2025
General Steganography for Neural Network Models Based on Graph Convolutional Network.
IEEE Internet Things J., May, 2025
Watermark Removal Attack Against Text-to-Image Generative Model Watermarking.
IEEE Signal Process. Lett., 2025
Untraceable Steganography: Towards the Anonymity of Steganographer.
IEEE Signal Process. Lett., 2025
Defending Against Adversarial Attack Through Generative Adversarial Networks.
IEEE Signal Process. Lett., 2025
A Burn After Reading Data Hiding Framework.
IEEE Signal Process. Lett., 2025
Protecting copyright of stable diffusion models from ambiguity attacks.
Signal Process., 2025
Feature augmentation-based few-shot image steganalysis.
J. Electronic Imaging, 2025
2024
Cover Selection in Encrypted Images.
IEEE Trans. Circuits Syst. Video Technol., December, 2024
Steganography in Style Transfer.
IEEE Trans. Artif. Intell., December, 2024
Robust Blind Video Watermarking Based on Ring Tensor and BCH Coding.
IEEE Internet Things J., December, 2024
Watermarking for Stable Diffusion Models.
IEEE Internet Things J., November, 2024
Adaptive Robust Watermarking for Resisting Multiple Distortions in Real Scenes.
IEEE Internet Things J., October, 2024
Maximizing steganalysis performance using siamese networks for image.
Multim. Tools Appl., September, 2024
Semi-Fragile Neural Network Watermarking Based on Adversarial Examples.
IEEE Trans. Emerg. Top. Comput. Intell., August, 2024
Diverse Batch Steganography Using Model-Based Selection and Double-Layered Payload Assignment.
IEEE Trans. Circuits Syst. Video Technol., August, 2024
Reducing High-Frequency Artifacts for Generative Model Watermarking via Wavelet Transform.
IEEE Internet Things J., May, 2024
Robust Image Hashing in Encrypted Domain.
IEEE Trans. Emerg. Top. Comput. Intell., February, 2024
Semi-fragile neural network watermarking for content authentication and tampering localization.
Expert Syst. Appl., February, 2024
Art Image Inpainting With Style-Guided Dual-Branch Inpainting Network.
IEEE Trans. Multim., 2024
Multi-Source Style Transfer via Style Disentanglement Network.
IEEE Trans. Multim., 2024
Perceptual Image Hashing Using Feature Fusion of Orthogonal Moments.
IEEE Trans. Multim., 2024
Robust Image Steganography Against General Downsampling Operations With Lossless Secret Recovery.
IEEE Trans. Dependable Secur. Comput., 2024
Ambiguity attack against text-to-image diffusion model watermarking.
Signal Process., 2024
Identification of the Original Images.
J. Vis. Commun. Image Represent., 2024
Transferable adversarial attack based on sensitive perturbation analysis in frequency domain.
Inf. Sci., 2024
2023
Robust zero-watermarking scheme using DT CWT and improved differential entropy for color medical images.
J. King Saud Univ. Comput. Inf. Sci., September, 2023
Data hiding during image processing using capsule networks.
Neurocomputing, June, 2023
Exploring Abnormal Behavior in Swarm: Identify User Using Adversarial Examples.
IEEE Trans. Emerg. Top. Comput. Intell., February, 2023
Cover Selection for Steganography Using Image Similarity.
IEEE Trans. Dependable Secur. Comput., 2023
JPEG Steganography With Content Similarity Evaluation.
IEEE Trans. Cybern., 2023
Steganalysis of Neural Networks Based on Symmetric Histogram Distribution.
Symmetry, 2023
An Effective Framework for Intellectual Property Protection of NLG Models.
Symmetry, 2023
Defending against adversarial examples using perceptual image hashing.
J. Electronic Imaging, 2023
Generating watermarked adversarial texts.
J. Electronic Imaging, 2023
A general steganographic framework for neural network models.
Inf. Sci., 2023
Generative Steganography Diffusion.
