Daoshun Wang

Orcid: 0000-0001-8610-6065

According to our database1, Daoshun Wang authored at least 58 papers between 2005 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
DT CWT and Schur decomposition based robust watermarking algorithm to geometric attacks.
Multim. Tools Appl., 2022

A perfect secret sharing scheme for general access structures.
Inf. Sci., 2022

2020
Deep Learning Approach Applied to Prediction of Bone Age Based on Computed Tomography Orthopedic Image Processing.
J. Medical Imaging Health Informatics, 2020

2019
An efficient XOR-based verifiable visual cryptographic scheme.
Multim. Tools Appl., 2019

A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem.
Inf. Sci., 2019

Boolean Operation Based Visual Cryptography.
IEEE Access, 2019

Using Transposition Padding to Get CCA2 Security From Any Deterministic Encryption Schemes.
IEEE Access, 2019

2018
Collaborative Visual Cryptography Schemes.
IEEE Trans. Circuits Syst. Video Technol., 2018

Secure "Ratio" Computation and Efficient Protocol for General Secure Two-Party Comparison.
IEEE Access, 2018

2017
Secure and Energy-Efficient Data Transmission System Based on Chaotic Compressive Sensing in Body-to-Body Networks.
IEEE Trans. Biomed. Circuits Syst., 2017

New privilege-based visual cryptography with arbitrary privilege levels.
J. Vis. Commun. Image Represent., 2017

A new sharing digital image scheme with clearer shadow images.
Comput. Stand. Interfaces, 2017

2016
A homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracle.
Theor. Comput. Sci., 2016

Two image encryption methods with hiding effect based on moiré pattern.
Int. J. High Perform. Comput. Netw., 2016

2014
Property Analysis of XOR-Based Visual Cryptography.
IEEE Trans. Circuits Syst. Video Technol., 2014

On Data and Virtualization Security Risks and Solutions of Cloud Computing.
J. Networks, 2014

A discussion on the relationship between probabilistic visual cryptography and random grid.
Inf. Sci., 2014

Secure multiparty computation of solid geometric problems and their applications.
Inf. Sci., 2014

Visual Cryptography Scheme with Autostereogram.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

2013
Optimal Contrast Grayscale Visual Cryptography Schemes With Reversing.
IEEE Trans. Inf. Forensics Secur., 2013

A transcoding-resistant video watermarking algorithm based on corners and singular value decomposition.
Telecommun. Syst., 2013

How to Collaborate between Threshold Schemes
CoRR, 2013

An Anti-cheating Block Secret Sharing Scheme Based on Cyclic Codes.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

2012
Optimal Contrast Greyscale Visual Cryptography Schemes with Reversing
CoRR, 2012

Weighted Stego-Image Steganalysis of Messages Hidden into Each Bit Plane.
Comput. J., 2012

On F5 Steganography in Images.
Comput. J., 2012

(2, n) secret sharing scheme for gray and color images based on Boolean operation.
Sci. China Inf. Sci., 2012

Conjunctive Keywords Searchable Encryption with Efficient Pairing, Constant Ciphertext and Short Trapdoor.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2012

2011
Probabilistic visual secret sharing schemes for grey-scale images and color images.
Inf. Sci., 2011

2010
On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme.
EURASIP J. Adv. Signal Process., 2010

Towards Shift Tolerant Visual Secret Sharing Schemes
CoRR, 2010

Image universal steganalysis based on best wavelet packet decomposition.
Sci. China Inf. Sci., 2010

(2, n) Secret Image Sharing Scheme with Ideal Contrast.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2009
On general construction for extended visual cryptography schemes.
Pattern Recognit., 2009

Secure Signature Protocol.
Intell. Inf. Manag., 2009

Probability method for cryptanalysis of general multivariate modular linear equation.
Sci. China Ser. F Inf. Sci., 2009

Cryptanalysis of RSA for a special case with <i>d</i> > <i>e</i>.
Sci. China Ser. F Inf. Sci., 2009

Symmetric cryptographic protocols for extended millionaires' problem.
Sci. China Ser. F Inf. Sci., 2009

Automated Thickness Measurement of Nacreous Layer of Seawater Pearls Based on Optical Coherence Tomography.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

Automated Thickness Measurements of Pearl from Optical Coherence Tomography Images.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

Cryptanalysis of RSA with Constrained Low Public Exponent.
Proceedings of the 2009 International Conference on Security & Management, 2009

Remarks on Cryptanalysis of RSA Using Lattice Basis Reduction.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
A review on blind detection for image steganography.
Signal Process., 2008

A distributed expansible authentication model based on Kerberos.
J. Netw. Comput. Appl., 2008

A scalable authentication model based on public keys.
J. Netw. Comput. Appl., 2008

Symmetric cryptographic solution to Yao's millionaires' problem and an evaluation of secure multiparty computations.
Inf. Sci., 2008

Comparing two sets without disclosing them.
Sci. China Ser. F Inf. Sci., 2008

2007
LTSB Steganalysis Based on Quartic Equation.
Trans. Data Hiding Multim. Secur., 2007

Two secret sharing schemes based on Boolean operations.
Pattern Recognit., 2007

Probabilistic Visual Secret Sharing Schemes for Gray-scale images and Color images
CoRR, 2007

Secret Key Estimation for Image Sequential Steganograph in Transform Domain.
Proceedings of the Global Communications Conference, 2007

Colored Probabilistic Visual Cryptography Scheme with Reversing.
Proceedings of the 2007 International Conference on Security & Management, 2007

Cryptanalysis of General Lu-Lee Type Systems.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Probabilistic (n, n) Visual Secret Sharing Scheme for Grayscale Images.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

2006
Visual secret sharing scheme with autostereogram.
IACR Cryptol. ePrint Arch., 2006

On the Analysis and Generalization of Extended Visual Cryptography Schemes
CoRR, 2006

Symmetric Encryption Solutions to Millionaire's Problem and Its Extension.
Proceedings of the First IEEE International Conference on Digital Information Management (ICDIM), 2006

2005
Secret color images sharing schemes based on XOR operation.
IACR Cryptol. ePrint Arch., 2005


  Loading...