每週二報 報告紀錄
回首頁
帳號: 密碼:
上傳報告 登出
報告日期 論文標題 論文期刊 論文作者 報告者 分類 下載次數
2018-07-19Reversible data hiding based on multilevel histogram modification and pixel value groupingJournal of Visual Communication and Image RepresentationWenguang He , Gangqiang Xiong , Ke Zhou and Jie Cai石家碩image1
2018-07-19Generalization of the Dark Channel Prior for Single Image RestorationIEEE Transactions on Image Processing, vol. 27, no. 6, pp. 2856-2868, June 2018.Yan-Tsung Peng, Keming Cao, and Pamela C. Cosman李心瑜image7
2018-07-19Reversible data hiding based on multilevel histogram modification and pixel value groupingJournal of Visual Communication and Image RepresentationWenguang He , Gangqiang Xiong , Ke Zhou and Jie Cai石家碩image9
2018-07-12A Secure and Efficient Cloud Resource Allocation Scheme with Trust Evaluation Mechanism Based on Combinatorial Double AuctionKSII Transactions on Internet and Information Systems vol. 11, no. 9, Sep. 2017Yun-Hao Xia, Han-Shu Hong, Guo-Feng Lin, Zhi-Xin Sun周澤捷other15
2018-07-12A Secure and Efficient Cloud Resource Allocation Scheme with Trust Evaluation Mechanism Based on Combinatorial Double AuctionKSII Transactions on Internet and Information Systems vol. 11, no. 9, Sep. 2017Yun-Hao Xia, Han-Shu Hong, Guo-Feng Lin, Zhi-Xin Sun周澤捷other8
2018-07-12Enhance Embedding Capacity of Generalized Exploiting Modification Directions in Data HidingIEEE Access, Vol. 6, Dec. 2017, pp. 2169-3536Yanxiao Liu, Chingnung Yang, Qindong Sun李冠龍image14
2018-06-28High-fidelity reversible data hiding based on pixel-value-ordering and pairwise prediction-error expansion Journal of Visual Communication and Image RepresentationBo Ou, Xiaolong Li ,Jinwei Wang , Gangqiang Xiong王資猛image21
2018-06-28High payload secret hiding technology for QR codesEURASIP Journal on Image and Video Processing, Vol. 2017, No. 1, pp. 14, 2017Lin Pei-Yu, Chen Yi-Hui黄鹏程other14
2018-06-21New Framework of Reversible Data Hiding in Encrypted JPEG BitstreamsIEEE Transactions on Circuits and Systems for Video Technology, acceptedZhenxing Qian, Haisheng Xu, Xiangyang Luo, Xinpeng Zhang謝小竹image31
2018-06-21A novel two-in-one image secret sharing scheme based on perfect black visual cryptographyJournal of Real-Time Image Processing, vol.14, pp.41-50, 2016Peng Li, Ching-Nung Yang, Qian KongXiao-Shuang Liimage33
2018-06-14A reversible data hiding scheme based on prediction-error expansion using pixel-based pixel value ordering predictorArtificial Intelligence and Signal Processing Conference (AISP) 2017 Pages 219 - 223Peyman Rahmani; Gholamhossein Dastghaibyfard何思亮image32
2018-06-14Realizing secret sharing with general access structureInformation Sciences Vol. 367, pp. 209-220, 2016Lein Harn, Chingfang Hsu, Mingwu Zhang, Tingting He胡慧丹security35
2018-06-07A Deep Learning Approach for Intrusion Detection using Recurrent Neural Network( Demo)IEEE Access, vol. 5, pp. 54-61, October 2017Chuanlong Yin, Yuefei Zhu, Jinlong Fei, Xinzheng He李坤印other27
2018-06-07An efficient biometric based remote user authentication scheme for secure internet of things environmentJournal of Intelligent & Fuzzy Systems Vol. 34, pp. 1403–1410, 2018Sandip Roy, Santanu Chatterjee, and Gautam MahapatraNguyen Ngoc Tuimage34
2018-05-31Big Data Analytics Meet Graph Theory: on Effective Botnet TakedownsIEEE Network, vol. 31, Issue: 1, pp. 18–26, January/February 2017Elias Bou-Harb, Mourad Debbabi, Chadi Assi周澤捷other43
[上一頁]
1/16 頁 [下一頁]