UM

Browse/Search Results:  1-5 of 5 Help

Filters    
Selected(0)Clear Items/Page:    Sort:
Adaptive Multiscale Decomposition of Graph Signals Journal article
IEEE Signal Processing Letters, 2016,Volume: 23,Issue: 10,Page: 1389-1393
Authors:  Xianwei Zheng;  Yuan Yan Tang;  Jianjia Pan;  Jiantao Zhou
Favorite  |  View/Download:6/0  |  Submit date:2018/12/22
Entropy  Graph Fourier Transform  Graph Signal Cost Function  Graph Wavelet Decomposition (Gwd)  Α-sparsity  
SIFT Keypoint Removal and Injection via Convex Relaxation Journal article
IEEE Transactions on Information Forensics and Security, 2016,Volume: 11,Issue: 8,Page: 1722-1735
Authors:  Yuanman Li;  Jiantao Zhou;  An Cheng;  Xianming Liu;  Yuan Yan Tang
Favorite  |  View/Download:6/0  |  Submit date:2018/12/22
Convex Optimization  Keypoint Injection  Keypoint Removal  Sift  
A Review of Compressive Sensing in Information Security Field Journal article
IEEE Access, 2016,Volume: 4,Page: 2507 - 2519
Authors:  YUSHU ZHANG;  LEO YU ZHANG;  JIANTAO ZHOU;  LICHENG LIU;  FEI CHEN;  XING HE
Favorite  |  View/Download:0/0  |  Submit date:2019/04/16
Compressive Sensing  Theoretical Security  Application Security  Image Cipher  Chaos  Optics  
Secure Reversible Image Data Hiding Over Encrypted Domain via Key Modulation Journal article
IEEE Transactions on Circuits and Systems for Video Technology, 2016,Volume: 26,Issue: 3,Page: 441 - 452
Authors:  Jiantao Zhou;  Weiwei Sun;  Li Dong;  Xianming Liu;  Oscar C. Au,;  Yuan Yan Tang
Favorite  |  View/Download:9/0  |  Submit date:2018/10/30
Feature Extraction  Reversible Image Data Hiding (Ridh)  Signal Processing Over Encrypted Domain  Svm  
Secure and verifiable outsourcing of nonnegative matrix factorization (NMF) Conference paper
IH and MMSec 2016 - Proceedings of the 2016 ACM Information Hiding and Multimedia Security Workshop, Vigo, Galicia, Spain, 6 20, 2016 - 6 22, 2016
Authors:  Duan, Jia;  Zhou, Jiantao;  Li, Yuanman
Favorite  |  View/Download:7/0  |  Submit date:2018/11/06