每週二報 報告紀錄
回首頁
帳號: 密碼:
上傳報告 登出
報告日期 論文標題 論文期刊 論文作者 報告者 分類 下載次數
2019-10-17Robust reversible data hiding scheme based on two-layer embedding strategyInformation Sciences, vol. 512, February 2020, pages 96-107Rajeev Kumar, Ki-Hyun Jung李冠龍image2
2019-10-17A Block-Based Division Reversible Data Hiding Method in Encrypted ImagesSymmetry 2017, 9(12), 308Wei-Liang Liu , Hui-Shih Leng, Chuan-Kuei Huang ,Dyi-Cheng Chen池衡晓image19
2019-10-17Robust reversible data hiding scheme based on two-layer embedding strategyInformation Sciences, vol. 512, February 2020, pages 96-107Rajeev Kumar, Ki-Hyun Jung李冠龍image18
2019-10-10A Secure Lightweight Three-Factor Authentication Scheme for IoT in Cloud Computing EnvironmentSensors, Volume 19, Issue 16 (August-2 2019)Sung Jin Yu, Ki Sung Park, Young Ho Park鄭耀主security17
2019-10-10Reversible data hiding in JPEG images based on zero coefficients and distortion cost functionMultimedia Tools and Applications (First Online: 21 August 2019)Fuqiang Di, Minqing Zhang, Fangjun Huang, Jia Liu and Yongjun Kong高锴image29
2019-10-03A New Reversible Data Hiding in Encrypted Image Based on Multi-Secret and Lightweight Cryptographic AlgorithmsIEEE Transaction on information forensics and security, Vol. 14 No. 12, December, 2019:3332-3343: Yu-Chi Chen, Tsung-Hsuan Hung and Chih-Wei Shiu陈泗盛image36
2019-10-02(t, n) multi-secret sharing scheme extended from Harn-Hsu’s schemeEURASIP Journal on Wireless Communications and Networking, 02 April 2018Tong Zhang, Xizheng Ke and Yanxiao Liu孟珂舉security29
2019-09-26A centroid based vector quantization reversible data hiding techniqueMultimedia Tools and Applications. September 2019, Volume 78, Issue 18, pp 25273–25298.Kris Manohar & The Duc Kieu李琳image23
2019-09-26High-capacity Reversible Data Hiding in Encrypted Image based on Specific Encryption ProcessSignal Processing: Image Communication (Available online 13 September 2019)De-lu Huang and Jian-jun Wang王旭image34
2019-09-26Enhanced AMBTC based data hiding method using hamming distance and pixel value differencingJournal of Information Security and Applications,vol. 49, pp. 94-103,  Augest 2019Rajeev Kumar, Dae-Soo Kim and Ki-Hyun Jung石家碩image33
2019-09-19A centroid based vector quantization reversible data hiding techniqueMultimedia Tools and Applications. September 2019, Volume 78, Issue 18, pp 25273–25298.Kris Manohar & The Duc Kieu李琳image36
2019-09-19Histogram-pair based reversible data hiding via searching for optimal four thresholdsJournal of Information Security and Applications Volume 39, April 2018, Pages 58-67Guorong Xuan, Xiaolong Li , Yun-Qingc Shi 李冠龍image34
2019-09-12Image Self-recovery with Watermark Self-embeddingSignal Processing: Image Communication, Vol. 65, pp. 11-25, Jul. 2018Wei-Liang Tai and Zi-Jun Liao苏国栋image34
2019-09-12Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement schemeFuture Generation Computer Systems Volume 100, November 2019, Pages 882-892ArezouOstad-Sharif, HamedArshad, MortezaNikooghadam, DariushAbbasinezhad-Mood鄭耀主security27
2019-09-05Cancelable Biometric······冷璐 副教授image28
[上一頁]
1/25 頁 [下一頁]