1 |
Z. Fu, X. Sun, Q. Liu, L. Zhou, and J. Shu, “Achieving Efficient Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing,” IEICE Transactions on Communications, vol. E98-B, no. 1, pp.190-200, 2015. Article (CrossRef Link)
DOI
|
2 |
Z. Xia, X. Wang, X. Sun, and Q. Wang, “A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data,” IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 2, pp. 340-352, 2016. Article (CrossRef Link)
DOI
|
3 |
Y. Ren, J. Shen, J. Wang, J. Han, and S. Lee, “Mutual Verifiable Provable Data Auditing in Public Cloud Storage,” Journal of Internet Technology, vol. 16, no. 2, pp. 317-323, 2015. Article (CrossRef Link)
DOI
|
4 |
P. Guo, J. Wang, B. Li, and S. Lee, “A Variable Threshold-value Authentication Architecture for Wireless Mesh Networks,” Journal of Internet Technology, vol. 15, no. 6, pp. 929-936, 2014. Article (CrossRef Link)
|
5 |
J. Li, X. Li, B. Yang and X. Sun, “Segmentation-based Image Copy-move Forgery Detection Scheme,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 3, pp. 507-518, 2015. Article (CrossRef Link)
DOI
|
6 |
B. Chen, H. Shu, G. Coatrieux, G. Chen, X. Sun, and J.L. Coatrieux, “Color Image Analysis by Quaternion-Type Moments,” Journal of Mathematical Imaging and Vision, vol. 51, no. 1, pp. 124-144, 2015. Article (CrossRef Link)
DOI
|
7 |
Z. Xia, X. Wang, X. Sun, Q. Liu, and N. Xiong, “Steganalysis of LSB Matching Using Differences Between Nonadjacent Pixels,” Multimedia Tools and Applications, vol. 75, no. 4, pp. 1947-1962, 2016. Article (CrossRef Link)
DOI
|
8 |
Z. Xia, X. Wang, X. Sun, and B. Wang, “Steganalysis of Least Significant Bit Matching Using Multi-Order Differences,” Security and Communication Networks, vol. 7, no. 8, pp. 1283-1291, 2014. Article (CrossRef Link)
DOI
|
9 |
B.Gu, V.S. Sheng, K.Y. Tay, W. Romano, and S. Li, “Incremental Support Vector Learning for Ordinal Regression,” IEEE Transactions on Neural Networks and Learning Systems, vol. 26, no. 7, pp. 1403-1416, 2015. Article (CrossRef Link)
DOI
|
10 |
B. Gu, V. S. Sheng, Z. Wang, D. Ho, S. Osman, and S. Li, "Incremental Learning for ν-Support Vector Regression," Neural Networks, vol. 67, pp. 140-150, 2015. Article (CrossRef Link)
DOI
|
11 |
X. Wen, L. Shao, Y. Xue, and W. Fang, “A Rapid Learning Algorithm for Vehicle Classification,” Information Sciences, vol. 295, no. 1, pp. 395-406, 2015. Article (CrossRef Link)
DOI
|
12 |
Z. Yuhui, J. Byeungwoo, X. Danhua, W.Q.M. Jonathan and Z. Hui, “Image Segmentation by Generalized Hierarchical Fuzzy C-means Algorithm,” Journal of Intelligent and Fuzzy Systems, vol. 28, no. 2, pp. 961-973, 2015. Article (CrossRef Link)
|
13 |
J. Mielikainen, “LSB Matching Revisited,” IEEE Signal Processing Letters, vol. 13, no. 5, pp. 285-287, 2006. Article (CrossRef Link)
DOI
|
14 |
W. Hong and T.S. Chen, “A Novel Data Embedding Method Using Adaptive Pixel Pair Matching,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 1, pp. 176-184, 2012. Article (CrossRef Link)
DOI
|
15 |
Z. Ni, Y.Q. Shi, N. Ansari, and W. Su, “Reversible Data Hiding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354-362, 2006. Article (CrossRef Link)
DOI
|
16 |
X.L. Li, J. Li, B. Li, and B. Yang, “High-Fidelity Reversible Data Hiding Scheme Based on Pixel-Value-Ordering and Prediction-Error Expansion,” Signal Processing, vol.93, no. 1, pp. 198-205, 2013. Article (CrossRef Link)
DOI
|
17 |
X. Zhang, S. Wang, Z. Qian, and G. Feng, “Reversible Fragile Watermarking for Locating Tampered Blocks in JPEG Images,” Signal Processing, vol. 90, no. 12, pp. 3026-3036, 2010. Article (CrossRef Link)
DOI
|
18 |
X. Wang, J. Ding, and Q.Q. Pei, “A Novel Reversible Image Data Hiding Scheme Based on Pixel Value Ordering and Dynamic Pixel Block Partition,” Information Science, vol. 310, pp. 16-35, 2015. Article (CrossRef Link)
DOI
|
19 |
W. Hong, T.S. Chen, and J. Chen, “Reversible Data Hiding Using Delaunay Triangulation and Selective Embedment,” Information Sciences, vol. 308, pp. 140-154, 2015. Article (CrossRef Link)
DOI
|
20 |
W.J. Wang, C.T. Huang, C.M. Liu, P.C. Su, and S.J. Wang, “Data Embedding for Vector Quantization Image Processing on the Basis of Adjoining State-Codebook Mapping,” Information Sciences, vol. 246, pp. 69-82, 2013. Article (CrossRef Link)
DOI
|
21 |
W. Hong, T.S. Chen, C.W. Shiu, and M.C. Wu, “Lossless Data Embedding in BTC Codes Based on Prediction and Histogram Shifting,” Applied Mechanics and Materials, vol. 65, pp. 182-185, 2011. Article (CrossRef Link)
DOI
|
22 |
J. Chen, W. Hong, T.S. Chen and C.W. Shiu, “Steganography for BTC Compressed Images Using No Distortion Technique,” Image Science Journal, vol. 58, no. 4, pp. 177-185. 2010. Article (CrossRef Link)
DOI
|
23 |
C.C. Chang, C.Y. Lin, and Y.H. Fan, “Reversible Steganography for BTC-Compressed Images,” Fundamenta Informaticae, vol. 109, no. 2, pp. 121-134, 2011. Article (CrossRef Link)
|
24 |
C.C. Lo, Y.C. Hu, W.L. Chen, and C.M. Wu, “Reversible Data Hiding Scheme for BTC-Compressed Images Based on Histogram Shifting,” International Journal of Security and Its Applications, vol. 8, no. 2, pp. 301-314, 2014. Article (CrossRef Link)
DOI
|
25 |
The USC-SIPI Image Database [Online]. Available: http://sipi.usc.edu/database/
|
26 |
Y.Y. Tsai, C.S. Chan, C.L. Liu, and B.R Su, “A Reversible Steganographic Algorithm for BTC-Compressed Images Based on Difference Expansion and Median Edge Detector,” Imaging Science Journal, vol. 62, no. 1, pp. 48-55, 2014. Article (CrossRef Link)
DOI
|
27 |
M.D. Lema and O.R. Mitchell, “Absolute Moment Block Truncation Coding and Its Application to Color Images,” IEEE Transactions on Communication, vol. 32, no. 10, pp. 1148-1157, 1984. Article (CrossRef Link)
DOI
|