当前位置: X-MOL首页全球导师 国内导师 › 李鹏

研究领域

信息安全、应用数学

近期论文

查看导师最新文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

Peng Li*, Ching-Nung Yang, Qian Kong. A novel two-in-one image secret sharing scheme based on perfect black visual cryptography. Journal of Real-Time Image Processing, 2018, 14:41–50. (SCI) Peng Li*, Ching-Nung Yang, Zuquan Liu. A construction method of (t,k,n,)-essential secret image sharing scheme. Signal Processing: Image Communication, 2018, 65: 210–220. (SCI) Peng Li*, Zuquan Liu. An Improved Essential Secret Image Sharing Scheme with Smaller Shadow Size. International Journal of Digital Crime and Forensics, 2018, 10 (3): 78-94. (ESCI, EI) Peng Li*, C.N. Yang, Z. Zhou. Essential secret image sharing scheme with the same size of shadows. Digital Signal Processing, 2016,50:51-60(SCI) Ching-Nung Yang, Peng Li*, Chih-Cheng Wu, Song-Ruei Cai. Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach, Signal Processing: Image Communication, 2015, 31: 1-9. (SCI) Peng Li*, Ching-Nung Yang, Qian Kong, Yanpeng Ma, Zheng Liu. Sharing more information in gray visual cryptography scheme. Journal of Visual Communication and Image Representation. 2013, 24(8): 1380-1393. (SCI) Peng Li*, Ching-Nung Yang, Chih-Cheng Wu, Qian Kong, Yanpeng Ma. Essential secret image sharing scheme with different importance of shadows. Journal of Visual Communication and Image Representation. 2013, 24(7): 1106-1114. ( SCI) Peng Li*, Peijun Ma, Xiaohong Su, Ching-Nung Yang. Improvements of a two-in-one image secret sharing scheme based on gray mixing model. Journal of Visual Communication and Image Representation. 2012, 23(3): 441–453. (SCI) Peng Li*, Qian Kong, Yanpeng Ma. Image secret sharing and hiding with authentication based on PSNR estimation. Journal of Information Hiding and Multimedia Signal Processing, 2014, 5(3):357-370. (EI) Peng Li*, Qian Kong, Yanpeng Ma. Double-threshold image secret sharing scheme based on gray mixing model. ICIC Express Letters, 2014, 8(8): 2135-2140. (EI) 鹏*,马培军,苏小红,刘峰. 多重门限的图像秘密共享方案.电子学报, 2012, 40(3):518-524. (EI). Peng Li*, Peijun Ma, Dong Li. Aspect ratio invariant visual cryptography scheme with flexible size expansion. ICIC Express Letters, 2012, 6(8): 1-6. (EI) Feng Liu*, Weiqi Yan, Peng Li and Chuankun Wu. ESSVCS: An Enriched Secret Sharing Visual Cryptography. The Springer Transactions on Data Hiding and Multimedia Security IX, Lecture Notes in Computer Science Volume 8363, 2014, pp 1-24. (EI) Qian Kong*, Peng Li, Yanpeng Ma. On the feasibility and security of image secret sharing scheme to identify cheaters. Journal of Information Hiding and Multimedia Signal Processing. 2013, 4(4): 225-232. (EI) Peng Li*, Ching-Nung Yang, Qian Kong, Two-in-One Image Secret Sharing Scheme Based on Boolean Operations. Accepted by IWDW 2014 (13th International Workshop on Digital-forensics and Watermarking), Lecture Notes in Computer Science, 2015, 9023:305-318, Taibei, 1 Oct.- 4 Oct. 2014.

推荐链接
down
wechat
bug