UM

Browse/Search Results:  1-3 of 3 Help

Selected(0)Clear Items/Page:    Sort:
A DCT-based information hiding method for network authentication Conference paper
Wei Song, Shuanghui Zou, Yifei Tian, Chen Li, Su Sun, Simon Fong. A DCT-based information hiding method for network authentication[C]:ASSOC COMPUTING MACHINERY, 1515 BROADWAY, NEW YORK, NY 10036-9998 USA, 2017, 149-152.
Authors:  Wei Song;  Shuanghui Zou;  Yifei Tian;  Chen Li;  Su Sun; et al.
Favorite | TC[WOS]:0 TC[Scopus]:0 | Submit date:2019/02/13
Information Hiding  Network Authentication  Discrete Cosine Transform  Image Processing  
Robust image hashing using progressive feature selection for tampering detection Journal article
Pun, Chi-Man, Yan, Cai-Ping, Yuan, Xiao-Chen. Robust image hashing using progressive feature selection for tampering detection[J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 77(10), 11609-11633.
Authors:  Pun, Chi-Man;  Yan, Cai-Ping;  Yuan, Xiao-Chen
Favorite | TC[WOS]:19 TC[Scopus]:24  IF:3.0/2.9 | Submit date:2018/10/30
Robust Image Hashing  Progressive Feature Point Selection  Tampering Detection  Image Authentication  Horizontal Location-context Hashing (Hlch)  Vertical Location-context Hashing (Vlch)  
Multi-scale image hashing using adaptive local feature extraction for robust tampering detection Journal article
Yan C.-P., Pun C.-M., Yuan X.-C.. Multi-scale image hashing using adaptive local feature extraction for robust tampering detection[J]. Signal Processing, 2015, 121, 1-16.
Authors:  Yan C.-P.;  Pun C.-M.;  Yuan X.-C.
Favorite | TC[WOS]:60 TC[Scopus]:71 | Submit date:2019/02/14
Adaptive Feature Point Detection  Image Authentication  Multi-scale Image Hashing  Tampering Detection