UM

Browse/Search Results:  1-9 of 9 Help

Selected(0)Clear Items/Page:    Sort:
Robust Image Forgery Detection over Online Social Network Shared Images Conference paper
New Orleans, Louisiana, 2022-07-19
Authors:  Haiwei Wu;  Jiantao Zhou;  Jinyu Tian;  Jun Liu
Adobe PDF | Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2022/07/07
IID-Net: Image Inpainting Detection Network via Neural Architecture Search and Attention Journal article
IEEE Transactions on Circuits and Systems for Video Technology, 2022,Volume: 32,Issue: 3,Page: 1172-1185
Authors:  Wu, Haiwei;  Zhou, Jiantao
Adobe PDF | Favorite |  | TC[WOS]:1 TC[Scopus]:1 | Submit date:2022/03/28
Deep Neural Networks  Generalizability  Inpainting Forensics  
Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs Journal article
IEEE Transactions on Cloud Computing, 2022,Volume: 10,Issue: 2,Page: 1215-1232
Authors:  Gu, Ke;  Dong, Xin Ying;  Jia, Wei Jia
Favorite |  | TC[WOS]:14 TC[Scopus]:8 | Submit date:2022/08/05
data security  fog computing  Malicious node  reputation  VANETs  
A novel visual analysis method of food safety risk traceability based on blockchain Journal article
International Journal of Environmental Research and Public Health, 2020,Volume: 17,Issue: 7
Authors:  Hao,Zhihao;  Mao,Dianhui;  Zhang,Bob;  Zuo,Min;  Zhao,Zhihua
Favorite |  | TC[WOS]:16 TC[Scopus]:24 | Submit date:2021/03/11
Blockchain  Food Safety  Risk  Traceability  Visualization  
Multi-Scale Difference Map Fusion for Tamper Localization Using Binary Ranking Hashing Conference paper
IEEE Transactions on Information Forensics and Security, Hong Kong, China, 2018-12
Authors:  Yan, Cai-Ping;  Pun, Chi-Man
Favorite |  | TC[WOS]:17 TC[Scopus]:20 | Submit date:2019/07/30
Image Hashing  Tamper Detection  Multi-scale Fusion  Manifold Ranking  Quaternion Fourier-mellin Moments  Quaternion Fourier Transform  
Robust image hashing using progressive feature selection for tampering detection Journal article
MULTIMEDIA TOOLS AND APPLICATIONS, 2017,Volume: 77,Issue: 10,Page: 11609-11633
Authors:  Pun, Chi-Man;  Yan, Cai-Ping;  Yuan, Xiao-Chen
Favorite |  | TC[WOS]:14 TC[Scopus]:15 | Submit date:2018/10/30
Robust Image Hashing  Progressive Feature Point Selection  Tampering Detection  Image Authentication  Horizontal Location-context Hashing (Hlch)  Vertical Location-context Hashing (Vlch)  
Multi-Scale Difference Map Fusion for Tamper Localization Using Binary Ranking Hashing Journal article
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017,Volume: 12,Issue: 9,Page: 2144-2158
Authors:  Yan, Cai-Ping;  Pun, Chi-Man
Favorite |  | TC[WOS]:17 TC[Scopus]:20 | Submit date:2018/10/30
Image Hashing  Tamper Detection  Multi-scale Fusion  Manifold Ranking  Quaternion Fourier-mellin Moments  Quaternion Fourier Transform  
Segmentation-based Image Hash for Precise Tamper Localization Conference paper
Proceedings of the World Congress on Internet Security, 2017, University of Cambridge, UK, 2017-12-11
Authors:  Yan, Cai-Ping;  Pun, Chi-Man
Favorite |  | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/05/24
A Review of Compressive Sensing in Information Security Field Journal article
IEEE Access, 2016,Volume: 4,Page: 2507 - 2519
Authors:  YUSHU ZHANG;  LEO YU ZHANG;  JIANTAO ZHOU;  LICHENG LIU;  FEI CHEN;  XING HE
Adobe PDF | Favorite |  | TC[WOS]:128 TC[Scopus]:141 | Submit date:2019/04/16
Compressive Sensing  Theoretical Security  Application Security  Image Cipher  Chaos  Optics