Low-Complexity Fake Face Detection Based On Forensic Similarity | 0 | 0.34 | 2021 |
Efficient Noninteractive Outsourcing Of Large-Scale Qr And Lu Factorizations | 0 | 0.34 | 2021 |
Non-Interactive And Secure Outsourcing Of Pca-Based Face Recognition | 0 | 0.34 | 2021 |
Multichannel Steganography in Digital Images for Multiple Receivers | 0 | 0.34 | 2021 |
Embedding Probability Guided Network For Image Steganalysis | 0 | 0.34 | 2021 |
Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server | 1 | 0.36 | 2021 |
Efficient Outsourced Extraction Of Histogram Features Over Encrypted Images In Cloud | 0 | 0.34 | 2021 |
Privacy-Preserving Redactable Blockchain For Internet Of Things | 0 | 0.34 | 2021 |
Privacy-preserving batch verification signature scheme based on blockchain for Vehicular Ad-Hoc Networks | 0 | 0.34 | 2021 |
On Cloud Storage Optimization of Blockchain With a Clustering-Based Genetic Algorithm | 2 | 0.38 | 2020 |
Privacy-Protected Deletable Blockchain. | 0 | 0.34 | 2020 |
Diversity-Based Cascade Filters for JPEG Steganalysis. | 2 | 0.35 | 2020 |
How to Extract Image Features based on Co-occurrence Matrix Securely and Efficiently in Cloud Computing | 1 | 0.37 | 2020 |
Feature Extraction Optimization of JPEG Steganalysis Based on Residual Images | 1 | 0.34 | 2020 |
Key Based Artificial Fingerprint Generation for Privacy Protection | 0 | 0.34 | 2020 |
Iris Segmentation Based On Improved U-Net Network Model | 0 | 0.34 | 2019 |
Jpeg Steganalysis Based On Multi-Projection Ensemble Discriminant Clustering | 0 | 0.34 | 2019 |
Fully Verifiable Algorithm For Outsourcing Multiple Modular Exponentiations With Single Cloud Server | 0 | 0.34 | 2018 |
Unsupervised steganalysis over social networks based on multi-reference sub-image sets. | 1 | 0.35 | 2018 |
Efficient steganographer detection over social networks with sampling reconstruction. | 2 | 0.36 | 2018 |
Analysis Of The K-Error Linear Complexity And Error Sequence For 2p(N)-Periodic Binary Sequence | 0 | 0.34 | 2018 |
Verifiable outsourced attribute-based signature scheme. | 3 | 0.41 | 2018 |
Efficient and secure outsourcing of bilinear pairings with single server. | 1 | 0.36 | 2018 |
Noninteractive Verifiable Outsourcing Algorithm for Bilinear Pairing with Improved Checkability. | 1 | 0.41 | 2017 |
PAC Learning Depth-3 $\textrm{AC}^0$ Circuits of Bounded Top Fanin. | 0 | 0.34 | 2017 |
Fully Verifiable Algorithm for Secure Outsourcing of Bilinear Pairing in Cloud Computing. | 0 | 0.34 | 2017 |
Verifiable Outsourcing Computation of Modular Exponentiations with Single Server. | 3 | 0.39 | 2017 |
Output Feedback Polytopic Lpv Tube-Rmpc Control For Air-Breathing Hypersonic Vehicles | 1 | 0.34 | 2017 |
Jpeg Image Steganalysis From Imbalanced Data | 0 | 0.34 | 2017 |
Learning AC0 Under k-Dependent Distributions. | 0 | 0.34 | 2017 |
Verifiable Outsourcing Algorithms for Modular Exponentiations with Improved Checkability. | 6 | 0.46 | 2016 |
New algorithms for verifiable outsourcing of bilinear pairings. | 6 | 0.51 | 2016 |
Identity-Based Encryption with Verifiable Outsourced Revocation. | 3 | 0.41 | 2016 |
Block cipher based separable reversible data hiding in encrypted images | 10 | 0.48 | 2016 |
Unbalanced JPEG image steganalysis via multiview data match. | 5 | 0.47 | 2016 |
JPEG encryption for image rescaling in the encrypted domain. | 6 | 0.54 | 2015 |
Towards Efficient, Secure, And Fine-Grained Access Control System In Msns With Flexible Revocations | 1 | 0.35 | 2015 |
An Efficient Batch Verifying Scheme for Detecting Illegal Signatures. | 1 | 0.35 | 2015 |
Compressing Encrypted Images With Auxiliary Information | 13 | 0.64 | 2014 |
Efficient Anonymous Identity-Based Broadcast Encryption without Random Oracles | 3 | 0.37 | 2014 |
Efficient reversible data hiding in encrypted images | 17 | 0.72 | 2014 |
Practical parallel key-insulated encryption with multiple helper keys. | 1 | 0.35 | 2013 |
Non-interactive dynamic identity-based broadcast encryption without random oracles | 1 | 0.35 | 2012 |
Scalable coding of encrypted images. | 22 | 1.15 | 2012 |
Efficient ciphertext-policy attribute based encryption with hidden policy | 13 | 0.54 | 2012 |
Anonymous Hierarchical Identity-Based Encryption in Prime Order Groups. | 0 | 0.34 | 2012 |
Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction | 48 | 1.39 | 2011 |
Compressing Encrypted Image Using Compressive Sensing | 18 | 0.94 | 2011 |
CCA2 secure (hierarchical) identity-based parallel key-insulated encryption without random oracles | 4 | 0.42 | 2010 |
Fragile watermarking for color image recovery based on color filter array interpolation | 2 | 0.39 | 2010 |