UM

Browse/Search Results:  1-3 of 3 Help

Selected(0)Clear Items/Page:    Sort:
Combination of Sharing Matrix and Image Encryption for Lossless (k,n)-Secret Image Sharing Journal article
Bao L., Yi S., Zhou Y.. Combination of Sharing Matrix and Image Encryption for Lossless (k,n)-Secret Image Sharing[J]. IEEE Transactions on Image Processing, 2017, 26(12), 5618-5631.
Authors:  Bao L.;  Yi S.;  Zhou Y.
Favorite | TC[WOS]:56 TC[Scopus]:63 | Submit date:2018/12/21
Image Encryption  Secret Image Sharing  Sharing Matrix  Visual Cryptography  
Combination of Sharing Matrix and Image Encryption for Lossless (k, n)-Secret Image Sharing Journal article
Bao, Long, Yi, Shuang, Zhou, Yicong. Combination of Sharing Matrix and Image Encryption for Lossless (k, n)-Secret Image Sharing[J]. IEEE Transactions on Image Processing, 2017, 26(12), 5618-5631.
Authors:  Bao, Long;  Yi, Shuang;  Zhou, Yicong
Favorite | TC[WOS]:56 TC[Scopus]:63  IF:10.8/12.1 | Submit date:2018/10/30
Secret Image Sharing  Visual Cryptography  Sharing Matrix  Image Encryption  
A two-stage queueing network with MAP inputs and buffer sharing Journal article
Wenhui Zhou, Zhaotong Lian, Wei Xu, Weixiang Huang. A two-stage queueing network with MAP inputs and buffer sharing[J]. Applied Mathematical Modelling, 2013, 37(6), 3736-3747.
Authors:  Wenhui Zhou;  Zhaotong Lian;  Wei Xu;  Weixiang Huang
Favorite | TC[WOS]:3 TC[Scopus]:4  IF:4.4/4.2 | Submit date:2019/08/01
Buffer Sharing  Map  Matrix Filtrate Technique  Two-stage Queueing Network