;  Zhu, Changming;  Wei, Lai;  Zhang, Xiafen;  Ian, Hou
Favorite  |  View/Download:9/0  |  Submit date:2018/10/30
Quantum watermarking  XOR operation  Swap operation  LSB algorithm  
Improved known-plaintext attack to permutation-only multimedia ciphers Journal article
INFORMATION SCIENCES, 2018,Volume: 430,Page: 228-239
Authors:  Zhang, Leo Yu;  Liu, Yuansheng;  Wang, Cong;  Zhou, Jiantao;  Zhang, Yushu;  Chen, Guanrong
Favorite  |  View/Download:12/0  |  Submit date:2018/10/30
Cryptanalysis  Known-plaintext Attack (Kpa)  Multimedia Encryption  Permutation  Transposition  
Robust Privacy-Preserving Image Sharing over Online Social Networks (OSNs) Journal article
ACM Transactions on Multimedia Computing and Applications, 2018,Volume: 14,Issue: 1
Authors:  WEIWEI SUN;  JIANTAO ZHOU;  SHUYUAN ZHU;  YUAN YAN TANG
Favorite  |  View/Download:8/0  |  Submit date:2018/12/22
Image Sharing  Jpeg  Online Social Networks  Privacy-preserving  
Processing-aware privacy-preserving photo sharing over online social networks Conference paper
MM 2016 - Proceedings of the 2016 ACM Multimedia Conference, Amsterdam, The Netherlands, October 15 - 19, 2016
Authors:  Sun W.;  Zhou J.;  Lyu R.;  Zhu S.
Favorite  |  View/Download:3/0  |  Submit date:2018/12/22
Facebook  Jpeg  Photo Sharing  Privacy-preserving  Social Networks  
Bi-level protected compressive sampling Journal article
IEEE Transactions on Multimedia, 2016,Volume: 18,Issue: 9,Page: 1720-1732
Authors:  Zhang L.Y.;  Wong K.-W.;  Zhang Y.;  Zhou J.
Favorite  |  View/Download:2/0  |  Submit date:2018/12/22
Compressive Sampling (Cs)  Encryption  Known/chosen-plaintext Attack  Random Projection  Restricted Isometry Property (Rip)  
Reducing the ciphertext expansion in image homomorphic encryption via linear interpolation technique Conference paper
2015 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2015, Orlando, FL, DEC 13-16, 2015
Authors:  Li Y.;  Zhou J.;  Li Y.;  Au O.C.
Favorite  |  View/Download:2/0  |  Submit date:2018/12/22
Ciphertext Expansion  Homomorphic Encryption  Linear Interpolation  
Secure and verifiable outsourcing of nonnegative matrix factorization (NMF) Conference paper
IH and MMSec 2016 - Proceedings of the 2016 ACM Information Hiding and Multimedia Security Workshop, Vigo, Galicia, Spain, 6 20, 2016 - 6 22, 2016
Authors:  Duan, Jia;  Zhou, Jiantao;  Li, Yuanman
Favorite  |  View/Download:7/0  |  Submit date:2018/11/06
Ciphertext-only attack on an image homomorphic encryption scheme with small ciphertext expansion Conference paper
MM 2015 - Proceedings of the 2015 ACM Multimedia Conference, Brisbane, AUSTRALIA, OCT 26-30, 2015
Authors:  Li Y.;  Zhou J.;  Li Y.
Favorite  |  View/Download:2/0  |  Submit date:2018/12/22
A new 1D chaotic system for image encryption Journal article
Signal Processing, 2014,Volume: 97,Page: 172
Authors:  Zhou Y.;  Bao L.;  Chen C.L.P.
Favorite  |  View/Download:8/0  |  Submit date:2018/10/30
Chaotic System  Chosen-plaintext Attack  Image Encryption  Security Analysis  
Image encryption in the wavelet domain Conference paper
Proceedings of SPIE - The International Society for Optical Engineering, Baltimore, MD, APR 29-30, 2013
Authors:  Bao L.;  Zhou Y.;  Chen C.L.P.
Favorite  |  View/Download:3/0  |  Submit date:2018/12/21
Discrete Wavelet Transform  Image Encryptio