Xinpeng Zhang

Orcid: 0000-0001-5867-1315

Affiliations:
  • Shanghai University, Key Laboratory of Specialty Fiber Optics and Optical Access Networks, China
  • Fudan University, School of Computer Science, Shanghai, China (former)


According to our database1, Xinpeng Zhang authored at least 451 papers between 2002 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Protecting copyright of stable diffusion models from ambiguity attacks.
Signal Process., 2025

Adaptive three-dimensional histogram modification for JPEG reversible data hiding.
Signal Process., 2025

A survey on representation learning for multi-view data.
Neural Networks, 2025

2024
Watermarking for Stable Diffusion Models.
IEEE Internet Things J., November, 2024

Learning Compressed Artifact for JPEG Manipulation Localization Using Wide-Receptive-Field Network.
ACM Trans. Multim. Comput. Commun. Appl., October, 2024

Novel Robust Video Watermarking Scheme Based on Concentric Ring Subband and Visual Cryptography With Piecewise Linear Chaotic Mapping.
IEEE Trans. Circuits Syst. Video Technol., October, 2024

Adaptive 3D Mesh Steganography Based on Feature-Preserving Distortion.
IEEE Trans. Vis. Comput. Graph., August, 2024

Semi-Fragile Neural Network Watermarking Based on Adversarial Examples.
IEEE Trans. Emerg. Top. Comput. Intell., August, 2024

Diverse Batch Steganography Using Model-Based Selection and Double-Layered Payload Assignment.
IEEE Trans. Circuits Syst. Video Technol., August, 2024

Deep neural networks watermark via universal deep hiding and metric learning.
Neural Comput. Appl., May, 2024

Reducing High-Frequency Artifacts for Generative Model Watermarking via Wavelet Transform.
IEEE Internet Things J., May, 2024

Effective Backdoor Attack on Graph Neural Networks in Spectral Domain.
IEEE Internet Things J., April, 2024

Payload-Independent Direct Cost Learning for Image Steganography.
IEEE Trans. Circuits Syst. Video Technol., March, 2024

Progressive Histogram Modification for JPEG Reversible Data Hiding.
IEEE Trans. Circuits Syst. Video Technol., February, 2024

Traffic sign attack via pinpoint region probability estimation network.
Pattern Recognit., February, 2024

Semi-fragile neural network watermarking for content authentication and tampering localization.
Expert Syst. Appl., February, 2024

Removing Watermarks For Image Processing Networks Via Referenced Subspace Attention.
Comput. J., February, 2024

DeepDIST: A Black-Box Anti-Collusion Framework for Secure Distribution of Deep Models.
IEEE Trans. Circuits Syst. Video Technol., January, 2024

BFDAC: A Blockchain-Based and Fog-Computing-Assisted Data Access Control Scheme in Vehicular Social Networks.
IEEE Internet Things J., January, 2024

Verifiable Privacy-Preserving Heart Rate Estimation Based on LSTM.
IEEE Internet Things J., January, 2024

Hide and Recognize Your Privacy Image.
IEEE Trans. Netw. Sci. Eng., 2024

Reversible Data Hiding in Encrypted Images With Asymmetric Coding and Bit-Plane Block Compression.
IEEE Trans. Multim., 2024

CMCF-Net: An End-to-End Context Multiscale Cross-Fusion Network for Robust Copy-Move Forgery Detection.
IEEE Trans. Multim., 2024

Art Image Inpainting With Style-Guided Dual-Branch Inpainting Network.
IEEE Trans. Multim., 2024

Multi-Source Style Transfer via Style Disentanglement Network.
IEEE Trans. Multim., 2024

Print-Camera Resistant Image Watermarking With Deep Noise Simulation and Constrained Learning.
IEEE Trans. Multim., 2024

Perceptual Image Hashing Using Feature Fusion of Orthogonal Moments.
IEEE Trans. Multim., 2024

iSCMIS:Spatial-Channel Attention Based Deep Invertible Network for Multi-Image Steganography.
IEEE Trans. Multim., 2024

Dual Consensus Anchor Learning for Fast Multi-View Clustering.
IEEE Trans. Image Process., 2024

Image Manipulation Localization Using Spatial-Channel Fusion Excitation and Fine-Grained Feature Enhancement.
IEEE Trans. Instrum. Meas., 2024

LiDiNet: A Lightweight Deep Invertible Network for Image-in-Image Steganography.
IEEE Trans. Inf. Forensics Secur., 2024

Establishing Robust Generative Image Steganography via Popular Stable Diffusion.
IEEE Trans. Inf. Forensics Secur., 2024

Semantic-Preserving Linguistic Steganography by Pivot Translation and Semantic-Aware Bins Coding.
IEEE Trans. Dependable Secur. Comput., 2024

Robust and Imperceptible Black-Box DNN Watermarking Based on Fourier Perturbation Analysis and Frequency Sensitivity Clustering.
IEEE Trans. Dependable Secur. Comput., 2024

Robust Hashing With Local Tangent Space Alignment for Image Copy Detection.
IEEE Trans. Dependable Secur. Comput., 2024

Multi-Modality Ensemble Distortion for Spatial Steganography With Dynamic Cost Correction.
IEEE Trans. Dependable Secur. Comput., 2024

Robust Image Steganography Against General Downsampling Operations With Lossless Secret Recovery.
IEEE Trans. Dependable Secur. Comput., 2024

Robust Hashing for Neural Network Models via Heterogeneous Graph Representation.
IEEE Signal Process. Lett., 2024

Ambiguity attack against text-to-image diffusion model watermarking.
Signal Process., 2024

Identification of the Original Images.
J. Vis. Commun. Image Represent., 2024

Robust and high-fidelity image watermarking with mutual mapping and antispectral aliasing.
J. Electronic Imaging, 2024

Backdoor attack detection via prediction trustworthiness assessment.
Inf. Sci., 2024

BPFL: Blockchain-based privacy-preserving federated learning against poisoning attack.
Inf. Sci., 2024

Transferable adversarial attack based on sensitive perturbation analysis in frequency domain.
Inf. Sci., 2024

