Zobrazeno 1 - 10
of 54
pro vyhledávání: '"Song‐Yu Wu"'
Autor:
Song‐Yu Wu, Ya‐Xi Ye, Qing Zhang, Qian‐Jin Kang, Zhu‐Min Xu, Shen‐Zhen Ren, Fan Lin, Yong‐Tao Duan, Hao‐Jun Xu, Zi‐Yi Hu, Sui‐Sui Yang, Hai‐Liang Zhu, Mei‐Juan Zou, Zhong‐Chang Wang
Publikováno v:
Advanced Science. 10:2203742
Photodynamic therapy (PDT) under hypoxic conditions and drug resistance in chemotherapy are perplexing problems in anti-tumor treatment. In addition, central nervous system neoplasm-targeted nanoplatforms are urgently required. To address these issue
Publikováno v:
Multimedia Tools and Applications. 78:18595-18616
Recently, Jana et al. proposed the partial reversible data hiding (PRDH) based on (7, 4) Hamming code, which deals with three images: the original image (OI), the cover image (CI), and the stego image (SI). The CI is obtained by slightly modifying OI
Publikováno v:
Journal of Visual Communication and Image Representation. 55:766-777
In ( k , n ) progressive secret image sharing (PSIS) schemes, a secret image is shared into n shadows in such way that: (1) fewer than k - 1 shadows get no information on the secret image; (2) k to n shadows can progressively recover the secret image
Publikováno v:
Signal Processing: Image Communication. 66:77-86
( k , n ) progressive secret image sharing (PSIS) schemes were discussed frequently in recent years. A ( k , n ) PSIS scheme consists of sharing phase and reconstruction phase. During sharing phase, a secret image is encrypted into n image-shadows; w
Publikováno v:
2019 IEEE 4th International Conference on Big Data Analytics (ICBDA).
The first step in online shopping is, apparently, to choose a reliable supplier. However, consumers and merchants may have different perceptions of product quality, and this may result in business disputes. The dispute about buying inferior goods may
Autor:
Song-Yu Wu, 吳嵩裕
107
Data hiding (DH) technology is an important research field that combines cryptography and digital multimedia processing. DH can be widely used in multimedia, especially digital images. Error correcting code (ECC) based DH can is increase emb
Data hiding (DH) technology is an important research field that combines cryptography and digital multimedia processing. DH can be widely used in multimedia, especially digital images. Error correcting code (ECC) based DH can is increase emb
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/c6q7fq
Publikováno v:
2018 International Conference on Cloud Computing, Big Data and Blockchain (ICCBB).
A well-known $(k,\,n)$ secret image sharing (SIS) scheme is the threshold scheme to share a secret image into $n$ shadow images, and the secret image can be recovered from any $k$ shadow images. And, fewer than shadow images get nothing on the secret
Publikováno v:
2018 IEEE 18th International Conference on Communication Technology (ICCT).
In wireless sensor network (WSN), a secure link in the key pre-distribution (KP) scheme may be compromised when sensor nodes are captured. Accordingly, the KP q- composite scheme was proposed to tackle this node-capture problem. Recently, Bechkit et
Publikováno v:
2018 2nd IEEE Advanced Information Management,Communicates,Electronic and Automation Control Conference (IMCEC).
R261, Jana et al. proposed the partial reversible data hiding (PRDH) based on (7, 4) Hamming code, which deals with three images: the original image (OI), the cover image (CI), and the stego image (SI). The CI is obtained by slightly modifying OI. Af