CASIA OpenIR

浏览/检索结果: 共6条,第1-6条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Flexible Lossy Compression for Selective Encrypted Image With Image Inpainting 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2019, 卷号: 29, 期号: 11, 页码: 3341-3355
作者:  Qin, Chuan;  Zhou, Qing;  Cao, Fang;  Dong, Jing;  Zhang, Xinpeng
收藏  |  浏览/下载:259/0  |  提交时间:2020/03/30
Image coding  Encryption  Image reconstruction  Receivers  Transforms  Cloud computing  Lossy compression  image encryption  image reconstruction  image inpainting  
CRISPR/Cas9-mediated PINK1 deletion leads to neurodegeneration in rhesus monkeys 期刊论文
CELL RESEARCH, 2019, 卷号: 29, 期号: 4, 页码: 334-336
作者:  Yang, Weili;  Liu, Yunbo;  Tu, Zhuchi;  Xiao, Chong;  Yan, Sen;  Ma, Xishan;  Guo, Xiangyu;  Chen, Xiusheng;  Yin, Peng;  Yang, Zhengyi;  Yang, Su;  Jiang, Tianzi;  Li, Shihua;  Qin, Chuan;  Li, Xiao-Jiang
收藏  |  浏览/下载:210/0  |  提交时间:2019/12/16
Reversible data hiding in encrypted image with separable capability and high embedding capacity 期刊论文
INFORMATION SCIENCES, 2018, 卷号: 465, 页码: 285-304
作者:  Qin, Chuan;  He, Zhihong;  Luo, Xiangyang;  Dong, Jing
收藏  |  浏览/下载:295/0  |  提交时间:2019/07/12
Reversible data hiding  Encrypted image  Embedding rate  Image quality  
Non-uniform Watermark Sharing Based on Optimal Iterative BTC for Image Tampering Recovery 期刊论文
IEEE MULTIMEDIA, 2018, 卷号: 25, 期号: 3, 页码: 36-48
作者:  Qin, Chuan;  Ji, Ping;  Chang, Chin-Chen;  Dong, Jing;  Sun, Xingming
收藏  |  浏览/下载:164/0  |  提交时间:2019/07/12
Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy 期刊论文
SIGNAL PROCESSING, 2017, 卷号: 138, 页码: 280-293
作者:  Qin, Chuan;  Ji, Ping;  Zhang, Xinpeng;  Dong, Jing;  Wang, Jinwei
收藏  |  浏览/下载:199/0  |  提交时间:2017/07/18
Fragile Watermarking  Overlapping Embedding  Pixel-wise Recovery  Tampering Localization  
Perceptual image hashing with selective sampling for salient structure features 期刊论文
DISPLAYS, 2016, 卷号: 45, 页码: 26-37
作者:  Qin, Chuan;  Chen, Xueqin;  Dong, Jing;  Zhang, Xinpeng
收藏  |  浏览/下载:195/0  |  提交时间:2017/02/14
Image Hashing  Structure Feature  Selective Sampling  Perceptual Robustness  Discrimination  Security