VMMP: Verifiable privacy-preserving multi-modal multi-task prediction.
Inf. Sci., 2024

Perceptual Hashing With Deep and Texture Features.
IEEE Multim., 2024

Controlling the performance of deep neural networks using a single parameter.
Evol. Intell., 2024

A novel robust black-box fingerprinting scheme for deep classification neural networks.
Expert Syst. Appl., 2024

ScreenMark: Watermarking Arbitrary Visual Content on Screen.
CoRR, 2024

Transferable Watermarking to Self-supervised Pre-trained Graph Encoders by Trigger Embeddings.
CoRR, 2024

Online Prompt Pricing based on Combinatorial Multi-Armed Bandit and Hierarchical Stackelberg Game.
CoRR, 2024

Regeneration Based Training-free Attribution of Fake Images Generated by Text-to-Image Generative Models.
CoRR, 2024

PROMPT-IML: Image Manipulation Localization with Pre-trained Foundation Models Through Prompt Tuning.
CoRR, 2024

From Covert Hiding to Visual Editing: Robust Generative Video Steganography.
CoRR, 2024

Sparse Backdoor Attack Against Neural Networks.
Comput. J., 2024

Stealthy Backdoor Attacks On Deep Point Cloud Recognization Networks.
Comput. J., 2024

From Covert Hiding To Visual Editing: Robust Generative Video Steganography.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Multi-view Feature Extraction via Tunable Prompts is Enough for Image Manipulation Localization.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Are handcrafted filters helpful for attributing AI-generated images?
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Cover-separable Fixed Neural Network Steganography via Deep Generative Models.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Engaging Live Video Comments Generation.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Suppressing High-Frequency Artifacts for Generative Model Watermarking by Anti-Aliasing.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2024

Watermarking Text Documents With Watermarked Fonts.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2024

Copyright Protection for Large Language Model EaaS via Unforgeable Backdoor Watermarking.
Proceedings of the Pattern Recognition - 27th International Conference, 2024

Search, Examine and Early-Termination: Fake News Detection with Annotation-Free Evidences.
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024

Revocable Backdoor for Deep Model Trading.
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024

Purified and Unified Steganographic Network.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

2023
Verifiable Privacy-Enhanced Rotation Invariant LBP Feature Extraction in Fog Computing.
IEEE Trans. Ind. Informatics, December, 2023

A Fast Method for Robust Video Watermarking Based on Zernike Moments.
IEEE Trans. Circuits Syst. Video Technol., December, 2023

Learning to Immunize Images for Tamper Localization and Self-Recovery.
IEEE Trans. Pattern Anal. Mach. Intell., November, 2023

Unlabeled backdoor poisoning on trained-from-scratch semi-supervised learning.
Inf. Sci., November, 2023

A novel watermarking framework for intellectual property protection of NLG APIs.
Neurocomputing, November, 2023

Robust image steganography against lossy JPEG compression based on embedding domain selection and adaptive error correction.
Expert Syst. Appl., November, 2023

Heterogeneous IoT Intrusion Detection Based on Fusion Word Embedding Deep Transfer Learning.
IEEE Trans. Ind. Informatics, August, 2023

A Customized Deep Network Based Encryption-Then-Lossy-Compression Scheme of Color Images Achieving Arbitrary Compression Ratios.
IEEE Trans. Circuits Syst. Video Technol., August, 2023

Image Sanitization in Online Social Networks: A General Framework for Breaking Robust Information Hiding.
IEEE Trans. Circuits Syst. Video Technol., June, 2023

Data hiding during image processing using capsule networks.
Neurocomputing, June, 2023

Secure Steganographic Cover Generation via a Noise-Optimization Stacked StyleGAN2.
Symmetry, April, 2023

Block-Diagonal Guided Symmetric Nonnegative Matrix Factorization.
IEEE Trans. Knowl. Data Eng., March, 2023

RGB-T Semantic Segmentation With Location, Activation, and Sharpening.
IEEE Trans. Circuits Syst. Video Technol., March, 2023

Exploring Abnormal Behavior in Swarm: Identify User Using Adversarial Examples.
IEEE Trans. Emerg. Top. Comput. Intell., February, 2023

Reversible Data Hiding in Palette Images.
IEEE Trans. Circuits Syst. Video Technol., February, 2023

Hiding data hiding.
Pattern Recognit. Lett., January, 2023

F-TPE: Flexible Thumbnail-Preserving Encryption Based on Multi-Pixel Sum-Preserving Encryption.
IEEE Trans. Multim., 2023

A Novel Encryption-Then-Lossy-Compression Scheme of Color Images Using Customized Residual Dense Spatial Network.
IEEE Trans. Multim., 2023

JPEG Image Encryption With Adaptive DC Coefficient Prediction and RS Pair Permutation.
IEEE Trans. Multim., 2023

Robust Image Hashing With Isomap and Saliency Map for Copy Detection.
IEEE Trans. Multim., 2023

Image Manipulation Localization Using Multi-Scale Feature Fusion and Adaptive Edge Supervision.
IEEE Trans. Multim., 2023

NIM-Nets: Noise-Aware Incomplete Multi-View Learning Networks.
IEEE Trans. Image Process., 2023

Salient Object Detection in Optical Remote Sensing Images Driven by Transformer.
IEEE Trans. Image Process., 2023

Query-Efficient Adversarial Attack With Low Perturbation Against End-to-End Speech Recognition Systems.
IEEE Trans. Inf. Forensics Secur., 2023

Double-Layered Dual-Syndrome Trellis Codes Utilizing Channel Knowledge for Robust Steganography.
IEEE Trans. Inf. Forensics Secur., 2023

Lightweight Salient Object Detection in Optical Remote-Sensing Images via Semantic Matching and Edge Alignment.
IEEE Trans. Geosci. Remote. Sens., 2023

Cover Selection for Steganography Using Image Similarity.
IEEE Trans. Dependable Secur. Comput., 2023

Perceptual Image Hashing With Locality Preserving Projection for Copy Detection.
IEEE Trans. Dependable Secur. Comput., 2023

