UM

Browse/Search Results:  1-10 of 28 Help

Selected(0)Clear Items/Page:    Sort:
Secret Sharing Based Reversible Data Hiding in Encrypted Images with Multiple Data-Hiders Journal article
IEEE Transactions on Dependable and Secure Computing, 2022,Volume: 19,Issue: 2,Page: 978-991
Authors:  Chen, Bing;  Lu, Wei;  Huang, Jiwu;  Weng, Jian;  Zhou, Yicong
Favorite |  | TC[WOS]:3 TC[Scopus]:2 | Submit date:2022/05/17
Encrypted Images  Multiple Data-hiders  Reversible Data Hiding  Secret Sharing  
Reversible Data Hiding in Encrypted Images using Chunk Encryption and Redundancy Matrix Representation Journal article
IEEE Transactions on Dependable and Secure Computing, 2022,Volume: 19,Issue: 2,Page: 1382-1394
Authors:  Liu, Zi Long;  Pun, Chi Man
Favorite |  | TC[WOS]:3 TC[Scopus]:5 | Submit date:2022/05/17
Chunk Encryption  Encrypted Image  Redundancy Matrix Representation  Reversible Data Hiding  
Reversible Data Hiding for Color Images Based on Adaptive 3D Prediction-Error Expansion and Double Deep Q-network Journal article
IEEE Transactions on Circuits and Systems for Video Technology, 2022
Authors:  Chang, Jie;  Zhu, Guopu;  Zhang, Hongli;  Zhou, Yicong;  Luo, Xiangyang;  Wu, Ligang
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2022/05/17
Color  color images  Correlation  double deep Q-network  Histograms  Image quality  prediction-error expansion  Reinforcement learning  Reversible data hiding  Steganography  Three-dimensional displays  
Reversible Data Hiding in Encrypted Images Using Cipher-Feedback Secret Sharing Journal article
IEEE Transactions on Circuits and Systems for Video Technology, 2022
Authors:  Hua, Zhongyun;  Wang, Yanxiang;  Yi, Shuang;  Zhou, Yicong;  Jia, Xiaohua
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2022/05/17
Cipher-feedback Secret Sharing  Ciphers  Cloud Computing  Correlation  Cryptography  Encrypted Image  Homomorphic Encryption  Multiple Data Hiders  Prediction Methods  Reversible Data Hiding  Servers  
Guest Editorial: Introduction to Special Section on Modern Reversible Data Hiding and Watermarking Other
2020-08-01
Authors:  Cao, Xiaochun;  Zhou, Yicong;  Guo, Jing Ming
Favorite |  | TC[WOS]:3 TC[Scopus]:5 | Submit date:2021/12/06
First Steps Toward Concealing the Traces Left by Reversible Image Data Hiding Journal article
IEEE Transactions on Circuits and Systems II: Express Briefs, 2020,Volume: 67,Issue: 5,Page: 951-955
Authors:  Li Dong;  Jiantao Zhou;  Weiwei Sun;  Diqun Yan;  Rangding Wang
Favorite |  | TC[WOS]:1 TC[Scopus]:6 | Submit date:2021/03/11
Reversible Image Data Hiding  Embedding Traces  Concealment  
Color image reversible data hiding with double-layer embedding Journal article
IEEE Access, 2020,Volume: 8,Page: 6915-6926
Authors:  Tang,Zhenjun;  Nie,Hewang;  Pun,Chi Man;  Yao,Heng;  Yu,Chunqiang;  Zhang,Xianquan
Favorite |  | TC[WOS]:3 TC[Scopus]:5 | Submit date:2021/03/11
double-layer embedding  histogram shifting  image interpolation  inter-channel correlation  Reversible data hiding  
Reversible image reconstruction for reversible data hiding in encrypted images Journal article
Signal Processing, 2019,Volume: 161,Page: 50-62
Authors:  Liu,Zi Long;  Pun,Chi Man
Favorite |  | TC[WOS]:10 TC[Scopus]:11 | Submit date:2021/03/11
Encrypted image  Reversible data hiding  Reversible image reconstruction  
Reversible Data Hiding in Encrypted Images using Prediction-error Encoding Conference paper
IEEE International Conference on Systems, Man, and Cybernetics (SMC), Miyazaki, Japan, Japan, 7-10 Oct. 2018
Authors:  Shuang Yi;  Yicong Zhou
Favorite |  | TC[WOS]:0 TC[Scopus]:1 | Submit date:2019/03/26
Reversible Data Hiding  Encrypted Image  Prediction-error Encoding  Weighted Checkerboard-based Prediction Privacy Protection  
Separable and Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling Journal article
IEEE TRANSACTIONS ON MULTIMEDIA, 2019,Volume: 21,Issue: 1,Page: 51-64
Authors:  Yi, Shuang;  Zhou, Yicong
Favorite |  | TC[WOS]:75 TC[Scopus]:89 | Submit date:2019/01/17
Reversible Data Hiding  Encrypted Images  Parametric Binary Tree Labeling Scheme  Privacy Protection