UM

Browse/Search Results:  1-10 of 14 Help

Selected(0)Clear Items/Page:    Sort:
IID-Net: Image Inpainting Detection Network via Neural Architecture Search and Attention Journal article
IEEE Transactions on Circuits and Systems for Video Technology, 2022,Volume: 32,Issue: 3,Page: 1172-1185
Authors:  Wu, Haiwei;  Zhou, Jiantao
Adobe PDF | Favorite |  | TC[WOS]:4 TC[Scopus]:4 | Submit date:2022/03/28
Deep Neural Networks  Generalizability  Inpainting Forensics  
Computation Outsourcing Meets Lossy Channel: Secure Sparse Robustness Decoding Service in Multi-Clouds Journal article
IEEE Transactions on Big Data, 2021,Volume: 7,Issue: 4,Page: 717-728
Authors:  Yushu Zhang;  Jiantao Zhou;  Yong Xiang;  Leo Yu Zhang;  Fei Chen;  Shaoning Pang;  Xiaofeng Liao
Adobe PDF | Favorite |  | TC[WOS]:5 TC[Scopus]:5 | Submit date:2019/04/16
Parallel Compressive Sensing  Sparse Robustness Decoding Service  Packet-loss  Cloud Computing  
Robust High-Capacity Watermarking over Online Social Network Shared Images Journal article
IEEE Transactions on Circuits and Systems for Video Technology, 2021,Volume: 31,Issue: 3,Page: 1208-1221
Authors:  Sun, Weiwei;  Zhou, Jiantao;  Li, Yuanman;  Cheung, Ming;  She, James
Adobe PDF | Favorite |  | TC[WOS]:7 TC[Scopus]:14 | Submit date:2021/12/07
Dct Domain  Deep Convolutional Neural Network  Image Watermarking  Online Social Networks  
First Steps Toward Concealing the Traces Left by Reversible Image Data Hiding Journal article
IEEE Transactions on Circuits and Systems II: Express Briefs, 2020,Volume: 67,Issue: 5,Page: 951-955
Authors:  Li Dong;  Jiantao Zhou;  Weiwei Sun;  Diqun Yan;  Rangding Wang
Adobe PDF | Favorite |  | TC[WOS]:2 TC[Scopus]:7 | Submit date:2021/03/11
Reversible Image Data Hiding  Embedding Traces  Concealment  
Reversible data-hiding in encrypted images by redundant space transfer Journal article
Information Sciences, 2017,Volume: 433,Page: 188-203
Authors:  Zi-Long Liu;  Chi-Man Pun
Favorite |  | TC[WOS]:63 TC[Scopus]:80 | Submit date:2019/07/30
Reversible Data Hiding  Encrypted Image  Redundant Space Transfer  
Adaptive image encryption for high capacity reversible data hiding Conference paper
2017 IEEE Conference on Dependable and Secure Computing, Taipei, Taiwan, August 7—10, 2017
Authors:  Choi K.-C.;  Pun C.-M.
Favorite |  | TC[WOS]:1 TC[Scopus]:1 | Submit date:2019/02/14
Burrow's-wheeler Transform  Generalized Integer Transform  Image Encryption  Lossless Data Hiding  
Difference Expansion Based Robust Reversible Watermarking with Region Filtering Conference paper
Proceedings - Computer Graphics, Imaging and Visualization: New Techniques and Trends, CGiV 2016, Beni Mellal City, MOROCCO, MAR 29-APR 01, 2016
Authors:  Choi K.-C.;  Pun C.-M.
Favorite |  | TC[WOS]:2 TC[Scopus]:3 | Submit date:2019/02/14
Bit Plane  Lossless Data Hiding  Reversible Watermarking  Robust  Threshold  
Robust coding of encrypted images via structural matrix Journal article
Signal Processing: Image Communication, 2015,Volume: 39,Page: 202-211
Authors:  Yushu Zhang;  Kwok-Wo Wong;  Leo Yu Zhang;  Wenying Wen;  Jiantao Zhou;  Xing He
Adobe PDF | Favorite |  | TC[WOS]:16 TC[Scopus]:20 | Submit date:2018/12/22
Multiple Description Code  Packet Loss  Robust Coding Of Encrypted Image  Structural Matrix  
Robust lossless digital watermarking using integer transform with Bit plane manipulation Journal article
Multimedia Tools and Applications, 2015,Volume: 75,Issue: 11,Page: 6621-6645
Authors:  Choi K.-C.;  Pun C.-M.
Favorite |  | TC[WOS]:5 TC[Scopus]:6 | Submit date:2019/02/14
Bit Plane  Generalized Integer Transform  Lossless Data Hiding  Robust Reversible Watermarking  Threshold  
Secure reversible image data hiding over encrypted domain via key modulation Journal article
IEEE Transactions on Circuits and Systems for Video Technology, 2015,Volume: 26,Issue: 3,Page: 441-452
Authors:  Jiantao Zhou;  Weiwei Sun;  Li Dong;  Xianming Liu;  Oscar C. Au;  Yuan Yan Tang
Adobe PDF | Favorite |  | TC[WOS]:116 TC[Scopus]:153 | Submit date:2021/03/11
Feature Extraction  Reversible Image Data Hiding (Ridh)  Signal Processing Over Encrypted Domain  Svm