Matrix-Based Secret Sharing for Reversible Data Hiding in Encrypted Images.
IEEE Trans. Dependable Secur. Comput., 2023

JPEG Steganography With Content Similarity Evaluation.
IEEE Trans. Cybern., 2023

Consistency-Induced Multiview Subspace Clustering.
IEEE Trans. Cybern., 2023

Reversible Data Hiding in Shared Images Based on Syndrome Decoding and Homomorphism.
IEEE Trans. Cloud Comput., 2023

Text Steganalysis Based on Hierarchical Supervised Learning and Dual Attention Mechanism.
IEEE ACM Trans. Audio Speech Lang. Process., 2023

Steganalysis of Neural Networks Based on Symmetric Histogram Distribution.
Symmetry, 2023

An Effective Framework for Intellectual Property Protection of NLG Models.
Symmetry, 2023

Image Steganalysis Network Based on Dual-Attention Mechanism.
IEEE Signal Process. Lett., 2023

Cross-Modal Text Steganography Against Synonym Substitution-Based Text Attack.
IEEE Signal Process. Lett., 2023

Maximum Block Energy Guided Robust Subspace Clustering.
IEEE Trans. Pattern Anal. Mach. Intell., 2023

Defending against adversarial examples using perceptual image hashing.
J. Electronic Imaging, 2023

Generating watermarked adversarial texts.
J. Electronic Imaging, 2023

A general steganographic framework for neural network models.
Inf. Sci., 2023

Privacy-enhanced and non-interactive linear regression with dropout-resilience.
Inf. Sci., 2023

CADW: CGAN-Based Attack on Deep Robust Image Watermarking.
IEEE Multim., 2023

Model Copyright Protection in Buyer-seller Environment.
CoRR, 2023

Steal My Artworks for Fine-tuning? A Watermarking Framework for Detecting Art Theft Mimicry in Text-to-Image Models.
CoRR, 2023

Rich and Poor Texture Contrast: A Simple yet Effective Approach for AI-generated Image Detection.
CoRR, 2023

StegGuard: Fingerprinting Self-supervised Pre-trained Encoders via Secrets Embeder and Extractor.
CoRR, 2023

Towards Deep Network Steganography: From Networks to Networks.
CoRR, 2023

StyleStegan: Leak-free Style Transfer Based on Feature Steganography.
CoRR, 2023

Generative Model Watermarking Suppressing High-Frequency Artifacts.
CoRR, 2023

Decision-based iterative fragile watermarking for model integrity verification.
CoRR, 2023

Generative Steganography Diffusion.
CoRR, 2023

Trojaning semi-supervised learning model via poisoning wild images on the web.
CoRR, 2023

VCMaster: Generating Diverse and Fluent Live Video Comments Based on Multimodal Contexts.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

RetouchingFFHQ: A Large-scale Dataset for Fine-grained Face Retouching Detection.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Flexible and Secure Watermarking for Latent Diffusion Model.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Interactive Image Style Transfer Guided by Graffiti.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Rethinking Neural Style Transfer: Generating Personalized and Watermarked Stylized Images.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

On Physically Occluded Fake Identity Document Detection.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Deep Neural Network Watermarking against Model Extraction Attack.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Securing Fixed Neural Network Steganography.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

WRAP: Watermarking Approach Robust Against Film-coating upon Printed Photographs.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Physical Invisible Backdoor Based on Camera Imaging.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Multi-modal Fake News Detection on Social Media via Multi-grained Information Fusion.
Proceedings of the 2023 ACM International Conference on Multimedia Retrieval, 2023

PDMTT: A Plagiarism Detection Model Towards Multi-turn Text Back-Translation.
Proceedings of the Digital Forensics and Watermarking - 22nd International Workshop, 2023

Perceptual Robust Hashing for Video Copy Detection with Unsupervised Learning.
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2023

Multimodal Fake News Detection via CLIP-Guided Learning.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

Watermarks for Generative Adversarial Network Based on Steganographic Invisible Backdoor.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

Image Protection for Robust Cropping Localization and Recovery.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

DRAW: Defending Camera-shooted RAW against Image Manipulation.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Forward Creation, Reverse Selection: Achieving Highly Pertinent Multimodal Responses in Dialogue Contexts.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

Identifying the Style of Chatting.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

StyleStegan: Leak-free Style Transfer Based on Feature Steganography.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

Preemptive Image Protection against Steganography.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

Steganography of Steganographic Networks.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Multi-granularity Brushstrokes Network for Universal Style Transfer.
ACM Trans. Multim. Comput. Commun. Appl., 2022

Signal-Dependent Noise Estimation for a Real-Camera Model via Weight and Shape Constraints.
IEEE Trans. Multim., 2022

Anti-Forensics for Face Swapping Videos via Adversarial Training.
IEEE Trans. Multim., 2022

Semi-Supervised Structured Subspace Learning for Multi-View Clustering.
IEEE Trans. Image Process., 2022

Unified Performance Evaluation Method for Perceptual Image Hashing.
IEEE Trans. Inf. Forensics Secur., 2022

High Capacity Lossless Data Hiding in JPEG Bitstream Based on General VLC Mapping.
IEEE Trans. Dependable Secur. Comput., 2022

HF-TPE: High-Fidelity Thumbnail- Preserving Encryption.
IEEE Trans. Circuits Syst. Video Technol., 2022

Reversible Data Hiding With Hierarchical Embedding for Encrypted Images.
IEEE Trans. Circuits Syst. Video Technol., 2022

A Comprehensive Analysis Method for Reversible Data Hiding in Stream-Cipher-Encrypted Images.
IEEE Trans. Circuits Syst. Video Technol., 2022

Perceptual Hashing With Complementary Color Wavelet Transform and Compressed Sensing for Reduced-Reference Image Quality Assessment.
IEEE Trans. Circuits Syst. Video Technol., 2022

Forensic Analysis of JPEG-Domain Enhanced Images via Coefficient Likelihood Modeling.
IEEE Trans. Circuits Syst. Video Technol., 2022

