Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    An Improved Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Pixel Expansion

    In traditional visual cryptography scheme (VCS), each pixel of secret image is encrypted into m( \( \geqslant 1 \) ...

    Wen Wang, Feng Liu, Weiqi Yan, Gang Shen, Teng Guo in Digital-Forensics and Watermarking (2016)

  2. No Access

    Chapter

    Surveillance Privacy Protection

    Surveillance Privacy Protection (SPP) is a realistic issue in the world we are living in today. Due to the massive progress in technologies and systems, surveillance is becoming quite impossible to avoid. More...

    Nikki Gulzar, Basra Abbasi, Eddie Wu, Anil Ozbal in Intelligent Multimedia Surveillance (2013)

  3. No Access

    Chapter and Conference Paper

    A Novel Agent-Based Framework in Bridge-Mode Hypervisors of Cloud Security

    Cloud computing has been introduced as a tool for improving IT proficiency and business responsiveness for organizations as it delivers flexible hardware and software services as well as providing an array of ...

    Maziar Janbeglou, WeiQi Yan in 7th International Conference on Knowledge … (2013)

  4. No Access

    Chapter and Conference Paper

    Authenticating Visual Cryptography Shares Using 2D Barcodes

    One of the problems pertinent with many visual cryptography (VC) schemes is that of authentication. VC provides a way of sharing secrets between a number of participants. The secrets are in the form of an imag...

    Jonathan Weir, WeiQi Yan in Digital Forensics and Watermarking (2012)

  5. No Access

    Chapter and Conference Paper

    Plane Transform Visual Cryptography

    Plane transformation visual cryptography takes a unique approach to some of the current shortcomings of current visual cryptography techniques. Typically, the direction and placement of the encrypted shares is...

    Jonathan Weir, WeiQi Yan in Digital Watermarking (2011)

  6. No Access

    Chapter and Conference Paper

    A Novel Collusion Attack Strategy for Digital Fingerprinting

    Digital fingerprinting is a technology which aims to embed unique marks with traceability in order to identify users who use their multimedia content for unintended purpose. A cost-efficient attack against dig...

    Hefei Ling, Hui Feng, Fuhao Zou, Weiqi Yan, Zhengding Lu in Digital Watermarking (2011)

  7. No Access

    Chapter

    Partial Palmprint Matching Using Invariant Local Minutiae Descriptors

    In forensic investigations, it is common for forensic investigators to obtain a photograph of evidence left at the scene of crimes to aid them catch the culprit(s). Although, fingerprints are the most popular ...

    Moussadek Laadjel, Ahmed Bouridane in Transactions on Data Hiding and Multimedia… (2010)

  8. No Access

    Chapter

    A Comprehensive Study of Visual Cryptography

    Visual cryptography (VC) is a powerful technique that combines the notions of perfect ciphers and secret sharing in cryptography with that of raster graphics. VC takes a binary image (the secret) and divides i...

    Jonathan Weir, WeiQi Yan in Transactions on Data Hiding and Multimedia Security V (2010)

  9. No Access

    Chapter

    Secure Masks for Visual Cryptography

    Visual cryptography provides a very powerful technique by which one secret can be distributed into two or more pieces known as shares. When the shares are printed on transparencies and then superimposed exactl...

    Jonathan Weir, WeiQi Yan in Transactions on Data Hiding and Multimedia Security V (2010)

  10. No Access

    Chapter and Conference Paper

    Digital Image Splicing Using Edges

    In this paper we splice together an image which has been split up on a piece of paper by using duplication detection. The nearest pieces are connected using edge searching and matching. For the pieces that hav...

    Raymond Lau, Jonathan Weir, WeiQi Yan in Advances in Multimedia Information Process… (2009)

  11. No Access

    Chapter and Conference Paper

    Palmprint Recognition Based on Subspace Analysis of Gabor Filter Bank

    This paper introduces a new technique for palmprint recognition based on Fisher Linear Discriminant Analysis (FLDA) of Gabor filter bank. This method involves convolving a palmprint image with a bank of Gabor ...

    Moussadek Laadjel, Fatih Kurugollu in Advances in Multimedia Information Process… (2009)

  12. No Access

    Chapter

    Finite Element Modelling in Implant Dentistry

    The use of numerical methods such as FEA has been adopted in solving complicated geometric problems, for which it is very difficult to achieve an analytical solution. FEA is a technique for obtaining a solutio...

    Jian** Geng, Weiqi Yan, Wei Xu in Application of the Finite Element Method i… (2008)

  13. No Access

    Chapter

    Applications to Implant Dentistry

    Although the precise mechanisms are not fully understood, it is clear that there is an adaptive remodelling response of surrounding bone to stresses. Implant features causing excessive high or low stresses can...

    Jian** Geng, Wei Xu, Keson B. C. Tan in Application of the Finite Element Method i… (2008)