Hongxia Wang
Orcid: 0000-0002-1339-2504Affiliations:
- Sichuan University, Chengdu, China
- Southwest Jiaotong University, School of Information Science and Technology, Chengdu, China
- University of Electronic Science and Technology of China, Chengdu, China (PhD 2002)
According to our database1,
Hongxia Wang
authored at least 153 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Internet Things J., September, 2024
Secure Distributed Control for Consensus of Multiple EL Systems Subject to DoS Attacks.
IEEE Trans. Syst. Man Cybern. Syst., June, 2024
IEEE Trans. Fuzzy Syst., March, 2024
Inf. Fusion, March, 2024
Exploring Accurate Invariants on Polar Harmonic Fourier Moments in Polar Coordinates for Robust Image Watermarking.
IEEE Trans. Multim., 2024
A Steganography Immunoprocessing Framework Against CNN-Based and Handcrafted Steganalysis.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Signal Process. Lett., 2024
IEEE Signal Process. Lett., 2024
An adaptive video watermarking robust to social platform transcoding and hybrid attacks.
Signal Process., 2024
A Contribution-Aware Noise Feature representation model for image manipulation localization.
Knowl. Based Syst., 2024
Robust text watermarking based on average skeleton mass of characters against cross-media attacks.
J. Vis. Commun. Image Represent., 2024
J. Vis. Commun. Image Represent., 2024
J. Inf. Secur. Appl., 2024
Enhancing robustness in video data hiding against recompression with a wide parameter range.
J. Inf. Secur. Appl., 2024
Exploring weakly-supervised image manipulation localization with tampering Edge-based class activation map.
Expert Syst. Appl., 2024
Expert Syst. Appl., 2024
Comput. J., 2024
Generalized face forgery detection with self-supervised face geometry information analysis network.
Appl. Soft Comput., 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
2023
J. Vis. Commun. Image Represent., December, 2023
Dual-branch multi-scale densely connected network for image splicing detection and localization.
Signal Process. Image Commun., November, 2023
Mode-Dependent Adaptive Event-Triggered Control for Stabilization of Markovian Memristor-Based Reaction-Diffusion Neural Networks.
IEEE Trans. Neural Networks Learn. Syst., August, 2023
The reversibility of cancelable biometric templates based on iterative perturbation stochastic approximation strategy.
Pattern Recognit. Lett., August, 2023
Event-Triggered Impulsive Fault-Tolerant Control for Memristor-Based RDNNs With Actuator Faults.
IEEE Trans. Neural Networks Learn. Syst., June, 2023
Improving security for image steganography using content-adaptive adversarial perturbations.
Appl. Intell., June, 2023
Constructing Immunized Stego-Image for Secure Steganography via Artificial Immune System.
IEEE Trans. Multim., 2023
Robust Blind Video Watermarking Against Geometric Deformations and Online Video Sharing Platform Processing.
IEEE Trans. Dependable Secur. Comput., 2023
NACA: A Joint Distortion-Based Non-Additive Cost Assignment Method for Video Steganography.
IEEE Trans. Dependable Secur. Comput., 2023
Cancelable Fingerprint Template Construction Using Vector Permutation and Shift-Ordering.
IEEE Trans. Dependable Secur. Comput., 2023
Image Steganalysis Against Adversarial Steganography by Combining Confidence and Pixel Artifacts.
IEEE Signal Process. Lett., 2023
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023
UMMAFormer: A Universal Multimodal-adaptive Transformer Framework for Temporal Forgery Localization.
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Adaptive and Robust Fourier-Mellin-Based Image Watermarking for Social Networking Platforms.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023
Content-adaptive Adversarial Embedding for Image Steganography Using Deep Reinforcement Learning.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023
2022
IEEE Trans. Syst. Man Cybern. Syst., 2022
Fuzzy Secure Control for Nonlinear $N$-D Parabolic PDE-ODE Coupled Systems Under Stochastic Deception Attacks.
IEEE Trans. Fuzzy Syst., 2022
Telecommun. Syst., 2022
DDCA: A Distortion Drift-Based Cost Assignment Method for Adaptive Video Steganography in the Transform Domain.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Signal Process. Lett., 2022
IEEE Signal Process. Lett., 2022
Cost Reassignment for Improving Security of Adaptive Steganography Using an Artificial Immune System.