General Expansion-Shifting Model for Reversible Data Hiding: Theoretical Investigation and Practical Algorithm Design.
IEEE Trans. Circuits Syst. Video Technol., 2022

Repeatable Data Hiding: Towards the Reusability of Digital Images.
IEEE Trans. Circuits Syst. Video Technol., 2022

JPEG Reversible Data Hiding Using Dynamic Distortion Optimizing With Frequency Priority Reassignment.
IEEE Trans. Circuits Syst. Video Technol., 2022

Exploring Stable Coefficients on Joint Sub-Bands for Robust Video Watermarking in DT CWT Domain.
IEEE Trans. Circuits Syst. Video Technol., 2022

Perceptual Hash of Neural Networks.
Symmetry, 2022

ALiSa: Acrostic Linguistic Steganography Based on BERT and Gibbs Sampling.
IEEE Signal Process. Lett., 2022

Breaking Robust Data Hiding in Online Social Networks.
IEEE Signal Process. Lett., 2022

Ensemble Stego Selection for Enhancing Image Steganography.
IEEE Signal Process. Lett., 2022

A fully supervised universal adversarial perturbations and the progressive optimization.
J. Intell. Fuzzy Syst., 2022

Generating traceable adversarial text examples by watermarking in the semantic space.
J. Electronic Imaging, 2022

Robust backdoor injection with the capability of resisting network transfer.
Inf. Sci., 2022

Privacy-Enhanced and Verification-Traceable Aggregation for Federated Learning.
IEEE Internet Things J., 2022

Exploring Depth Information for Face Manipulation Detection.
CoRR, 2022

Robust Watermarking for Video Forgery Detection with Improved Imperceptibility and Robustness.
CoRR, 2022

A DTCWT-SVD Based Video Watermarking resistant to frame rate conversion.
CoRR, 2022

Multimodal Fake News Detection via CLIP-Guided Learning.
CoRR, 2022

Deniable Steganography.
CoRR, 2022

Hiding Images in Deep Probabilistic Models.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Robust Watermarking for Video Forgery Detection with Improved Imperceptibility and Robustness.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022

Multi-source Data Hiding in Neural Networks.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022

HF-Defend: Defending Against Adversarial Examples Based on Halftoning.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022

Perceptual Model Hashing: Towards Neural Network Model Authentication.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022

Hiding Function with Neural Networks.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022

On Generating Identifiable Virtual Faces.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Image Generation Network for Covert Transmission in Online Social Network.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Neural Network Model Protection with Piracy Identification and Tampering Localization Capability.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Generative Steganography Network.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Imperceptible Backdoor Attack: From Input Space to Feature Representation.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Generative Model Watermarking Based on Human Visual System.
Proceedings of the Digital Multimedia Communications - The 19th International Forum, 2022

On the Robustness of "Robust Reversible Data Hiding Scheme Based on Two-Layer Embedding Strategy".
Proceedings of the Digital Multimedia Communications - The 19th International Forum, 2022

Generative Steganographic Flow.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

Unlabeled Backdoor Poisoning in Semi-Supervised Learning.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

Invertible Image Dataset Protection.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

RWN: Robust Watermarking Network for Image Cropping Localization.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

Hiding Images Into Images with Real-World Robustness.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

Neural Network Fragile watermarking With No Model Performance Degradation.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

Exploiting Language Model For Efficient Linguistic Steganalysis.
Proceedings of the IEEE International Conference on Acoustics, 2022

Joint Learning for Addressee Selection and Response Generation in Multi-Party Conversation.
Proceedings of the IEEE International Conference on Acoustics, 2022

Image Steganalysis with Convolutional Vision Transformer.
Proceedings of the IEEE International Conference on Acoustics, 2022

Object-Oriented Backdoor Attack Against Image Captioning.
Proceedings of the IEEE International Conference on Acoustics, 2022

Encryption Resistant Deep Neural Network Watermarking.
Proceedings of the IEEE International Conference on Acoustics, 2022

Stealthy Backdoor Attack with Adversarial Training.
Proceedings of the IEEE International Conference on Acoustics, 2022

Patch Diffusion: A General Module for Face Manipulation Detection.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Invisible Backdoor Attacks on Deep Neural Networks Via Steganography and Regularization.
IEEE Trans. Dependable Secur. Comput., 2021

Detection of Spoofing Medium Contours for Face Anti-Spoofing.
IEEE Trans. Circuits Syst. Video Technol., 2021

Batch Steganography via Generative Network.
IEEE Trans. Circuits Syst. Video Technol., 2021

A Common Method of Share Authentication in Image Secret Sharing.
IEEE Trans. Circuits Syst. Video Technol., 2021

Efficient Reversible Data Hiding for JPEG Images With Multiple Histograms Modification.
IEEE Trans. Circuits Syst. Video Technol., 2021

Watermarking Neural Networks With Watermarked Images.
IEEE Trans. Circuits Syst. Video Technol., 2021

Optimized Lossless Data Hiding in JPEG Bitstream and Relay Transfer-Based Extension.
IEEE Trans. Circuits Syst. Video Technol., 2021

Perceptual Image Hashing for Content Authentication Based on Convolutional Neural Network With Multiple Constraints.
IEEE Trans. Circuits Syst. Video Technol., 2021

Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server.
IEEE Trans. Cloud Comput., 2021

Gaussian Model for 3D Mesh Steganography.
IEEE Signal Process. Lett., 2021

Linguistic Steganalysis With Graph Neural Networks.
IEEE Signal Process. Lett., 2021

Efficient Non-Targeted Attack for Deep Hashing Based Image Retrieval.
IEEE Signal Process. Lett., 2021

Hierarchical Authorization of Convolutional Neural Networks for Multi-User.
IEEE Signal Process. Lett., 2021

Embedding Probability Guided Network for Image Steganalysis.
IEEE Signal Process. Lett., 2021

Inheritance Attention Matrix-Based Universal Adversarial Perturbations on Vision Transformers.
IEEE Signal Process. Lett., 2021

Efficient Noninteractive Outsourcing of Large-Scale QR and LU Factorizations.
Secur. Commun. Networks, 2021

