Search Results - "Yu, Nenghai"

Refine Results
  1. 1

    Reversibility improved data hiding in encrypted images by Zhang, Weiming, Ma, Kede, Yu, Nenghai

    Published in Signal processing (01-01-2014)
    “…A novel reversible data hiding technique in encrypted images is presented in this paper. Instead of embedding data in encrypted images directly, some pixels…”
    Get full text
    Journal Article
  2. 2

    StyleBank: An Explicit Representation for Neural Image Style Transfer by Dongdong Chen, Lu Yuan, Jing Liao, Nenghai Yu, Gang Hua

    “…We propose StyleBank, which is composed of multiple convolution filter banks and each filter bank explicitly represents one style, for neural image style…”
    Get full text
    Conference Proceeding
  3. 3

    Recursive Histogram Modification: Establishing Equivalency Between Reversible Data Hiding and Lossless Data Compression by Zhang, Weiming, Hu, Xiaocheng, Li, Xiaolong, Yu, Nenghai

    Published in IEEE transactions on image processing (01-07-2013)
    “…State-of-the-art schemes for reversible data hiding (RDH) usually consist of two steps: first construct a host sequence with a sharp histogram via prediction…”
    Get full text
    Journal Article
  4. 4

    Learning Spatial Regularization with Image-Level Supervisions for Multi-label Image Classification by Feng Zhu, Hongsheng Li, Wanli Ouyang, Nenghai Yu, Xiaogang Wang

    “…Multi-label image classification is a fundamental but challenging task in computer vision. Great progress has been achieved by exploiting semantic relations…”
    Get full text
    Conference Proceeding
  5. 5

    Reversible Data Hiding in Encrypted Images by Reversible Image Transformation by Zhang, Weiming, Wang, Hui, Hou, Dongdong, Yu, Nenghai

    Published in IEEE transactions on multimedia (01-08-2016)
    “…With the popularity of outsourcing data to the cloud, it is vital to protect the privacy of data and enable the cloud server to easily manage the data at the…”
    Get full text
    Journal Article
  6. 6

    A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability by Hao, Zhuo, Zhong, Sheng, Yu, Nenghai

    “…Remote data integrity checking is a crucial technology in cloud computing. Recently, many works focus on providing data dynamics and/or public verifiability to…”
    Get full text
    Journal Article
  7. 7

    Decomposing Joint Distortion for Adaptive Steganography by Zhang, Weiming, Zhang, Zhuo, Zhang, Lili, Li, Hanyi, Yu, Nenghai

    “…Recent advances on adaptive steganography imply that the security of steganography can be improved by exploiting the mutual impact of modifications between…”
    Get full text
    Journal Article
  8. 8

    Coherent Online Video Style Transfer by Dongdong Chen, Jing Liao, Lu Yuan, Nenghai Yu, Gang Hua

    “…Training a feed-forward network for the fast neural style transfer of images has proven successful, but the naive extension of processing videos frame by frame…”
    Get full text
    Conference Proceeding
  9. 9

    Healthchain: A Blockchain-Based Privacy Preserving Scheme for Large-Scale Health Data by Xu, Jie, Xue, Kaiping, Li, Shaohua, Tian, Hangyu, Hong, Jianan, Hong, Peilin, Yu, Nenghai

    Published in IEEE internet of things journal (01-10-2019)
    “…With the dramatically increasing deployment of the Internet of Things (IoT), remote monitoring of health data to achieve intelligent healthcare has received…”
    Get full text
    Journal Article
  10. 10

    Optimal Transition Probability of Reversible Data Hiding for General Distortion Metrics and Its Applications by Zhang, Weiming, Hu, Xiaocheng, Li, Xiaolong, Nenghai, Yu

    Published in IEEE transactions on image processing (01-01-2015)
    “…Recently, a recursive code construction (RCC) approaching the rate-distortion bound of reversible data hiding (RDH) was proposed. However, to estimate the…”
    Get full text
    Journal Article
  11. 11

