Designing an efficient image encryption-then-compression system via prediction error clustering and random permutation J Zhou, X Liu, OC Au, YY Tang IEEE transactions on information forensics and security 9 (1), 39-50, 2013 | 153 | 2013 |
A review of compressive sensing in information security field Y Zhang, LY Zhang, J Zhou, L Liu, F Chen, X He IEEE access 4, 2507-2519, 2016 | 136 | 2016 |
Secure reversible image data hiding over encrypted domain via key modulation J Zhou, W Sun, L Dong, X Liu, OC Au, YY Tang IEEE transactions on circuits and systems for video technology 26 (3), 441-452, 2015 | 133 | 2015 |
Security analysis of multimedia encryption schemes based on multiple Huffman table J Zhou, Z Liang, Y Chen, OC Au IEEE Signal Processing Letters 14 (3), 201-204, 2007 | 111 | 2007 |
Embedding cryptographic features in compressive sensing Y Zhang, J Zhou, F Chen, LY Zhang, KW Wong, X He, D Xiao Neurocomputing 205, 472-480, 2016 | 94 | 2016 |
Adaptive chosen-ciphertext attack on secure arithmetic coding J Zhou, OC Au, PHW Wong IEEE Transactions on Signal Processing 57 (5), 1825-1838, 2009 | 66 | 2009 |
Bi-level protected compressive sampling LY Zhang, KW Wong, Y Zhang, J Zhou IEEE Transactions on Multimedia 18 (9), 1720-1732, 2016 | 65 | 2016 |
Data-driven sparsity-based restoration of JPEG-compressed images in dual transform-pixel domain X Liu, X Wu, J Zhou, D Zhao Proceedings of the IEEE Conference on Computer Vision and Pattern …, 2015 | 62 | 2015 |
Image interpolation via graph-based Bayesian label propagation X Liu, D Zhao, J Zhou, W Gao, H Sun IEEE Transactions on Image Processing 23 (3), 1084-1096, 2013 | 46 | 2013 |
Data-driven soft decoding of compressed images in dual transform-pixel domain X Liu, X Wu, J Zhou, D Zhao IEEE Transactions on Image Processing 25 (4), 1649-1659, 2016 | 37 | 2016 |
Fast and effective image copy-move forgery detection via hierarchical feature point matching Y Li, J Zhou IEEE Transactions on Information Forensics and Security 14 (5), 1307-1322, 2018 | 36 | 2018 |
Scalable compression of stream cipher encrypted images through context-adaptive sampling J Zhou, OC Au, G Zhai, YY Tang, X Liu IEEE transactions on Information Forensics and Security 9 (11), 1857-1868, 2014 | 35 | 2014 |
Improved known-plaintext attack to permutation-only multimedia ciphers LY Zhang, Y Liu, C Wang, J Zhou, Y Zhang, G Chen Information Sciences 430, 228-239, 2018 | 34 | 2018 |
Compressive sampling-based image coding for resource-deficient visual communication X Liu, D Zhai, J Zhou, X Zhang, D Zhao, W Gao IEEE Transactions on Image Processing 25 (6), 2844-2855, 2016 | 34 | 2016 |
On the design of an efficient encryption-then-compression system J Zhou, X Liu, OC Au 2013 IEEE International Conference on Acoustics, Speech and Signal …, 2013 | 32 | 2013 |
Inter-channel demosaicking traces for digital image forensics JS Ho, OC Au, J Zhou, Y Guo 2010 IEEE International Conference on Multimedia and Expo, 1475-1480, 2010 | 29 | 2010 |
Successive refinement based Wyner–Ziv video compression X Fan, OC Au, NM Cheung, Y Chen, J Zhou Signal Processing: Image Communication 25 (1), 47-63, 2010 | 29 | 2010 |
Spatio-temporal boundary matching algorithm for temporal error concealment Y Chen, O Au, C Ho, J Zhou 2006 IEEE International Symposium on Circuits and Systems, 4 pp., 2006 | 29 | 2006 |
A block compressive sensing based scalable encryption framework for protecting significant image regions Y Zhang, J Zhou, F Chen, LY Zhang, D Xiao, B Chen, X Liao International Journal of Bifurcation and Chaos 26 (11), 1650191, 2016 | 28 | 2016 |
Blind quality assessment of compressed images via pseudo structural similarity X Min, G Zhai, K Gu, Y Fang, X Yang, X Wu, J Zhou, X Liu 2016 IEEE International Conference on Multimedia and Expo (ICME), 1-6, 2016 | 28 | 2016 |