Xin-peng Zhang
#116,895
Most Influential Person Now
Xin-peng Zhang's AcademicInfluence.com Rankings
Xin-peng Zhangcomputer-science Degrees
Computer Science
#4588
World Rank
#4841
Historical Rank
Information Security
#12
World Rank
#12
Historical Rank
Database
#1797
World Rank
#1883
Historical Rank

Download Badge
Computer Science
Xin-peng Zhang's Degrees
- PhD Computer Science Harbin Institute of Technology
- Masters Computer Science Harbin Institute of Technology
- Bachelors Computer Science Harbin Institute of Technology
Similar Degrees You Can Earn
Why Is Xin-peng Zhang Influential?
(Suggest an Edit or Addition)Xin-peng Zhang's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Reversible Data Hiding in Encrypted Image (2011) (791)
- Separable Reversible Data Hiding in Encrypted Image (2012) (762)
- Efficient Steganographic Embedding by Exploiting Modification Direction (2006) (640)
- An Effective CU Size Decision Method for HEVC Encoders (2013) (422)
- Reversible data hiding: Advances in the past two decades (2016) (390)
- Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security (2004) (278)
- Reversible Data Hiding in Encrypted Images With Distributed Source Encoding (2016) (226)
- Lossy Compression and Iterative Reconstruction for Encrypted Image (2011) (221)
- Reversible Data Hiding in Encrypted JPEG Bitstream (2014) (214)
- Reversible Data Hiding With Optimal Value Transfer (2013) (203)
- Robust Hashing for Image Authentication Using Zernike Moments and Local Features (2013) (194)
- Steganography using multiple-base notational system and human vision sensitivity (2005) (192)
- Effective reversible data hiding in encrypted image with privacy protection for image content (2015) (169)
- Reference Sharing Mechanism for Watermark Self-Embedding (2011) (163)
- Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy (2017) (157)
- Fragile Watermarking With Error-Free Restoration Capability (2008) (156)
- Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction (2011) (144)
- Efficient reversible data hiding in encrypted images (2014) (141)
- Invisible Backdoor Attacks on Deep Neural Networks Via Steganography and Regularization (2019) (132)
- Fragile watermarking scheme using a hierarchical mechanism (2009) (122)
- Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels (2007) (117)
- Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization (2008) (117)
- A Double Layered “Plus-Minus One” Data Embedding Scheme (2007) (107)
- Scalable Coding of Encrypted Images (2012) (105)
- Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection (2018) (104)
- Towards Robust Image Steganography (2019) (103)
- Lossless and Reversible Data Hiding in Encrypted Images With Public-Key Cryptography (2016) (102)
- Improving Embedding Efficiency of Covering Codes for Applications in Steganography (2007) (100)
- Image self-embedding with high-quality restoration capability (2011) (98)
- Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting (2019) (97)
- Lossless data hiding in JPEG bitstream (2012) (91)
- Separable Reversible Data Hiding in Encrypted JPEG Bitstreams (2018) (83)
- Estimation of Image Rotation Angle Using Interpolation-Related Spectral Signatures With Application to Blind Detection of Image Forgery (2010) (80)
- Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding (2018) (79)
- Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes (2008) (77)
- New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams (2019) (75)
- Lexicographical framework for image hashing with implementation based on DCT and NMF (2011) (73)
- Reversible Data Hiding in Encrypted Images Based on Progressive Recovery (2016) (71)
- Reversible fragile watermarking for locating tampered blocks in JPEG images (2010) (67)
- Fragile Watermarking Scheme with Extensive Content Restoration Capability (2009) (65)
- Toward Construction-Based Data Hiding: From Secrets to Fingerprint Images (2019) (64)
- Compressing Encrypted Image Using Compressive Sensing (2011) (62)
- Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode (2016) (62)
- An efficient coding scheme for reversible data hiding in encrypted image with redundancy transfer (2019) (61)
- Efficient double-layered steganographic embedding (2007) (60)
- Perceptual image hashing via dual-cross pattern encoding and salient structure detection (2018) (58)
- Kernel quaternion principal component analysis and its application in RGB-D object recognition (2017) (55)
- Compressing Encrypted Images With Auxiliary Information (2014) (54)
- Self-embedding watermark with flexible restoration quality (2011) (52)
- Detecting Image Forgery Using Perspective Constraints (2012) (52)
- Detecting Image Splicing Based on Noise Level Inconsistency (2017) (50)
- Log-Polar Based Scheme for Revealing Duplicated Regions in Digital Images (2011) (49)
- Commutative reversible data hiding and encryption (2013) (48)
- Watermarking Neural Networks With Watermarked Images (2021) (47)
- Fast TU size decision algorithm for HEVC encoders using Bayesian theorem detection (2015) (45)
