UM

Browse/Search Results:  1-10 of 10 Help

Filters    
Selected(0)Clear Items/Page:    Sort:
Sed-Dedup: An efficient secure deduplication system with data modifications Journal article
Concurrency Computation, 2019
Authors:  Tian,Wenlong;  Li,Ruixuan;  Xu,Cheng Zhong;  Xu,Zhiyong
Favorite |  | TC[WOS]:1 TC[Scopus]:1 | Submit date:2021/03/09
chunking algorithms  convergent encryption  data modifications  delta encoding  secure deduplication  
Multilevel Data Encryption Using Thermal-Treatment Controlled Room Temperature Phosphorescence of Carbon Dot/Polyvinylalcohol Composites Journal article
Advanced Science, 2018,Volume: 5,Issue: 9
Authors:  Tian Z.;  Li D.;  Ushakova E.V.;  Maslov V.G.;  Zhou D.;  Jing P.;  Shen D.;  Qu S.;  Rogach A.L.
Favorite |  | TC[WOS]:69 TC[Scopus]:67 | Submit date:2019/04/08
Anti-counterfeiting  Carbon Dots  Data Encryption  Polyvinylalcohol Matrix  Room Temperature Phosphorescence  
Adaptive image encryption for high capacity reversible data hiding Conference paper
2017 IEEE Conference on Dependable and Secure Computing, Taipei, Taiwan, August 7—10, 2017
Authors:  Choi K.-C.;  Pun C.-M.
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/14
Burrow's-wheeler Transform  Generalized Integer Transform  Image Encryption  Lossless Data Hiding  
Binary-block embedding for reversible data hiding in encrypted images Journal article
SIGNAL PROCESSING, 2017,Volume: 133,Page: 40-51
Authors:  Yi, Shuang;  Zhou, Yicong
Favorite |  | TC[WOS]:56 TC[Scopus]:67 | Submit date:2018/10/30
Binary-block Embedding (Bee)  Reversible Data Hiding  Image Encryption  Encrypted Domain  
An improved reversible data hiding in encrypted images Conference paper
2015 IEEE China Summit and International Conference on Signal and Information Processing, ChinaSIP 2015 - Proceedings, Chengdu, China, 12-15 July 2015
Authors:  Yi S.;  Zhou Y.
Favorite |  | TC[WOS]:0 TC[Scopus]:7 | Submit date:2018/12/21
Histogram Shifting  Image Encryption  Prediction Error  Reversible Data Hiding  
Cascade Chaotic System with Applications Journal article
IEEE Transactions on Cybernetics, 2014,Volume: 45,Issue: 9,Page: 2001
Authors:  Zhou Y.;  Hua Z.;  Pun C.-M.;  Philip Chen C.L.
Favorite |  | TC[WOS]:119 TC[Scopus]:146 | Submit date:2018/10/30
Cascade Chaotic System (Ccs)  Chaotic Map  Data Encryption  Pseudo-random Number Generator (Prng)  
A new reversible data hiding algorithm in the encryption domain Conference paper
Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics, San Diego, CA, OCT 05-08, 2014
Authors:  Yi S.;  Zhou Y.;  Pun C.-M.;  Chen C.L.P.
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2018/12/21
Differential Attack  Encryption Domain  Reversible Data Hiding  
Image encryption using 2D logistic-sine chaotic map Conference paper
Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics, San Diego, CA, OCT 05-08, 2014
Authors:  Hua Z.;  Zhou Y.;  Pun C.-M.;  Chen C.L.P.
Favorite |  | TC[WOS]:17 TC[Scopus]:19 | Submit date:2018/12/21
Cascade Chaotic System  Chaotic Map  Data Encryption  Pseudorandom Number Generator (Prng)  
On Improving the Lightweight Video Encryption Algorithms for Real-time Video Transmission Conference paper
3rd International Conference on Communications and Networking in China, ChinaCom 2008, Hangzhou, China, 25-27 Aug. 2008
Authors:  Simon Fong
Favorite |  | TC[WOS]:0 TC[Scopus]:4 | Submit date:2019/02/13
Idea  Mpeg Video Encryption  Multimedia Data Security  
On improving the lightweight video encryption algorithms for real-time video transmission Conference paper
3rd International Conference on Communications and Networking in China, ChinaCom 2008
Authors:  Fong,Simon
Favorite |  | TC[WOS]:0 TC[Scopus]:4 | Submit date:2021/03/09
IDEA  MPEG video encryption  Multimedia data security