Weiming Zhang
Orcid: 0000-0001-5576-6108Affiliations:
- University of Science and Technology of China, School of Cyber Science and Security, CAS Key Laboratory of Electro-magnetic Space Information, Hefei, Anhui, China
- Zhengzhou Information Science and Technology Institute, Zhengzhou, China (PhD 2005)
According to our database1,
Weiming Zhang
authored at least 333 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Artif. Intell., October, 2024
IEEE Trans. Pattern Anal. Mach. Intell., October, 2024
Covert Task Embedding: Turning a DNN Into an Insider Agent Leaking Out Private Information.
IEEE Trans. Neural Networks Learn. Syst., July, 2024
IEEE Trans. Knowl. Data Eng., June, 2024
IEEE Trans. Commun., April, 2024
Model Access Control Based on Hidden Adversarial Examples for Automatic Speech Recognition.
IEEE Trans. Artif. Intell., March, 2024
IEEE Trans. Pattern Anal. Mach. Intell., February, 2024
J. Imaging, January, 2024
IEEE Trans. Image Process., 2024
Silent Guardian: Protecting Text From Malicious Exploitation by Large Language Models.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
CoRR, 2024
Binary Code Similarity Detection via Graph Contrastive Learning on Intermediate Representations.
CoRR, 2024
Deciphering Cross-Modal Alignment in Large Vision-Language Models with Modality Integration Rate.
CoRR, 2024
Prefix Guidance: A Steering Wheel for Large Language Models to Defend Against Jailbreak Attacks.
CoRR, 2024
Any360D: Towards 360 Depth Anything with Unlabeled 360 Data and Möbius Spatial Augmentation.
CoRR, 2024
\copyright Plug-in Authorization for Human Content Copyright Protection in Text-to-Image Model.
CoRR, 2024
How Far Have We Gone in Stripped Binary Code Understanding Using Large Language Models.
CoRR, 2024
Unsupervised Visible-Infrared ReID via Pseudo-label Correction and Modality-level Alignment.
CoRR, 2024
CoRR, 2024
GoodSAM: Bridging Domain and Capacity Gaps via Segment Anything Model for Distortion-aware Panoramic Semantic Segmentation.
CoRR, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
SemGIR: Semantic-Guided Image Regeneration Based Method for AI-generated Image Detection and Attribution.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
LDStega: Practical and Robust Generative Image Steganography based on Latent Diffusion Models.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Transferable Facial Privacy Protection against Blind Face Restoration via Domain-Consistent Adversarial Obfuscation.
Proceedings of the Forty-first International Conference on Machine Learning, 2024
AquaLoRA: Toward White-box Protection for Customized Stable Diffusion Models via Watermark LoRA.
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024
A Geometric Distortion Immunized Deep Watermarking Framework with Robustness Generalizability.
Proceedings of the Computer Vision - ECCV 2024, 2024
Gaussian Shading: Provable Performance-Lossless Image Watermarking for Diffusion Models.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
OPERA: Alleviating Hallucination in Multi-Modal Large Language Models via Over-Trust Penalty and Retrospection-Allocation.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
GenderCARE: A Comprehensive Framework for Assessing and Reducing Gender Bias in Large Language Models.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the ACM Turing Award Celebration Conference 2024, 2024
Proceedings of the ACM Turing Award Celebration Conference 2024, 2024
Proceedings of the ACM Turing Award Celebration Conference 2024, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Enhancing image steganography via adversarial optimization of the stego distribution.
Signal Process., November, 2023
IEEE J. Sel. Top. Signal Process., November, 2023
Feature Fusion Based Adversarial Example Detection Against Second-Round Adversarial Attacks.
IEEE Trans. Artif. Intell., October, 2023
IEEE Trans. Circuits Syst. Video Technol., September, 2023
Pattern Recognit., September, 2023
A Visually Meaningful Image Encryption Scheme Based on Lossless Compression SPIHT Coding.
IEEE Trans. Serv. Comput., 2023
ACM Trans. Multim. Comput. Commun. Appl., 2023
No-reference Quality Assessment for Contrast-distorted Images Based on Gray and Color-gray-difference Space.
ACM Trans. Multim. Comput. Commun. Appl., 2023
IEEE Trans. Multim., 2023
Quaternary Quantized Gaussian Modulation With Optimal Polarity Map Selection for JPEG Steganography.
IEEE Trans. Inf. Forensics Secur., 2023
Double-Layered Dual-Syndrome Trellis Codes Utilizing Channel Knowledge for Robust Steganography.
