每週二報 報告紀錄
回首頁
帳號: 密碼:
上傳報告 登出
報告日期 論文標題 論文期刊 論文作者 報告者 分類 下載次數
2017-08-03Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategySignal Processing, Vol. 138, pp. 280-293, September 2017Chuan Qin, Ping Ji, Xinpeng Zhang, Jing Dong, Jinwei Wang林佳隆image32
2017-06-29 Signed digit data hiding schemeInformation Processing Letters 116 (2016) 183–191 Wen-ChungKuo, Chun-ChengWang, Hong-ChingHou曾群丰image43
2017-06-29HCP: A Flexible CNN Framework for Multi-Label Image ClassificationIEEE Transactions on Pattern Analysis & Machine IntelligenceWei Y, Wei X, Lin M, et al.谭洁帆other72
2017-06-22Histogram Shifting in Encrypted Images with Public Key Cryptosystem for Reversible Data Hiding Signal Processing, Vol. 130, 2017: 190-196.Ming Li , Yang Li 謝小竹image40
2017-06-22QR Code Authentication with Embedded Message Authentication CodeMobile Networks and Applications, pp. 1-12, 2016. (published online: 17 Nov. 2016)Changsheng Chen黃鵬程other41
2017-06-15A novel data hiding for color images based on pixel value difference and modulus functionMultimed Tools and Application, vol. 74, February 2015, pp. 707 – 728Shuyuan Shen, Lihong Huang and Qinglong Tian權勤皓image30
2017-06-15A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility NetworksWireless Personal Communications, ahead of print, online 19 May 2017Vanga Odelu, Soumya Banerjee, Ashok Kumar Das, Samiran Chattopadhyay, Saru Kumari, Xiong Li, Adrijit GoswamiNguyen Ngoc Tusecurity37
2017-06-08t-Closeness through Microaggregation Strict Privacy with Enhanced Utility PreservationIEEE Transactions on Knowledge and Data Engineering, Vol.27, No. 11, Nov. 2015Jordi Soria-Comas, Josep Domingo-Ferrer, David Sanchez, and Sergio Martinez王榮other53
2017-06-08Reversible data hiding for encrypted signals by homomorphic encryption and signal energy transferJ. Vis. Commun. Image R. 41 (2016) 58–64Xiaotian Wu , Bing Chen , Jian Weng汤然image56
2017-06-01Image camouflage by reversible image transformationJournal of Visual Communication and Image Representation, 2016Dongdong Hou, Weiming Zhang, Nenghai Yu林佳隆image58
2017-06-01Provably Secure Authenticated Key Agreement Scheme for Distributed Mobile Cloud Computing ServicesFuture Generation Computer Systems, Vol. 68, pp. 74-88, 2017Vanga Odelu, Ashok Kumar Das, Saru Kumari, Xinyi Huang and Mohammad Wazid吳曉玲security55
2017-05-25Cost-aware Pre-training for Multiclass Cost-sensitive Deep LearningComputer ScienceYuan C, Lin H T, Yang S W譚潔帆other51
2017-05-25A Two Stage Data Hiding Scheme with High Capacity Based on Interpolation and Difference ExpansionProcedia Technology 24 ( 2016 ) 1311 – 1316 Sabeen Govind P.V , Sajil M. K, Bindiya M. Varghese曾群丰image45
2017-05-18Data hiding in encrypted images based on predefined watermark embedding before encryption processSignal Processing:ImageCommunication47(2016)263–270Dalel Bouslimi , Gouenou Coatrieux, Michel Cozic, Christian RouxRu-Xang Chengimage55
2017-05-18A data hiding scheme using pixel value differencing and improving exploiting modification directionsComputer and Security, Volume 48, Feb 2015, Pages 131-141Shu-Yuan Shen, Li-Hong Huang李俊億image68
[上一頁]
1/10 頁 [下一頁]