Wenying Wen

Orcid: 0000-0002-3098-4640

According to our database1, Wenying Wen authored at least 49 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A privacy-preserving image retrieval scheme with access control based on searchable encryption in media cloud.
Cybersecur., December, 2024

E-TPE: Efficient Thumbnail-Preserving Encryption for Privacy Protection in Visual Sensor Networks.
ACM Trans. Sens. Networks, July, 2024

3D mesh encryption with differentiated visual effect and high efficiency based on chaotic system.
Expert Syst. Appl., March, 2024

Visual Security Index Combining CNN and Filter for Perceptually Encrypted Light Field Images.
ACM Trans. Multim. Comput. Commun. Appl., January, 2024

Joint Coverless Steganography and Image Transformation for Covert Communication of Secret Messages.
IEEE Trans. Netw. Sci. Eng., 2024

PPM-SEM: A Privacy-Preserving Mechanism for Sharing Electronic Patient Records and Medical Images in Telemedicine.
IEEE Trans. Multim., 2024

Understanding Visual Privacy Protection: A Generalized Framework With an Instance on Facial Privacy.
IEEE Trans. Inf. Forensics Secur., 2024

PDDM: Prior-Guided Dual-Branch Diffusion Model for Pansharpening.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024

A Consumer-Oriented Image Transformation Scheme With a Secret Key for Privacy Protection.
IEEE Signal Process. Lett., 2024

Client-Side Watermarking for Images With Solid-Color Backgrounds.
IEEE Signal Process. Lett., 2024

TPE-DF: Thumbnail Preserving Encryption via Dual-2DCS Fusion.
IEEE Signal Process. Lett., 2024

Reversible gender privacy enhancement via adversarial perturbations.
Neural Networks, 2024

MFITN: A Multilevel Feature Interaction Transformer Network for Pansharpening.
IEEE Geosci. Remote. Sens. Lett., 2024

2023
APCAS: Autonomous Privacy Control and Authentication Sharing in Social Networks.
IEEE Trans. Comput. Soc. Syst., December, 2023

DR-SISM: A dual reversible secret image sharing mechanism.
J. King Saud Univ. Comput. Inf. Sci., September, 2023

A multi-level approach with visual information for encrypted H.265/HEVC videos.
Multim. Syst., June, 2023

Authenticable medical image-sharing scheme based on embedded small shadow QR code and blockchain framework.
Multim. Syst., April, 2023

Gradient-Guided Single Image Super-Resolution Based on Joint Trilateral Feature Filtering.
IEEE Trans. Circuits Syst. Video Technol., February, 2023

RAPP: Reversible Privacy Preservation for Various Face Attributes.
IEEE Trans. Inf. Forensics Secur., 2023

Identifiable Face Privacy Protection via Virtual Identity Transformation.
IEEE Signal Process. Lett., 2023

Visual Content Privacy Protection: A Survey.
CoRR, 2023

2022
Primitively visually meaningful image encryption: A new paradigm.
Inf. Sci., 2022

Dual-stream Self-attention Network for Image Captioning.
Proceedings of the IEEE International Conference on Visual Communications and Image Processing, 2022

2021
Blind Quality Assessment for Tone-Mapped Images by Analysis of Gradient and Chromatic Statistics.
IEEE Trans. Multim., 2021

Infrared and Visible Image Fusion via Texture Conditional Generative Adversarial Network.
IEEE Trans. Circuits Syst. Video Technol., 2021

Visual Quality Assessment for Perceptually Encrypted Light Field Images.
IEEE Trans. Circuits Syst. Video Technol., 2021

VMDM-fusion: a saliency feature representation method for infrared and visible image fusion.
Signal Image Video Process., 2021

Light field image encryption based on spatial-angular characteristic.
Signal Process., 2021

2020
Salient Object Detection by Spatiotemporal and Semantic Features in Real-Time Video Processing Systems.
IEEE Trans. Ind. Electron., 2020

Perceptual Quality Assessment for Screen Content Images by Spatial Continuity.
IEEE Trans. Circuits Syst. Video Technol., 2020

A visually secure image encryption scheme based on semi-tensor product compressed sensing.
Signal Process., 2020

An Unequal Image Privacy Protection Method Based on Saliency Detection.
Secur. Commun. Networks, 2020

Subdata image encryption scheme based on compressive sensing and vector quantization.
Neural Comput. Appl., 2020

Blind quality assessment for tone-mapped images based on local and global features.
Inf. Sci., 2020

2019
A robust and secure image sharing scheme with personal identity information embedded.
Comput. Secur., 2019

Light Field Image Encryption Based on Pixel Substitution and Double Random Phase Encoding.
Proceedings of the 3rd International Conference on Graphics and Signal Processing, 2019

2018
A compression-diffusion-permutation strategy for securing image.
Signal Process., 2018

Image salient regions encryption for generating visually meaningful ciphertext image.
Neural Comput. Appl., 2018

Cryptanalyzing a Color Image Encryption Scheme Based on Hybrid Hyper-Chaotic System and Cellular Automata.
IEEE Access, 2018

Light Filed Image Quality Assessment by Local and Global Features of Epipolar Plane Image.
Proceedings of the Fourth IEEE International Conference on Multimedia Big Data, 2018

2017
Deciphering an RGB color image cryptosystem based on Choquet fuzzy integral.
Neural Comput. Appl., 2017

A novel method for image segmentation using reaction-diffusion model.
Multidimens. Syst. Signal Process., 2017

2016
Security analysis of a color image encryption scheme based on skew tent map and hyper chaotic system of 6th-order CNN against chosen-plaintext attack.
Multim. Tools Appl., 2016

A novel selective image encryption method based on saliency detection.
Proceedings of the 2016 Visual Communications and Image Processing, 2016

2015
Robust coding of encrypted images via structural matrix.
Signal Process. Image Commun., 2015

Secure binary arithmetic coding based on digitalized modified logistic map and linear feedback shift register.
Commun. Nonlinear Sci. Numer. Simul., 2015

2014
Cryptanalyzing a novel image cipher based on mixed transformed logistic maps.
Multim. Tools Appl., 2014

On the security of symmetric ciphers based on DNA coding.
Inf. Sci., 2014

2013
Transition region-based active contour model for image segmentation.
J. Electronic Imaging, 2013


  Loading...