UM

Browse/Search Results:  1-10 of 10 Help

Filters    
Selected(0)Clear Items/Page:    Sort:
Two strategies to optimize the decisions in signature verification with the presence of spoofing attacks Journal article
Information Sciences, 2016,Volume: 352-353,Page: 188-202
Authors:  Yu S.;  Ai Y.;  Xu B.;  Zhou Y.;  Li W.;  Liao Q.;  Poh N.
Favorite | View/Download:12/0 | TC[WOS]:4 TC[Scopus]:0 | Submit date:2018/12/21
Biometric Authentication  Brute-force  Liveness Score  Probabilistic  Spoofing Attack  
2D Sudoku associated bijections for image scrambling Journal article
Information Sciences, 2016,Volume: 327,Page: 91-109
Authors:  Wu Y.;  Zhou Y.;  Agaian S.;  Noonan J.P.
Favorite | View/Download:9/0 | TC[WOS]:11 TC[Scopus]:0 | Submit date:2018/12/21
Image Scrambling  Matrix Element Representation  Sudoku Matrix  Two Dimensional Bijection  
Image encryption using 2D Logistic-adjusted-Sine map Journal article
Information Sciences, 2016,Volume: 339,Page: 237
Authors:  Hua Z.;  Zhou Y.
Favorite | View/Download:9/0 | TC[WOS]:207 TC[Scopus]:0 | Submit date:2018/10/30
Chaotic Encryption  Chaotic Map  Confusion And Diffusion  Image Encryption  
Fast Fourier transform using matrix decomposition Journal article
Information Sciences, 2015,Volume: 291,Issue: C,Page: 172-183
Authors:  Zhou Y.;  Cao W.;  Liu L.;  Agaian S.;  Chen C.L.P.
Favorite | View/Download:10/0 | TC[WOS]:8 TC[Scopus]:0 | Submit date:2018/12/21
Fast Fourier Transform  Image Encryption  Orthogonal Transform  Sparse Matrix  
A new weighted mean filter with a two-phase detector for removing impulse noise Journal article
Information Sciences, 2015,Volume: 315,Page: 1
Authors:  Liu L.;  Chen C.L.P.;  Zhou Y.;  You X.
Favorite | View/Download:12/0 | TC[WOS]:58 TC[Scopus]:0 | Submit date:2018/10/30
Edge Pixels Identification  Fuzzy Noise Detector  Image Denoising  Impulse Noise  Weighted Mean Filter  
Image encryption: Generating visually meaningful encrypted images Journal article
Information Sciences, 2015,Volume: 324,Page: 197
Authors:  Bao L.;  Zhou Y.
Favorite | View/Download:10/0 | TC[WOS]:58 TC[Scopus]:0 | Submit date:2018/10/30
Discrete Wavelet Transform  Image Encryption  Visually Meaningful Encrypted Image  
2D Sine Logistic modulation map for image encryption Journal article
Information Sciences, 2014,Volume: 297,Page: 80
Authors:  Hua Z.;  Zhou Y.;  Pun C.-M.;  Chen C.L.P.
Favorite | View/Download:19/0 | TC[WOS]:224 TC[Scopus]:0 | Submit date:2018/10/30
2d Sine Logistic Modulation Map  Chaotic Magic Transform  Image Encryption  
Spatial adjacent bag of features with multiple superpixels for object segmentation and classification Journal article
Information Sciences, 2014,Volume: 281,Page: 373-385
Authors:  Tao W.;  Zhou Y.;  Liu L.;  Li K.;  Sun K.;  Zhang Z.
Favorite | View/Download:9/0 | TC[WOS]:8 TC[Scopus]:0 | Submit date:2018/12/21
Multiple Segmentations  Object Recognition  Spatial Adjacent Bag Of Features  Superpixel Adjacent Histogram  
Design of image cipher using latin squares Journal article
Information Sciences, 2014,Volume: 264,Page: 317
Authors:  Wu Y.;  Zhou Y.;  Noonan J.P.;  Agaian S.
Favorite | View/Download:17/0 | TC[WOS]:73 TC[Scopus]:0 | Submit date:2018/10/30
Confusion-diffusion  Error Tolerance  Image Encryption  Latin Square  Substitution-permutation Network  
Local Shannon entropy measure with statistical tests for image randomness Journal article
Information Sciences, 2013,Volume: 222,Page: 323
Authors:  Wu Y.;  Zhou Y.;  Saveriades G.;  Agaian S.;  Noonan J.P.;  Natarajan P.
Favorite | View/Download:24/0 | TC[WOS]:168 TC[Scopus]:0 | Submit date:2018/10/30
Hypothesis Test  Image Encryption  Image Randomness  Shannon Entropy