UM

Browse/Search Results:  1-7 of 7 Help

Selected(0)Clear Items/Page:    Sort:
Image Sharing Chain Detection VIA Sequence-To-Sequence Model Conference paper
You, Jiaxiang, Li, Yuanman, Liang, Rongqin, Tan, Yuxuan, Zhou, Jiantao, Li, Xia. Image Sharing Chain Detection VIA Sequence-To-Sequence Model[C]:Institute of Electrical and Electronics Engineers Inc., 2023, 1-5.
Authors:  You, Jiaxiang;  Li, Yuanman;  Liang, Rongqin;  Tan, Yuxuan;  Zhou, Jiantao; et al.
Favorite | TC[Scopus]:3 | Submit date:2024/02/22
Image Forensics  Online Social Networks  Seq2seq Model  Sharing Chain Detection  
Reversible Data Hiding in Encrypted Images Using Cipher-Feedback Secret Sharing Journal article
Hua, Zhongyun, Wang, Yanxiang, Yi, Shuang, Zhou, Yicong, Jia, Xiaohua. Reversible Data Hiding in Encrypted Images Using Cipher-Feedback Secret Sharing[J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2022, 32(8), 4968-4982.
Authors:  Hua, Zhongyun;  Wang, Yanxiang;  Yi, Shuang;  Zhou, Yicong;  Jia, Xiaohua
Favorite | TC[WOS]:32 TC[Scopus]:44  IF:8.3/7.1 | Submit date:2022/05/17
Reversible Data Hiding  Cipher-feedback Secret Sharing  Encrypted Image  Multiple Data Hiders  
RS-pCloud: A Peer-to-Peer Based Edge-Cloud System for Fast Remote Sensing Image Processing Conference paper
Tongzheng Sun, Jingpan Xiong, Yang Wang, Tianhui Meng, Xi Chen, Chengzhong Xu. RS-pCloud: A Peer-to-Peer Based Edge-Cloud System for Fast Remote Sensing Image Processing[C]:IEEE, 2020, 15-22.
Authors:  Tongzheng Sun;  Jingpan Xiong;  Yang Wang;  Tianhui Meng;  Xi Chen; et al.
Favorite | TC[WOS]:1 TC[Scopus]:2 | Submit date:2021/03/09
Edge-cloud Architecture  Load Sharing  Near-data Computing  Peer-to-peer  Remote Sensing Image  
Robust privacy-Preserving image sharing over online social networks (OSNs) Journal article
Weiwei Sun, JIANTAO ZHOU, SHUYUAN ZHU, YUAN YAN TANG. Robust privacy-Preserving image sharing over online social networks (OSNs)[J]. ACM Transactions on Multimedia Computing, Communications and Applications, 2018, 14(1).
Authors:  Weiwei Sun;  JIANTAO ZHOU;  SHUYUAN ZHU;  YUAN YAN TANG
Adobe PDF | Favorite | TC[WOS]:20 TC[Scopus]:25  IF:5.2/4.9 | Submit date:2021/03/11
Image Sharing  Jpeg  Online Social Networks  Privacy-preserving  
Combination of Sharing Matrix and Image Encryption for Lossless (k,n)-Secret Image Sharing Journal article
Bao L., Yi S., Zhou Y.. Combination of Sharing Matrix and Image Encryption for Lossless (k,n)-Secret Image Sharing[J]. IEEE Transactions on Image Processing, 2017, 26(12), 5618-5631.
Authors:  Bao L.;  Yi S.;  Zhou Y.
Favorite | TC[WOS]:56 TC[Scopus]:63 | Submit date:2018/12/21
Image Encryption  Secret Image Sharing  Sharing Matrix  Visual Cryptography  
Combination of Sharing Matrix and Image Encryption for Lossless (k, n)-Secret Image Sharing Journal article
Bao, Long, Yi, Shuang, Zhou, Yicong. Combination of Sharing Matrix and Image Encryption for Lossless (k, n)-Secret Image Sharing[J]. IEEE Transactions on Image Processing, 2017, 26(12), 5618-5631.
Authors:  Bao, Long;  Yi, Shuang;  Zhou, Yicong
Favorite | TC[WOS]:56 TC[Scopus]:63  IF:10.8/12.1 | Submit date:2018/10/30
Secret Image Sharing  Visual Cryptography  Sharing Matrix  Image Encryption  
A lossless (2, 8)-chaos-based secret image sharing scheme Conference paper
Bao Long, Zhou Yicong, Chen C.L.P.. A lossless (2, 8)-chaos-based secret image sharing scheme[C], 2014, 3209-3214.
Authors:  Bao Long;  Zhou Yicong;  Chen C.L.P.
Favorite | TC[WOS]:1 TC[Scopus]:1 | Submit date:2018/12/21
Chaotic System  Image Encryption  Secret Image Sharing