UM

Browse/Search Results:  1-10 of 33 Help

Selected(0)Clear Items/Page:    Sort:
Reversible Data Hiding in Encrypted Images Using Cipher-Feedback Secret Sharing Journal article
IEEE Transactions on Circuits and Systems for Video Technology, 2022,Volume: 32,Issue: 8,Page: 4968-4982
Authors:  Hua, Zhongyun;  Wang, Yanxiang;  Yi, Shuang;  Zhou, Yicong;  Jia, Xiaohua
Favorite |  | TC[WOS]:2 TC[Scopus]:1 | Submit date:2022/05/17
Cipher-feedback Secret Sharing  Ciphers  Cloud Computing  Correlation  Cryptography  Encrypted Image  Homomorphic Encryption  Multiple Data Hiders  Prediction Methods  Reversible Data Hiding  Servers  
Visually secure image encryption using adaptive-thresholding sparsification and parallel compressive sensing Journal article
Signal Processing, 2021,Volume: 183
Authors:  Hua, Zhongyun;  Zhang, Kuiyuan;  Li, Yuanman;  Zhou, Yicong
Favorite |  | TC[WOS]:27 TC[Scopus]:32 | Submit date:2021/12/08
Image Compression  Image Security  Parallel Compressive Sensing  Separable Wavelet Transform  
Denoising in the Dark: Privacy-Preserving Deep Neural Network-Based Image Denoising Journal article
IEEE Transactions on Dependable and Secure Computing, 2021,Volume: 18,Issue: 3,Page: 1261-1275
Authors:  Zheng, Yifeng;  Duan, Huayi;  Tang, Xiaoting;  Wang, Cong;  Zhou, Jiantao
Adobe PDF | Favorite |  | TC[WOS]:7 TC[Scopus]:8 | Submit date:2021/12/07
Cloud Computing  Deep Neural Networks  Image Denoising  Privacy Preservation  
Content-adaptive image encryption with partial unwinding decomposition Journal article
Signal Processing, 2021,Volume: 181
Authors:  Wu, Yongfei;  Zhang, Liming;  Qian, Tao;  Liu, Xilin;  Xie, Qiwei
Favorite |  | TC[WOS]:12 TC[Scopus]:10 | Submit date:2021/12/07
Image Encryption  Image-content-adaptive Encryption  Information Security  Partial Unwinding Decomposition  
Cryptanalysis of a chaotic image cipher based on plaintext-related permutation and lookup table Journal article
Nonlinear Dynamics, 2020,Volume: 100,Issue: 4,Page: 3959-3978
Authors:  Chen, Lei;  Chen, Junxin;  Ma, Lisha;  Wang, Shihong
Favorite |  | TC[WOS]:4 TC[Scopus]:4 | Submit date:2021/12/06
Chaotic Cryptograph  Chaotic Dynamics  Chosen-plaintext Attack  Image Cryptanalysis  Latin Square  
Cryptanalysis of a DNA-based image encryption scheme Journal article
Information Sciences, 2020,Volume: 520,Page: 130-141
Authors:  Chen, Junxin;  Chen, Lei;  Zhou, Yicong
Favorite |  | TC[WOS]:49 TC[Scopus]:55 | Submit date:2021/12/06
Cryptanalysis  Image Encryption  Hénon-sine Map  Dna Coding  
A cloud image data protection algorithm with multilevel encryption scheme and automated- selection mechanism Journal article
Applied Sciences (Switzerland), 2019,Volume: 9,Issue: 23
Authors:  Shih-Yu Li;  Miguel Angel Benalcázar Hernández;  Lap-Mou Tam;  Chin-Sheng Chen
Favorite |  | TC[WOS]:3 TC[Scopus]:3 | Submit date:2021/03/09
Smart Automation  Cyberphysical Systems  Cloud Data Protection  Cryptography  
A Cloud Image Data Protection Algorithm with Multilevel Encryption Scheme and Automated-Selection Mechanism Journal article
Applied Sciences, 2019,Page: 5146-5163
Authors:  Li, S. Y.;  Hernandez, M. A. B.;  Tam, L. M.;  Chen, C. S.
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2022/08/29
Smart automation  Cyberphysical systems  Cloud data protection  Cryptography  
Advanced Signal Processing for Personal Image Encryption on Consumer Electronics Conference paper
Proceedings of IEEE International Conference on Consumer Electronics 2019
Authors:  Li, S. Y.;  Lee, C. H.;  Chen, C. S. ;  Tam, L. M.
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2022/08/29
Signal Processing  Image Encryption  
Secure and Verifiable Outsourcing of Large-scale Nonnegative Matrix Factorization (NMF) Journal article
IEEE Transactions on Services Computing, 2019,Volume: 14,Issue: 6,Page: 1940-1953
Authors:  Jia Duan;  Jiantao Zhou;  Yuanman Li
Adobe PDF | Favorite |  | TC[WOS]:6 TC[Scopus]:6 | Submit date:2022/07/07