- Block cipher based separable reversible data hiding in encrypted images (2016) (45)
- Markov process-based retrieval for encrypted JPEG images (2015) (43)
- Dynamic Adjustment of Hidden Node Parameters for Extreme Learning Machine (2015) (43)
- Flexible Lossy Compression for Selective Encrypted Image With Image Inpainting (2019) (42)
- Perceptual image hashing with selective sampling for salient structure features (2016) (39)
- Multibit Assignment Steganography in Palette Images (2008) (39)
- JPEG Steganalysis With High-Dimensional Features and Bayesian Ensemble Classifier (2013) (39)
- On Improving Distortion Functions for JPEG Steganography (2018) (39)
- Dynamical running coding in digital steganography (2006) (39)
- Compression of encrypted images with multi-layer decomposition (2014) (37)
- Reversible data hiding in encrypted images using adaptive reversible integer transformation (2020) (36)
- Encrypted JPEG image retrieval using block-wise feature comparison (2016) (35)
- Automatic non-proliferative diabetic retinopathy screening system based on color fundus image (2017) (35)
- Robust Steganography Using Texture Synthesis (2017) (35)
- Anti-Forensics for Face Swapping Videos via Adversarial Training (2022) (33)
- A Low-Overhead, Confidentiality-Assured, and Authenticated Data Acquisition Framework for IoT (2020) (33)
- Steganography with Least Histogram Abnormality (2003) (32)
- Feature-transfer network and local background suppression for microaneurysm detection (2020) (32)
- Diversity-Based Cascade Filters for JPEG Steganalysis (2020) (31)
- Reversible data hiding in encrypted images based on multi-level encryption and block histogram modification (2017) (31)
- Lossless data hiding in JPEG bitstream using alternative embedding (2018) (31)
- Hybrid distortion function for JPEG steganography (2016) (31)
- Joint Cover-Selection and Payload-Allocation by Steganographic Distortion Optimization (2018) (30)
- Watermarking in Deep Neural Networks via Error Back-propagation (2020) (30)
- A New Approach to Commutative Watermarking-Encryption (2012) (30)
- Evolutionary selection extreme learning machine optimization for regression (2012) (30)
- Robust Batch Steganography in Social Networks With Non-Uniform Payload and Data Decomposition (2018) (29)
- Simultaneous inpainting for image structure and texture using anisotropic heat transfer model (2012) (29)
- Near-Optimal Codes for Information Embedding in Gray-Scale Signals (2010) (29)
- Reversible data hiding in encrypted image based on block histogram shifting (2016) (29)
- Markov process-based retrieval for encrypted JPEG images (2016) (27)
- An efficient privacy protection scheme for data security in video surveillance (2019) (27)
- Detection of Image Region-Duplication with Rotation and Scaling Tolerance (2010) (26)
- Fully Anonymous Identity-based Broadcast Encryption without Random Oracles (2014) (26)
- Structural Feature-Based Image Hashing and Similarity Metric for Tampering Detection (2011) (26)
- Reversible Data Hiding in Encrypted Images Using Pseudorandom Sequence Modulation (2012) (26)
- Secure neural network watermarking protocol against forging attack (2020) (26)
- AC-coefficient histogram-based retrieval for encrypted JPEG images (2016) (25)
- Image Splicing Detection Using Color Edge Inconsistency (2010) (24)
- Reversible visible watermark embedded in encrypted domain (2015) (24)
- Spatial Steganalysis Using Contrast of Residuals (2016) (24)
- A Common Method of Share Authentication in Image Secret Sharing (2021) (24)
- Distortion function based on residual blocks for JPEG steganography (2018) (23)
- Reversible data hiding in encrypted AMBTC images (2018) (23)
- On Cloud Storage Optimization of Blockchain With a Clustering-Based Genetic Algorithm (2020) (23)
- Reversible Data Hiding With Image Enhancement Using Histogram Shifting (2019) (23)
- Verifiable Outsourcing Algorithms for Modular Exponentiations with Improved Checkability (2016) (22)
- Histogram-based retrieval for encrypted JPEG images (2014) (21)
- Improved Steganographic Embedding Exploiting Modification Direction in Multimedia Communications (2011) (21)
- Improved joint reversible data hiding in encrypted images (2016) (21)
- Efficient Reversible Data Hiding for JPEG Images With Multiple Histograms Modification (2021) (21)
- Image Splicing Detection Using Camera Characteristic Inconsistency (2009) (20)
- Huffman-code based retrieval for encrypted JPEG images (2019) (20)
- Efficient Data Hiding With Plus-Minus One or Two (2010) (20)
- Improved anti-forensics of JPEG compression (2014) (19)
- Recent Advances in Image-Based Steganalysis Research: Recent Advances in Image-Based Steganalysis Research (2009) (18)
- Exploring Stable Coefficients on Joint Sub-Bands for Robust Video Watermarking in DT CWT Domain (2022) (18)
- High Capacity Lossless Data Hiding in JPEG Bitstream Based on General VLC Mapping (2019) (18)
- HF-TPE: High-Fidelity Thumbnail- Preserving Encryption (2022) (17)
- Hologram-based watermarking capable of surviving print-scan process. (2010) (17)
