×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Scien... [3]
Authors
PUN CHI MAN [2]
FONG SIMON JAMES [1]
Document Type
Journal article [2]
Conference paper [1]
Date Issued
2017 [2]
2015 [1]
Language
英語English [2]
Source Publication
BDIOT2017: Proce... [1]
MULTIMEDIA TOOLS... [1]
Signal Processin... [1]
Indexed By
SCIE [2]
CPCI-S [1]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-3 of 3
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Journal Impact Factor Ascending
Journal Impact Factor Descending
Submit date Ascending
Submit date Descending
Author Ascending
Author Descending
Title Ascending
Title Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Issue Date Ascending
Issue Date Descending
A DCT-based information hiding method for network authentication
Conference paper
Wei Song, Shuanghui Zou, Yifei Tian, Chen Li, Su Sun, Simon Fong. A DCT-based information hiding method for network authentication[C]:ASSOC COMPUTING MACHINERY, 1515 BROADWAY, NEW YORK, NY 10036-9998 USA, 2017, 149-152.
Authors:
Wei Song
;
Shuanghui Zou
;
Yifei Tian
;
Chen Li
;
Su Sun
; et al.
Favorite
|
TC[WOS]:
0
TC[Scopus]:
0
|
Submit date:2019/02/13
Information Hiding
Network Authentication
Discrete Cosine Transform
Image Processing
Robust image hashing using progressive feature selection for tampering detection
Journal article
Pun, Chi-Man, Yan, Cai-Ping, Yuan, Xiao-Chen. Robust image hashing using progressive feature selection for tampering detection[J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 77(10), 11609-11633.
Authors:
Pun, Chi-Man
;
Yan, Cai-Ping
;
Yuan, Xiao-Chen
Favorite
|
TC[WOS]:
19
TC[Scopus]:
24
IF:
3.0
/
2.9
|
Submit date:2018/10/30
Robust Image Hashing
Progressive Feature Point Selection
Tampering Detection
Image Authentication
Horizontal Location-context Hashing (Hlch)
Vertical Location-context Hashing (Vlch)
Multi-scale image hashing using adaptive local feature extraction for robust tampering detection
Journal article
Yan C.-P., Pun C.-M., Yuan X.-C.. Multi-scale image hashing using adaptive local feature extraction for robust tampering detection[J]. Signal Processing, 2015, 121, 1-16.
Authors:
Yan C.-P.
;
Pun C.-M.
;
Yuan X.-C.
Favorite
|
TC[WOS]:
60
TC[Scopus]:
71
|
Submit date:2019/02/14
Adaptive Feature Point Detection
Image Authentication
Multi-scale Image Hashing
Tampering Detection