Search Results - "Yu, Nenghai"
-
1
Reversibility improved data hiding in encrypted images
Published in Signal processing (01-01-2014)“…A novel reversible data hiding technique in encrypted images is presented in this paper. Instead of embedding data in encrypted images directly, some pixels…”
Get full text
Journal Article -
2
StyleBank: An Explicit Representation for Neural Image Style Transfer
Published in 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (01-07-2017)“…We propose StyleBank, which is composed of multiple convolution filter banks and each filter bank explicitly represents one style, for neural image style…”
Get full text
Conference Proceeding -
3
Recursive Histogram Modification: Establishing Equivalency Between Reversible Data Hiding and Lossless Data Compression
Published in IEEE transactions on image processing (01-07-2013)“…State-of-the-art schemes for reversible data hiding (RDH) usually consist of two steps: first construct a host sequence with a sharp histogram via prediction…”
Get full text
Journal Article -
4
Learning Spatial Regularization with Image-Level Supervisions for Multi-label Image Classification
Published in 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (01-07-2017)“…Multi-label image classification is a fundamental but challenging task in computer vision. Great progress has been achieved by exploiting semantic relations…”
Get full text
Conference Proceeding -
5
Reversible Data Hiding in Encrypted Images by Reversible Image Transformation
Published in IEEE transactions on multimedia (01-08-2016)“…With the popularity of outsourcing data to the cloud, it is vital to protect the privacy of data and enable the cloud server to easily manage the data at the…”
Get full text
Journal Article -
6
A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability
Published in IEEE transactions on knowledge and data engineering (01-09-2011)“…Remote data integrity checking is a crucial technology in cloud computing. Recently, many works focus on providing data dynamics and/or public verifiability to…”
Get full text
Journal Article -
7
Decomposing Joint Distortion for Adaptive Steganography
Published in IEEE transactions on circuits and systems for video technology (01-10-2017)“…Recent advances on adaptive steganography imply that the security of steganography can be improved by exploiting the mutual impact of modifications between…”
Get full text
Journal Article -
8
Coherent Online Video Style Transfer
Published in 2017 IEEE International Conference on Computer Vision (ICCV) (01-10-2017)“…Training a feed-forward network for the fast neural style transfer of images has proven successful, but the naive extension of processing videos frame by frame…”
Get full text
Conference Proceeding -
9
Healthchain: A Blockchain-Based Privacy Preserving Scheme for Large-Scale Health Data
Published in IEEE internet of things journal (01-10-2019)“…With the dramatically increasing deployment of the Internet of Things (IoT), remote monitoring of health data to achieve intelligent healthcare has received…”
Get full text
Journal Article -
10
Optimal Transition Probability of Reversible Data Hiding for General Distortion Metrics and Its Applications
Published in IEEE transactions on image processing (01-01-2015)“…Recently, a recursive code construction (RCC) approaching the rate-distortion bound of reversible data hiding (RDH) was proposed. However, to estimate the…”
Get full text
Journal Article -
11
Screen-Shooting Resilient Watermarking
Published in IEEE transactions on information forensics and security (01-06-2019)“…This paper proposes a novel screen-shooting resilient watermarking scheme, which means that if the watermarked image is displayed on the screen and the screen…”
Get full text
Journal Article -
12
Online Multi-object Tracking Using CNN-Based Single Object Tracker with Spatial-Temporal Attention Mechanism
Published in 2017 IEEE International Conference on Computer Vision (ICCV) (01-10-2017)“…In this paper, we propose a CNN-based framework for online MOT. This framework utilizes the merits of single object trackers in adapting appearance models and…”
Get full text
Conference Proceeding -
13
Reversible Data Hiding Under Inconsistent Distortion Metrics
Published in IEEE transactions on image processing (01-10-2018)“…Recursive code construction (RCC), based on the optimal transition probability matrix (OTPM), approaching the rate-distortion bound of reversible data hiding…”
Get full text
Journal Article -
14
A New Rule for Cost Reassignment in Adaptive Steganography
Published in IEEE transactions on information forensics and security (01-11-2017)“…In steganography schemes, the distortion function is used to define modification costs on cover elements, which is distinctly vital to the security of modern…”
Get full text
Journal Article -
15
Defining Cost Functions for Adaptive JPEG Steganography at the Microscale
Published in IEEE transactions on information forensics and security (01-04-2019)“…Minimal distortion steganography is the most successful model for adaptive steganography, in which the cost function determines the security. Texture…”
Get full text
Journal Article -
16
Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers
Published in IEEE transactions on image processing (01-06-2012)“…In reversible data hiding (RDH), the original cover can be losslessly restored after the embedded information is extracted. Kalker and Willems established a…”
Get full text
Journal Article -
17
A practical quantum designated verifier signature scheme for E-voting applications
Published in Quantum information processing (01-07-2021)“…Although most of the quantum signatures can be verified by a designated receiver, they do not match the classical designated verifier signature since an…”
Get full text
Journal Article -
18
Two-Cloud Secure Database for Numeric-Related SQL Range Queries With Privacy Preserving
Published in IEEE transactions on information forensics and security (01-07-2017)“…Industries and individuals outsource database to realize convenient and low-cost applications and services. In order to provide sufficient functionality for…”
Get full text
Journal Article -
19
Fog-Aided Verifiable Privacy Preserving Access Control for Latency-Sensitive Data Sharing in Vehicular Cloud Computing
Published in IEEE network (01-05-2018)“…VCC is an emerging computing paradigm developed for providing various services to vehicle drivers, and has attracted more and more attention from researchers…”
Get full text
Journal Article -
20
Semantics-Preserving Bag-of-Words Models and Applications
Published in IEEE transactions on image processing (01-07-2010)“…The Bag-of-Words (BoW) model is a promising image representation technique for image categorization and annotation tasks. One critical limitation of existing…”
Get full text
Journal Article