每週二報 報告紀錄
回首頁
帳號: 密碼:
上傳報告 登出
報告日期 論文標題 論文期刊 論文作者 報告者 分類 下載次數
2019-06-20Data hiding scheme improving embedding capacity using mixed PVD and LSB on bit planeJournal of Real-Time Image ProcessingKi-Hyun Jung何明泽image13
2019-06-20Reversible data hiding based on reducing invalid shifting of pixels in histogram shiftingSignal Processing, vol. 163, pp. 238-246,  October 2019Yujie Jia, Zhaoxia Yin, Xinpeng Zhang and Yonglong Luo石家碩image12
2019-06-13Privacy Protection for E-Health Systems by Means of Dynamic Authentication and Three-Factor Key AgreementIEEE Transactions on Industrial Electronics, Vol. 65, No.3, pp. 2795-2805, Mar. 2018.Liping Zhang, Yixin Zhang, Shanyu Tang, and He Luo劉若筠security12
2019-06-13An elliptic curve cryptography based lightweight authentication scheme for smart grid communicationFuture Generation Computer Systems, Vol. 81, pp. 557-565, April 2018Khalid Mahmood, Shehzad Ashraf Chaudhry, Husnain Naqvi, Saru Kumari, Xiong Li, and Arun Kumar Sangaiah 邱蜂祐other12
2019-06-13An elliptic curve cryptography based lightweight authentication scheme for smart grid communicationFuture Generation Computer Systems, Vol. 81, pp. 557-565, April 2018Khalid Mahmood, Shehzad Ashraf Chaudhry, Husnain Naqvi, Saru Kumari, Xiong Li, and Arun Kumar Sangaiah 邱蜂祐other6
2019-06-13Reversible data hiding based on reducing invalid shifting of pixels in histogram shiftingSignal Processing, vol. 163, pp. 238-246,  October 2019Yujie Jia, Zhaoxia Yin, Xinpeng Zhang and Yonglong Luo石家碩image10
2019-06-13Privacy Protection for E-Health Systems by Means of Dynamic Authentication and Three-Factor Key AgreementIEEE Transactions on Industrial Electronics, Vol. 65, No.3, pp. 2795-2805, Mar. 2018.Liping Zhang, Yixin Zhang, Shanyu Tang, and He Luo劉若筠security7
2019-06-06An elliptic curve cryptography based lightweight authentication scheme for smart grid communicationFuture Generation Computer SystemsKhalid Mahmood, Shehzad Ashraf Chaudhry, Husnain Naqvi, Saru Kumari, Xiong Li, and Arun Kumar Sangaiah 邱蜂祐other10
2019-06-06Reversible data-hiding in encrypted images by redundant space transferInformation Sciences, Volumes 433–434, April 2018, Pages 188-203Zi-Long Liu, Chi-Man Pun 李冠龍image23
2019-06-06An elliptic curve cryptography based lightweight authentication scheme for smart grid communication - 複製Future Generation Computer SystemsKhalid Mahmood, Shehzad Ashraf Chaudhry, Husnain Naqvi, Saru Kumari, Xiong Li, and Arun Kumar Sangaiah邱蜂祐other9
2019-05-30An AMBTC compression based data hiding scheme using pixel value adjusting strategyMultidim Syst Sign Process, vol. 29, no. 4, pp. 1801-1818, 2018Aruna Malik, Geeta Sikka, Harsh K. Verma陈仪image17
2019-05-23Multi-Modal Multi-Scale Deep Learning for Large-Scale Image AnnotationIEEE Transactions on Image Processing, Vol. 28, No. 4, pp. 1720-1731, April 2019.Yu-Lei Niu, Zhi-Wu Lu, Ji-Rong Wen, Tao Xiang, and Shih-Fu Chang陳志龍other23
2019-05-23Reversible Data Hiding in Encrypted Images based on MSB Prediction and Huffman CodingarXiv preprint, arXiv:1812.09499, 2018 Youzhi Xiang, Zhaoxia Yin and Xinpeng Zhang王旭image36
2019-05-16A construction method of (t, k, n) - essential secret image sharing schemeSignal Processing: Image Communication, Vol. 65, pp. 210-220, Jul. 2018Peng Li, Zu-Quan Liu and Ching-Nung Yang謝允豪image22
2019-05-16Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed ImagesSymmetry, Vol. 10, No. 8, pp. 318 (1-17), Aug. 2018Wien Hong, Xiaoyu Zhou, Der-Chyuan Lou, Xiaoqin Huang and Cancan Peng苏国栋image36
[上一頁]
1/23 頁 [下一頁]