- New Fuzzy Identity-Based Encryption in the Standard Model (2010) (16)
- Detection of double JPEG compression using modified DenseNet model (2018) (16)
- Behavior Steganography in Social Network (2017) (16)
- Optimized Lossless Data Hiding in JPEG Bitstream and Relay Transfer-Based Extension (2021) (16)
- Improved Lossless Data Hiding for JPEG Images Based on Histogram Modification (2018) (16)
- Unbalanced JPEG image steganalysis via multiview data match (2016) (15)
- Image Editing without Color Inconsistency Using Modified Poisson Equation (2008) (15)
- A general framework for shiftable position-based dual-image reversible data hiding (2018) (15)
- Self CNN-based time series stream forecasting (2016) (15)
- Adaptive JPEG steganography with new distortion function (2014) (15)
- Stego-Encoding with Error Correction Capability (2005) (15)
- Semantic image compression based on data hiding (2015) (15)
- Generative Text Steganography Based on LSTM Network and Attention Mechanism with Keywords (2020) (15)
- Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy (2016) (14)
- Privacy-preserving batch verification signature scheme based on blockchain for Vehicular Ad-Hoc Networks (2021) (14)
- Detection of Spoofing Medium Contours for Face Anti-Spoofing (2021) (14)
- Digital image steganalysis based on local textural features and double dimensionality reduction (2016) (14)
- Reversible Data Hiding With Hierarchical Embedding for Encrypted Images (2022) (14)
- Diabetic Retinopathy Retinal Image Enhancement Based on Gamma Correction (2017) (14)
- Watermarking Scheme Capable of Resisting Sensitivity Attack (2007) (14)
- Watermarking Graph Neural Networks by Random Graphs (2020) (13)
- Perceptual Image Hashing for Content Authentication Based on Convolutional Neural Network With Multiple Constraints (2020) (13)
- Perceptual Similarity Metric Resilient to Rotation for Application in Robust Image Hashing (2009) (13)
- Non-interactive Dynamic Identity-Based Broadcast Encryption without Random Oracles (2012) (13)
- Steganography in binary image by checking data-carrying eligibility of boundary pixels (2007) (13)
- New metric for quality assessment of digital images based on weighted mean square error (2002) (13)
- Analysis of Parity Assignment Steganography in Palette Images (2005) (12)
- Efficient data hiding with histogram-preserving property (2012) (12)
- Robust image watermarking based on generative adversarial network (2020) (12)
- Batch Steganography via Generative Network (2021) (12)
- Linguistic Steganalysis With Graph Neural Networks (2021) (12)
- Detect piecewise linear contrast enhancement and estimate parameters using spectral analysis of image histogram (2009) (12)
- Feature extraction optimization of JPEG steganalysis based on residual images (2020) (12)
- Data Hiding in Iris Image for Privacy Protection (2018) (11)
- Distortion Function for JPEG Steganography Based on Image Texture and Correlation in DCT Domain (2018) (11)
- An improved first quantization matrix estimation for nonaligned double compressed JPEG images (2020) (11)
- Watermarking Neural Network with Compensation Mechanism (2020) (11)
- Towards Robust Invariant Commutative Watermarking-Encryption Based on Image Histograms (2014) (11)
- Efficient Compression of Encrypted Binary Images Using the Markov Random Field (2017) (10)
- Broadcasting Steganography in the Blockchain (2019) (10)
- How to Extract Image Features Based on Co-Occurrence Matrix Securely and Efficiently in Cloud Computing (2020) (10)
- JPEG encryption for image rescaling in the encrypted domain (2015) (10)
- Semi-Supervised Structured Subspace Learning for Multi-View Clustering (2021) (10)
- Towards More Robust Commutative Watermarking-Encryption of Images (2013) (10)
- Secure Cover Selection for Steganography (2019) (10)
- Practical Cover Selection for Steganography (2020) (10)
- Complete Separable Reversible Data Hiding in Encrypted Image (2015) (10)
- Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server (2018) (10)
- Selective Ensemble Classification of Image Steganalysis Via Deep Q Network (2019) (10)
- From Image to Imuge: Immunized Image Generation (2021) (10)
- Structural Watermarking to Deep Neural Networks via Network Channel Pruning (2021) (10)
- SODNet: small object detection using deconvolutional neural network (2020) (10)
- Block cipher based separable reversible data hiding in encrypted images (2015) (9)
- Reversible Privacy-Preserving Recognition (2021) (9)
- A Reversible Data Hiding Scheme in Encrypted Domain for Secret Image Sharing Based on Chinese Remainder Theorem (2020) (9)
- Non-Interactive and secure outsourcing of PCA-Based face recognition (2021) (8)
- Imperceptible Backdoor Attack: From Input Space to Feature Representation (2022) (8)
- Hard Exudates Detection Method Based on Background-Estimation (2015) (8)
- Mixing high-dimensional features for JPEG steganalysis with ensemble classifier (2014) (8)
- Inheritance Attention Matrix-Based Universal Adversarial Perturbations on Vision Transformers (2021) (8)
