Chunfang Yang

Orcid: 0000-0001-6487-379X

According to our database1, Chunfang Yang authored at least 76 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
4SCIG: A Four-Branch Framework to Reduce the Interference of Sky Area in Cross-View Image Geo-Localization.
IEEE Trans. Geosci. Remote. Sens., 2024

Linguistic steganalysis via multi-task with crossing generative-natural domain.
Neurocomputing, 2024

HSTW: A robust network flow watermarking method based on hybrid packet sequence-timing.
Comput. Secur., 2024

2023
PNG-Stega: Progressive Non-Autoregressive Generative Linguistic Steganography.
IEEE Signal Process. Lett., 2023

MTD-RTPE: A Malicious Traffic Detection Method Based on Relative Time-Delay Positional Encoding.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Privacy-Preserving Image Scaling Using Bicubic Interpolation and Homomorphic Encryption.
Proceedings of the Digital Forensics and Watermarking - 22nd International Workshop, 2023

2022
Inverse Interpolation and Its Application in Robust Image Steganography.
IEEE Trans. Circuits Syst. Video Technol., 2022

Robust JPEG steganography based on DCT and SVD in nonsubsampled shearlet transform domain.
Multim. Tools Appl., 2022

Extracting embedded messages using adaptive steganography based on optimal syndrome-trellis decoding paths.
Digit. Commun. Networks, 2022

HeteroTiC: A robust network flow watermarking based on heterogeneous time channels.
Comput. Networks, 2022

An Improved Purdue Enterprise Reference Architecture to Enhance Cybersecurity.
Proceedings of the 2022 5th International Conference on Blockchain Technology and Applications, 2022

2021
Research on a Control Strategy of the Symmetrical Four-Roller Bending Process Based on Experiment and Numerical Simulation.
Symmetry, 2021

Invariances of JPEG-quantized DCT coefficients and their application in robust image steganography.
Signal Process., 2021

PRUDA: A Novel Measurement Attribute Set towards Robust Steganography in Social Networks.
Secur. Commun. Networks, 2021

Feature Selection of the Rich Model Based on the Correlation of Feature Components.
Secur. Commun. Networks, 2021

JPEG image steganography payload location based on optimal estimation of cover co-frequency sub-image.
EURASIP J. Image Video Process., 2021

Video steganography algorithm based on the relative relationship between DWT coefficients.
Proceedings of the ACM TURC 2021: ACM Turing Award Celebration Conference - Hefei, China, 30 July 2021, 2021

2020
Thresholding binary coding for image forensics of weak sharpening.
Signal Process. Image Commun., 2020

Towards feature representation for steganalysis of spatial steganography.
Signal Process., 2020

Steganalysis of homogeneous-representation based steganography for high dynamic range images.
Multim. Tools Appl., 2020

A novel haze image steganography method via cover-source switching.
J. Vis. Commun. Image Represent., 2020

Color image steganalysis based on embedding change probabilities in differential channels.
Int. J. Distributed Sens. Networks, 2020

Payload location for JPEG image steganography based on co-frequency sub-image filtering.
Int. J. Distributed Sens. Networks, 2020

Stego key recovery method for F5 steganography with matrix encoding.
EURASIP J. Image Video Process., 2020

Steganalysis of Adaptive Steganography Under the Known Cover Image.
Proceedings of the Security and Privacy in Digital Economy, 2020

On the Sharing-Based Model of Steganography.
Proceedings of the Digital Forensics and Watermarking - 19th International Workshop, 2020

2019
Steganalysis aided by fragile detection of image manipulations.
Multim. Tools Appl., 2019

Color image steganalysis based on channel gradient correlation.
Int. J. Distributed Sens. Networks, 2019

Steganalysis of Content-Adaptive Steganography Based on Massive Datasets Pre-Classification and Feature Selection.
IEEE Access, 2019

A Security-Sensitive Function Mining Framework for Source Code.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Enhanced branch obfuscation based on exception handling and encrypted mapping table.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
Parameter estimation of image gamma transformation based on zero-value histogram bin locations.
Signal Process. Image Commun., 2018

Dither modulation based adaptive steganography resisting jpeg compression and statistic detection.
Multim. Tools Appl., 2018

A linguistic steganography based on word indexing compression and candidate selection.
Multim. Tools Appl., 2018

Reliable steganalysis of HUGO steganography based on partially known plaintext.
Multim. Tools Appl., 2018

Blind forensics of image gamma transformation and its application in splicing detection.
J. Vis. Commun. Image Represent., 2018