Steganography in animated emoji using self-reference.
Multim. Syst., 2021

Low-complexity fake face detection based on forensic similarity.
Multim. Syst., 2021

Privacy-preserving batch verification signature scheme based on blockchain for Vehicular Ad-Hoc Networks.
J. Inf. Secur. Appl., 2021

Destroying robust steganography in online social networks.
Inf. Sci., 2021

Multichannel Steganography in Digital Images for Multiple Receivers.
IEEE Multim., 2021

Steganographic visual story with mutual-perceived joint attention.
EURASIP J. Image Video Process., 2021

Generating Watermarked Adversarial Texts.
CoRR, 2021

On Generating Identifiable Virtual Faces.
CoRR, 2021

Exploiting Language Model for Efficient Linguistic Steganalysis: An Empirical Study.
CoRR, 2021

High-Capacity Reversible Data Hiding in Encrypted Image Using Pixel Predictions and Huffman Encoding.
CoRR, 2021

Hiding Data Hiding.
CoRR, 2021

Orientation Convolutional Networks for Image Recognition.
CoRR, 2021

Non-Interactive and secure outsourcing of PCA-Based face recognition.
Comput. Secur., 2021

Data Hiding in Neural Networks for Multiple Receivers [Research Frontier].
IEEE Comput. Intell. Mag., 2021

Efficient outsourced extraction of histogram features over encrypted images in cloud.
Sci. China Inf. Sci., 2021

Structural Watermarking to Deep Neural Networks via Network Channel Pruning.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2021

Deep Neural Network Retrieval.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

From Image to Imuge: Immunized Image Generation.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

Diffusing the Liveness Cues for Face Anti-spoofing.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

Fragile Neural Network Watermarking with Trigger Image Set.
Proceedings of the Knowledge Science, Engineering and Management, 2021

Watermarking Graph Neural Networks by Random Graphs.
Proceedings of the 9th International Symposium on Digital Forensics and Security, 2021

Undetectable Adversarial Examples Based on Microscopical Regularization.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021

Reversible Privacy-Preserving Recognition.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021

On Generating JPEG Adversarial Images.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021

Covert Communication via Modulating Soft Label of Neural Network.
Proceedings of the Artificial Intelligence and Security - 7th International Conference, 2021

2020
A New Steganography Method for Dynamic GIF Images Based on Palette Sort.
Wirel. Commun. Mob. Comput., 2020

Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding.
IEEE Trans. Multim., 2020

A Low-Overhead, Confidentiality-Assured, and Authenticated Data Acquisition Framework for IoT.
IEEE Trans. Ind. Informatics, 2020

Key Based Artificial Fingerprint Generation for Privacy Protection.
IEEE Trans. Dependable Secur. Comput., 2020

Diversity-Based Cascade Filters for JPEG Steganalysis.
IEEE Trans. Circuits Syst. Video Technol., 2020

How to Extract Image Features Based on Co-Occurrence Matrix Securely and Efficiently in Cloud Computing.
IEEE Trans. Cloud Comput., 2020

On Security Enhancement of Steganography via Generative Adversarial Image.
IEEE Signal Process. Lett., 2020

Practical Cover Selection for Steganography.
IEEE Signal Process. Lett., 2020

An improved first quantization matrix estimation for nonaligned double compressed JPEG images.
Signal Process., 2020

Reversible data hiding in encrypted images using adaptive reversible integer transformation.
Signal Process., 2020

Feature extraction optimization of JPEG steganalysis based on residual images.
Signal Process., 2020

Adaptive video data hiding with low bit-rate growth based on texture selection and ternary syndrome-trellis coding.
Multim. Tools Appl., 2020

Anti-forensics of diffusion-based image inpainting.
J. Electronic Imaging, 2020

On Cloud Storage Optimization of Blockchain With a Clustering-Based Genetic Algorithm.
IEEE Internet Things J., 2020

Defeating data hiding in social networks using generative adversarial network.
EURASIP J. Image Video Process., 2020

Semi-structured data protection scheme based on robust watermarking.
EURASIP J. Image Video Process., 2020

Perceptual Robust Hashing for Color Images with Canonical Correlation Analysis.
CoRR, 2020

Computing in Covert Domain Using Data Hiding.
CoRR, 2020

Iris Segmentation Using Feature Channel Optimization for Noisy Environments.
Cogn. Comput., 2020

Privacy-Protected Deletable Blockchain.
IEEE Access, 2020

Data Computing in Covert Domain.
Proceedings of the Security and Privacy in Digital Economy, 2020

Towards Criminal Sketching with Generative Adversarial Network.
Proceedings of the 22nd IEEE International Workshop on Multimedia Signal Processing, 2020

Reducing Invertible Embedding Distortion Using Graph Matching Model.
Proceedings of the Media Watermarking, 2020

Watermarking in Deep Neural Networks via Error Back-propagation.
Proceedings of the Media Watermarking, 2020

Generative Text Steganography Based on LSTM Network and Attention Mechanism with Keywords.
Proceedings of the Media Watermarking, 2020

Watermarking Neural Network with Compensation Mechanism.
Proceedings of the Knowledge Science, Engineering and Management, 2020

Steganographic Distortion Function for Enhanced Images.
Proceedings of the Digital Forensics and Watermarking - 19th International Workshop, 2020

Hierarchical High Capacity Data Hiding in JPEG Crypto-compressed Images.
Proceedings of the 28th European Signal Processing Conference, 2020

2019
Toward Construction-Based Data Hiding: From Secrets to Fingerprint Images.
IEEE Trans. Image Process., 2019

Towards Robust Image Steganography.
IEEE Trans. Circuits Syst. Video Technol., 2019

Flexible Lossy Compression for Selective Encrypted Image With Image Inpainting.
IEEE Trans. Circuits Syst. Video Technol., 2019

New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams.
IEEE Trans. Circuits Syst. Video Technol., 2019

Selective Ensemble Classification of Image Steganalysis Via Deep Q Network.
IEEE Signal Process. Lett., 2019

Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting.
Signal Process., 2019

Detection of double JPEG compression using modified DenseNet model.
Multim. Tools Appl., 2019

Huffman-code based retrieval for encrypted JPEG images.
J. Vis. Commun. Image Represent., 2019

An efficient privacy protection scheme for data security in video surveillance.
J. Vis. Commun. Image Represent., 2019

基于DCT域相关性的非对称JPEG隐写 (Asymmetric JPEG Steganography Based on Correlation in DCT Domain).
计算机科学, 2019

Additional articles of special issue on Real-time image watermarking and forensics in cloud computing.
J. Real Time Image Process., 2019

Special issue on real-time image watermarking and forensics in cloud computing.
J. Real Time Image Process., 2019

Steganography in stylized images.
J. Electronic Imaging, 2019

An efficient coding scheme for reversible data hiding in encrypted image with redundancy transfer.
Inf. Sci., 2019

Asymmetric Distortion Function for JPEG Steganography Using Block Artifact Compensation.
Int. J. Digit. Crime Forensics, 2019

Breaking Steganography: Slight Modification with Distortion Minimization.
Int. J. Digit. Crime Forensics, 2019

High Capacity Lossless Data Hiding for JPEG images by NLCM Relationship Constrcution.
CoRR, 2019

Game-theoretic Analysis to Content-adaptive Reversible Watermarking.
CoRR, 2019

Reversible Data Hiding With Image Enhancement Using Histogram Shifting.
IEEE Access, 2019

Secure Cover Selection for Steganography.
IEEE Access, 2019

Towards Improved Steganalysis: When Cover Selection is Used in Steganography.
IEEE Access, 2019

Breaking Permutation-Based Mesh Steganography and Security Improvement.
IEEE Access, 2019

Broadcasting Steganography in the Blockchain.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

Ensemble Steganalysis Based on Deep Residual Network.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

New Paradigm for Self-embedding Image Watermarking with Poisson Equation.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

An Improved Steganalysis Method Using Feature Combinations.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

2018
Efficient Compression of Encrypted Binary Images Using the Markov Random Field.
IEEE Trans. Inf. Forensics Secur., 2018

Separable Reversible Data Hiding in Encrypted JPEG Bitstreams.
IEEE Trans. Dependable Secur. Comput., 2018

Multi-Source Stego Detection with Low-Dimensional Textural Feature and Clustering Ensembles.
Symmetry, 2018

Joint Cover-Selection and Payload-Allocation by Steganographic Distortion Optimization.
IEEE Signal Process. Lett., 2018

Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection.
Signal Process., 2018

Multimedia Security: Novel Steganography and Privacy Preserving.
Secur. Commun. Networks, 2018

Secure and Efficient Image Retrieval over Encrypted Cloud Data.
Secur. Commun. Networks, 2018

Reversible data hiding in encrypted AMBTC images.
Multim. Tools Appl., 2018

Distortion function based on residual blocks for JPEG steganography.
Multim. Tools Appl., 2018

Guest Editorial: Multimedia Information Security and Its Applications in Cloud Computing.
Multim. Tools Appl., 2018

A novel auxiliary data construction scheme for reversible data hiding in JPEG images.
Multim. Tools Appl., 2018

Lossless data hiding in JPEG bitstream using alternative embedding.
J. Vis. Commun. Image Represent., 2018

Special Issue: Real-Time Data Hiding and Visual Cryptography.
J. Real Time Image Process., 2018

Constructive Steganography by Tangles.
KSII Trans. Internet Inf. Syst., 2018

Perceptual image hashing via dual-cross pattern encoding and salient structure detection.
Inf. Sci., 2018

A general framework for shiftable position-based dual-image reversible data hiding.
EURASIP J. Image Video Process., 2018

Reversible Data Hiding in Encrypted Images based on MSB Prediction and Huffman Coding.
CoRR, 2018

On Improving Distortion Functions for JPEG Steganography.
IEEE Access, 2018

Robust Batch Steganography in Social Networks With Non-Uniform Payload and Data Decomposition.
IEEE Access, 2018

Reversible Contrast Mapping based Reversible Data Hiding in Encrypted Images.
Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, 2018

Unified Data Hiding and Scrambling Method for JPEG Images.
Proceedings of the Advances in Multimedia Information Processing - PCM 2018, 2018

Distortion Function for Steganography in Texture Synthesized Images.
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018

Single Actor Pooled Steganalysis.
Proceedings of the Genetic and Evolutionary Computing, 2018

Breaking CNN-Based Steganalysis.
Proceedings of the Genetic and Evolutionary Computing, 2018

Location Privacy-Preserving Scheme Based on Multiple Virtual Maps.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Steganography by Constructing Marbling Texture.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Reversible Data Embedding and Scrambling Method Based on JPEG Images.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Style Transferring Based Data Hiding for Color Images.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Lost in the Digital Wild: Hiding Information in Digital Activities.
Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, 2018

2017
Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy.
Signal Process., 2017

Reversible data hiding in encrypted images based on multi-level encryption and block histogram modification.
Multim. Tools Appl., 2017

Detecting Image Splicing Based on Noise Level Inconsistency.
Multim. Tools Appl., 2017

Fully Verifiable Algorithm for Secure Outsourcing of Bilinear Pairing in Cloud Computing.
KSII Trans. Internet Inf. Syst., 2017

Kernel quaternion principal component analysis and its application in RGB-D object recognition.
Neurocomputing, 2017

Data hiding in Fingerprint Minutiae Template for Privacy Protection.
CoRR, 2017

An Improved Lossless Data Hiding Scheme in JPEG Bitstream by VLC Mapping.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017

2016
Lossless and Reversible Data Hiding in Encrypted Images With Public-Key Cryptography.
IEEE Trans. Circuits Syst. Video Technol., 2016

Reversible Data Hiding in Encrypted Images With Distributed Source Encoding.
IEEE Trans. Circuits Syst. Video Technol., 2016

Spatial Steganalysis Using Contrast of Residuals.
IEEE Signal Process. Lett., 2016

Reversible Data Hiding in Encrypted Images Based on Progressive Recovery.
IEEE Signal Process. Lett., 2016

Digital image steganalysis based on local textural features and double dimensionality reduction.
Secur. Commun. Networks, 2016

Spatial steganalysis using redistributed residuals and diverse ensemble classifier.
Multim. Tools Appl., 2016

Block cipher based separable reversible data hiding in encrypted images.
Multim. Tools Appl., 2016

AC-coefficient histogram-based retrieval for encrypted JPEG images.
Multim. Tools Appl., 2016

Unbalanced JPEG image steganalysis via multiview data match.
J. Vis. Commun. Image Represent., 2016

Improved joint reversible data hiding in encrypted images.
J. Vis. Commun. Image Represent., 2016

Encrypted JPEG image retrieval using block-wise feature comparison.
J. Vis. Commun. Image Represent., 2016

Hybrid distortion function for JPEG steganography.
J. Electronic Imaging, 2016

Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode.
Inf. Sci., 2016

Markov process-based retrieval for encrypted JPEG images.
EURASIP J. Inf. Secur., 2016

Perceptual image hashing with selective sampling for salient structure features.
Displays, 2016

Identity-Based Encryption with Verifiable Outsourced Revocation.
Comput. J., 2016

Semi-fragile watermarking for image authentication based on compressive sensing.
Sci. China Inf. Sci., 2016

Reversible Data Hiding: Advances in the Past Two Decades.
IEEE Access, 2016

Distortion Function for Spatial Image Steganography Based on the Polarity of Embedding Change.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Reversible Data Hiding in Encrypted AMBTC Compressed Images.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Quaternion-type moments combining both color and depth information for RGB-D object recognition.
Proceedings of the 23rd International Conference on Pattern Recognition, 2016

Reversible Contrast Enhancement.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

Reversible data hiding in encrypted image based on block histogram shifting.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

Adaptive Algorithm Based on Reversible Data Hiding Method for JPEG Images.
Proceedings of the Cloud Computing, Security, Privacy in New Computing Environments, 2016

Verifiable Outsourcing Algorithms for Modular Exponentiations with Improved Checkability.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Dynamic Adjustment of Hidden Node Parameters for Extreme Learning Machine.
IEEE Trans. Cybern., 2015

Fast TU size decision algorithm for HEVC encoders using Bayesian theorem detection.
Signal Process. Image Commun., 2015

Effective reversible data hiding in encrypted image with privacy protection for image content.
J. Vis. Commun. Image Represent., 2015

JPEG encryption for image rescaling in the encrypted domain.
J. Vis. Commun. Image Represent., 2015

An Efficient Batch Verifying Scheme for Detecting Illegal Signatures.
Int. J. Netw. Secur., 2015

Multiple Description Coding for Encrypted Images.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

Complete Separable Reversible Data Hiding in Encrypted Image.
Proceedings of the Cloud Computing and Security - First International Conference, 2015

Reversible visible watermark embedded in encrypted domain.
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015

Content-Fragile Commutative Watermarking-Encryption Based on Pixel Entropy.
Proceedings of the Advanced Concepts for Intelligent Vision Systems, 2015

2014
Compressing Encrypted Images With Auxiliary Information.
IEEE Trans. Multim., 2014

Reversible Data Hiding in Encrypted JPEG Bitstream.
IEEE Trans. Multim., 2014

Mixing high-dimensional features for JPEG steganalysis with ensemble classifier.
Signal Image Video Process., 2014

Compression of encrypted images with multi-layer decomposition.
Multim. Tools Appl., 2014

Efficient reversible data hiding in encrypted images.
J. Vis. Commun. Image Represent., 2014

Improved anti-forensics of JPEG compression.
J. Syst. Softw., 2014

Adaptive transform size decision algorithm for high-efficiency video coding inter coding.
J. Electronic Imaging, 2014

Effective feature selection for image steganalysis using extreme learning machine.
J. Electronic Imaging, 2014

Fully Anonymous Identity-based Broadcast Encryption without Random Oracles.
Int. J. Netw. Secur., 2014

Towards Robust Invariant Commutative Watermarking-Encryption Based on Image Histograms.
Int. J. Multim. Data Eng. Manag., 2014

Reversible Data Hiding in Encrypted Images Based on Image Interpolation.
Int. J. Digit. Crime Forensics, 2014

Efficient wet paper embedding for steganography with multilayer construction.
Ann. des Télécommunications, 2014

Adaptive JPEG steganography with new distortion function.
Ann. des Télécommunications, 2014

Histogram-based retrieval for encrypted JPEG images.
Proceedings of the IEEE China Summit & International Conference on Signal and Information Processing, 2014

2013
Reversible Data Hiding With Optimal Value Transfer.
IEEE Trans. Multim., 2013

An Effective CU Size Decision Method for HEVC Encoders.
IEEE Trans. Multim., 2013

Robust Hashing for Image Authentication Using Zernike Moments and Local Features.
IEEE Trans. Inf. Forensics Secur., 2013

JPEG Steganalysis With High-Dimensional Features and Bayesian Ensemble Classifier.
IEEE Signal Process. Lett., 2013

Commutative reversible data hiding and encryption.
Secur. Commun. Networks, 2013

Practical parallel key-insulated encryption with multiple helper keys.
Comput. Math. Appl., 2013

Towards More Robust Commutative Watermarking-Encryption of Images.
Proceedings of the 2013 IEEE International Symposium on Multimedia, 2013

2012
Scalable Coding of Encrypted Images.
IEEE Trans. Image Process., 2012

Separable Reversible Data Hiding in Encrypted Image.
IEEE Trans. Inf. Forensics Secur., 2012

Efficient data hiding with histogram-preserving property.
Telecommun. Syst., 2012

Spectrum-estimation based lossless information recovery for sparse array patterns.
Telecommun. Syst., 2012

Detecting Image Forgery Using Perspective Constraints.
IEEE Signal Process. Lett., 2012

Evolutionary selection extreme learning machine optimization for regression.
Soft Comput., 2012

Simultaneous inpainting for image structure and texture using anisotropic heat transfer model.
Multim. Tools Appl., 2012

Lossless data hiding in JPEG bitstream.
J. Syst. Softw., 2012

Robust Degraded Face Recognition Using Enhanced Local Frequency Descriptor and Multi-scale Competition
CoRR, 2012

Robust Face Recognition in Low Resolution and Blurred Image Using Joint Information in Space and Frequency.
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012

Reversible Data Hiding in Encrypted Images Using Pseudorandom Sequence Modulation.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

Generalized Quality Assessment of Blocking Artifacts for Compressed Images.
Proceedings of the Advances on Digital Television and Wireless Multimedia Communications, 2012

Non-interactive Dynamic Identity-Based Broadcast Encryption without Random Oracles.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Anonymous Hierarchical Identity-Based Encryption in Prime Order Groups.
Proceedings of the Data and Knowledge Engineering - Third International Conference, 2012

A New Approach to Commutative Watermarking-Encryption.
Proceedings of the Communications and Multimedia Security, 2012

2011
Reference Sharing Mechanism for Watermark Self-Embedding.
IEEE Trans. Image Process., 2011

Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction.
IEEE Trans. Inf. Forensics Secur., 2011

Lossy Compression and Iterative Reconstruction for Encrypted Image.
IEEE Trans. Inf. Forensics Secur., 2011

Reversible Data Hiding in Encrypted Image.
IEEE Signal Process. Lett., 2011

Log-Polar Based Scheme for Revealing Duplicated Regions in Digital Images.
IEEE Signal Process. Lett., 2011

Self-embedding watermark with flexible restoration quality.
Multim. Tools Appl., 2011

Lexicographical framework for image hashing with implementation based on DCT and NMF.
Multim. Tools Appl., 2011

Reversible Visible Watermarhing with Lossless Data Embedding Based on Difference Value Shift.
Intell. Autom. Soft Comput., 2011

Structural Feature-Based Image Hashing and Similarity Metric for Tampering Detection.
Fundam. Informaticae, 2011

Image self-embedding with high-quality restoration capability.
Digit. Signal Process., 2011

Improved Steganographic Embedding Exploiting Modification Direction in Multimedia Communications.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011

Compressing Encrypted Image Using Compressive Sensing.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

2010
Near-optimal codes for information embedding in gray-scale signals.
IEEE Trans. Inf. Theory, 2010

Estimation of image rotation angle using interpolation-related spectral signatures with application to blind detection of image forgery.
IEEE Trans. Inf. Forensics Secur., 2010

Efficient Data Hiding With Plus-Minus One or Two.
IEEE Signal Process. Lett., 2010

Reversible fragile watermarking for locating tampered blocks in JPEG images.
Signal Process., 2010

Image Watermarking Scheme With Unequal Protection Capability Based on Error Correcting Codes.
J. Multim., 2010

New Fuzzy Identity-Based Encryption in the Standard Model.
Informatica, 2010

Colour filter array interpolation based self recovery with anti-cropping capability.
Int. J. Multim. Intell. Secur., 2010

Hierarchical Identity-Based Proxy Re-Encryption without Random Oracles.
Int. J. Found. Comput. Sci., 2010

Detection of Image Region-Duplication with Rotation and Scaling Tolerance.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2010

2009
Fragile watermarking scheme using a hierarchical mechanism.
Signal Process., 2009

Steganography Combining Data Decomposition Mechanism and Stego-coding Method.
Informatica (Slovenia), 2009

Perceptual Similarity Metric Resilient to Rotation for Application in Robust Image Hashing.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009

Fragile Watermarking Scheme with Extensive Content Restoration Capability.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009

Matrix Selection in High Payload Embedding.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

2008
Fragile Watermarking With Error-Free Restoration Capability.
IEEE Trans. Multim., 2008

Multibit Assignment Steganography in Palette Images.
IEEE Signal Process. Lett., 2008

Twice Gric Colorings in Steganography.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Image Editing without Color Inconsistency Using Modified Poisson Equation.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes.
Proceedings of the Information Hiding, 10th International Workshop, 2008

2007
A Double Layered "Plus-Minus One" Data Embedding Scheme.
IEEE Signal Process. Lett., 2007

Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels.
IEEE Signal Process. Lett., 2007

Watermarking Scheme Capable of Resisting Sensitivity Attack.
IEEE Signal Process. Lett., 2007

Improving Embedding Efficiency of Covering Codes for Applications in Steganography.
IEEE Commun. Lett., 2007

Senary Huffman Compression - A Reversible Data Hiding Scheme for Binary Images.
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007

2006
Dynamical running coding in digital steganography.
IEEE Signal Process. Lett., 2006

Efficient Steganographic Embedding by Exploiting Modification Direction.
IEEE Commun. Lett., 2006

Information capacity of quantization steganography in the presence of active attack.
Proceedings of the 12th International Conference on Multi Media Modeling (MMM 2006), 2006

Information Hiding in Text Using Typesetting Tools with Stego-Encoding.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

Copyright Management Using Progressive Image Delivery, Visible Watermarking and Robust Fingerprinting.
Proceedings of the Ninth International Conference on Control, 2006

2005
Steganography using multiple-base notational system and human vision sensitivity.
IEEE Signal Process. Lett., 2005

Stego-Encoding with Error Correction Capability.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Watermarking Protocol Compatible with Secret Algorithms for Resisting Invertibility Attack.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Analysis of Parity Assignment Steganography in Palette Images.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

2004
Invertibility attack against watermarking based on forged algorithm and a countermeasure.
Pattern Recognit. Lett., 2004

Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security.
Pattern Recognit. Lett., 2004

A new watermarking scheme against inserter-based attacks suitable for digital media with moderate size.
Proceedings of the 3rd International Conference on Information Security, 2004

2003
Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences.
Proceedings of the Computer Network Security, 2003

Steganography with Least Histogram Abnormality.
Proceedings of the Computer Network Security, 2003

Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation.
Proceedings of the Computer Network Security, 2003

Data Hiding in Digital Audio by Frequency Domain Dithering.
Proceedings of the Computer Network Security, 2003

2002
Watermarking scheme capable of resisting attacks based on availability of inserter.
Signal Process., 2002


  Loading...