- Privacy-Protected Deletable Blockchain (2020) (8)
- Fully Secure Ciphertext-Policy Attribute-Based Encryption with Constant Size Ciphertext (2011) (8)
- Rotation Based Reversible Data Hiding for JPEG Images (2016) (8)
- New Advances of Privacy Protection and Multimedia Content Security for Big Data and Cloud Computing (2018) (8)
- An Efficient Batch Verifying Scheme for Detecting Illegal Signatures (2015) (8)
- Distortion Function for Spatial Image Steganography Based on the Polarity of Embedding Change (2016) (8)
- Data Hiding in Digital Audio by Frequency Domain Dithering (2003) (8)
- A New Steganography Method for Dynamic GIF Images Based on Palette Sort (2020) (7)
- A robust and fast video fingerprinting based on 3D-DCT and LSH (2011) (7)
- Image restoration using truncated SVD filter bank based on an energy criterion (2006) (7)
- Lost in the Digital Wild: Hiding Information in Digital Activities (2018) (7)
- Spatial steganalysis using redistributed residuals and diverse ensemble classifier (2016) (7)
- On Security Enhancement of Steganography via Generative Adversarial Image (2020) (7)
- Asymmetric Distortion Function for JPEG Steganography Using Block Artifact Compensation (2019) (7)
- Real-Time Surface EMG Pattern Recognition for Hand Gestures Based on Support Vector Machine* (2019) (7)
- Watermarking scheme capable of resisting attacks based on availability of inserter (2002) (7)
- Secure and Efficient Image Retrieval over Encrypted Cloud Data (2018) (7)
- End-to-End Model for Speech Enhancement by Consistent Spectrogram Masking (2019) (6)
- Integrated encoding with high efficiency for digital steganography (2007) (6)
- Constructive Steganography Using Texture Synthesis (2018) (6)
- Information Hiding in Text Using Typesetting Tools with Stego-Encoding (2006) (6)
- Repeatable Data Hiding: Towards the Reusability of Digital Images (2021) (6)
- Data Hiding in Neural Networks for Multiple Receivers [Research Frontier] (2021) (6)
- Breaking Steganography: Slight Modification with Distortion Minimization (2019) (6)
- Defeating data hiding in social networks using generative adversarial network (2020) (6)
- Fully Verifiable Algorithm for Secure Outsourcing of Bilinear Pairing in Cloud Computing (2017) (6)
- Hierarchical Identity-Based Proxy Re-Encryption without Random Oracles (2010) (6)
- Multimodal Fake News Detection via CLIP-Guided Learning (2022) (6)
- Distortion Function for Emoji Image Steganography (2019) (6)
- Destroying robust steganography in online social networks (2021) (6)
- Special Issue: Real-Time Data Hiding and Visual Cryptography (2018) (6)
- Steganographic visual story with mutual-perceived joint attention (2021) (5)
- Quaternion-type moments combining both color and depth information for RGB-D object recognition (2016) (5)
- Embedding Probability Guided Network for Image Steganalysis (2021) (5)
- Hiding Images Into Images with Real-World Robustness (2021) (5)
- Maximum Block Energy Guided Robust Subspace Clustering (2022) (5)
- Image Watermarking using Dither Modulation in Dual-Transform Domain (2002) (5)
- Semi-structured data protection scheme based on robust watermarking (2020) (5)
- Senary Huffman Compression - A Reversible Data Hiding Scheme for Binary Images (2007) (5)
- Image Watermarking Scheme With Unequal Protection Capability Based on Error Correcting Codes (2010) (5)
- Undercover communication using image and text as disguise and countermeasures (2006) (5)
- Efficient Non-Targeted Attack for Deep Hashing Based Image Retrieval (2021) (5)
- Invertibility attack against watermarking based on forged algorithm and a countermeasure (2004) (4)
- Encryption Resistant Deep Neural Network Watermarking (2022) (4)
- Anti-forensics of diffusion-based image inpainting (2020) (4)
- ALiSa: Acrostic Linguistic Steganography Based on BERT and Gibbs Sampling (2022) (4)
- Securing Graph Steganography over Social Networks via Interaction Remapping (2020) (4)
- Adaptive video data hiding with low bit-rate growth based on texture selection and ternary syndrome-trellis coding (2020) (4)
- Unified Performance Evaluation Method for Perceptual Image Hashing (2022) (4)
- Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation (2003) (4)
- IoT for the Power Industry: Recent Advances and Future Directions with Pavatar (2018) (4)
- Multichannel Steganography in Digital Images for Multiple Receivers (2021) (4)
- Reversible Visible Watermarhing with Lossless Data Embedding Based on Difference Value Shift (2011) (4)
- Iris Segmentation Using Feature Channel Optimization for Noisy Environments (2020) (4)
- Fragile Neural Network Watermarking with Trigger Image Set (2021) (4)
- A novel auxiliary data construction scheme for reversible data hiding in JPEG images (2018) (4)
- Undetectable Adversarial Examples Based on Microscopical Regularization (2021) (4)
- Steganography Combining Data Decomposition Mechanism and Stego-coding Method (2009) (3)
- Reversible Contrast Mapping based Reversible Data Hiding in Encrypted Images (2018) (3)
