热点话题人物,欢迎提交收录!
最优雅的名人百科,欢迎向我们提交收录。
李鹏
2023-05-10 15:46
  • 李鹏
  • 李鹏 - 副教授-华北电力大学(保定)-数学系-个人资料

近期热点

资料介绍

研究领域


信息安全、应用数学

近期论文


Peng Li*, Ching-Nung Yang, Qian Kong. A novel two-in-one image secret sharing scheme based on perfect black visual cryptography. Journal of Real-Time Image Processing, 2018, 14:41–50. (SCI)
Peng Li*, Ching-Nung Yang, Zuquan Liu. A construction method of (t,k,n,)-essential secret image sharing scheme. Signal Processing: Image Communication, 2018, 65: 210–220. (SCI)
Peng Li*, Zuquan Liu. An Improved Essential Secret Image Sharing Scheme with Smaller Shadow Size. International Journal of Digital Crime and Forensics, 2018, 10 (3): 78-94. (ESCI, EI)
Peng Li*, C.N. Yang, Z. Zhou. Essential secret image sharing scheme with the same size of shadows. Digital Signal Processing, 2016,50:51-60(SCI)
Ching-Nung Yang, Peng Li*, Chih-Cheng Wu, Song-Ruei Cai. Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach, Signal Processing: Image Communication, 2015, 31: 1-9. (SCI)
Peng Li*, Ching-Nung Yang, Qian Kong, Yanpeng Ma, Zheng Liu. Sharing more information in gray visual cryptography scheme. Journal of Visual Communication and Image Representation. 2013, 24(8): 1380-1393. (SCI)
Peng Li*, Ching-Nung Yang, Chih-Cheng Wu, Qian Kong, Yanpeng Ma. Essential secret image sharing scheme with different importance of shadows. Journal of Visual Communication and Image Representation. 2013, 24(7): 1106-1114. ( SCI)
Peng Li*, Peijun Ma, Xiaohong Su, Ching-Nung Yang. Improvements of a two-in-one image secret sharing scheme based on gray mixing model. Journal of Visual Communication and Image Representation. 2012, 23(3): 441–453. (SCI)
Peng Li*, Qian Kong, Yanpeng Ma. Image secret sharing and hiding with authentication based on PSNR estimation. Journal of Information Hiding and Multimedia Signal Processing, 2014, 5(3):357-370. (EI)
Peng Li*, Qian Kong, Yanpeng Ma. Double-threshold image secret sharing scheme based on gray mixing model. ICIC Express Letters, 2014, 8(8): 2135-2140. (EI)
鹏*,马培军,苏小红,刘峰. 多重门限的图像秘密共享方案.电子学报, 2012, 40(3):518-524. (EI).
Peng Li*, Peijun Ma, Dong Li. Aspect ratio invariant visual cryptography scheme with flexible size expansion. ICIC Express Letters, 2012, 6(8): 1-6. (EI)
Feng Liu*, Weiqi Yan, Peng Li and Chuankun Wu. ESSVCS: An Enriched Secret Sharing Visual Cryptography. The Springer Transactions on Data Hiding and Multimedia Security IX, Lecture Notes in Computer Science Volume 8363, 2014, pp 1-24. (EI)
Qian Kong*, Peng Li, Yanpeng Ma. On the feasibility and security of image secret sharing scheme to identify cheaters. Journal of Information Hiding and Multimedia Signal Processing. 2013, 4(4): 225-232. (EI)
Peng Li*, Ching-Nung Yang, Qian Kong, Two-in-One Image Secret Sharing Scheme Based on Boolean Operations. Accepted by IWDW 2014 (13th International Workshop on Digital-forensics and Watermarking), Lecture Notes in Computer Science, 2015, 9023:305-318, Taibei, 1 Oct.- 4 Oct. 2014.

相关热点

扫码添加好友