UM

Browse/Search Results:  1-4 of 4 Help

Selected(0)Clear Items/Page:    Sort:
Reversible Data Hiding in Encrypted Images Using Cipher-Feedback Secret Sharing Journal article
Hua, Zhongyun, Wang, Yanxiang, Yi, Shuang, Zhou, Yicong, Jia, Xiaohua. Reversible Data Hiding in Encrypted Images Using Cipher-Feedback Secret Sharing[J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2022, 32(8), 4968-4982.
Authors:  Hua, Zhongyun;  Wang, Yanxiang;  Yi, Shuang;  Zhou, Yicong;  Jia, Xiaohua
Favorite | TC[WOS]:32 TC[Scopus]:44  IF:8.3/7.1 | Submit date:2022/05/17
Reversible Data Hiding  Cipher-feedback Secret Sharing  Encrypted Image  Multiple Data Hiders  
Combination of Sharing Matrix and Image Encryption for Lossless (k, n)-Secret Image Sharing Journal article
Bao, Long, Yi, Shuang, Zhou, Yicong. Combination of Sharing Matrix and Image Encryption for Lossless (k, n)-Secret Image Sharing[J]. IEEE Transactions on Image Processing, 2017, 26(12), 5618-5631.
Authors:  Bao, Long;  Yi, Shuang;  Zhou, Yicong
Favorite | TC[WOS]:56 TC[Scopus]:63  IF:10.8/12.1 | Submit date:2018/10/30
Secret Image Sharing  Visual Cryptography  Sharing Matrix  Image Encryption  
Combination of Sharing Matrix and Image Encryption for Lossless (k,n)-Secret Image Sharing Journal article
Bao L., Yi S., Zhou Y.. Combination of Sharing Matrix and Image Encryption for Lossless (k,n)-Secret Image Sharing[J]. IEEE Transactions on Image Processing, 2017, 26(12), 5618-5631.
Authors:  Bao L.;  Yi S.;  Zhou Y.
Favorite | TC[WOS]:56 TC[Scopus]:63 | Submit date:2018/12/21
Image Encryption  Secret Image Sharing  Sharing Matrix  Visual Cryptography  
A lossless (2, 8)-chaos-based secret image sharing scheme Conference paper
Bao Long, Zhou Yicong, Chen C.L.P.. A lossless (2, 8)-chaos-based secret image sharing scheme[C], 2014, 3209-3214.
Authors:  Bao Long;  Zhou Yicong;  Chen C.L.P.
Favorite | TC[WOS]:1 TC[Scopus]:1 | Submit date:2018/12/21
Chaotic System  Image Encryption  Secret Image Sharing