Остановите войну!
for scientists:
default search action
Xuehu Yan
Publications
- 2022
- [j79]Jingwen Cheng, Xuehu Yan, Lintao Liu, Yue Jiang, Xuan Wang:
Meaningful Secret Image Sharing with Saliency Detection. Entropy 24(3): 340 (2022) - [j74]Jingwen Cheng, Xuehu Yan, Lintao Liu, Yuyuan Sun, Fengyue Xing:
Comprehensive reversible secret image sharing with palette cover images. J. Inf. Secur. Appl. 68: 103233 (2022) - [j68]Jiayu Wang, Xuehu Yan, Lintao Liu, Longlong Li, Yongqiang Yu:
CTTGAN: Traffic Data Synthesizing Scheme Based on Conditional GAN. Sensors 22(14): 5243 (2022) - 2021
- [j67]Yuyuan Sun, Yuliang Lu, Xuehu Yan, Lintao Liu, Longlong Li:
Robust Secret Image Sharing Scheme Against Noise in Shadow Images. IEEE Access 9: 23284-23300 (2021) - [j63]Lintao Liu, Yuliang Lu, Xuehu Yan:
A novel (k1, k2, n)-threshold two-in-one secret image sharing scheme for multiple secrets. J. Vis. Commun. Image Represent. 74: 102971 (2021) - [j57]Xuehu Yan, Lintao Liu, Longlong Li, Yuliang Lu:
Robust Secret Image Sharing Resistant to Noise in Shares. ACM Trans. Multim. Comput. Commun. Appl. 17(1): 24:1-24:22 (2021) - [c29]Jiayu Wang, Lintao Liu, Jia Chen, Xuehu Yan:
Comparison and analysis of secret image sharing principles. CCCI 2021: 1-5 - 2020
- [j55]Xuehu Yan, Yuliang Lu, Lintao Liu, Xia Li, Jingju Liu, Guozheng Yang:
Application of random elements in ISS. IET Image Process. 14(3): 530-535 (2020) - [j54]Xuehu Yan, Yuliang Lu, Lintao Liu:
A Common General Access Structure Construction Approach in Secret Image Sharing. Int. J. Digit. Crime Forensics 12(3): 96-110 (2020) - [j52]Longdan Tan, Yuliang Lu, Xuehu Yan, Lintao Liu, Xuan Zhou:
XOR-ed visual secret sharing scheme with robust and meaningful shadows based on QR codes. Multim. Tools Appl. 79(9-10): 5719-5741 (2020) - [j50]Xuehu Yan, Wei Qi Yan, Lintao Liu, Yuliang Lu:
Penrose tiling for visual secret sharing. Multim. Tools Appl. 79(43-44): 32693-32710 (2020) - [j46]Xuehu Yan, Yuliang Lu, Lintao Liu, Xianhua Song:
Reversible Image Secret Sharing. IEEE Trans. Inf. Forensics Secur. 15: 3848-3858 (2020) - 2019
- [j45]Longdan Tan, Yuliang Lu, Xuehu Yan, Lintao Liu, Longlong Li:
Weighted Secret Image Sharing for a $(k, n)$ Threshold Based on the Chinese Remainder Theorem. IEEE Access 7: 59278-59286 (2019) - [j44]Longlong Li, Yuliang Lu, Xuehu Yan, Lintao Liu, Longdan Tan:
Lossless $(k, n)$ -Threshold Image Secret Sharing Based on the Chinese Remainder Theorem Without Auxiliary Encryption. IEEE Access 7: 75113-75121 (2019) - [j43]Qinghong Gong, Yongjie Wang, Xuehu Yan, Lintao Liu:
Efficient and Lossless Polynomial-Based Secret Image Sharing for Color Images. IEEE Access 7: 113216-113222 (2019) - [j42]Hanlin Liu, Jingju Liu, Xuehu Yan, Lintao Liu, Wanmeng Ding, Yue Jiang:
A Novel Behavior Steganography Model Based on Secret Sharing. Int. J. Digit. Crime Forensics 11(4): 97-117 (2019) - [j41]Xuehu Yan, Lintao Liu, Yuliang Lu, Qinghong Gong:
Security analysis and classification of image secret sharing. J. Inf. Secur. Appl. 47: 208-216 (2019) - [j39]Lintao Liu, Yuliang Lu, Xuehu Yan:
Polynomial-based extended secret image sharing scheme with reversible and unexpanded covers. Multim. Tools Appl. 78(2): 1265-1287 (2019) - [j38]Xuehu Yan, Yuliang Lu, Lintao Liu:
A general progressive secret image sharing construction method. Signal Process. Image Commun. 71: 66-75 (2019) - 2018
- [j37]Xuehu Yan, Yuliang Lu, Lintao Liu:
General Meaningful Shadow Construction in Secret Image Sharing. IEEE Access 6: 45246-45255 (2018) - [j36]Xuehu Yan, Yuliang Lu, Lintao Liu, Jingju Liu, Guozheng Yang:
Chinese remainder theorem-based two-in-one image secret sharing with three decoding options. Digit. Signal Process. 82: 80-90 (2018) - [j35]Wanmeng Ding, Kesheng Liu, Xuehu Yan, Lintao Liu:
Polynomial-Based Secret Image Sharing Scheme with Fully Lossless Recovery. Int. J. Digit. Crime Forensics 10(2): 120-136 (2018) - [j34]Xuehu Yan, Yuliang Lu, Lintao Liu, Duohe Ma:
Image Secret Sharing Construction for General Access Structure with Meaningful Share. Int. J. Digit. Crime Forensics 10(3): 66-77 (2018) - [j29]Xuehu Yan, Yuliang Lu, Lintao Liu, Shen Wang:
Partial secret image sharing for (k, n) threshold based on image inpainting. J. Vis. Commun. Image Represent. 50: 135-144 (2018) - [j27]Lintao Liu, Yuliang Lu, Xuehu Yan, Huaixi Wang:
Greyscale-images-oriented progressive secret sharing based on the linear congruence equation. Multim. Tools Appl. 77(16): 20569-20596 (2018) - [j25]Longdan Tan, Kesheng Liu, Xuehu Yan, Lintao Liu, Tianqi Lu, Jinrui Chen, Feng Liu, Yuliang Lu:
Robust Visual Secret Sharing Scheme Applying to QR Code. Secur. Commun. Networks 2018: 4036815:1-4036815:12 (2018) - [j24]Xuan Zhou, Yuliang Lu, Xuehu Yan, Yongjie Wang, Lintao Liu:
Lossless and Efficient Polynomial-Based Secret Image Sharing with Reduced Shadow Size. Symmetry 10(7): 249 (2018) - [j23]Jinrui Chen, Kesheng Liu, Xuehu Yan, Lintao Liu, Xuan Zhou, Longdan Tan:
Chinese Remainder Theorem-Based Secret Image Sharing with Small-Sized Shadow Images. Symmetry 10(8): 340 (2018) - [j22]Wanmeng Ding, Kesheng Liu, Xuehu Yan, Huaixi Wang, Lintao Liu, Qinghong Gong:
An Image Secret Sharing Method Based on Matrix Theory. Symmetry 10(10): 530 (2018) - 2017
- [j20]Xuehu Yan, Yuliang Lu, Lintao Liu, Song Wan, Wanmeng Ding, Hanlin Liu:
Exploiting the Homomorphic Property of Visual Cryptography. Int. J. Digit. Crime Forensics 9(2): 45-56 (2017) - [j19]Lintao Liu, Yuliang Lu, Xuehu Yan, Song Wan:
A Novel Progressive Secret Image Sharing Scheme Based on Arithmetic Mean. Int. J. Digit. Crime Forensics 9(3): 28-37 (2017) - [j18]Song Wan, Yuliang Lu, Xuehu Yan, Lintao Liu:
A Novel Visual Secret Sharing Scheme Based on QR Codes. Int. J. Digit. Crime Forensics 9(3): 38-48 (2017) - [c25]Xuehu Yan, Yuliang Lu, Lintao Liu, Song Wan, Wanmeng Ding, Hanlin Liu:
Chinese Remainder Theorem-Based Secret Image Sharing for (k, n) Threshold. ICCCS (2) 2017: 433-440 - [c24]Xuehu Yan, Yuliang Lu, Lintao Liu, Shen Wang, Song Wan, Wanmeng Ding, Hanlin Liu:
Partial Secret Image Sharing for (n, n) Threshold Based on Image Inpainting. ICIG (3) 2017: 527-538 - [c22]Xuehu Yan, Yuliang Lu, Lintao Liu, Song Wan, Wanmeng Ding, Hanlin Liu:
Security Analysis of Secret Image Sharing. ICPCSEE (1) 2017: 305-316 - [c21]Wanmeng Ding, Kesheng Liu, Xuehu Yan, Lintao Liu:
A General (k, n) Threshold Secret Image Sharing Construction Based on Matrix Theory. ICPCSEE (1) 2017: 331-340 - [c20]Lintao Liu, Yuliang Lu, Xuehu Yan, Wanmeng Ding:
A Novel Progressive Secret Image Sharing Method with Better Robustness. ICPCSEE (2) 2017: 539-550 - [c19]Xuehu Yan, Yuliang Lu, Lintao Liu, Song Wan, Wanmeng Ding, Hanlin Liu:
Secret Image Sharing for (k, k) Threshold Based on Chinese Remainder Theorem and Image Characteristics. PSIVT 2017: 174-181 - 2016
- [c18]Xuehu Yan, Yuliang Lu, Hui Huang, Lintao Liu, Song Wan:
Clarity Corresponding to Contrast in Visual Cryptography. ICYCSEE (1) 2016: 249-257 - [c17]Xuehu Yan, Yuliang Lu, Lintao Liu, Song Wan, Wanmeng Ding, Hanlin Liu:
Contrast-Improved Visual Cryptography for General Access Structure. iThings/GreenCom/CPSCom/SmartData 2016: 578-583 - [c16]Xuehu Yan, Yuliang Lu, Lintao Liu, Song Wan:
Random Grids-Based Threshold Visual Secret Sharing with Improved Visual Quality. IWDW 2016: 209-222 - [c15]Song Wan, Yuliang Lu, Xuehu Yan, Lintao Liu:
Visual Secret Sharing Scheme with (k, n) Threshold Based on QR Codes. MSN 2016: 374-379 - [c14]Lintao Liu, Yuliang Lu, Xuehu Yan, Song Wan:
A Progressive Threshold Secret Image Sharing with Meaningful Shares for Gray-Scale Image. MSN 2016: 380-385 - [c12]Xuehu Yan, Yuliang Lu, Lintao Liu, Song Wan, Wanmeng Ding, Hanlin Liu:
Perceptual Secret Sharing Scheme Based on Boolean Operations and Random Grids. WICON 2016: 80-90
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 00:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint