Selected(0)Clear
Items/Page: Sort: |
| Privacy-Preserving Image Denoising from External Cloud Databases Journal article IEEE Transactions on Information Forensics and Security, 2017,Volume: 12,Issue: 6,Page: 1285-1298 Authors: Zheng Y.; Cui H.; Wang C.; Zhou J.
 Favorite | View/Download:12/0 | TC[WOS]:13 TC[Scopus]:17 | Submit date:2018/12/22 Cloud Computing External Database Image Denoising Privacy Security |
| Adaptive Block Coding Order for Intra Prediction in HEVC Journal article IEEE Transactions on Circuits and Systems for Video Technology, 2016,Volume: 26,Issue: 11,Page: 2152-2158 Authors: Zheng A.; Yuan Y.; Zhou J. ; Guo Y.; Yang H.; Au O.C.
 Favorite | View/Download:6/0 | TC[WOS]:4 TC[Scopus]:9 | Submit date:2018/12/22 Adaptive Block Coding Order (Abco) High Efficiency Video Coding (Hevc) Intra Prediction Video Coding |
| A block compressive sensing based scalable encryption framework for protecting significant image regions Journal article International Journal of Bifurcation and Chaos, 2016,Volume: 26,Issue: 11 Authors: Zhang Y.; Zhou J. ; Chen F.; Zhang L.Y.; Xiao D.; Chen B.; Liao X.
 Favorite | View/Download:15/0 | TC[WOS]:14 TC[Scopus]:23 | Submit date:2018/12/22 Block Compressive Sensing Insignificant Block Encryption Scalable Encryption Framework Significant Block Encryption |
| Bi-level protected compressive sampling Journal article IEEE Transactions on Multimedia, 2016,Volume: 18,Issue: 9,Page: 1720-1732 Authors: Zhang L.Y.; Wong K.-W.; Zhang Y.; Zhou J.
 Favorite | View/Download:10/0 | TC[WOS]:45 TC[Scopus]:55 | Submit date:2018/12/22 Compressive Sampling (Cs) Encryption Known/chosen-plaintext Attack Random Projection Restricted Isometry Property (Rip) |
| Embedding cryptographic features in compressive sensing Journal article Neurocomputing, 2016,Volume: 205,Page: 472 Authors: Zhang Y.; Zhou J. ; Chen F.; Zhang L.Y.; Wong K.-W.; He X.; Xiao D.
 Favorite | View/Download:8/0 | TC[WOS]:55 TC[Scopus]:76 | Submit date:2018/10/30 Parallel Compressive Sensing Random Permutation Secure Compressive Sensing Symmetric-key Cipher |
| Perturbation meets key-based interval splitting arithmetic coding: security enhancement and chaos generalization Journal article Security and Communication Networks, 2016,Volume: 9,Issue: 1,Page: 43-53 Authors: Zhang Y.; Xiao D.; Wong K.-W.; Zhou J. ; Bai S.; Su M.
 Favorite | View/Download:5/0 | TC[WOS]:3 TC[Scopus]:4 | Submit date:2018/12/22 Arithmetic Coding Chaotic Map Joint Compression And Encryption Perturbation |
| Halftone image watermarking via optimization Journal article Signal Processing: Image Communication, 2016,Volume: 41,Page: 85-100 Authors: Guo Y.; Au O.C.; Zhou J. ; Tang K.; Fan X.
 Favorite | View/Download:9/0 | TC[WOS]:8 TC[Scopus]:11 | Submit date:2018/12/22 Error Diffusion Halftone Image Halftone Image Watermarking Optimization Watermarking |
| Anti-Forensics of Lossy Predictive Image Compression Journal article IEEE Signal Processing Letters, 2015,Volume: 22,Issue: 12,Page: 2219-2223 Authors: Li Y.; Zhou J.
 Favorite | View/Download:5/0 | TC[WOS]:5 TC[Scopus]:9 | Submit date:2018/12/22 Anti-forensics Lossy Predictive Image Coding |
| On imperfect pricing in globally constrained noncooperative games for cognitive radio networks Journal article Signal Processing, 2015,Volume: 117,Page: 96-101 Authors: Wang J.; Huang Y.; Zhou J. ; Sun L.
 Favorite | View/Download:7/0 | TC[WOS]:2 TC[Scopus]:2 | Submit date:2018/12/22 Cognitive Radio Networks Imperfect Pricing Nash Equilibrium Problem Noncooperative Game |
| Robust coding of encrypted images via structural matrix Journal article Signal Processing: Image Communication, 2015,Volume: 39,Page: 202-211 Authors: Zhang Y.; Wong K.-W.; Zhang L.Y.; Wen W.; Zhou J. ; He X.
 Favorite | View/Download:10/0 | TC[WOS]:10 TC[Scopus]:15 | Submit date:2018/12/22 Multiple Description Code Packet Loss Robust Coding Of Encrypted Image Structural Matrix |