UM

Browse/Search Results:  1-10 of 104 Help

Selected(0)Clear Items/Page:    Sort:
n-Dimensional Chaotic Map with application in secure communication Journal article
Chaos, Solitons and Fractals, 2022,Volume: 163
Authors:  Cao, Weijia;  Cai, Hang;  Hua, Zhongyun
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2022/11/07
Chaotic Map  Chaotic System  Image Encryption  Lyapunov Exponent  Secure Communication  
Algorithm-Dependent Computational Ghost Encryption and Imaging Journal article
Physical Review Applied, 2022,Volume: 18,Issue: 3
Authors:  Xiong, Jiahao;  Zheng, Peixia;  Gao, Zihan;  Liu, Hong Chao
Favorite |  | TC[WOS]:0 TC[Scopus]:1 | Submit date:2022/10/06
Computational ghost imaging encryption with a pattern compression from 3D to 0D Journal article
Optics Express, 2022,Volume: 30,Issue: 12,Page: 21866-21875
Authors:  Zheng, Peixia;  Ye, Zhiyuan;  Xiong, Jun;  Liu, Hong Chao
Favorite |  | TC[WOS]:2 TC[Scopus]:1 | Submit date:2022/08/02
Privacy-preserving and verifiable deep learning inference based on secret sharing Journal article
Neurocomputing, 2022,Volume: 483,Page: 221-234
Authors:  Duan, Jia;  Zhou, Jiantao;  Li, Yuanman;  Huang, Caishi
Adobe PDF | Favorite |  | TC[WOS]:1 TC[Scopus]:3 | Submit date:2022/05/04
Deep Learning Prediction  Deep Neural Network Inference  Privacy-preserving  Secure Multi-party Computation  Verifiable Computation  
Anti-loss-compression image encryption based on computational ghost imaging using discrete cosine transform and orthogonal patterns Journal article
Optics Express, 2022,Volume: 30,Issue: 9,Page: 14073-14087
Authors:  Liu, Yichen;  Zheng, Peixia;  Liu, Hong Chao
Favorite |  | TC[WOS]:1 TC[Scopus]:3 | Submit date:2022/05/04
Reversible Data Hiding in Encrypted Images using Chunk Encryption and Redundancy Matrix Representation Journal article
IEEE Transactions on Dependable and Secure Computing, 2022,Volume: 19,Issue: 2,Page: 1382-1394
Authors:  Liu, Zi Long;  Pun, Chi Man
Favorite |  | TC[WOS]:8 TC[Scopus]:10 | Submit date:2022/05/17
Chunk Encryption  Encrypted Image  Redundancy Matrix Representation  Reversible Data Hiding  
Sampling expansions associated with quaternion difference equations Journal article
Linear and Multilinear Algebra, 2022
Authors:  Cheng, Dong;  Kou, Kit Ian;  Xia, Yonghui;  Xu, Junfeng
Favorite |  | TC[WOS]:1 TC[Scopus]:1 | Submit date:2022/08/05
11r52  12e05  39a12  41a05  Interpolation  Quaternion Difference Equations  Quaternion Polynomials  Sampling Expansions  Tridiagonal Matrices  
Reversible Data Hiding in Encrypted Images Using Cipher-Feedback Secret Sharing Journal article
IEEE Transactions on Circuits and Systems for Video Technology, 2022,Volume: 32,Issue: 8,Page: 4968-4982
Authors:  Hua, Zhongyun;  Wang, Yanxiang;  Yi, Shuang;  Zhou, Yicong;  Jia, Xiaohua
Favorite |  | TC[WOS]:5 TC[Scopus]:4 | Submit date:2022/05/17
Cipher-feedback Secret Sharing  Ciphers  Cloud Computing  Correlation  Cryptography  Encrypted Image  Homomorphic Encryption  Multiple Data Hiders  Prediction Methods  Reversible Data Hiding  Servers  
Re-Evaluation of the Security of a Family of Image Diffusion Mechanisms Journal article
IEEE Transactions on Circuits and Systems for Video Technology, 2021,Volume: 31,Issue: 12,Page: 4747-4758
Authors:  Chen, Junxin;  Zhang, Leo Yu;  Zhou, Yicong
Favorite |  | TC[WOS]:3 TC[Scopus]:4 | Submit date:2022/01/14
Bitwise Exclusive Or  Cryptanalysis  Image Encryption  Modulo Addition  
Quaternion discrete fractional Krawtchouk transform and its application in color image encryption and watermarking Journal article
Signal Processing, 2021,Volume: 189
Authors:  Liu, Xilin;  Wu, Yongfei;  Zhang, Hao;  Wu, Jiasong;  Zhang, Liming
Favorite |  | TC[WOS]:10 TC[Scopus]:13 | Submit date:2022/05/13
Color Image Encryption  Color Image Watermarking  Quaternion Discrete Fractional Krawtchouk Transform