UM

Browse/Search Results:  1-9 of 9 Help

Selected(0)Clear Items/Page:    Sort:
Selling intimacy online: The multi-modal discursive techniques of China’s female and male wanghong Journal article
Discourse, Context & Media, 2022,Volume: 47,Page: 1-10
Authors:  Sandel, T. L.;  Wang, Y
Adobe PDF | Favorite |  | TC[WOS]:1 TC[Scopus]:0 | Submit date:2022/06/16
Wanghong  Social Media  China  Multimodal Affordances  Intimacy  Selling  
English Textbook Selection in Taiwan: Voices of Two Book Sales Representatives Journal article
Education Research International, 2022,Volume: 2022
Authors:  Barry Lee Reynolds;  Xuan Van Ha;  Melissa H. Yu
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2022/06/07
Secret Sharing Based Reversible Data Hiding in Encrypted Images with Multiple Data-Hiders Journal article
IEEE Transactions on Dependable and Secure Computing, 2022,Volume: 19,Issue: 2,Page: 978-991
Authors:  Chen, Bing;  Lu, Wei;  Huang, Jiwu;  Weng, Jian;  Zhou, Yicong
Favorite |  | TC[WOS]:3 TC[Scopus]:2 | Submit date:2022/05/17
Encrypted Images  Multiple Data-hiders  Reversible Data Hiding  Secret Sharing  
Reversible Data Hiding in Encrypted Images Using Cipher-Feedback Secret Sharing Journal article
IEEE Transactions on Circuits and Systems for Video Technology, 2022
Authors:  Hua, Zhongyun;  Wang, Yanxiang;  Yi, Shuang;  Zhou, Yicong;  Jia, Xiaohua
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2022/05/17
Cipher-feedback Secret Sharing  Ciphers  Cloud Computing  Correlation  Cryptography  Encrypted Image  Homomorphic Encryption  Multiple Data Hiders  Prediction Methods  Reversible Data Hiding  Servers  
Denoising in the Dark: Privacy-Preserving Deep Neural Network-Based Image Denoising Journal article
IEEE Transactions on Dependable and Secure Computing, 2021,Volume: 18,Issue: 3,Page: 1261-1275
Authors:  Zheng, Yifeng;  Duan, Huayi;  Tang, Xiaoting;  Wang, Cong;  Zhou, Jiantao
Favorite |  | TC[WOS]:5 TC[Scopus]:6 | Submit date:2021/12/07
Cloud Computing  Deep Neural Networks  Image Denoising  Privacy Preservation  
Combination of Sharing Matrix and Image Encryption for Lossless (k, n)-Secret Image Sharing Journal article
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2017,Volume: 26,Issue: 12,Page: 5618-5631
Authors:  Bao, Long;  Yi, Shuang;  Zhou, Yicong
Favorite |  | TC[WOS]:36 TC[Scopus]:42 | Submit date:2018/10/30
Secret Image Sharing  Visual Cryptography  Sharing Matrix  Image Encryption  
Combination of Sharing Matrix and Image Encryption for Lossless (k,n)-Secret Image Sharing Journal article
IEEE Transactions on Image Processing, 2017,Volume: 26,Issue: 12,Page: 5618-5631
Authors:  Bao L.;  Yi S.;  Zhou Y.
Favorite |  | TC[WOS]:36 TC[Scopus]:42 | Submit date:2018/12/21
image encryption  Secret image sharing  sharing matrix  visual cryptography  
A novel robust video fingerprinting-watermarking hybrid scheme based on visual secret sharing Journal article
Multimedia Tools and Applications, 2015,Volume: 74,Issue: 21,Page: 9157-9174
Authors:  Liu, Xiyao;  Zhu, Yuesheng;  Sun, Ziqiang;  Diao, Mengge;  Zhang, Liming
Favorite |  | TC[WOS]:4 TC[Scopus]:5 | Submit date:2018/11/06
A lossless (2, 8)-chaos-based secret image sharing scheme Conference paper
Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics, San Diego, CA, OCT 05-08, 2014
Authors:  Bao L.;  Zhou Y.;  Chen C.L.P.
Favorite |  | TC[WOS]:1 TC[Scopus]:1 | Submit date:2018/12/21
Chaotic System  Image Encryption  Secret Image Sharing