- Stealthy Backdoor Attack with Adversarial Training (2022) (3)
- Low-complexity fake face detection based on forensic similarity (2021) (3)
- Identity-Based Encryption with Verifiable Outsourced Revocation (2016) (3)
- Fully Secure Anonymous Identity-Based Encryption under Simple Assumptions (2010) (3)
- Perceptual Image Hashing With Locality Preserving Projection for Copy Detection (2023) (3)
- Steganography in Social Networks Based on Behavioral Correlation (2020) (3)
- Separable Reversible Data Hiding in Encrypted JPEG (3)
- Steganographic embedding in JPEG images with visual criterion (2011) (3)
- Twice Gric Colorings in Steganography (2008) (3)
- Reducing Invertible Embedding Distortion Using Graph Matching Model (2020) (3)
- Semi-fragile watermarking for image authentication based on compressive sensing (2016) (3)
- Multispectral image watermarking based on KLT (2001) (3)
- Deep Neural Network Retrieval (2021) (3)
- Semantic-Preserving Linguistic Steganography by Pivot Translation and Semantic-Aware Bins Coding (2022) (3)
- Consistency-Induced Multiview Subspace Clustering (2022) (3)
- JPEG Steganography With Content Similarity Evaluation. (2022) (3)
- Perceptual Hashing With Complementary Color Wavelet Transform and Compressed Sensing for Reduced-Reference Image Quality Assessment (2022) (3)
- Diffusing the Liveness Cues for Face Anti-spoofing (2021) (3)
- Efficient Dynamic Integrity Verification for Big Data Supporting Users Revocability (2016) (3)
- Breaking Permutation-Based Mesh Steganography and Security Improvement (2019) (3)
- Exploiting Language Model For Efficient Linguistic Steganalysis (2021) (3)
- An Improved Steganalysis Method Using Feature Combinations (2019) (3)
- Ensemble Stego Selection for Enhancing Image Steganography (2022) (3)
- Adaptive transform size decision algorithm for high-efficiency video coding inter coding (2014) (3)
- Reversible Data Hiding in Encrypted AMBTC Compressed Images (2016) (3)
- Ensemble Steganalysis Based on Deep Residual Network (2019) (3)
- Steganography by Constructing Marbling Texture (2018) (3)
- Steganography in stylized images (2019) (3)
- Patch Diffusion: A General Module for Face Manipulation Detection (2022) (3)
- Block-Diagonal Guided Symmetric Nonnegative Matrix Factorization (2021) (3)
- Shape-based filter for micro-aneurysm detection (2020) (2)
- Steganography with Histogram-Preserving and Distortion-Constraining Properties (2009) (2)
- A DTCWT-SVD Based Video Watermarking Resistant to Frame Rate Conversion (2022) (2)
- Multi-granularity Brushstrokes Network for Universal Style Transfer (2022) (2)
- Signal-Dependent Noise Estimation for a Real-Camera Model via Weight and Shape Constraints (2022) (2)
- Efficient steganography based on a data decomposition mechanism (2008) (2)
- Data hiding in Fingerprint Minutiae Template for Privacy Protection (2017) (2)
- Neural Visual Social Comment on Image-Text Content (2020) (2)
- Lightweight Salient Object Detection in Optical Remote-Sensing Images via Semantic Matching and Edge Alignment (2023) (2)
- Forensic Analysis of JPEG-Domain Enhanced Images via Coefficient Likelihood Modeling (2021) (2)
- Robust Face Recognition in Low Resolution and Blurred Image Using Joint Information in Space and Frequency (2012) (2)
- Multi-Source Stego Detection with Low-Dimensional Textural Feature and Clustering Ensembles (2018) (2)
- F-TPE: Flexible Thumbnail-Preserving Encryption Based on Multi-Pixel Sum-Preserving Encryption (2022) (2)
- Hierarchical identification of visually salient image regions (2008) (2)
- Effective feature selection for image steganalysis using extreme learning machine (2014) (2)
- Single Actor Pooled Steganalysis (2018) (2)
- Sensing Signal Analysis and Imaging Processing With High Frequency Ultrasonic Testing for Fe-Based Amorphous Coatings (2022) (2)
- Invertible Image Dataset Protection (2021) (2)
- Practical parallel key-insulated encryption with multiple helper keys (2013) (2)
- Game-theoretic Analysis to Parameterized Reversible Watermarking (2019) (2)
- A Comprehensive Analysis Method for Reversible Data Hiding in Stream-Cipher-Encrypted Images (2022) (2)
- A new watermarking scheme against inserter-based attacks suitable for digital media with moderate size (2004) (2)
- Special issue on real-time image watermarking and forensics in cloud computing (2019) (2)
- Secure image retrieval with multiple keys (2018) (2)
- Guest Editorial: Multimedia Information Security and Its Applications in Cloud Computing (2018) (2)
- Gaussian Model for 3D Mesh Steganography (2021) (2)
- Automatic Localization of Macula Fovea Based on Wavelet Transformation and Gray Contours (2015) (2)
- Neural Network Model Protection with Piracy Identification and Tampering Localization Capability (2022) (2)
- Key Based Artificial Fingerprint Generation for Privacy Protection (2020) (2)
- Combating Anti-forensics of Jpeg Compression (2012) (2)
- Watermarking capable of identifying embedding order based on an arithmetic mechanism (2003) (2)
- Reversible Data Hiding in Encrypted Images Based on Image Interpolation (2014) (2)