IEEE Trans. Inf. Forensics Secur., 2023
Robust Audio Copy-Move Forgery Detection Using Constant Q Spectral Sketches and GA-SVM.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Reversible Data Hiding in Encrypted Images Based on Binary Symmetric Channel Model and Polar Code.
IEEE Trans. Dependable Secur. Comput., 2023
Universal BlackMarks: Key-Image-Free Blackbox Multi-Bit Watermarking of Deep Neural Networks.
IEEE Signal Process. Lett., 2023
Signal Process., 2023
Pattern Recognit., 2023
Segue: Side-information Guided Generative Unlearnable Examples for Facial Privacy Protection in Real World.
CoRR, 2023
CoRR, 2023
Catch You Everything Everywhere: Guarding Textual Inversion via Concept Watermarking.
CoRR, 2023
CoRR, 2023
CoRR, 2023
VQNet 2.0: A New Generation Machine Learning Framework that Unifies Classical and Quantum.
CoRR, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Investigating Neural-based Function Name Reassignment from the Perspective of Binary Code Representation.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
StegaDDPM: Generative Image Steganography based on Denoising Diffusion Probabilistic Model.
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
DeNoL: A Few-Shot-Sample-Based Decoupling Noise Layer for Cross-channel Watermarking Robustness.
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2023
X-Paste: Revisiting Scalable Copy-Paste for Instance Segmentation using CLIP and StableDiffusion.
Proceedings of the International Conference on Machine Learning, 2023
Proceedings of the IEEE International Conference on Image Processing, 2023
Proceedings of the IEEE International Conference on Image Processing, 2023
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Improving Adversarial Robustness of Masked Autoencoders via Test-time Frequency-domain Prompting.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Proceedings of the IEEE International Conference on Acoustics, 2023
Proceedings of the IEEE International Conference on Acoustics, 2023
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
Flow-Based Robust Watermarking with Invertible Noise Layer for Black-Box Distortions.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
IEEE Trans. Vis. Comput. Graph., 2022
Watermarking-Based Secure Plaintext Image Protocols for Storage, Show, Deletion and Retrieval in the Cloud.
IEEE Trans. Serv. Comput., 2022
Distribution-Preserving-Based Automatic Data Augmentation for Deep Image Steganalysis.
IEEE Trans. Multim., 2022
TERA: Screen-to-Camera Image Code With Transparency, Efficiency, Robustness and Adaptability.
IEEE Trans. Multim., 2022
IEEE Trans. Image Process., 2022
IEEE Trans. Dependable Secur. Comput., 2022
A High Visual Quality Color Image Reversible Data Hiding Scheme Based on B-R-G Embedding Principle and CIEDE2000 Assessment Metric.
IEEE Trans. Circuits Syst. Video Technol., 2022
Detecting Steganography in JPEG Images Recompressed With the Same Quantization Matrix.
IEEE Trans. Circuits Syst. Video Technol., 2022
Signal Process., 2022
IEEE Trans. Pattern Anal. Mach. Intell., 2022
Reversible data hiding with enhancing contrast and preserving brightness in medical image.
J. Inf. Secur. Appl., 2022
J. Inf. Secur. Appl., 2022
J. Inf. Secur. Appl., 2022
CLIP Itself is a Strong Fine-tuner: Achieving 85.7% and 88.0% Top-1 Accuracy with ViT-B and ViT-L on ImageNet.
CoRR, 2022
CoRR, 2022
Go Wide or Go Deep: Levering Watermarking Performance with Computational Cost for Specific Images.
CoRR, 2022
Sci. China Inf. Sci., 2022
Optimality of Polar Codes in Additive Steganography under Constant Distortion Profile.
Proceedings of the 14th International Conference on Wireless Communications and Signal Processing, 2022
PIMoG: An Effective Screen-shooting Noise-Layer Simulation for Deep-Learning-Based Watermarking Network.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022
Proceedings of the IEEE International Conference on Acoustics, 2022
Proceedings of the IEEE International Conference on Acoustics, 2022
Proceedings of the IEEE International Conference on Acoustics, 2022
Proceedings of the IEEE International Conference on Acoustics, 2022
Proceedings of the Computer Vision - ECCV 2022, 2022
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022
2021
IEEE Trans. Vis. Comput. Graph., 2021
Non-Additive Cost Functions for JPEG Steganography Based on Block Boundary Maintenance.
IEEE Trans. Inf. Forensics Secur., 2021
BBC++: Enhanced Block Boundary Continuity on Defining Non-Additive Distortion for JPEG Steganography.