    Screen-Shooting Resilient Watermarking by Fang, Han, Zhang, Weiming, Zhou, Hang, Cui, Hao, Yu, Nenghai

    “…This paper proposes a novel screen-shooting resilient watermarking scheme, which means that if the watermarked image is displayed on the screen and the screen…”
    Get full text
    Journal Article
  12. 12

    Online Multi-object Tracking Using CNN-Based Single Object Tracker with Spatial-Temporal Attention Mechanism by Qi Chu, Wanli Ouyang, Hongsheng Li, Xiaogang Wang, Bin Liu, Nenghai Yu

    “…In this paper, we propose a CNN-based framework for online MOT. This framework utilizes the merits of single object trackers in adapting appearance models and…”
    Get full text
    Conference Proceeding
  13. 13

    Reversible Data Hiding Under Inconsistent Distortion Metrics by Hou, Dongdong, Zhang, Weiming, Yang, Yang, Yu, Nenghai

    Published in IEEE transactions on image processing (01-10-2018)
    “…Recursive code construction (RCC), based on the optimal transition probability matrix (OTPM), approaching the rate-distortion bound of reversible data hiding…”
    Get full text
    Journal Article
  14. 14

    A New Rule for Cost Reassignment in Adaptive Steganography by Zhou, Wenbo, Zhang, Weiming, Yu, Nenghai

    “…In steganography schemes, the distortion function is used to define modification costs on cover elements, which is distinctly vital to the security of modern…”
    Get full text
    Journal Article
  15. 15

    Defining Cost Functions for Adaptive JPEG Steganography at the Microscale by Chen, Kejiang, Zhou, Hang, Zhou, Wenbo, Zhang, Weiming, Yu, Nenghai

    “…Minimal distortion steganography is the most successful model for adaptive steganography, in which the cost function determines the security. Texture…”
    Get full text
    Journal Article
  16. 16

    Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers by Zhang, Weiming, Chen, Biao, Yu, Nenghai

    Published in IEEE transactions on image processing (01-06-2012)
    “…In reversible data hiding (RDH), the original cover can be losslessly restored after the embedded information is extracted. Kalker and Willems established a…”
    Get full text
    Journal Article
  17. 17

    A practical quantum designated verifier signature scheme for E-voting applications by Zheng, Mengce, Xue, Kaiping, Li, Shangbin, Yu, Nenghai

    Published in Quantum information processing (01-07-2021)
    “…Although most of the quantum signatures can be verified by a designated receiver, they do not match the classical designated verifier signature since an…”
    Get full text
    Journal Article
  18. 18

    Two-Cloud Secure Database for Numeric-Related SQL Range Queries With Privacy Preserving by Xue, Kaiping, Li, Shaohua, Hong, Jianan, Xue, Yingjie, Yu, Nenghai, Hong, Peilin

    “…Industries and individuals outsource database to realize convenient and low-cost applications and services. In order to provide sufficient functionality for…”
    Get full text
    Journal Article
  19. 19

    Fog-Aided Verifiable Privacy Preserving Access Control for Latency-Sensitive Data Sharing in Vehicular Cloud Computing by Xue, Kaiping, Jianan Hong, Yongjin Ma, Wei, David S. L., Peilin Hong, Nenghai Yu

    Published in IEEE network (01-05-2018)
    “…VCC is an emerging computing paradigm developed for providing various services to vehicle drivers, and has attracted more and more attention from researchers…”
    Get full text
    Journal Article
  20. 20

    Semantics-Preserving Bag-of-Words Models and Applications by Lei Wu, Hoi, Steven C H, Nenghai Yu

    Published in IEEE transactions on image processing (01-07-2010)
    “…The Bag-of-Words (BoW) model is a promising image representation technique for image categorization and annotation tasks. One critical limitation of existing…”
    Get full text
    Journal Article