- New Paradigm for Self-embedding Image Watermarking with Poisson Equation (2019) (2)
- AIE-YOLO: Auxiliary Information Enhanced YOLO for Small Object Detection (2022) (2)
- GAN-Based Steganography with the Concatenation of Multiple Feature Maps (2019) (2)
- On Generating Identifiable Virtual Faces (2021) (2)
- Image Steganalysis with Convolutional Vision Transformer (2022) (2)
- Efficient wet paper embedding for steganography with multilayer construction (2014) (2)
- Anonymous Hierarchical Identity-Based Encryption in Prime Order Groups (2012) (2)
- Robust Image Hashing With Isomap and Saliency Map for Copy Detection (2023) (2)
- Hierarchical Authorization of Convolutional Neural Networks for Multi-User (2021) (1)
- General Expansion-Shifting Model for Reversible Data Hiding: Theoretical Investigation and Practical Algorithm Design (2022) (1)
- Generalized running coding for efficient data hiding (2008) (1)
- Generative Steganographic Flow (2022) (1)
- Domain Transferred Image Recognition via Generative Adversarial Network (2022) (1)
- Robust Image Protection Countering Cropping Manipulation (2022) (1)
- Style Transferring Based Data Hiding for Color Images (2018) (1)
- Spectrum-estimation based lossless information recovery for sparse array patterns (2012) (1)
- The application of cloud data integrity verification scheme in Internet of Things security (2017) (1)
- Query-Efficient Adversarial Attack With Low Perturbation Against End-to-End Speech Recognition Systems (2023) (1)
- An Improved Lossless Data Hiding Scheme in JPEG Bitstream by VLC Mapping (2017) (1)
- Unlabeled Backdoor Poisoning in Semi-Supervised Learning (2022) (1)
- Efficient video hashing based on low-rank frames (2021) (1)
- Neural Network Fragile watermarking With No Model Performance Degradation (2022) (1)
- Small Target Recognition Using Dynamic Time Warping and Visual Attention (2020) (1)
- Privacy-Enhanced and Verification-Traceable Aggregation for Federated Learning (2022) (1)
- Covert Communication via Modulating Soft Label of Neural Network (2021) (1)
- Using Phase Congruency Model for Microaneurysms Detection in Fundus Image (2015) (1)
- A Novel Location Privacy Protection Algorithm for Social Discovery Application (2020) (1)
- Matrix Selection in High Payload Embedding (2009) (1)
- Efficient outsourced extraction of histogram features over encrypted images in cloud (2021) (1)
- Towards Improved Steganalysis: When Cover Selection is Used in Steganography (2019) (1)
- Extraction of color-intensity feature towards image authentication (2010) (1)
- Content-Fragile Commutative Watermarking-Encryption Based on Pixel Entropy (2015) (1)
- Double-Layered Dual-Syndrome Trellis Codes Utilizing Channel Knowledge for Robust Steganography (2023) (1)
- A New Metric for Quality Assessment of Digital Images Based on Weighted-Mean Square Error 1 Proceedings of SPIE , vol . 4875 , 2002 (2003) (1)
- CADW: CGAN-based Attack on Deep Robust Image Watermarking (2022) (1)
- Light color performance analysis of LED take-off and landing signal lights in special weather conditions (2020) (1)
- Hiding Data Hiding (2021) (1)
- RWN: Robust Watermarking Network for Image Cropping Localization (2021) (1)
- Generative Steganography Network (2022) (1)
- Unified Data Hiding and Scrambling Method for JPEG Images (2018) (1)
- Fragile watermarking based on robust hidden information (2003) (1)
- Robust and Imperceptible Black-box DNN Watermarking Based on Fourier Perturbation Analysis and Frequency Sensitivity Clustering (2022) (1)
- On Generating JPEG Adversarial Images (2021) (1)
- Robust degraded face recognition with novel face representation and multiscale fusion (2013) (1)
- 基于DCT域相关性的非对称JPEG隐写 (Asymmetric JPEG Steganography Based on Correlation in DCT Domain) (2019) (1)
- Fine-grained and fair identity authentication scheme for mobile networks based on blockchain (2022) (1)
- Data embedding with multi-ary tree coding (2011) (1)
- Perceptual Hash of Neural Networks (2022) (1)
- Colour filter array interpolation based self recovery with anti-cropping capability (2010) (1)
- Breaking CNN-Based Steganalysis (2018) (1)
- Constructive Steganography by Tangles (2018) (1)
- Multimedia Security: Novel Steganography and Privacy Preserving (2018) (1)
- Hiding Images in Deep Probabilistic Models (2022) (1)
- Analysis of Matrix Embedding with Error Correction Capabilities (2012) (1)
- Image Generation Network for Covert Transmission in Online Social Network (2022) (1)
- Perceptual Robust Hashing for Color Images with Canonical Correlation Analysis (2020) (1)
- Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences (2003) (1)
- LED Floodlight Optical System Design (2019) (0)
- Microaneurysms detection in retinal fundus images based on shape constraint with region-context features (2023) (0)
- JPEG Image Encryption with Adaptive DC Coefficient Prediction and RS Pair Permutation (2022) (0)
- Data hiding during image processing using capsule networks (2023) (0)
- Non-Interactive and Secure Data Aggregation Scheme for Internet of Things (2021) (0)
