UM
(Note: the search results are based on claimed items)

Browse/Search Results:  1-10 of 10 Help

Filters                            
Selected(0)Clear Items/Page:    Sort:
Two strategies to optimize the decisions in signature verification with the presence of spoofing attacks Journal article
Information Sciences, 2016,Volume: 352-353,Page: 188-202
Authors:  Yu S.;  Ai Y.;  Xu B.;  Zhou Y.;  Li W.;  Liao Q.;  Poh N.
Favorite |  | TC[WOS]:4 TC[Scopus]:5 | Submit date:2018/12/21
Biometric Authentication  Brute-force  Liveness Score  Probabilistic  Spoofing Attack  
2D Sudoku associated bijections for image scrambling Journal article
Information Sciences, 2016,Volume: 327,Page: 91-109
Authors:  Wu Y.;  Zhou Y.;  Agaian S.;  Noonan J.P.
Favorite |  | TC[WOS]:14 TC[Scopus]:17 | Submit date:2018/12/21
Image Scrambling  Matrix Element Representation  Sudoku Matrix  Two Dimensional Bijection  
Image encryption using 2D Logistic-adjusted-Sine map Journal article
Information Sciences, 2016,Volume: 339,Page: 237
Authors:  Hua Z.;  Zhou Y.
Favorite |  | TC[WOS]:273 TC[Scopus]:305 | Submit date:2018/10/30
Chaotic Encryption  Chaotic Map  Confusion And Diffusion  Image Encryption  
Fast Fourier transform using matrix decomposition Journal article
Information Sciences, 2015,Volume: 291,Issue: C,Page: 172-183
Authors:  Zhou Y.;  Cao W.;  Liu L.;  Agaian S.;  Chen C.L.P.
Favorite |  | TC[WOS]:10 TC[Scopus]:15 | Submit date:2018/12/21
Fast Fourier Transform  Image Encryption  Orthogonal Transform  Sparse Matrix  
A new weighted mean filter with a two-phase detector for removing impulse noise Journal article
Information Sciences, 2015,Volume: 315,Page: 1
Authors:  Liu L.;  Chen C.L.P.;  Zhou Y.;  You X.
Favorite |  | TC[WOS]:64 TC[Scopus]:83 | Submit date:2018/10/30
Edge Pixels Identification  Fuzzy Noise Detector  Image Denoising  Impulse Noise  Weighted Mean Filter  
Image encryption: Generating visually meaningful encrypted images Journal article
Information Sciences, 2015,Volume: 324,Page: 197
Authors:  Bao L.;  Zhou Y.
Favorite |  | TC[WOS]:81 TC[Scopus]:90 | Submit date:2018/10/30
Discrete Wavelet Transform  Image Encryption  Visually Meaningful Encrypted Image  
2D Sine Logistic modulation map for image encryption Journal article
Information Sciences, 2014,Volume: 297,Page: 80
Authors:  Hua Z.;  Zhou Y.;  Pun C.-M.;  Chen C.L.P.
Favorite |  | TC[WOS]:310 TC[Scopus]:331 | Submit date:2018/10/30
2d Sine Logistic Modulation Map  Chaotic Magic Transform  Image Encryption  
Spatial adjacent bag of features with multiple superpixels for object segmentation and classification Journal article
Information Sciences, 2014,Volume: 281,Page: 373-385
Authors:  Tao W.;  Zhou Y.;  Liu L.;  Li K.;  Sun K.;  Zhang Z.
Favorite |  | TC[WOS]:8 TC[Scopus]:13 | Submit date:2018/12/21
Multiple Segmentations  Object Recognition  Spatial Adjacent Bag Of Features  Superpixel Adjacent Histogram  
Design of image cipher using latin squares Journal article
Information Sciences, 2014,Volume: 264,Page: 317
Authors:  Wu Y.;  Zhou Y.;  Noonan J.P.;  Agaian S.
Favorite |  | TC[WOS]:90 TC[Scopus]:97 | Submit date:2018/10/30
Confusion-diffusion  Error Tolerance  Image Encryption  Latin Square  Substitution-permutation Network  
Local Shannon entropy measure with statistical tests for image randomness Journal article
Information Sciences, 2013,Volume: 222,Page: 323
Authors:  Wu Y.;  Zhou Y.;  Saveriades G.;  Agaian S.;  Noonan J.P.;  Natarajan P.
Favorite |  | TC[WOS]:243 TC[Scopus]:261 | Submit date:2018/10/30
Hypothesis Test  Image Encryption  Image Randomness  Shannon Entropy