Xinpeng Zhang
Orcid: 0000-0001-5867-1315Affiliations:
- Shanghai University, Key Laboratory of Specialty Fiber Optics and Optical Access Networks, China
- Fudan University, School of Computer Science, Shanghai, China (former)
According to our database1,
Xinpeng Zhang
authored at least 451 papers
between 2002 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Signal Process., 2025
Signal Process., 2025
2024
Learning Compressed Artifact for JPEG Manipulation Localization Using Wide-Receptive-Field Network.
ACM Trans. Multim. Comput. Commun. Appl., October, 2024
Novel Robust Video Watermarking Scheme Based on Concentric Ring Subband and Visual Cryptography With Piecewise Linear Chaotic Mapping.
IEEE Trans. Circuits Syst. Video Technol., October, 2024
IEEE Trans. Vis. Comput. Graph., August, 2024
IEEE Trans. Emerg. Top. Comput. Intell., August, 2024
Diverse Batch Steganography Using Model-Based Selection and Double-Layered Payload Assignment.
IEEE Trans. Circuits Syst. Video Technol., August, 2024
Neural Comput. Appl., May, 2024
Reducing High-Frequency Artifacts for Generative Model Watermarking via Wavelet Transform.
IEEE Internet Things J., May, 2024
IEEE Internet Things J., April, 2024
IEEE Trans. Circuits Syst. Video Technol., March, 2024
IEEE Trans. Circuits Syst. Video Technol., February, 2024
Pattern Recognit., February, 2024
Semi-fragile neural network watermarking for content authentication and tampering localization.
Expert Syst. Appl., February, 2024
Comput. J., February, 2024
DeepDIST: A Black-Box Anti-Collusion Framework for Secure Distribution of Deep Models.
IEEE Trans. Circuits Syst. Video Technol., January, 2024
BFDAC: A Blockchain-Based and Fog-Computing-Assisted Data Access Control Scheme in Vehicular Social Networks.
IEEE Internet Things J., January, 2024
IEEE Internet Things J., January, 2024
Reversible Data Hiding in Encrypted Images With Asymmetric Coding and Bit-Plane Block Compression.
IEEE Trans. Multim., 2024
CMCF-Net: An End-to-End Context Multiscale Cross-Fusion Network for Robust Copy-Move Forgery Detection.
IEEE Trans. Multim., 2024
IEEE Trans. Multim., 2024
IEEE Trans. Multim., 2024
Print-Camera Resistant Image Watermarking With Deep Noise Simulation and Constrained Learning.
IEEE Trans. Multim., 2024
IEEE Trans. Multim., 2024
iSCMIS:Spatial-Channel Attention Based Deep Invertible Network for Multi-Image Steganography.
IEEE Trans. Multim., 2024
IEEE Trans. Image Process., 2024
Image Manipulation Localization Using Spatial-Channel Fusion Excitation and Fine-Grained Feature Enhancement.
IEEE Trans. Instrum. Meas., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Semantic-Preserving Linguistic Steganography by Pivot Translation and Semantic-Aware Bins Coding.
IEEE Trans. Dependable Secur. Comput., 2024
Robust and Imperceptible Black-Box DNN Watermarking Based on Fourier Perturbation Analysis and Frequency Sensitivity Clustering.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Multi-Modality Ensemble Distortion for Spatial Steganography With Dynamic Cost Correction.
IEEE Trans. Dependable Secur. Comput., 2024
Robust Image Steganography Against General Downsampling Operations With Lossless Secret Recovery.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Signal Process. Lett., 2024
Signal Process., 2024
Robust and high-fidelity image watermarking with mutual mapping and antispectral aliasing.
J. Electronic Imaging, 2024
BPFL: Blockchain-based privacy-preserving federated learning against poisoning attack.
Inf. Sci., 2024
Transferable adversarial attack based on sensitive perturbation analysis in frequency domain.
Inf. Sci., 2024
Inf. Sci., 2024
Evol. Intell., 2024
A novel robust black-box fingerprinting scheme for deep classification neural networks.
Expert Syst. Appl., 2024
Transferable Watermarking to Self-supervised Pre-trained Graph Encoders by Trigger Embeddings.
CoRR, 2024
Online Prompt Pricing based on Combinatorial Multi-Armed Bandit and Hierarchical Stackelberg Game.
CoRR, 2024
Regeneration Based Training-free Attribution of Fake Images Generated by Text-to-Image Generative Models.
CoRR, 2024
PROMPT-IML: Image Manipulation Localization with Pre-trained Foundation Models Through Prompt Tuning.
CoRR, 2024
CoRR, 2024
Comput. J., 2024
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Multi-view Feature Extraction via Tunable Prompts is Enough for Image Manipulation Localization.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Suppressing High-Frequency Artifacts for Generative Model Watermarking by Anti-Aliasing.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2024
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2024
Copyright Protection for Large Language Model EaaS via Unforgeable Backdoor Watermarking.
Proceedings of the Pattern Recognition - 27th International Conference, 2024
Search, Examine and Early-Termination: Fake News Detection with Annotation-Free Evidences.
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
2023
Verifiable Privacy-Enhanced Rotation Invariant LBP Feature Extraction in Fog Computing.
IEEE Trans. Ind. Informatics, December, 2023
IEEE Trans. Circuits Syst. Video Technol., December, 2023
IEEE Trans. Pattern Anal. Mach. Intell., November, 2023
Inf. Sci., November, 2023
Neurocomputing, November, 2023
Robust image steganography against lossy JPEG compression based on embedding domain selection and adaptive error correction.
Expert Syst. Appl., November, 2023
Heterogeneous IoT Intrusion Detection Based on Fusion Word Embedding Deep Transfer Learning.
IEEE Trans. Ind. Informatics, August, 2023
A Customized Deep Network Based Encryption-Then-Lossy-Compression Scheme of Color Images Achieving Arbitrary Compression Ratios.
IEEE Trans. Circuits Syst. Video Technol., August, 2023
Image Sanitization in Online Social Networks: A General Framework for Breaking Robust Information Hiding.
IEEE Trans. Circuits Syst. Video Technol., June, 2023
Neurocomputing, June, 2023
Symmetry, April, 2023
IEEE Trans. Knowl. Data Eng., March, 2023
IEEE Trans. Circuits Syst. Video Technol., March, 2023
IEEE Trans. Emerg. Top. Comput. Intell., February, 2023
IEEE Trans. Circuits Syst. Video Technol., February, 2023
F-TPE: Flexible Thumbnail-Preserving Encryption Based on Multi-Pixel Sum-Preserving Encryption.
IEEE Trans. Multim., 2023
A Novel Encryption-Then-Lossy-Compression Scheme of Color Images Using Customized Residual Dense Spatial Network.
IEEE Trans. Multim., 2023
JPEG Image Encryption With Adaptive DC Coefficient Prediction and RS Pair Permutation.
IEEE Trans. Multim., 2023
IEEE Trans. Multim., 2023
Image Manipulation Localization Using Multi-Scale Feature Fusion and Adaptive Edge Supervision.
IEEE Trans. Multim., 2023
IEEE Trans. Image Process., 2023
IEEE Trans. Image Process., 2023
Query-Efficient Adversarial Attack With Low Perturbation Against End-to-End Speech Recognition Systems.
IEEE Trans. Inf. Forensics Secur., 2023
Double-Layered Dual-Syndrome Trellis Codes Utilizing Channel Knowledge for Robust Steganography.
IEEE Trans. Inf. Forensics Secur., 2023
Lightweight Salient Object Detection in Optical Remote-Sensing Images via Semantic Matching and Edge Alignment.
IEEE Trans. Geosci. Remote. Sens., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Cloud Comput., 2023
Text Steganalysis Based on Hierarchical Supervised Learning and Dual Attention Mechanism.
IEEE ACM Trans. Audio Speech Lang. Process., 2023
Symmetry, 2023
Symmetry, 2023
IEEE Signal Process. Lett., 2023
IEEE Signal Process. Lett., 2023
IEEE Trans. Pattern Anal. Mach. Intell., 2023
J. Electronic Imaging, 2023
Inf. Sci., 2023
Steal My Artworks for Fine-tuning? A Watermarking Framework for Detecting Art Theft Mimicry in Text-to-Image Models.
CoRR, 2023
Rich and Poor Texture Contrast: A Simple yet Effective Approach for AI-generated Image Detection.
CoRR, 2023
StegGuard: Fingerprinting Self-supervised Pre-trained Encoders via Secrets Embeder and Extractor.
CoRR, 2023
CoRR, 2023
CoRR, 2023
VCMaster: Generating Diverse and Fluent Live Video Comments Based on Multimodal Contexts.
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Rethinking Neural Style Transfer: Generating Personalized and Watermarked Stylized Images.
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Multi-modal Fake News Detection on Social Media via Multi-grained Information Fusion.
Proceedings of the 2023 ACM International Conference on Multimedia Retrieval, 2023
Proceedings of the Digital Forensics and Watermarking - 22nd International Workshop, 2023
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2023
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023
Watermarks for Generative Adversarial Network Based on Steganographic Invisible Backdoor.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Forward Creation, Reverse Selection: Achieving Highly Pertinent Multimodal Responses in Dialogue Contexts.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
ACM Trans. Multim. Comput. Commun. Appl., 2022
Signal-Dependent Noise Estimation for a Real-Camera Model via Weight and Shape Constraints.
IEEE Trans. Multim., 2022
IEEE Trans. Multim., 2022
IEEE Trans. Image Process., 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Circuits Syst. Video Technol., 2022
IEEE Trans. Circuits Syst. Video Technol., 2022
A Comprehensive Analysis Method for Reversible Data Hiding in Stream-Cipher-Encrypted Images.
IEEE Trans. Circuits Syst. Video Technol., 2022
Perceptual Hashing With Complementary Color Wavelet Transform and Compressed Sensing for Reduced-Reference Image Quality Assessment.
IEEE Trans. Circuits Syst. Video Technol., 2022
Forensic Analysis of JPEG-Domain Enhanced Images via Coefficient Likelihood Modeling.
IEEE Trans. Circuits Syst. Video Technol., 2022
General Expansion-Shifting Model for Reversible Data Hiding: Theoretical Investigation and Practical Algorithm Design.
IEEE Trans. Circuits Syst. Video Technol., 2022
IEEE Trans. Circuits Syst. Video Technol., 2022
JPEG Reversible Data Hiding Using Dynamic Distortion Optimizing With Frequency Priority Reassignment.
IEEE Trans. Circuits Syst. Video Technol., 2022
Exploring Stable Coefficients on Joint Sub-Bands for Robust Video Watermarking in DT CWT Domain.
IEEE Trans. Circuits Syst. Video Technol., 2022
IEEE Signal Process. Lett., 2022
IEEE Signal Process. Lett., 2022
IEEE Signal Process. Lett., 2022
A fully supervised universal adversarial perturbations and the progressive optimization.
J. Intell. Fuzzy Syst., 2022
Generating traceable adversarial text examples by watermarking in the semantic space.
J. Electronic Imaging, 2022
Inf. Sci., 2022
IEEE Internet Things J., 2022
Robust Watermarking for Video Forgery Detection with Improved Imperceptibility and Robustness.
CoRR, 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Robust Watermarking for Video Forgery Detection with Improved Imperceptibility and Robustness.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022
Neural Network Model Protection with Piracy Identification and Tampering Localization Capability.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022
Proceedings of the Digital Multimedia Communications - The 19th International Forum, 2022
On the Robustness of "Robust Reversible Data Hiding Scheme Based on Two-Layer Embedding Strategy".
Proceedings of the Digital Multimedia Communications - The 19th International Forum, 2022
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022
Proceedings of the IEEE International Conference on Acoustics, 2022
Joint Learning for Addressee Selection and Response Generation in Multi-Party Conversation.
Proceedings of the IEEE International Conference on Acoustics, 2022
Proceedings of the IEEE International Conference on Acoustics, 2022
Proceedings of the IEEE International Conference on Acoustics, 2022
Proceedings of the IEEE International Conference on Acoustics, 2022
Proceedings of the IEEE International Conference on Acoustics, 2022
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022
2021
Invisible Backdoor Attacks on Deep Neural Networks Via Steganography and Regularization.
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Circuits Syst. Video Technol., 2021
IEEE Trans. Circuits Syst. Video Technol., 2021
IEEE Trans. Circuits Syst. Video Technol., 2021
Efficient Reversible Data Hiding for JPEG Images With Multiple Histograms Modification.
IEEE Trans. Circuits Syst. Video Technol., 2021
IEEE Trans. Circuits Syst. Video Technol., 2021
IEEE Trans. Circuits Syst. Video Technol., 2021
Perceptual Image Hashing for Content Authentication Based on Convolutional Neural Network With Multiple Constraints.
IEEE Trans. Circuits Syst. Video Technol., 2021
Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server.
IEEE Trans. Cloud Comput., 2021
IEEE Signal Process. Lett., 2021
IEEE Signal Process. Lett., 2021
IEEE Signal Process. Lett., 2021
Inheritance Attention Matrix-Based Universal Adversarial Perturbations on Vision Transformers.
IEEE Signal Process. Lett., 2021
Secur. Commun. Networks, 2021
Privacy-preserving batch verification signature scheme based on blockchain for Vehicular Ad-Hoc Networks.
J. Inf. Secur. Appl., 2021
IEEE Multim., 2021
EURASIP J. Image Video Process., 2021
CoRR, 2021
High-Capacity Reversible Data Hiding in Encrypted Image Using Pixel Predictions and Huffman Encoding.
CoRR, 2021
Comput. Secur., 2021
IEEE Comput. Intell. Mag., 2021
Efficient outsourced extraction of histogram features over encrypted images in cloud.
Sci. China Inf. Sci., 2021
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2021
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
Proceedings of the Knowledge Science, Engineering and Management, 2021
Proceedings of the 9th International Symposium on Digital Forensics and Security, 2021
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021
Proceedings of the Artificial Intelligence and Security - 7th International Conference, 2021
2020
Wirel. Commun. Mob. Comput., 2020
Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding.
IEEE Trans. Multim., 2020
A Low-Overhead, Confidentiality-Assured, and Authenticated Data Acquisition Framework for IoT.
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Dependable Secur. Comput., 2020
IEEE Trans. Circuits Syst. Video Technol., 2020
How to Extract Image Features Based on Co-Occurrence Matrix Securely and Efficiently in Cloud Computing.
IEEE Trans. Cloud Comput., 2020
IEEE Signal Process. Lett., 2020
An improved first quantization matrix estimation for nonaligned double compressed JPEG images.
Signal Process., 2020
Reversible data hiding in encrypted images using adaptive reversible integer transformation.
Signal Process., 2020
Signal Process., 2020
Adaptive video data hiding with low bit-rate growth based on texture selection and ternary syndrome-trellis coding.
Multim. Tools Appl., 2020
On Cloud Storage Optimization of Blockchain With a Clustering-Based Genetic Algorithm.
IEEE Internet Things J., 2020
EURASIP J. Image Video Process., 2020
EURASIP J. Image Video Process., 2020
CoRR, 2020
Cogn. Comput., 2020
Proceedings of the Security and Privacy in Digital Economy, 2020
Proceedings of the 22nd IEEE International Workshop on Multimedia Signal Processing, 2020
Proceedings of the Media Watermarking, 2020
Proceedings of the Media Watermarking, 2020
Generative Text Steganography Based on LSTM Network and Attention Mechanism with Keywords.
Proceedings of the Media Watermarking, 2020
Proceedings of the Knowledge Science, Engineering and Management, 2020
Proceedings of the Digital Forensics and Watermarking - 19th International Workshop, 2020
Proceedings of the 28th European Signal Processing Conference, 2020
2019
IEEE Trans. Image Process., 2019
IEEE Trans. Circuits Syst. Video Technol., 2019
IEEE Trans. Circuits Syst. Video Technol., 2019
IEEE Signal Process. Lett., 2019
Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting.
Signal Process., 2019
Multim. Tools Appl., 2019
J. Vis. Commun. Image Represent., 2019
J. Vis. Commun. Image Represent., 2019
基于DCT域相关性的非对称JPEG隐写 (Asymmetric JPEG Steganography Based on Correlation in DCT Domain).
计算机科学, 2019
Additional articles of special issue on Real-time image watermarking and forensics in cloud computing.
J. Real Time Image Process., 2019
J. Real Time Image Process., 2019
An efficient coding scheme for reversible data hiding in encrypted image with redundancy transfer.
Inf. Sci., 2019
Asymmetric Distortion Function for JPEG Steganography Using Block Artifact Compensation.
Int. J. Digit. Crime Forensics, 2019
Int. J. Digit. Crime Forensics, 2019
High Capacity Lossless Data Hiding for JPEG images by NLCM Relationship Constrcution.
CoRR, 2019
IEEE Access, 2019
IEEE Access, 2019
IEEE Access, 2019
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Trans. Dependable Secur. Comput., 2018
Multi-Source Stego Detection with Low-Dimensional Textural Feature and Clustering Ensembles.
Symmetry, 2018
Joint Cover-Selection and Payload-Allocation by Steganographic Distortion Optimization.
IEEE Signal Process. Lett., 2018
Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection.
Signal Process., 2018
Secur. Commun. Networks, 2018
Secur. Commun. Networks, 2018
Multim. Tools Appl., 2018
Guest Editorial: Multimedia Information Security and Its Applications in Cloud Computing.
Multim. Tools Appl., 2018
A novel auxiliary data construction scheme for reversible data hiding in JPEG images.
Multim. Tools Appl., 2018
J. Vis. Commun. Image Represent., 2018
J. Real Time Image Process., 2018
Perceptual image hashing via dual-cross pattern encoding and salient structure detection.
Inf. Sci., 2018
EURASIP J. Image Video Process., 2018
Reversible Data Hiding in Encrypted Images based on MSB Prediction and Huffman Coding.
CoRR, 2018
Robust Batch Steganography in Social Networks With Non-Uniform Payload and Data Decomposition.
IEEE Access, 2018
Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, 2018
Proceedings of the Advances in Multimedia Information Processing - PCM 2018, 2018
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018
Proceedings of the Genetic and Evolutionary Computing, 2018
Proceedings of the Genetic and Evolutionary Computing, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, 2018
2017
Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy.
Signal Process., 2017
Reversible data hiding in encrypted images based on multi-level encryption and block histogram modification.
Multim. Tools Appl., 2017
Multim. Tools Appl., 2017
Fully Verifiable Algorithm for Secure Outsourcing of Bilinear Pairing in Cloud Computing.
KSII Trans. Internet Inf. Syst., 2017
Kernel quaternion principal component analysis and its application in RGB-D object recognition.
Neurocomputing, 2017
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017
2016
Lossless and Reversible Data Hiding in Encrypted Images With Public-Key Cryptography.
IEEE Trans. Circuits Syst. Video Technol., 2016
IEEE Trans. Circuits Syst. Video Technol., 2016
IEEE Signal Process. Lett., 2016
Digital image steganalysis based on local textural features and double dimensionality reduction.
Secur. Commun. Networks, 2016
Multim. Tools Appl., 2016
Multim. Tools Appl., 2016
Multim. Tools Appl., 2016
J. Vis. Commun. Image Represent., 2016
J. Vis. Commun. Image Represent., 2016
J. Vis. Commun. Image Represent., 2016
Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode.
Inf. Sci., 2016
EURASIP J. Inf. Secur., 2016
Displays, 2016
Sci. China Inf. Sci., 2016
Distortion Function for Spatial Image Steganography Based on the Polarity of Embedding Change.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
Quaternion-type moments combining both color and depth information for RGB-D object recognition.
Proceedings of the 23rd International Conference on Pattern Recognition, 2016
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016
Proceedings of the Cloud Computing, Security, Privacy in New Computing Environments, 2016
Verifiable Outsourcing Algorithms for Modular Exponentiations with Improved Checkability.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
IEEE Trans. Cybern., 2015
Signal Process. Image Commun., 2015
Effective reversible data hiding in encrypted image with privacy protection for image content.
J. Vis. Commun. Image Represent., 2015
J. Vis. Commun. Image Represent., 2015
Int. J. Netw. Secur., 2015
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015
Proceedings of the Cloud Computing and Security - First International Conference, 2015
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015
Proceedings of the Advanced Concepts for Intelligent Vision Systems, 2015
2014
Signal Image Video Process., 2014
Multim. Tools Appl., 2014
J. Vis. Commun. Image Represent., 2014
Adaptive transform size decision algorithm for high-efficiency video coding inter coding.
J. Electronic Imaging, 2014
J. Electronic Imaging, 2014
Int. J. Netw. Secur., 2014
Towards Robust Invariant Commutative Watermarking-Encryption Based on Image Histograms.
Int. J. Multim. Data Eng. Manag., 2014
Int. J. Digit. Crime Forensics, 2014
Ann. des Télécommunications, 2014
Ann. des Télécommunications, 2014
Proceedings of the IEEE China Summit & International Conference on Signal and Information Processing, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
IEEE Signal Process. Lett., 2013
Comput. Math. Appl., 2013
Proceedings of the 2013 IEEE International Symposium on Multimedia, 2013
2012
IEEE Trans. Inf. Forensics Secur., 2012
Telecommun. Syst., 2012
IEEE Signal Process. Lett., 2012
Soft Comput., 2012
Simultaneous inpainting for image structure and texture using anisotropic heat transfer model.
Multim. Tools Appl., 2012
Robust Degraded Face Recognition Using Enhanced Local Frequency Descriptor and Multi-scale Competition
CoRR, 2012
Robust Face Recognition in Low Resolution and Blurred Image Using Joint Information in Space and Frequency.
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012
Proceedings of the Advances on Digital Television and Wireless Multimedia Communications, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the Data and Knowledge Engineering - Third International Conference, 2012
Proceedings of the Communications and Multimedia Security, 2012
2011
IEEE Trans. Image Process., 2011
Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction.
IEEE Trans. Inf. Forensics Secur., 2011
IEEE Trans. Inf. Forensics Secur., 2011
IEEE Signal Process. Lett., 2011
Multim. Tools Appl., 2011
Lexicographical framework for image hashing with implementation based on DCT and NMF.
Multim. Tools Appl., 2011
Reversible Visible Watermarhing with Lossless Data Embedding Based on Difference Value Shift.
Intell. Autom. Soft Comput., 2011
Structural Feature-Based Image Hashing and Similarity Metric for Tampering Detection.
Fundam. Informaticae, 2011
Digit. Signal Process., 2011
Improved Steganographic Embedding Exploiting Modification Direction in Multimedia Communications.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
2010
IEEE Trans. Inf. Theory, 2010
Estimation of image rotation angle using interpolation-related spectral signatures with application to blind detection of image forgery.
IEEE Trans. Inf. Forensics Secur., 2010
Signal Process., 2010
Image Watermarking Scheme With Unequal Protection Capability Based on Error Correcting Codes.
J. Multim., 2010
Int. J. Multim. Intell. Secur., 2010
Int. J. Found. Comput. Sci., 2010
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2010
2009
Informatica (Slovenia), 2009
Perceptual Similarity Metric Resilient to Rotation for Application in Robust Image Hashing.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009
Proceedings of the Digital Watermarking, 8th International Workshop, 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
2008
IEEE Trans. Multim., 2008
IEEE Signal Process. Lett., 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes.
Proceedings of the Information Hiding, 10th International Workshop, 2008
2007
IEEE Signal Process. Lett., 2007
IEEE Signal Process. Lett., 2007
IEEE Signal Process. Lett., 2007
IEEE Commun. Lett., 2007
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007
2006
IEEE Commun. Lett., 2006
Proceedings of the 12th International Conference on Multi Media Modeling (MMM 2006), 2006
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006
Copyright Management Using Progressive Image Delivery, Visible Watermarking and Robust Fingerprinting.
Proceedings of the Ninth International Conference on Control, 2006
2005
IEEE Signal Process. Lett., 2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
Watermarking Protocol Compatible with Secret Algorithms for Resisting Invertibility Attack.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
2004
Invertibility attack against watermarking based on forged algorithm and a countermeasure.
Pattern Recognit. Lett., 2004
Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security.
Pattern Recognit. Lett., 2004
A new watermarking scheme against inserter-based attacks suitable for digital media with moderate size.
Proceedings of the 3rd International Conference on Information Security, 2004
2003
Proceedings of the Computer Network Security, 2003
Proceedings of the Computer Network Security, 2003
Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation.
Proceedings of the Computer Network Security, 2003
Proceedings of the Computer Network Security, 2003
2002
Signal Process., 2002