UM

Browse/Search Results:  1-10 of 50 Help

Selected(0)Clear Items/Page:    Sort:
Synchronization of fractional-order quaternion-valued neural networks with image encryption via event-triggered impulsive control Journal article
Zhang, Yanlin, Yang, Liqiao, Kou, Kit Ian, Liu, Yang. Synchronization of fractional-order quaternion-valued neural networks with image encryption via event-triggered impulsive control[J]. Knowledge-Based Systems, 2024, 296, 111953.
Authors:  Zhang, Yanlin;  Yang, Liqiao;  Kou, Kit Ian;  Liu, Yang
Favorite | TC[WOS]:2 TC[Scopus]:2  IF:7.2/7.4 | Submit date:2024/06/05
Event-triggered Impulsive Control  Finite-time Synchronization  Fractional-order Quaternion-valued Neural Networks  Image Encryption And Decryption  Quaternion-valued Linear Matrix Inequalities  
Recoverable Privacy-Preserving Image Classification through Noise-like Adversarial Examples Journal article
Liu, Jun, Zhou, Jiantao, Tian, Jinyu, Sun, Weiwei. Recoverable Privacy-Preserving Image Classification through Noise-like Adversarial Examples[J]. ACM Transactions on Multimedia Computing, Communications and Applications, 2024, 20(7), 216.
Authors:  Liu, Jun;  Zhou, Jiantao;  Tian, Jinyu;  Sun, Weiwei
Favorite | TC[WOS]:1 TC[Scopus]:1  IF:5.2/4.9 | Submit date:2024/06/05
Deep Neural Networks  Encryption  Image Classification  Privacy-preserving  
A novel image encryption scheme with adaptive Fourier decomposition Journal article
Wu, Yongfei, Zhang, Liming, Liu, Xilin, Zhang, Hao. A novel image encryption scheme with adaptive Fourier decomposition[J]. Journal of the Franklin Institute, 2024, 361(4), 106630.
Authors:  Wu, Yongfei;  Zhang, Liming;  Liu, Xilin;  Zhang, Hao
Favorite | TC[WOS]:3 TC[Scopus]:3  IF:3.7/3.5 | Submit date:2024/04/02
Adaptive Fourier Decomposition  Bilateral Sequence Diffusion  Image Encryption  Index-sorted Mapping  Pixel Swapping  
A Smart Image Encryption Technology via Applying Personal Information and Speaker-Verification System Journal article
Li,Shih Yu, Lee,Chun Hung, Tam,Lap Mou. A Smart Image Encryption Technology via Applying Personal Information and Speaker-Verification System[J]. Sensors, 2023, 23(13), 5906.
Authors:  Li,Shih Yu;  Lee,Chun Hung;  Tam,Lap Mou
Favorite | TC[WOS]:1 TC[Scopus]:1  IF:3.4/3.7 | Submit date:2023/08/03
Authorization  Hyper-chaotic System  Novel Image Encryption  Speaker Verification  
Exploiting Substitution Box for Cryptanalyzing Image Encryption Schemes with DNA Coding and Nonlinear Dynamics Journal article
Zhang,Chengrui, Chen,Junxin, Chen,Dongming, Wang,Wei, Zhang,Yushu, Zhou,Yicong. Exploiting Substitution Box for Cryptanalyzing Image Encryption Schemes with DNA Coding and Nonlinear Dynamics[J]. IEEE Transactions on Multimedia, 2023, 26, 1114-1128.
Authors:  Zhang,Chengrui;  Chen,Junxin;  Chen,Dongming;  Wang,Wei;  Zhang,Yushu; et al.
Favorite | TC[WOS]:4 TC[Scopus]:7  IF:8.4/8.0 | Submit date:2023/08/03
Chosen-plaintext Attack  Ciphers  Decoding  Dna  Dna Coding  Encoding  Encryption  Image Coding  Image Encryption  S-box Matrix  Security  
n-Dimensional Chaotic Map with application in secure communication Journal article
Cao, Weijia, Cai, Hang, Hua, Zhongyun. n-Dimensional Chaotic Map with application in secure communication[J]. Chaos, Solitons and Fractals, 2022, 163, 112519.
Authors:  Cao, Weijia;  Cai, Hang;  Hua, Zhongyun
Favorite | TC[WOS]:33 TC[Scopus]:40  IF:5.3/5.4 | Submit date:2022/11/07
Chaotic Map  Chaotic System  Secure Communication  Lyapunov Exponent  Image Encryption  
Reversible Data Hiding in Encrypted Images using Chunk Encryption and Redundancy Matrix Representation Journal article
Liu, Zi Long, Pun, Chi Man. Reversible Data Hiding in Encrypted Images using Chunk Encryption and Redundancy Matrix Representation[J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(2), 1382-1394.
Authors:  Liu, Zi Long;  Pun, Chi Man
Favorite | TC[WOS]:35 TC[Scopus]:44  IF:7.0/6.8 | Submit date:2022/05/17
Reversible Data Hiding  Encrypted Image  Chunk Encryption  Redundancy Matrix Representation  
Quaternion discrete fractional Krawtchouk transform and its application in color image encryption and watermarking Journal article
Xilin Liu, Yongfei Wu, Hao Zhang, Jiasong Wu, Liming Zhang. Quaternion discrete fractional Krawtchouk transform and its application in color image encryption and watermarking[J]. Signal Processing, 2021, 189, 108275.
Authors:  Xilin Liu;  Yongfei Wu;  Hao Zhang;  Jiasong Wu;  Liming Zhang
Favorite | TC[WOS]:30 TC[Scopus]:34  IF:3.4/3.8 | Submit date:2022/05/13
Color Image Encryption  Color Image Watermarking  Quaternion Discrete Fractional Krawtchouk Transform  
Inverse computational ghost imaging for image encryption Journal article
Zheng, P, Tan, Q, Liu, H.. Inverse computational ghost imaging for image encryption[J]. Optics Express, 2021, 21290-21299.
Authors:  Zheng, P;  Tan, Q;  Liu, H.
Favorite |   IF:3.2/3.4 | Submit date:2022/06/05
Ghost Imaging  Image Encryption  
Cryptanalysis of Image Ciphers with Permutation-Substitution Network and Chaos Journal article
Chen, Junxin, Chen, Lei, Zhou, Yicong. Cryptanalysis of Image Ciphers with Permutation-Substitution Network and Chaos[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2021, 31(6), 2494-2508.
Authors:  Chen, Junxin;  Chen, Lei;  Zhou, Yicong
Favorite | TC[WOS]:38 TC[Scopus]:40  IF:8.3/7.1 | Submit date:2021/12/08
Chosen-ciphertext Attack  Permutation Substitution  Bit-wise Xor  Image Encryption