UM

Browse/Search Results:  1-3 of 3 Help

Filters    
Selected(0)Clear Items/Page:    Sort:
SIFT Keypoint Removal and Injection via Convex Relaxation Journal article
IEEE Transactions on Information Forensics and Security, 2016,Volume: 11,Issue: 8,Page: 1722-1735
Authors:  Yuanman Li;  Jiantao Zhou;  An Cheng;  Xianming Liu;  Yuan Yan Tang
Favorite  |  View/Download:6/0  |  Submit date:2018/12/22
Convex Optimization  Keypoint Injection  Keypoint Removal  Sift  
Scalable Compression of Stream Cipher Encrypted Images Through Context-Adaptive Sampling Journal article
IEEE Transactions on Information Forensics and Security, 2014,Volume: 9,Issue: 11,Page: 1857-1868
Authors:  Jiantao Zhou;  Oscar C. Au;  Guangtao Zhai;  Yuan Yan Tang;  Xianming Liu
Favorite  |  View/Download:5/0  |  Submit date:2018/12/22
Adaptive Sampling  Image Compression  Scalable Coding  Signal ProcessIng In Encrypted domaIn  
Designing an efficient image encryption-then-compression system via prediction error clustering and random permutation Journal article
IEEE Transactions on Information Forensics and Security, 2014,Volume: 9,Issue: 1,Page: 39-50
Authors:  Jiantao Zhou;  Xianming Liu;  Oscar C. Au;  Yuan Yan Tang
Favorite  |  View/Download:7/0  |  Submit date:2018/10/30
Compression Of Encrypted Image  Encrypted Domain Signal Processing