Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 276
1.
  • A Common Method of Share Au... A Common Method of Share Authentication in Image Secret Sharing
    Yan, Xuehu; Lu, Yuliang; Yang, Ching-Nung ... IEEE transactions on circuits and systems for video technology, 07/2021, Letnik: 31, Številka: 7
    Journal Article
    Recenzirano
    Odprti dostop

    Because of the importance of digital images and their extensive application to digital watermarking, block chain, access control, identity authentication, distributive storage in the cloud and so on, ...
Celotno besedilo
Dostopno za: IJS, NUK, UL

PDF
2.
  • Robust Reversible Watermark... Robust Reversible Watermarking in Encrypted Image With Secure Multi-Party Based on Lightweight Cryptography
    Xiong, Lizhi; Han, Xiao; Yang, Ching-Nung ... IEEE transactions on circuits and systems for video technology, 2022-Jan., 2022-1-00, 20220101, Letnik: 32, Številka: 1
    Journal Article
    Recenzirano

    With the rapid development of network media, increasing research on reversible watermarking has focused on improving its robustness to resisting attacks during digital media transmission. There are ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
3.
  • Effective and Efficient Glo... Effective and Efficient Global Context Verification for Image Copy Detection
    Zhili Zhou; Yunlong Wang; Wu, Q. M. Jonathan ... IEEE transactions on information forensics and security, 2017-Jan., 2017-1-00, 20170101, Letnik: 12, Številka: 1
    Journal Article
    Recenzirano

    To detect illegal copies of copyrighted images, recent copy detection methods mostly rely on the bag-of-visual-words (BOW) model, in which local features are quantized into visual words for image ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
4.
  • Blockchain-Based Secure and... Blockchain-Based Secure and Efficient Secret Image Sharing with Outsourcing Computation in Wireless Networks
    Zhou, Zhili; Wan, Yao; Cui, Qi ... IEEE transactions on wireless communications, 01/2024, Letnik: 23, Številka: 1
    Journal Article
    Recenzirano

    Secret Image Sharing (SIS) is the technology that shares any given secret image by generating and distributing n shadow images in the way that any subset of k shadow images can restore the secret ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
5.
  • Transform Domain-Based Inve... Transform Domain-Based Invertible and Lossless Secret Image Sharing With Authentication
    Xiong, Lizhi; Zhong, Xinwei; Yang, Ching-Nung ... IEEE transactions on information forensics and security, 2021, Letnik: 16
    Journal Article
    Recenzirano

    Secret Image Sharing (SIS) as a secure data sharing scheme in multiple cover images, has become an increasing researchers' concern. In traditional SIS, the cover image can't be recovered losslessly. ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
6.
  • Enabling Semantic Search Ba... Enabling Semantic Search Based on Conceptual Graphs over Encrypted Outsourced Data
    Fu, Zhangjie; Huang, Fengxiao; Sun, Xingming ... IEEE transactions on services computing, 09/2019, Letnik: 12, Številka: 5
    Journal Article
    Recenzirano

    Currently, searchable encryption is a hot topic in the field of cloud computing. The existing achievements are mainly focused on keyword-based search schemes, and almost all of them depend on ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
7.
  • On the Analysis and Design ... On the Analysis and Design of Visual Cryptography With Error Correcting Capability
    Yang, Ching-Nung; Yang, Yi-Yun IEEE transactions on circuits and systems for video technology, 06/2021, Letnik: 31, Številka: 6
    Journal Article
    Recenzirano

    A (<inline-formula> <tex-math notation="LaTeX">k </tex-math></inline-formula>, <inline-formula> <tex-math notation="LaTeX">n </tex-math></inline-formula>) visual cryptographic scheme (VCS) shares a ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
8.
  • Property Analysis of XOR-Ba... Property Analysis of XOR-Based Visual Cryptography
    YANG, Ching-Nung; WANG, Dao-Shun IEEE transactions on circuits and systems for video technology, 02/2014, Letnik: 24, Številka: 2
    Journal Article
    Recenzirano

    A (k,n) visual cryptographic scheme (VCS) encodes a secret image into n shadow images (printed on transparencies) distributed among n participants. When any k participants superimpose their ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
9.
Celotno besedilo
Dostopno za: CEKLJ, EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OBVAL, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
10.
  • Reversible Data Hiding in S... Reversible Data Hiding in Shared Images Based on Syndrome Decoding and Homomorphism
    Xiong, Lizhi; Han, Xiao; Yang, Ching-Nung ... IEEE transactions on cloud computing, 07/2023, Letnik: 11, Številka: 3
    Journal Article
    Recenzirano

    Reversible Data Hiding in Encrypted Images (RDHEI) has drawn increasing concern in multimedia cloud computing scenarios. It embeds secret message into the encrypted carrier while preserving the ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
1 2 3 4 5
zadetkov: 276

Nalaganje filtrov