IEEE Signal Process. Lett., 2022
GAN-based image steganography for enhancing security via adversarial attack and pixel-wise deep fusion.
Multim. Tools Appl., 2022
Knowl. Based Syst., 2022
Long-term variable Q transform: A novel time-frequency transform algorithm for synthetic speech detection.
Digit. Signal Process., 2022
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022
Proceedings of the Digital Forensics and Watermarking - 21st International Workshop, 2022
Improving GAN-Generated Image Detection Generalization Using Unsupervised Domain Adaptation.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022
2021
Frame-Wise Detection of Double HEVC Compression by Learning Deep Spatio-Temporal Representations in Compression Domain.
IEEE Trans. Multim., 2021
IEEE Trans. Dependable Secur. Comput., 2021
A Two-Stage Cascaded Detection Scheme for Double HEVC Compression Based on Temporal Inconsistency.
Secur. Commun. Networks, 2021
Multim. Tools Appl., 2021
A Lightweight Three-Factor Anonymous Authentication Scheme With Privacy Protection for Personalized Healthcare Applications.
J. Organ. End User Comput., 2021
Exploiting texture characteristics and spatial correlations for robustness metric of data hiding with noisy transmission.
IET Image Process., 2021
A Robust DCT-Based Video Watermarking Scheme Against Recompression and Synchronization Attacks.
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
Exposing Fake Bitrate Videos Using Hybrid Deep-Learning Network From Recompression Error.
IEEE Trans. Circuits Syst. Video Technol., 2020
Detection of Computer Graphics Using Attention-Based Dual-Branch Convolutional Neural Network from Fused Color Components.
Sensors, 2020
Reversible data hiding based on a modified difference expansion for H.264/AVC video streams.
Multim. Tools Appl., 2020
Correction to: A reversible data hiding in encrypted image based on prediction-error estimation and location map.
Multim. Tools Appl., 2020
A reversible data hiding in encrypted image based on prediction-error estimation and location map.
Multim. Tools Appl., 2020
A passive forensic scheme for copy-move forgery based on superpixel segmentation and K-means clustering.
Multim. Tools Appl., 2020
A novel two-dimensional reversible data hiding method with high embedding capacity in H.264/advanced video coding.
Int. J. Distributed Sens. Networks, 2020
A Novel Integrity Authentication Algorithm Based on Perceptual Speech Hash and Learned Dictionaries.
IEEE Access, 2020
High-Capacity Reversible Data Hiding in Encrypted Images Using Multi-Layer Embedding.
IEEE Access, 2020
Constructing Immune Cover for Secure Steganography Based on an Artificial Immune System Approach.
Proceedings of the Digital Forensics and Watermarking - 19th International Workshop, 2020
2019
Multim. Tools Appl., 2019
Multim. Tools Appl., 2019
KSII Trans. Internet Inf. Syst., 2019
Reversible data hiding in homomorphically encrypted image using interpolation technique.
J. Inf. Secur. Appl., 2019
Int. J. Digit. Crime Forensics, 2019
Comput. Secur., 2019
Proceedings of the Media Watermarking, 2019
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019
Detection of Fake Images Via The Ensemble of Deep Representations from Multi Color Spaces.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019
Proceedings of the ACM Turing Celebration Conference - China, 2019
Cochleagram-based identification of electronic disguised voice with pitch scaling in the noisy environment.
Proceedings of the ACM Turing Celebration Conference - China, 2019
2018
Speech authentication and content recovery scheme for security communication and storage.
Telecommun. Syst., 2018
A video error concealment method using data hiding based on compressed sensing over lossy channel.
Telecommun. Syst., 2018
An enhanced fragile watermarking scheme to digital image protection and self-recovery.
Signal Process. Image Commun., 2018
Secur. Commun. Networks, 2018
Reference Sharing Mechanism-Based Self-Embedding Watermarking Scheme with Deterministic Content Reconstruction.
Secur. Commun. Networks, 2018
An efficient fingerprint identification algorithm based on minutiae and invariant moment.
Pers. Ubiquitous Comput., 2018
An adaptive data hiding algorithm with low bitrate growth for H.264/AVC video stream.
Multim. Tools Appl., 2018
Robust enhancement and centroid-based concealment of fingerprint biometric data into audio signals.
