×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Scie... [48]
INSTITUTE OF COL... [2]
Authors
ZHOU YICONG [36]
CHEN CHUN LUNG ... [12]
ZHOU JIANTAO [12]
PUN CHI MAN [5]
LIU HONGCHAO [5]
IAN HOU [2]
More...
Document Type
Journal article [46]
Conference pape... [21]
Patent [2]
Project [1]
Date Issued
2022 [3]
2021 [8]
2020 [6]
2019 [1]
2018 [6]
2017 [11]
More...
Language
英語English [69]
Source Publication
Signal Processin... [8]
Information Scie... [7]
Conference Proce... [5]
IEEE Transaction... [4]
Optics Express [3]
SIGNAL PROCESSIN... [3]
More...
Indexed By
SCIE [49]
CPCI-S [4]
CPCI [1]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-10 of 70
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Issue Date Ascending
Issue Date Descending
Author Ascending
Author Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Submit date Ascending
Submit date Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
Title Ascending
Title Descending
Anti-loss-compression image encryption based on computational ghost imaging using discrete cosine transform and orthogonal patterns
Journal article
Optics Express, 2022,Volume: 30,Issue: 9,Page: 14073-14087
Authors:
Liu, Yichen
;
Zheng, Peixia
;
Liu, Hong Chao
Favorite
|
|
TC[WOS]:
0
TC[Scopus]:
0
|
Submit date:2022/05/04
Reversible Data Hiding in Encrypted Images using Chunk Encryption and Redundancy Matrix Representation
Journal article
IEEE Transactions on Dependable and Secure Computing, 2022,Volume: 19,Issue: 2,Page: 1382-1394
Authors:
Liu, Zi Long
;
Pun, Chi Man
Favorite
|
|
TC[WOS]:
3
TC[Scopus]:
5
|
Submit date:2022/05/17
chunk encryption
encrypted image
redundancy matrix representation
Reversible data hiding
Reversible Data Hiding in Encrypted Images Using Cipher-Feedback Secret Sharing
Journal article
IEEE Transactions on Circuits and Systems for Video Technology, 2022
Authors:
Hua, Zhongyun
;
Wang, Yanxiang
;
Yi, Shuang
;
Zhou, Yicong
;
Jia, Xiaohua
Favorite
|
|
TC[WOS]:
0
TC[Scopus]:
0
|
Submit date:2022/05/17
cipher-feedback secret sharing
Ciphers
Cloud computing
Correlation
Cryptography
encrypted image
Homomorphic encryption
multiple data hiders
Prediction methods
Reversible data hiding
Servers
Re-Evaluation of the Security of a Family of Image Diffusion Mechanisms
Journal article
IEEE Transactions on Circuits and Systems for Video Technology, 2021,Volume: 31,Issue: 12,Page: 4747-4758
Authors:
Chen, Junxin
;
Zhang, Leo Yu
;
Zhou, Yicong
Favorite
|
|
TC[WOS]:
1
TC[Scopus]:
1
|
Submit date:2022/01/14
Bitwise Exclusive Or
Cryptanalysis
Image Encryption
Modulo Addition
Quaternion discrete fractional Krawtchouk transform and its application in color image encryption and watermarking
Journal article
Signal Processing, 2021,Volume: 189
Authors:
Liu, Xilin
;
Wu, Yongfei
;
Zhang, Hao
;
Wu, Jiasong
;
Zhang, Liming
Favorite
|
|
TC[WOS]:
2
TC[Scopus]:
4
|
Submit date:2022/05/13
Color image encryption
Color image watermarking
Quaternion discrete fractional Krawtchouk transform
Inverse computational ghost imaging for image encryption
Journal article
Optics Express, 2021,Volume: 29,Issue: 14,Page: 21290-21299
Authors:
Zheng, Peixia
;
Tan, Qilong
;
Liu, Hong-chao
Favorite
|
|
TC[WOS]:
1
TC[Scopus]:
3
|
Submit date:2021/11/30
Visually secure image encryption using adaptive-thresholding sparsification and parallel compressive sensing
Journal article
Signal Processing, 2021,Volume: 183
Authors:
Hua, Zhongyun
;
Zhang, Kuiyuan
;
Li, Yuanman
;
Zhou, Yicong
Favorite
|
|
TC[WOS]:
12
TC[Scopus]:
16
|
Submit date:2021/12/08
Image Compression
Image Security
Parallel Compressive Sensing
Separable Wavelet Transform
Cryptanalysis of Image Ciphers with Permutation-Substitution Network and Chaos
Journal article
IEEE Transactions on Circuits and Systems for Video Technology, 2021,Volume: 31,Issue: 6,Page: 2494-2508
Authors:
Chen, Junxin
;
Chen, Lei
;
Zhou, Yicong
Favorite
|
|
TC[WOS]:
8
TC[Scopus]:
7
|
Submit date:2021/12/08
Bit-wise Xor
Chosen-ciphertext Attack
Image Encryption
Permutation Substitution
Metasurface-based key for computational imaging encryption
Journal article
Science Advances, 2021,Volume: 7,Issue: 21
Authors:
Zheng, Peixia
;
Dai, Qi
;
Li, Zile
;
Ye, Zhiyuan
;
Xiong, Jun
;
Liu, Hong Chao
;
Zheng, Guoxing
;
Zhang, Shuang
Favorite
|
|
TC[WOS]:
28
TC[Scopus]:
26
|
Submit date:2021/11/30
Content-adaptive image encryption with partial unwinding decomposition
Journal article
Signal Processing, 2021,Volume: 181
Authors:
Wu, Yongfei
;
Zhang, Liming
;
Qian, Tao
;
Liu, Xilin
;
Xie, Qiwei
Favorite
|
|
TC[WOS]:
5
TC[Scopus]:
6
|
Submit date:2021/12/07
Image Encryption
Image-content-adaptive Encryption
Information Security
Partial Unwinding Decomposition