UM

Browse/Search Results:  1-6 of 6 Help

Selected(0)Clear Items/Page:    Sort:
Secret Sharing Based Reversible Data Hiding in Encrypted Images with Multiple Data-Hiders Journal article
Chen, Bing, Lu, Wei, Huang, Jiwu, Weng, Jian, Zhou, Yicong. Secret Sharing Based Reversible Data Hiding in Encrypted Images with Multiple Data-Hiders[J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(2), 978-991.
Authors:  Chen, Bing;  Lu, Wei;  Huang, Jiwu;  Weng, Jian;  Zhou, Yicong
Favorite | TC[WOS]:37 TC[Scopus]:55  IF:7.0/6.8 | Submit date:2022/05/17
Encrypted Images  Multiple Data-hiders  Reversible Data Hiding  Secret Sharing  
Reversible Data Hiding in Encrypted Images Using Cipher-Feedback Secret Sharing Journal article
Hua, Zhongyun, Wang, Yanxiang, Yi, Shuang, Zhou, Yicong, Jia, Xiaohua. Reversible Data Hiding in Encrypted Images Using Cipher-Feedback Secret Sharing[J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2022, 32(8), 4968-4982.
Authors:  Hua, Zhongyun;  Wang, Yanxiang;  Yi, Shuang;  Zhou, Yicong;  Jia, Xiaohua
Favorite | TC[WOS]:32 TC[Scopus]:44  IF:8.3/7.1 | Submit date:2022/05/17
Reversible Data Hiding  Cipher-feedback Secret Sharing  Encrypted Image  Multiple Data Hiders  
Privacy-Preserving distributed deep learning based on secret sharing Journal article
Jia Duan, Jiantao Zhou, Yuanman Li. Privacy-Preserving distributed deep learning based on secret sharing[J]. Information Sciences, 2020, 527, 108-127.
Authors:  Jia Duan;  Jiantao Zhou;  Yuanman Li
Adobe PDF | Favorite | TC[WOS]:31 TC[Scopus]:37  IF:0/0 | Submit date:2021/03/11
Deep Neural Network  Distributed Deep Learning  Privacy Preserving  Secret Sharing  Secure Multi-party Computation  
Combination of Sharing Matrix and Image Encryption for Lossless (k,n)-Secret Image Sharing Journal article
Bao L., Yi S., Zhou Y.. Combination of Sharing Matrix and Image Encryption for Lossless (k,n)-Secret Image Sharing[J]. IEEE Transactions on Image Processing, 2017, 26(12), 5618-5631.
Authors:  Bao L.;  Yi S.;  Zhou Y.
Favorite | TC[WOS]:56 TC[Scopus]:63 | Submit date:2018/12/21
Image Encryption  Secret Image Sharing  Sharing Matrix  Visual Cryptography  
Combination of Sharing Matrix and Image Encryption for Lossless (k, n)-Secret Image Sharing Journal article
Bao, Long, Yi, Shuang, Zhou, Yicong. Combination of Sharing Matrix and Image Encryption for Lossless (k, n)-Secret Image Sharing[J]. IEEE Transactions on Image Processing, 2017, 26(12), 5618-5631.
Authors:  Bao, Long;  Yi, Shuang;  Zhou, Yicong
Favorite | TC[WOS]:56 TC[Scopus]:63  IF:10.8/12.1 | Submit date:2018/10/30
Secret Image Sharing  Visual Cryptography  Sharing Matrix  Image Encryption  
A lossless (2, 8)-chaos-based secret image sharing scheme Conference paper
Bao Long, Zhou Yicong, Chen C.L.P.. A lossless (2, 8)-chaos-based secret image sharing scheme[C], 2014, 3209-3214.
Authors:  Bao Long;  Zhou Yicong;  Chen C.L.P.
Favorite | TC[WOS]:1 TC[Scopus]:1 | Submit date:2018/12/21
Chaotic System  Image Encryption  Secret Image Sharing