IEEE Trans. Circuits Syst. Video Technol., 2021
IEEE Trans. Circuits Syst. Video Technol., 2021
IEEE Trans. Circuits Syst. Video Technol., 2021
IEEE Trans. Circuits Syst. Video Technol., 2021
Signal Process., 2021
J. Vis. Commun. Image Represent., 2021
Improving UNIWARD distortion function via isotropic construction and hierarchical merging.
J. Vis. Commun. Image Represent., 2021
Inf. Sci., 2021
Neurocomputing, 2021
A novel reversible data hiding based on adaptive block-partition and payload-allocation method.
IET Image Process., 2021
Future Internet, 2021
CoRR, 2021
CoRR, 2021
GDroid: Android malware detection and classification with graph convolutional network.
Comput. Secur., 2021
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2021
MBRS: Enhancing Robustness of DNN-based Watermarking by Mini-Batch of Real and Simulated JPEG Compression.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
A lightweight framework for function name reassignment based on large-scale stripped binaries.
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021
Proceedings of the Image and Graphics - 11th International Conference, 2021
Proceedings of the IEEE International Conference on Acoustics, 2021
A Privacy-Preserving Medical Image Scheme Based on Secret Sharing and Reversible Data Hiding.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021
Spatial-Phase Shallow Learning: Rethinking Face Forgery Detection in Frequency Domain.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
2020
Steganographic Security Analysis From Side Channel Steganalysis and Its Complementary Attacks.
IEEE Trans. Multim., 2020
Non-Additive Cost Functions for Color Image Steganography Based on Inter-Channel Correlations and Differences.
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Circuits Syst. Video Technol., 2020
IEEE Trans. Circuits Syst. Video Technol., 2020
IEEE Trans. Circuits Syst. Video Technol., 2020
Derivative-Based Steganographic Distortion and its Non-additive Extensions for Audio.
IEEE Trans. Circuits Syst. Video Technol., 2020
IEEE Trans. Commun., 2020
A Secure and Privacy-Preserving Technique Based on Contrast-Enhancement Reversible Data Hiding and Plaintext Encryption for Medical Images.
IEEE Signal Process. Lett., 2020
Signal Process., 2020
Robust adaptive steganography based on generalized dither modulation and expanded embedding domain.
Signal Process., 2020
J. Real Time Image Process., 2020
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020
Reversible Watermarking in Deep Convolutional Neural Networks for Integrity Authentication.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020
Proceedings of the ICCAI '20: 2020 6th International Conference on Computing and Artificial Intelligence, 2020
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020
LG-GAN: Label Guided Adversarial Network for Flexible Targeted Attack of Point Cloud Based Deep Networks.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
2019
Paillier Cryptosystem based Mean Value Computation for Encrypted Domain Image Processing Operations.
ACM Trans. Multim. Comput. Commun. Appl., 2019
IEEE Trans. Multim., 2019
IEEE Trans. Inf. Forensics Secur., 2019
Improving Pairwise PEE via Hybrid-Dimensional Histogram Generation and Adaptive Mapping Selection.
IEEE Trans. Circuits Syst. Video Technol., 2019
IEEE Trans. Circuits Syst. Video Technol., 2019
IEEE Signal Process. Lett., 2019
Signal Process., 2019
Secur. Commun. Networks, 2019
A no-reference quality assessment for contrast-distorted image based on improved learning method.
Multim. Tools Appl., 2019
Multim. Tools Appl., 2019
A robust image watermarking scheme in DCT domain based on adaptive texture direction quantization.
Multim. Tools Appl., 2019
IEEE Internet Things J., 2019
IET Image Process., 2019
Prediction error expansion-based reversible data hiding in encrypted images with public key cryptosystem.
IET Image Process., 2019
A Restrained Paillier Cryptosystem and Its Applications for Access Control of Common Secret.
CoRR, 2019
A Secure and High Visual-Quality Framework for Medical Images by Contrast-Enhancement Reversible Data Hiding and Homomorphic Encryption.
IEEE Access, 2019
IEEE Access, 2019
Demo Abstract: UnseenCode: Invisible On-screen Barcode with Image-based Extraction (Demo).
Proceedings of the IEEE INFOCOM 2019, 2019
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019
Proceedings of the 2nd International Conference on Image and Graphics Processing, 2019
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019
Once a MAN: Towards Multi-Target Attack via Learning Multi-Target Adversarial Network Once.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019
Detection Based Defense Against Adversarial Examples From the Steganalysis Point of View.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019
2018
IEEE Trans. Multim., 2018
IEEE Trans. Image Process., 2018
IEEE Trans. Dependable Secur. Comput., 2018
Signal Process., 2018
Signal Process., 2018
A ROI-based high capacity reversible data hiding scheme with contrast enhancement for medical images.
