×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [43]
自动化研究所 [15]
北京大学 [12]
清华大学 [6]
深圳先进技术研究院 [3]
地理科学与资源研究所 [3]
更多...
内容类型
期刊论文 [74]
会议论文 [11]
学位论文 [8]
其他 [7]
发表日期
2022 [2]
2021 [3]
2020 [6]
2019 [3]
2018 [10]
2017 [5]
更多...
学科主题
Computer S... [1]
Cultural p... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共100条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Robust Texture-Aware Local Adaptive Image Watermarking With Perceptual Guarantee
期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2023, 卷号: 33, 期号: 9, 页码: 4660-4674
作者:
Huang, Ying
;
Guan, Hu
;
Liu, Jie
;
Zhang, Shuwu
;
Niu, Baoning
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2023/11/16
Adaptive
image watermarking
image texture
imperceptibility
robustness
A retrieval method for encrypted speech based on improved power normalized cepstrum coefficients and perceptual hashing
期刊论文
Multimedia Tools and Applications, 2022, 卷号: 81, 期号: 11, 页码: 15127-15151
作者:
Zhang, Qiu-yu
;
Bai, Jian
;
Xu, Fu-jiu
收藏
  |  
浏览/下载:27/0
  |  
提交时间:2022/06/20
Authentication
Chaotic systems
Discrete wavelet transforms
Efficiency
Extraction
Hamming distance
Hash functions
Information retrieval
Principal component analysis
Speech
Cepstrum
Chaotic mapping
Encrypted speech
Encrypted speech retrieval
Features extraction
Henon chaotic mapping
Perceptual hashing
Power
Power normalized cepstrum coefficient
Speech feature extraction
Speech features
Speech retrieval
Encrypted speech perceptual hashing authentication algorithm based on improved 2D-Henon encryption and harmonic product spectrum
期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 卷号: 81, 期号: 18, 页码: 25829-25852
作者:
Huang, Yi-bo
;
Chen, Teng-fei
;
Zhang, Qiu-yu
;
Zhang, Yuan
;
Yan, Shao-hui
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2022/04/21
Encrypted speech authentication
Perceptual hashing
Improved 2D-Henon
HPS
Matching accuracy
Security
Sparse self-attention aggregation networks for neural sequence slice interpolation
期刊论文
BioData Mining, 2021, 卷号: 14, 期号: 1, 页码: 19
作者:
Wang,Zejin
;
Liu,Jing
;
Chen,Xi
;
Li,Guoqing
;
Han,Hua
收藏
  |  
浏览/下载:58/0
  |  
提交时间:2021/02/18
Slice interpolation
Biological tissue recovery
EM images
Sparse self-attention network
Adaptive style-balance loss
Semi-U-Net: A Lightweight Deep Neural Network for Subject-Sensitive Hashing of HRRS Images
期刊论文
IEEE ACCESS, 2021, 卷号: 9, 页码: 60280-60295
作者:
Ding, Kaimeng
;
Su, Shoubao
;
Xu, Nan
;
Jiang, Tingting
收藏
  |  
浏览/下载:65/0
  |  
提交时间:2021/06/10
Authentication
Feature extraction
Remote sensing
Neural networks
Data mining
Cryptography
Computational modeling
Subject-sensitive hashing
lightweight deep neural network
integrity authentication
HRRS image
U-net
An encrypted speech authentication and tampering recovery method based on perceptual hashing
期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 卷号: 80, 期号: 16, 页码: 24925-24948
作者:
Zhang, Qiu-yu
;
Zhang, Deng-hai
;
Xu, Fu-jiu
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2021/06/03
Encrypted speech authentication
Perceptual hashing
Least square curve fitting
Tampering location
Tampering recovery
An efficient retrieval approach for encrypted speech based on biological hashing and spectral subtraction
期刊论文
Multimedia Tools and Applications, 2020, 卷号: 79, 期号: 39-40, 页码: 29775-29798
作者:
Zhang, Qiu-yu
;
Li, Gai-li
;
Huang, Yi-bo
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2020/11/14
Authentication
Conformal mapping
Cryptography
Discrete wavelet transforms
Efficiency
Fast Fourier transforms
Hamming distance
Photomapping
Signal reconstruction
Speech
Speech communication
Autocorrelation functions
Distance algorithm
Encrypted speech
Integrity authentications
Mapping algorithms
Retrieval efficiency
Spectral subtractions
Strong robustness
A Subject-Sensitive Perceptual Hash Based on MUM-Net for the Integrity Authentication of High Resolution Remote Sensing Images
期刊论文
ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION, 2020, 卷号: 9, 期号: 8, 页码: 28
作者:
Ding, Kaimeng
;
Liu, Yueming
;
Xu, Qin
;
Lu, Fuqiang
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2021/03/18
perceptual hash
integrity authentication
subject-sensitive
HRRS image
deep learning
An encrypted speech retrieval algorithm based on Chirp-Z transform and perceptual hashing second feature extraction
期刊论文
Multimedia Tools and Applications, 2020, 卷号: 79, 期号: 9-10, 页码: 6337-6361
作者:
Zhang, Qiu-yu
;
Ge, Zi-xian
;
Hu, Ying-jie
;
Bai, Jian
;
Huang, Yi-bo
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2020/11/14
Cryptography
Efficiency
Extraction
Feature extraction
K-means clustering
Matrix algebra
Security of data
Z transforms
Chirp Z transform
Encrypted speech
Perceptual hashing
Random Matrix
Speech denoising
An Encrypted Speech Retrieval Method Based on Deep Perceptual Hashing and CNN-BiLSTM
期刊论文
IEEE Access, 2020, 卷号: 8, 页码: 148556-148569
作者:
Zhang, Qiuyu
;
Li, Yuzhou
;
Hu, Yingjie
;
Zhao, Xuejiao
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2020/11/14
Bismuth compounds
Brain
Convolutional neural networks
Cryptography
Deep learning
Hamming distance
Information retrieval
Learning systems
Speech
Distance algorithm
Hyper-chaotic systems
Neural network model
Perceptual feature
Perceptual hashing
Recall and precision
Retrieval accuracy
Retrieval efficiency
©版权所有 ©2017 CSpace - Powered by
CSpace