- Defending against adversarial examples using perceptual image hashing (2023) (0)
- TVV: Real-Time Visual Identity and Tracking with Edge Computing (2019) (0)
- Breaking Robust Data Hiding in Online Social Networks (2022) (0)
- Efficient Noninteractive Outsourcing of Large-Scale QR and LU Factorizations (2021) (0)
- Robust backdoor injection with the capability of resisting network transfer (2022) (0)
- Improved Hierarchical Identity-Based Parallel Key-Insulated Encryption (2011) (0)
- Generating traceable adversarial text examples by watermarking in the semantic space (2022) (0)
- Location Privacy-Preserving Scheme Based on Multiple Virtual Maps (2018) (0)
- High-Capacity Reversible Data Hiding in Encrypted Image Using Pixel Predictions and Huffman Encoding (2021) (0)
- HF-Defend: Defending Against Adversarial Examples Based on Halftoning (2022) (0)
- New Data Storage Auditing Protocols (2014) (0)
- Robust Degraded Face Recognition Using Enhanced Local Frequency Descriptor and Multi-scale Competition (2012) (0)
- Reversible Data Hiding in Palette Images (2023) (0)
- High-Performance LED Light Source Mixed Optical System Design (2019) (0)
- Semi-fragile watermarking for image authentication based on compressive sensing (2016) (0)
- Adaptive Backdoor Attack against Deep Neural Networks (2023) (0)
- Hiding Function with Neural Networks (2022) (0)
- Adaptive 3D Mesh Steganography Based on Feature-Preserving Distortion (2022) (0)
- Additional articles of special issue on Real-time image watermarking and forensics in cloud computing (2019) (0)
- Macular Vessel Segmentation in Retinal Image Based on Direction Tracking and Pixel Convolution (2017) (0)
- Multi-modal Fake News Detection on Social Media via Multi-grained Information Fusion (2023) (0)
- Generalized Quality Assessment of Blocking Artifacts for Compressed Images (2012) (0)
- High Capacity Lossless Data Hiding for JPEG images by NLCM Relationship Constrcution (2019) (0)
- Multi-source Data Hiding in Neural Networks (2022) (0)
- Adaptive JPEG steganography with new distortion function (2014) (0)
- Cover Selection for Steganography Using Image Similarity (2022) (0)
- Reversible data hiding in encrypted images based on multi-level encryption and block histogram modification (2016) (0)
- Computing in Covert Domain Using Data Hiding (2020) (0)
- On the Robustness of "Robust Reversible Data Hiding Scheme Based on Two-Layer Embedding Strategy" (2021) (0)
- PSTNet: Protectable Style Transfer Network Based on Steganography (2022) (0)
- A fully supervised universal adversarial perturbations and the progressive optimization (2021) (0)
- Commutative Watermarking-Encryption of Multimedia Data Based on Histograms (2018) (0)
- Object-Oriented Backdoor Attack Against Image Captioning (2022) (0)
- Subjective and objective quality assessment of re-sampling audio (2012) (0)
- Evolutionary selection extreme learning machine optimization for regression (2012) (0)
- Generating watermarked adversarial texts (2021) (0)
- A Customized Deep Network Based Encryption-then-Lossy-Compression Scheme of Color Images Achieving Arbitrary Compression Ratios (2023) (0)
- Image Manipulation Localization Using Multi-Scale Feature Fusion and Adaptive Edge Supervision (2022) (0)
- Generative Model Watermarking Based on Human Visual System (2022) (0)
- Towards Criminal Sketching with Generative Adversarial Network (2020) (0)
- Reversible Data hiding in Encrypted Domain with Public Key Embedding Mechanism (2022) (0)
- Secure neural network watermarking protocol against forging attack (2020) (0)
- Steganographic technique capable of withstanding RQP analysis (2002) (0)
- Steganography of Steganographic Networks (2023) (0)
- Deniable Steganography (2022) (0)
- Adaptive Algorithm Based on Reversible Data Hiding Method for JPEG Images (2016) (0)
- Poster: A Hierarchical VR Streaming System through a WiFi Connection (2019) (0)
- Simultaneous inpainting for image structure and texture using anisotropic heat transfer model (2010) (0)
- A novel auxiliary data construction scheme for reversible data hiding in JPEG images (2017) (0)
- Classification of Snoring Sound-Related Signals Based on MLP (2018) (0)
- Cross-Modal Text Steganography Against Synonym Substitution-Based Text Attack (2023) (0)
- Robust image steganography against lossy JPEG compression based on embedding domain selection and adaptive error correction (2023) (0)
- Improved Scheme for Reversible Data Hiding for Encrypted Images using Interpolation Technique (2019) (0)
- Matrix-Based Secret Sharing for Reversible Data Hiding in Encrypted Images (2022) (0)
- Trojaning semi-supervised learning model via poisoning wild images on the web (2023) (0)
- Generalized Running Coding with Prime Base for Efficient Steganographic Embedding (2009) (0)
- Data hiding in images based on tolerable error range (2009) (0)
- Robust adversarial examples against scale transformation via generative network (2022) (0)
- Steganography in animated emoji using self-reference (2021) (0)