CoRR, 2023
Neural Network Steganography Using Extractor Matching.
Proceedings of the Digital Forensics and Watermarking - 22nd International Workshop, 2023
2022
Unified Performance Evaluation Method for Perceptual Image Hashing.
IEEE Trans. Inf. Forensics Secur., 2022
Repeatable Data Hiding: Towards the Reusability of Digital Images.
IEEE Trans. Circuits Syst. Video Technol., 2022
Multisource Data Hiding in Digital Images.
Symmetry, 2022
Multi-source Data Hiding in Neural Networks.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022
Robust Watermarking for Neural Network Models Using Residual Network.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022
Perceptual Model Hashing: Towards Neural Network Model Authentication.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022
2021
Batch Steganography via Generative Network.
IEEE Trans. Circuits Syst. Video Technol., 2021
Reversible Privacy Protection with the Capability of Antiforensics.
Secur. Commun. Networks, 2021
Multichannel Steganography in Digital Images for Multiple Receivers.
IEEE Multim., 2021
Data Hiding in Neural Networks for Multiple Receivers [Research Frontier].
IEEE Comput. Intell. Mag., 2021
2020
A New Steganography Method for Dynamic GIF Images Based on Palette Sort.
Wirel. Commun. Mob. Comput., 2020
Practical Cover Selection for Steganography.
IEEE Signal Process. Lett., 2020
Computing in Covert Domain Using Data Hiding.
CoRR, 2020
Data Computing in Covert Domain.
Proceedings of the Security and Privacy in Digital Economy, 2020
Steganographic Distortion Function for Enhanced Images.
Proceedings of the Digital Forensics and Watermarking - 19th International Workshop, 2020
Hierarchical High Capacity Data Hiding in JPEG Crypto-compressed Images.
Proceedings of the 28th European Signal Processing Conference, 2020
2019
Towards Robust Image Steganography.
IEEE Trans. Circuits Syst. Video Technol., 2019
基于DCT域相关性的非对称JPEG隐写 (Asymmetric JPEG Steganography Based on Correlation in DCT Domain).
计算机科学, 2019
Privacy protection based on binary fingerprint compression.
J. Real Time Image Process., 2019
Steganography in stylized images.
J. Electronic Imaging, 2019
Asymmetric Distortion Function for JPEG Steganography Using Block Artifact Compensation.
Int. J. Digit. Crime Forensics, 2019
Breaking Steganography: Slight Modification with Distortion Minimization.
Int. J. Digit. Crime Forensics, 2019
Secure Cover Selection for Steganography.
IEEE Access, 2019
Towards Improved Steganalysis: When Cover Selection is Used in Steganography.
IEEE Access, 2019
An Improved Steganalysis Method Using Feature Combinations.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
2018
Joint Cover-Selection and Payload-Allocation by Steganographic Distortion Optimization.
IEEE Signal Process. Lett., 2018
Distortion function based on residual blocks for JPEG steganography.
Multim. Tools Appl., 2018
On Improving Distortion Functions for JPEG Steganography.
IEEE Access, 2018
Reversible Contrast Mapping based Reversible Data Hiding in Encrypted Images.
Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, 2018
Distortion Function for Steganography in Texture Synthesized Images.
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018
Single Actor Pooled Steganalysis.
Proceedings of the Genetic and Evolutionary Computing, 2018
Breaking CNN-Based Steganalysis.
Proceedings of the Genetic and Evolutionary Computing, 2018
Lost in the Digital Wild: Hiding Information in Digital Activities.
Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, 2018
2016
Lossless and Reversible Data Hiding in Encrypted Images With Public-Key Cryptography.
IEEE Trans. Circuits Syst. Video Technol., 2016
Hybrid distortion function for JPEG steganography.
J. Electronic Imaging, 2016
Distortion Function for Spatial Image Steganography Based on the Polarity of Embedding Change.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
2015
Reversible visible watermark embedded in encrypted domain.
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015