A multi-threshold secret image sharing scheme based on MSP

GuoCheng , ChangChin-Chen , QinChuan
Pattern Recognition Letters

2012
Construction of Dynamic Threshold Scheme

Ren Yizhi , Li Mingchu , Guo Cheng , Sakurai Kouichi
コンピュータセキュリティシンポジウム2009 (CSS2009) 論文集 2009 1 -6

2011
Perceptual Robust Image Hashing Scheme Based on Secret Sharing

Guo Cheng , Chang Chin Chen , Qin Chuan
Journal of Computer Research and Development 49 ( 8) 1690

1
2012
Enhancing Cooperative Behavior for P2P Reputation Systems by Group Selection (Theoretical Computer Science and Its Applications)

Yongrui Cui , Kouichi Sakurai , Yizhi Ren , Mingchu Li
数理解析研究所講究録 1649 17 -22

2009
Proactive Weighted Threshold Signature Based on Generalized Chinese Remainder Theorem

Cheng Guo , Chin-Chen Chang ,
Journal of Electronic Science and Technology 10 ( 3) 250 -255

1
2012
Fuzzy Set Theory-Based Trust Models in Multi-Agent Environment

Jianhua Ma , Young-Sik Jeong , Jong Hyuk Park , Zhiyuan Su
Journal of Internet Technology 13 ( 1) 159 -172

2
2012
Optimal Allocation Strategy Based on Stackelberg Game for Inspecting Drunk Driving on Traffic Network

Cheng Guo , Yingmo Jie , Mingchu Li , Tingting Tang
Ksii Transactions on Internet and Information Systems 11 ( 12) 5759 -5779

1
2017
A Secure and Efficient Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communications.

Chin-Chen Chang , Cheng Guo , Shih-Chang Chang
Int. J. Netw. Secur. 20 323 -331

21
2018
Chaotic Maps-Based Mutual Authentication and Key Agreement using Smart Cards for Wireless Communications

Cheng Guo , Chin-Chen Chang , Chin-Yu Sun ,
multimedia signal processing 4 99 -109

32
2013
Game-theoretic online resource allocation scheme on fog computing for mobile multimedia users

Cheng Guo , Yingmo Jie , Mingchu Li , Ling Chen
China Communications 16 ( 3) 22 -31

9
2019
A Construction for Secret Sharing Scheme with General Access Structure.

Cheng Guo , Chin-Chen Chang ,
J. Inf. Hiding Multim. Signal Process. 4 1 -8

15
2013
EigenCloud: A Cooperation and Trust-Aware Dependable Cloud File-Sharing Network

Cheng Guo , Yong Guan , Xing Jin , Zhen Wang
IEEE Transactions on Computational Social Systems 8 ( 2) 522 -536

2021
Region-based reversible medical image watermarking algorithm for privacy protection and integrity authentication

Cheng Guo , Hui Shi , Yonggong Ren , Yanni Li
Multimedia Tools and Applications 1 -37

2021
A Reversible Steganography Scheme of Secret Image Sharing Based on Cellular Automata and Least Significant Bits Construction

Wei-Tong Hu , Ming-Chu Li , Cheng Guo , Li-Feng Yuan
Mathematical Problems in Engineering 2015 ( 2015) 1 -11

6
2015
A Multi-attribute Hierarchical Threshold Scheme

Dong Jiao , Mingchu Li , Cheng Guo , Jianhua Ma
2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing 667 -671

2011
R-Dedup: Secure client-side deduplication for encrypted data without involving a third-party entity

Cheng Guo , Xueru Jiang , Kim-Kwang Raymond Choo , Yingmo Jie
Journal of Network and Computer Applications 162 102664

2
2020
Multi-objective Optimization for Multi-task Allocation in Mobile Crowd Sensing

Mingchu Li , Yuan Gao , Mingliang Wang , Cheng Guo
Procedia Computer Science 155 360 -368

8
2019
LPSSE: Lightweight Phrase Search with Symmetric Searchable Encryption in Cloud Storage

Mingchu Li , Wei Jia , Cheng Guo , Weifeng Sun
international conference on information technology: new generations 174 -178

8
2015
Encrypted Searching with Adaptive Symmetric Searchable Encryption Security in Cloud Storage

Mingchu Li , Wei Jia , Cheng Guo , Lieran Zhang
Proceedings of the 2015 International Symposium on Computers and Informatics 806 -813

1
2015