Ke Niu

Orcid: 0000-0001-8933-3132

Affiliations:
  • Engineering University of People's Armed Police, College of Cryptographic Engineering, Xi'an, China


According to our database1, Ke Niu authored at least 15 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Motion vector-domain video steganalysis exploiting skipped macroblocks.
IET Image Process., 2024

NeR-VCP: A Video Content Protection Method Based on Implicit Neural Representation.
CoRR, 2024

2023
Investigation on principles for cost assignment in motion vector-based video steganography.
J. Inf. Secur. Appl., March, 2023

A One-dimensional HEVC video steganalysis method using the Optimality of Predicted Motion Vectors.
CoRR, 2023

2022
Efficient certificateless public integrity auditing of cloud data with designated verifier for batch audit.
J. King Saud Univ. Comput. Inf. Sci., 2022

2021
Research on Adaptive Video Steganography Algorithm for Clustering and Dispersing DCT Coefficient Difference Histogram.
Proceedings of the Theoretical Computer Science, 2021

2019
Two-dimensional histogram modification based reversible data hiding using motion vector for H.264.
Multim. Tools Appl., 2019

Hybrid Adaptive Video Steganography Scheme Under Game Model.
IEEE Access, 2019

2018
Reversible Data Hiding for Video.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2016
A Novel Video Steganography Algorithm Based on Trailing Coecients for H.264/AVC.
Informatica (Slovenia), 2016

2015
A Novel Information Hiding Algorithm Based on Grey Relational Analysis for H.264/AVC.
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015

Video Steganography Algorithm Based on Trailing Coefficients.
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015

2009
How to Solve Key Escrow Problem in Proxy Re-encryption from CBE to IBE.
Proceedings of the First International Workshop on Database Technology and Applications, 2009

An Authenticating Algorithm with Multi-compression Compatible in DCT Domain.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2007
A New Multi-class SVM Algorithm Based on One-Class SVM.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007


  Loading...