Multim. Tools Appl., 2018
Multim. Tools Appl., 2018
Guest Editorial: Multimedia Information Security and Its Applications in Cloud Computing.
Multim. Tools Appl., 2018
Reversible data hiding for 3D mesh models with three-dimensional prediction-error histogram modification.
Multim. Tools Appl., 2018
J. Vis. Commun. Image Represent., 2018
J. Vis. Commun. Image Represent., 2018
CAAD 2018: Powerful None-Access Black-Box Attack Based on Adversarial Transformation Network.
CoRR, 2018
IREXF: Data Exfiltration from Air-gapped Networks by Infrared Remote Control Signals.
CoRR, 2018
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
2017
IEEE Trans. Image Process., 2017
IEEE Trans. Inf. Forensics Secur., 2017
IEEE Trans. Circuits Syst. Video Technol., 2017
Secur. Commun. Networks, 2017
Secur. Commun. Networks, 2017
Multim. Tools Appl., 2017
Improving side-informed JPEG steganography using two-dimensional decomposition embedding method.
Multim. Tools Appl., 2017
CoRR, 2017
Proceedings of the Image and Graphics - 9th International Conference, 2017
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
2016
ACM Trans. Multim. Comput. Commun. Appl., 2016
IEEE Trans. Multim., 2016
Inter-frame distortion drift analysis for reversible data hiding in encrypted H.264/AVC video bitstreams.
Signal Process., 2016
Multim. Tools Appl., 2016
Multim. Tools Appl., 2016
Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes.
Multim. Tools Appl., 2016
J. Vis. Commun. Image Represent., 2016
Digit. Signal Process., 2016
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016
Reversible Data Hiding for Texture Videos and Depth Maps Coding with Quality Scalability.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
Evolving distortion function by exploiting the differences among comparable adaptive steganography.
Proceedings of the 12th International Conference on Natural Computation, 2016
Proceedings of the 2016 IEEE International Conference on Digital Signal Processing, 2016
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
2015
Optimal Transition Probability of Reversible Data Hiding for General Distortion Metrics and Its Applications.
IEEE Trans. Image Process., 2015
Security Analysis on One-to-Many Order Preserving Encryption-Based Cloud Data Search.
IEEE Trans. Inf. Forensics Secur., 2015
IEEE Trans. Inf. Forensics Secur., 2015
Minimum Rate Prediction and Optimized Histograms Modification for Reversible Data Hiding.
IEEE Trans. Inf. Forensics Secur., 2015
Robust FMO algorithm and adaptive redundant slice allocation for wireless video transmission.
Telecommun. Syst., 2015
Multim. Tools Appl., 2015
Improving Visual Quality of Reversible Data Hiding in Medical Image with Texture Area Contrast Enhancement.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015
2014
Multim. Tools Appl., 2014
Int. J. Digit. Crime Forensics, 2014
Int. J. Digit. Crime Forensics, 2014
Comput. Secur., 2014
Proceedings of the Internet of Vehicles - Technologies and Services, 2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014
Proceedings of the IEEE China Summit & International Conference on Signal and Information Processing, 2014
Proceedings of the 7th International Conference on Biomedical Engineering and Informatics, 2014
2013
Recursive Histogram Modification: Establishing Equivalency Between Reversible Data Hiding and Lossless Data Compression.
IEEE Trans. Image Process., 2013
IEEE Trans. Inf. Forensics Secur., 2013
A Novel Reversible Data Hiding Scheme Based on Two-Dimensional Difference-Histogram Modification.
IEEE Trans. Inf. Forensics Secur., 2013
IEEE Trans. Inf. Forensics Secur., 2013
Int. J. Comput. Intell. Syst., 2013
Proceedings of the 6th International Conference on Biomedical Engineering and Informatics, 2013
2012
Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers.
IEEE Trans. Image Process., 2012
Proceedings of the 2012 International Conference on Cloud and Service Computing, 2012
Proceedings of the 2012 International Conference on Cloud and Service Computing, 2012
2011
Proceedings of the Information Hiding - 13th International Conference, 2011
Proceedings of the Sixth International Conference on Image and Graphics, 2011
Proceedings of the Sixth International Conference on Image and Graphics, 2011
2010
IEEE Trans. Inf. Theory, 2010
IEEE Trans. Inf. Forensics Secur., 2010
2009
Informatica (Slovenia), 2009
2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes.
Proceedings of the Information Hiding, 10th International Workshop, 2008
2007
IEEE Signal Process. Lett., 2007
IEEE Commun. Lett., 2007