UM

Browse/Search Results:  1-10 of 21 Help

Selected(0)Clear Items/Page:    Sort:
Personal Privacy Protection via Irrelevant Faces Tracking and Pixelation in Video Live Streaming Journal article
IEEE Transactions on Information Forensics and Security, 2021,Volume: 16,Page: 1088-1103
Authors:  Zhou,Jizhe;  Pun,Chi Man
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2021/03/11
empirical likelihood ratio  Face pixelation  positioned incremental affinity propagation  privacy protection  video live streaming  
Genetic Privacy and Data Protection: A Review of Chinese Direct-to-Consumer Genetic Test Services Journal article
Frontiers in Genetics, 2020,Volume: 11
Authors:  Li Du;  Meng Wang
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2020/12/04
Chinese Genetic Testing Providers  Consumers’ Right To Their Genetic Information  Data Privacy  Data Protection Law  Data Sharing  Direct-to-consumer Genetic Testing  Genetic Information Protection  
A cloud image data protection algorithm with multilevel encryption scheme and automated- selection mechanism Journal article
Applied Sciences (Switzerland), 2019,Volume: 9,Issue: 23
Authors:  Li,Shih Yu;  Hernández,Miguel Angel Benalcázar;  Tam,Lap Mou;  Chen,Chin Sheng
Favorite |  | TC[WOS]:1 TC[Scopus]:1 | Submit date:2021/03/09
Cloud data protection  Cryptography  Cyberphysical systems  Smart automation  
Reversible Data Hiding in Encrypted Images using Prediction-error Encoding Conference paper
IEEE International Conference on Systems, Man, and Cybernetics (SMC), Miyazaki, Japan, Japan, 7-10 Oct. 2018
Authors:  Shuang Yi;  Yicong Zhou
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/03/26
Reversible Data Hiding  Encrypted Image  Prediction-error Encoding  Weighted Checkerboard-based Prediction Privacy Protection  
Separable and Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling Journal article
IEEE TRANSACTIONS ON MULTIMEDIA, 2019,Volume: 21,Issue: 1,Page: 51-64
Authors:  Yi, Shuang;  Zhou, Yicong
Favorite |  | TC[WOS]:32 TC[Scopus]:37 | Submit date:2019/01/17
Reversible data hiding  encrypted images  parametric binary tree labeling scheme  privacy protection  
Genetic and Genomic Consultation: Are We Ready for Direct-to-Consumer Telegenetics ? Journal article
FRONTIERS IN GENETICS, 2018,Volume: 9
Authors:  Li Du;  Shmuel I. Becher
Favorite |  | TC[WOS]:2 TC[Scopus]:1 | Submit date:2019/01/17
Telegenetics  Telegenomics  Direct-to-consumer  Genetic Services  Risks And Benefits  Privacy  Informed Consent  
Parametric reversible data hiding in encrypted images using adaptive bit-level data embedding and checkerboard based prediction Journal article
SIGNAL PROCESSING, 2018,Volume: 150,Page: 171-182
Authors:  Yi, Shuang;  Zhou, Yicong
Favorite |  | TC[WOS]:9 TC[Scopus]:10 | Submit date:2018/10/30
Reversible Data Hiding  Encrypted Images  High Capacity  Privacy Protection  Adaptive Bit-level Data Embedding  Adaptive Checkerboard Based Prediction  
Enhancing social network privacy with accumulated non-zero prior knowledge Journal article
INFORMATION SCIENCES, 2018,Volume: 445,Page: 6-21
Authors:  Wang, Yue;  Yang, Lin;  Chen, Xiaoyun;  Zhang, Xiaofeng;  He, Zhenyu
Favorite |  | TC[WOS]:3 TC[Scopus]:4 | Submit date:2018/10/30
Differential privacy  Social network analysis  Privacy protection  Privacy preserving data mining  
Enhancing social network privacy with accumulated non-zero prior knowledge Journal article
Information Sciences, 2018,Volume: 445-446,Page: 6-21
Authors:  Wang,Yue;  Yang,Lin;  Chen,Xiaoyun;  Zhang,Xiaofeng;  He,Zhenyu
Favorite |  | TC[WOS]:3 TC[Scopus]:4 | Submit date:2019/08/01
Differential privacy  Privacy preserving data mining  Privacy protection  Social network analysis  
Adaptive code embedding for reversible data hiding in encrypted images Conference paper
Proceedings - International Conference on Image Processing, ICIP, Beijing, PEOPLES R CHINA, SEP 17-20, 2017
Authors:  Yi S.;  Zhou Y.
Favorite |  | TC[WOS]:1 TC[Scopus]:5 | Submit date:2018/12/21
Adaptive Code Embedding  Encrypted Image  Privacy Protection  Reversible Data Hiding