- Orientation Convolutional Networks for Image Recognition (2021) (0)
- Efficient wet paper embedding for steganography with multilayer construction (2013) (0)
- Steganographic Distortion Function for Enhanced Images (2020) (0)
- AC-coefficient histogram-based retrieval for encrypted JPEG images (2015) (0)
- Exploring Abnormal Behavior in Swarm: Identify User Using Adversarial Examples (2023) (0)
- Guest Editorial: Multimedia Information Security and Its Applications in Cloud Computing (2018) (0)
- An Infantile Hemangioma Dataset IH-2021 and a Deep Learning based Recognition Method on it (2021) (0)
- Learning to Immunize Images for Tamper Localization and Self-Recovery (2022) (0)
- Robust Watermarking for Video Forgery Detection with Improved Imperceptibility and Robustness (2022) (0)
- Spatial steganalysis using redistributed residuals and diverse ensemble classifier (2015) (0)
- Mixing high-dimensional features for JPEG steganalysis with ensemble classifier (2012) (0)
- Data Computing in Covert Domain (2020) (0)
- Efficient data hiding with histogram-preserving property (2010) (0)
- Privacy-enhanced and non-interactive linear regression with dropout-resilience (2023) (0)
- A non-local based segmentation method for Pelvic MR Images (2019) (0)
- Face Expression Recognition Based on Convolutional Neural Networks (2022) (0)
- Joint Learning for Addressee Selection and Response Generation in Multi-Party Conversation (2022) (0)
- Special issue on real-time image watermarking and forensics in cloud computing (2019) (0)
- Security Analysis for a Ciphertext-Policy Attribute-Based Encryption Scheme (2012) (0)
- Semi-structured data protection scheme based on robust watermarking (2020) (0)
- Watermarking Schemes Capable of Identifying Embedding Order (2007) (0)
- Detection of double JPEG compression using modified DenseNet model (2018) (0)
- JPEG Reversible Data Hiding Using Dynamic Distortion Optimizing With Frequency Priority Reassignment (2022) (0)
- Novel deconvolution approach to image restoration (2002) (0)
- Defeating data hiding in social networks using generative adversarial network (2020) (0)
- Reversible Data Embedding and Scrambling Method Based on JPEG Images (2018) (0)
- Verifiable Privacy-Enhanced Rotation Invariant LBP Feature Extraction in Fog Computing (2023) (0)
- Exploring Depth Information for Face Manipulation Detection (2022) (0)
- Reversible Contrast Enhancement (2016) (0)
- Image Protection for Robust Cropping Localization and Recovery (2022) (0)
- Steganographic visual story with mutual-perceived joint attention (2021) (0)
- Distortion function based on residual blocks for JPEG steganography (2017) (0)
- Secure Steganographic Cover Generation via a Noise-Optimization Stacked StyleGAN2 (2023) (0)
- Information capacity of quantization steganography in the presence of active attack (2006) (0)
- Compression of encrypted images with multi-layer decomposition (2013) (0)
- Hierarchical High Capacity Data Hiding in JPEG Crypto-compressed Images (2021) (0)
- Distortion Function for Steganography in Texture Synthesized Images (2018) (0)
- Reversible Data Hiding in Shared Images based on Syndrome Decoding and Homomorphism (2023) (0)
- Exploiting Language Model for Efficient Linguistic Steganalysis: An Empirical Study (2021) (0)
- Heterogeneous IoT Intrusion Detection Based on Fusion Word Embedding Deep Transfer Learning (2022) (0)
- NIM-Nets: Noise-Aware Incomplete Multi-View Learning Networks (2022) (0)
- Perceptual Model Hashing: Towards Neural Network Model Authentication (2022) (0)
- Blockchain-Based Access Control Schemes for Medical Image Analysis System (2019) (0)
- Copyright Management Using Progressive Image Delivery, Visible Watermarking and Robust Fingerprinting (2006) (0)
- Detecting Image Splicing Based on Noise Level Inconsistency (2016) (0)
- Watermarking Protocol Compatible with Secret Algorithms for Resisting Invertibility Attack (2005) (0)
- A general framework for shiftable position-based dual-image reversible data hiding (2018) (0)
- Efficient Data Hiding with High Payload (2011) (0)
- Identity-Based Parallel Key-Insulated Encryption with Multiple Long-Term Keys (2011) (0)
- Spectrum-estimation based lossless information recovery for sparse array patterns (2010) (0)
- Multiple Description Coding for Encrypted Images (2015) (0)
- An Improved Frost Filtering Algorithm Based on the Four Rectangular Windows (2019) (0)
- Secure Image Delivery Scheme Using Poisson Editing (2010) (0)
- Reversible data hiding in encrypted AMBTC images (2017) (0)
- Image block feature vectors based on a singular-value information metric and color-texture description (2007) (0)
- Image Sanitization in Online Social Networks: A General Framework for Breaking Robust Information Hiding (2022) (0)
- Robust Image Steganography Against General Downsampling Operations with Lossless Secret Recovery (2023) (0)
- Statistical Analysis of Signal-Dependent Noise: Application in Blind Localization of Image Splicing Forgery (2020) (0)
This paper list is powered by the following services: