UM

Browse/Search Results:  1-10 of 13 Help

Selected(0)Clear Items/Page:    Sort:
Optimal LSBs-based quantum watermarking with lower distortion Journal article
International Journal of Quantum Information, 2018,Volume: 16,Issue: 7
Authors:  Zhou R.-G.;  Hu W.W.;  Luo G.F.;  Fan P.;  Ian H.
Favorite | View/Download:2/0 | TC[WOS]:3 TC[Scopus]:0 | Submit date:2019/04/08
computational complexity  LSBs steganography  optimal LSBs based  Quantum watermarking  visual effect  
Information security display via uncrowded window Conference paper
2014 IEEE Visual Communications and Image Processing Conference, VCIP 2014, Valletta, MALTA, DEC 07-10, 2014
Authors:  Gao Z.;  Zhai G.;  Zhou J.;  Min X.;  Hu C.
Favorite | View/Download:5/0 | TC[WOS]:1 TC[Scopus]:0 | Submit date:2018/12/22
Display Technology  Eye Tracking  Information Security  Uncrowded Window  
A new collage steganographic algorithm using cartoon design Conference paper
Proceedings of SPIE - The International Society for Optical Engineering, San Francisco, CA, FEB 03-05, 2014
Authors:  Yi S.;  Zhou Y.;  Pun C.-M.;  Chen C.L.P.
Favorite | View/Download:7/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2018/12/21
Cartoon Design  Collage Steganography  Matrix Encoding  
Application of a generalized difference expansion based reversible audio data hiding algorithm Journal article
Multimedia Tools and Applications, 2013,Volume: 74,Issue: 6,Page: 1961-1982
Authors:  Choi K.-C.;  Pun C.-M.;  Chen C.L.P.
Favorite | View/Download:4/0 | TC[WOS]:8 TC[Scopus]:0 | Submit date:2019/02/11
Audio  Data Hiding  Reversible Watermarking  Steganography  Waveform  
High capacity digital audio reversible watermarking Conference paper
Proceeding - IEEE CYBERNETICSCOM 2013: IEEE International Conference on Computational Intelligence and Cybernetics
Authors:  Choi K.-C.;  Pun C.-M.
Favorite | View/Download:1/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/14
audio  data hiding  reversible watermarking  steganography  waveform  
A pattern recognition system for JPEG steganography detection Journal article
Optics Communications, 2012,Volume: 285,Issue: 21-22,Page: 4252-4261
Authors:  Chen C.L.P.;  Chen M.-C.;  Agaian S.;  Zhou Y.;  Roy A.;  Rodriguez B.M.
Favorite | View/Download:11/0 | TC[WOS]:1 TC[Scopus]:0 | Submit date:2018/12/21
Feature Generation  Feature Ranking And Selection  Pattern Classification  Pattern Recognition System  Steganography Detection  
Cyber security and privacy issues in smart grids Journal article
IEEE Communications Surveys and Tutorials, 2012,Volume: 14,Issue: 4,Page: 981
Authors:  Liu J.;  Xiao Y.;  Li S.;  Liang W.;  Chen C.L.P.
View | Adobe PDF | Favorite | View/Download:1154/263 | TC[WOS]:233 TC[Scopus]:0 | Submit date:2018/10/30
Accountability  Ami  Privacy  Scada  Security  Smart Grid  
An application of linear mixed effects model to steganography detection Conference paper
Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics
Authors:  Chen M.-C.;  Roy A.;  Rodriguez B.M.;  Agaian S.S.;  Chen C.L.P.
Favorite | View/Download:6/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/11
Feature generation  Linear mixed effects model  Maximum likelihood estimates  Steganalysis  Steganography  
Alpha-trimmed image estimation for JPEG steganography detection Conference paper
Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics
Authors:  Chen M.-C.;  Agaian S.S.;  Chen C.L.P.;  Rodriguez B.M.
Favorite | View/Download:3/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/11
Alpha-trimmed mean  Feature generation  Image estimation  JPEG steganalysis  
Image steganography in fractal compression Conference paper
Proceedings of SPIE - The International Society for Optical Engineering
Authors:  Chen M.-C.;  Agaian S.S.;  Chen C.L.P.;  Rodriguez B.M.
Favorite | View/Download:2/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/11
Fractal compression  Fractal decoding  Fractal encoding  Fractal steganography  Image steganography