Multim. Tools Appl., 2018
Int. J. Digit. Crime Forensics, 2018
A Novel Reversible Data Hiding Employing All Quantized Nonzero AC Coefficients in JPEG Images.
CoRR, 2018
Intra-Frame Error Concealment Scheme using 3D Reversible Data Hiding in Mobile Cloud Environment.
CoRR, 2018
Intra-Frame Error Concealment Scheme Using 3D Reversible Data Hiding in Mobile Cloud Environment.
IEEE Access, 2018
Proceedings of the 24th International Conference on Pattern Recognition, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Reducing the Computational Complexity of the Reference-Sharing Based Self-embedding Watermarking Approach.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Fourier-Mellin Transform and Fractal Coding for Secure and Robust Fingerprint Image Hashing.
Proceedings of the 15th IEEE International Conference on Advanced Video and Signal Based Surveillance, 2018
Speaker Identity Tracing Using Fingerprint Data Hiding against Telecommunications Fraud.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018
2017
Separable Reversible Data Hiding for Encrypted Palette Images With Color Partitioning and Flipping Verification.
IEEE Trans. Circuits Syst. Video Technol., 2017
A passive authentication scheme for copy-move forgery based on package clustering algorithm.
Multim. Tools Appl., 2017
An Efficient Copy-Move Detection Algorithm Based on Superpixel Segmentation and Harris Key-Points.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
2016
Cross correlation feature mining for steganalysis of hash based least significant bit substitution video steganography.
Telecommun. Syst., 2016
Authentication and recovery algorithm for speech signal based on digital watermarking.
Signal Process., 2016
Multim. Tools Appl., 2016
Can Machine Learn Steganography? - Implementing LSB Substitution and Matrix Coding Steganography with Feed-Forward Neural Networks.
CoRR, 2016
Dynamic content selection-and-prediction framework applied to reversible data hiding.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
Concealing Fingerprint-Biometric Data into Audio Signals for Identify Authentication.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
Reversible Data Hiding with Low Bit-Rate Growth in H.264/AVC Compressed Video by Adaptive Hybrid Coding.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
An efficient content authentication scheme in encrypted speech based on integer wavelet transform.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2016
2015
Multim. Tools Appl., 2015
A Secure Speech Content Authentication Algorithm Based on Discrete Fractional Fourier Transform.
Int. J. Digit. Crime Forensics, 2015
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015
2014
Video Steganalysis Against Motion Vector-Based Steganography by Adding or Subtracting One Motion Vector Value.
IEEE Trans. Inf. Forensics Secur., 2014
Multim. Tools Appl., 2014
Pseudo-zernike moments-based audio content authentication algorithm robust against feature-analysed substitution attack.
Multim. Tools Appl., 2014
A fingerprint-based audio authentication scheme using frequency domain statistical characteristic.
Multim. Tools Appl., 2014
Multim. Tools Appl., 2014
Digit. Signal Process., 2014
Efficient Reversible Data Hiding Based on Prefix Matching and Directed LSB Embedding.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
2013
J. Commun., 2013
Geometrically Invariant Image Watermarking using Connected Objects and Gravity Centers.
KSII Trans. Internet Inf. Syst., 2013
Perceptual Hashing-Based Robust Image Authentication Scheme for Wireless Multimedia Sensor Networks.
Int. J. Distributed Sens. Networks, 2013
A Speech Content Authentication Algorithm Based on Pseudo-Zernike Moments in DCT Domain.
Int. J. Digit. Crime Forensics, 2013
A semi-fragile watermarking scheme for authenticating audio signal based on dual-tree complex wavelet transform and discrete cosine transform.
Int. J. Comput. Math., 2013
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013
2012
An Efficient Speech Content Authentication Algorithm Based on Coefficients Self-correlation Degree.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012
Steganalysis of Youtube Compressed Video Using High-order Statistics in 3D DCT Domain.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012
2011
Steganalysis for palette-based images using generalized difference image and color correlogram.
Signal Process., 2011
Multim. Tools Appl., 2011
KSII Trans. Internet Inf. Syst., 2011
Statistical characteristic-based robust audio watermarking for resolving playback speed modification.
Digit. Signal Process., 2011
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011
Proceedings of the 14th IEEE International Conference on Computational Science and Engineering, 2011
2010
Sci. China Inf. Sci., 2010
Proceedings of the FIT '10, 2010
2009
Comput. Electr. Eng., 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
2008
2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006