UM
(Note: the search results are based on claimed items)

Browse/Search Results:  1-4 of 4 Help

Filters        
Selected(0)Clear Items/Page:    Sort:
Adaptive image encryption for high capacity reversible data hiding Conference paper
2017 IEEE Conference on Dependable and Secure Computing, Taipei, Taiwan, August 7—10, 2017
Authors:  Choi K.-C.;  Pun C.-M.
Favorite  |  View/Download:5/0  |  Submit date:2019/02/14
Burrow's-wheeler Transform  Generalized Integer Transform  Image Encryption  Lossless Data Hiding  
Cascade Chaotic System with Applications Journal article
IEEE Transactions on Cybernetics, 2014,Volume: 45,Issue: 9,Page: 2001
Authors:  Zhou Y.;  Hua Z.;  Pun C.-M.;  Philip Chen C.L.
Favorite  |  View/Download:13/0  |  Submit date:2018/10/30
Cascade Chaotic System (Ccs)  Chaotic Map  Data Encryption  Pseudo-random Number Generator (Prng)  
A new reversible data hiding algorithm in the encryption domain Conference paper
Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics, San Diego, CA, OCT 05-08, 2014
Authors:  Yi S.;  Zhou Y.;  Pun C.-M.;  Chen C.L.P.
Favorite  |  View/Download:5/0  |  Submit date:2018/12/21
Differential Attack  Encryption Domain  Reversible Data Hiding  
Image encryption using 2D logistic-sine chaotic map Conference paper
Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics, San Diego, CA, OCT 05-08, 2014
Authors:  Hua Z.;  Zhou Y.;  Pun C.-M.;  Chen C.L.P.
Favorite  |  View/Download:8/0  |  Submit date:2018/12/21
Cascade Chaotic System  Chaotic Map  Data Encryption  Pseudorandom Number Generator (Prng)