Selected(0)Clear
Items/Page: Sort: |
| Two strategies to optimize the decisions in signature verification with the presence of spoofing attacks Journal article Information Sciences, 2016,Volume: 352-353,Page: 188-202 Authors: Yu S.; Ai Y.; Xu B.; Zhou Y. ; Li W.; Liao Q.; Poh N.
 Favorite | View/Download:14/0 | TC[WOS]:4 TC[Scopus]:5 | Submit date:2018/12/21 Biometric Authentication Brute-force Liveness Score Probabilistic Spoofing Attack |
| 2D Sudoku associated bijections for image scrambling Journal article Information Sciences, 2016,Volume: 327,Page: 91-109 Authors: Wu Y.; Zhou Y. ; Agaian S.; Noonan J.P.
 Favorite | View/Download:14/0 | TC[WOS]:14 TC[Scopus]:16 | Submit date:2018/12/21 Image Scrambling Matrix Element Representation Sudoku Matrix Two Dimensional Bijection |
| Image encryption using 2D Logistic-adjusted-Sine map Journal article Information Sciences, 2016,Volume: 339,Page: 237 Authors: Hua Z.; Zhou Y.
 Favorite | View/Download:14/0 | TC[WOS]:260 TC[Scopus]:287 | Submit date:2018/10/30 Chaotic Encryption Chaotic Map Confusion And Diffusion Image Encryption |
| A new weighted mean filter with a two-phase detector for removing impulse noise Journal article Information Sciences, 2015,Volume: 315,Page: 1 Authors: Liu L.; Chen C.L.P.; Zhou Y. ; You X.
 Favorite | View/Download:14/0 | TC[WOS]:63 TC[Scopus]:82 | Submit date:2018/10/30 Edge Pixels Identification Fuzzy Noise Detector Image Denoising Impulse Noise Weighted Mean Filter |
| Fast Fourier transform using matrix decomposition Journal article Information Sciences, 2015,Volume: 291,Issue: C,Page: 172-183 Authors: Zhou Y. ; Cao W.; Liu L.; Agaian S.; Chen C.L.P.
 Favorite | View/Download:14/0 | TC[WOS]:9 TC[Scopus]:14 | Submit date:2018/12/21 Fast Fourier Transform Image Encryption Orthogonal Transform Sparse Matrix |
| Image encryption: Generating visually meaningful encrypted images Journal article Information Sciences, 2015,Volume: 324,Page: 197 Authors: Bao L.; Zhou Y.
 Favorite | View/Download:14/0 | TC[WOS]:78 TC[Scopus]:84 | Submit date:2018/10/30 Discrete Wavelet Transform Image Encryption Visually Meaningful Encrypted Image |
| 2D Sine Logistic modulation map for image encryption Journal article Information Sciences, 2014,Volume: 297,Page: 80 Authors: Hua Z.; Zhou Y. ; Pun C.-M. ; Chen C.L.P.
 Favorite | View/Download:23/0 | TC[WOS]:288 TC[Scopus]:311 | Submit date:2018/10/30 2d Sine Logistic Modulation Map Chaotic Magic Transform Image Encryption |
| Spatial adjacent bag of features with multiple superpixels for object segmentation and classification Journal article Information Sciences, 2014,Volume: 281,Page: 373-385 Authors: Tao W.; Zhou Y. ; Liu L.; Li K.; Sun K.; Zhang Z.
 Favorite | View/Download:15/0 | TC[WOS]:8 TC[Scopus]:14 | Submit date:2018/12/21 Multiple Segmentations Object Recognition Spatial Adjacent Bag Of Features Superpixel Adjacent Histogram |
| Design of image cipher using latin squares Journal article Information Sciences, 2014,Volume: 264,Page: 317 Authors: Wu Y.; Zhou Y. ; Noonan J.P.; Agaian S.
 Favorite | View/Download:63/0 | TC[WOS]:85 TC[Scopus]:91 | Submit date:2018/10/30 Confusion-diffusion Error Tolerance Image Encryption Latin Square Substitution-permutation Network |
| Local Shannon entropy measure with statistical tests for image randomness Journal article Information Sciences, 2013,Volume: 222,Page: 323 Authors: Wu Y.; Zhou Y. ; Saveriades G.; Agaian S.; Noonan J.P.; Natarajan P.
 Favorite | View/Download:31/0 | TC[WOS]:232 TC[Scopus]:245 | Submit date:2018/10/30 Hypothesis Test Image Encryption Image Randomness Shannon Entropy |