Steganalysis of content-adaptive JPEG steganography based on scale co-occurrence matrix with diverse quantization.
J. Electronic Imaging, 2018

Quantitative steganalysis of JPEG additive steganography based on boundary effect.
J. Electronic Imaging, 2018

Extracting hidden messages of MLSB steganography based on optimal stego subset.
Sci. China Inf. Sci., 2018

A Word-Embedding-Based Steganalysis Method for Linguistic Steganography via Synonym Substitution.
IEEE Access, 2018

Optimization of rich model based on fisher criterion for image steganalysis.
Proceedings of the Tenth International Conference on Advanced Computational Intelligence, 2018

2017
Joint JPEG compression and detection resistant performance enhancement for adaptive steganography using feature regions selection.
Multim. Tools Appl., 2017

2D Gabor filters-based steganalysis of content-adaptive JPEG steganography.
Multim. Tools Appl., 2017

Improving side-informed JPEG steganography using two-dimensional decomposition embedding method.
Multim. Tools Appl., 2017

Steganalysis of content-adaptive JPEG steganography based on Gauss partial derivative filter bank.
J. Electronic Imaging, 2017

Optimal Gabor Filters for Steganalysis of Content-Adaptive JPEG Steganography.
KSII Trans. Internet Inf. Syst., 2017

A Novel Linguistic Steganography Based on Synonym Run-Length Encoding.
IEICE Trans. Inf. Syst., 2017

Steganalysis Feature Subspace Selection Based on Fisher Criterion.
Proceedings of the 2017 IEEE International Conference on Data Science and Advanced Analytics, 2017

2016
A framework of adaptive steganography resisting JPEG compression and detection.
Secur. Commun. Networks, 2016

Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes.
Multim. Tools Appl., 2016

Improving Scanned Binary Image Watermarking Based On Additive Model and Sampling.
Int. J. Digit. Crime Forensics, 2016

2015
Detection of perturbed quantization class stego images based on possible change modes.
J. Electronic Imaging, 2015

Steganalysis of Adaptive JPEG Steganography by Selecting DCT Coefficients According to Embedding Distortion.
KSII Trans. Internet Inf. Syst., 2015

LSB steganographic payload location for JPEG-decompressed images.
Digit. Signal Process., 2015

Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters.
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015

A JPEG-Compression Resistant Adaptive Steganography Based on Relative Relationship between DCT Coefficients.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2013
Pixel Group Trace Model-Based Quantitative Steganalysis for Multiple Least-Significant Bits Steganography.
IEEE Trans. Inf. Forensics Secur., 2013

Fusion of Two Typical Quantitative Steganalysis Based on SVR.
J. Softw., 2013

2012
Steganalysis of adaptive image steganography in multiple gray code bit-planes.
Multim. Tools Appl., 2012

Parameter-estimation and algorithm-selection based United-Judgment for image steganalysis.
Multim. Tools Appl., 2012

Weighted Stego-Image Steganalysis of Messages Hidden into Each Bit Plane.
Comput. J., 2012

On F5 Steganography in Images.
Comput. J., 2012

2011
On the Typical Statistic Features for Image Blind Steganalysis.
IEEE J. Sel. Areas Commun., 2011

Software Watermarking Through Obfuscated Interpretation: Implementation and Analysis.
J. Multim., 2011

Identification of steganography software based on register dependence.
Int. J. Multim. Intell. Secur., 2011

Embedding Ratio Estimation based on Weighted Stego Image for Embedding in 2LSB.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

2010
Image universal steganalysis based on best wavelet packet decomposition.
Sci. China Inf. Sci., 2010

Modification ratio estimation for a category of adaptive steganography.
Sci. China Inf. Sci., 2010

2009
Classification between PS and Stego Images Based on Noise Model.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009

Steganalysis Based on Weighted Stego-Image for 2LSB Replacement Steganography.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Embedding Ratio Estimating for Each Bit Plane of Image.
Proceedings of the Information Hiding, 11th International Workshop, 2009

2008
Steganalysis Frameworks of Embedding in Multiple Least-Significant Bits.
IEEE Trans. Inf. Forensics Secur., 2008

Stepwise inter-frame correlation-based steganalysis system for video streams.
Secur. Commun. Networks, 2008

Secure Steganography in Compressed Video Bitstreams.
Proceedings of the The Third International Conference on Availability, 2008

2007
LTSB Steganalysis Based on Quartic Equation.
Trans. Data Hiding Multim. Secur., 2007

2006
Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods.
Proceedings of the Communications and Multimedia Security, 2006


  Loading...