UM
(Note: the search results are based on claimed items)

Browse/Search Results:  1-5 of 5 Help

Filters        
Selected(0)Clear Items/Page:    Sort:
Robust Face Hallucination via Locality-Constrained Bi-Layer Representation Journal article
IEEE Transactions on Cybernetics, 2018,Volume: 48,Issue: 4,Page: 1189-1201
Authors:  Liu, Licheng;  Chen, C. L. Philip;  Li, Shutao;  Tang, Yuan Yan;  Chen, Long
Favorite | View/Download:27/0 | TC[WOS]:19 TC[Scopus]:0 | Submit date:2018/10/30
Bi-layer Representation  Face Hallucination  Locality-constrained Coding  Robust Coding  
Weighted Joint Sparse Representation for Removing Mixed Noise in Image Journal article
IEEE Transactions on Cybernetics, 2017,Volume: 47,Issue: 3,Page: 600-611
Authors:  Liu, Licheng;  Chen, Long;  Chen, C. L. Philip;  Tang, Yuan Yan;  Pun, Chi Man
Favorite | View/Download:63/0 | TC[WOS]:60 TC[Scopus]:0 | Submit date:2018/10/30
Greedy Algorithm  Image Denoising  Joint Sparse Representation (Jsr)  Nonlocal Similarity  Weighted Sparse Coding  
Secure Reversible Image Data Hiding Over Encrypted Domain via Key Modulation Journal article
IEEE Transactions on Circuits and Systems for Video Technology, 2016,Volume: 26,Issue: 3,Page: 441 - 452
Authors:  Jiantao Zhou;  Weiwei Sun;  Li Dong;  Xianming Liu;  Oscar C. Au,;  Yuan Yan Tang
Favorite | View/Download:21/0 | TC[WOS]:64 TC[Scopus]:0 | Submit date:2018/10/30
Feature Extraction  Reversible Image Data Hiding (Ridh)  Signal Processing Over Encrypted Domain  Svm  
Scalable Compression of Stream Cipher Encrypted Images Through Context-Adaptive Sampling Journal article
IEEE Transactions on Information Forensics and Security, 2014,Volume: 9,Issue: 11,Page: 1857-1868
Authors:  Jiantao Zhou;  Oscar C. Au;  Guangtao Zhai;  Yuan Yan Tang;  Xianming Liu
Favorite | View/Download:8/0 | TC[WOS]:14 TC[Scopus]:0 | Submit date:2018/12/22
Adaptive Sampling  Image Compression  Scalable Coding  Signal ProcessIng In Encrypted domaIn  
Designing an efficient image encryption-then-compression system via prediction error clustering and random permutation Journal article
IEEE Transactions on Information Forensics and Security, 2014,Volume: 9,Issue: 1,Page: 39-50
Authors:  Jiantao Zhou;  Xianming Liu;  Oscar C. Au;  Yuan Yan Tang
Favorite | View/Download:18/0 | TC[WOS]:65 TC[Scopus]:0 | Submit date:2018/10/30
Compression Of Encrypted Image  Encrypted Domain Signal Processing