Xuehu Yan
Orcid: 0000-0001-6388-1720
According to our database1,
Xuehu Yan
authored at least 127 papers
between 2007 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
2024
Neural Comput. Appl., May, 2024
Sensors, April, 2024
Robust Secret Image Sharing Resistant to JPEG Recompression Based on Stable Block Condition.
IEEE Trans. Multim., 2024
Secret Cracking and Security Enhancement for the Image Application of CRT-Based Secret Sharing.
IEEE Trans. Inf. Forensics Secur., 2024
Signal Process., 2024
J. Inf. Secur. Appl., 2024
CoRR, 2024
2023
Signal Process., May, 2023
Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing.
Frontiers Inf. Technol. Electron. Eng., January, 2023
ACM Trans. Multim. Comput. Commun. Appl., 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
2022
Sensors, 2022
Multim. Tools Appl., 2022
Visual secret sharing scheme with (n, n) threshold based on WeChat Mini Program codes.
J. Vis. Commun. Image Represent., 2022
J. Inf. Secur. Appl., 2022
A Novel General (n, n)-Threshold Multiple Secret Images Sharing Scheme Based on Information Hiding in the Sharing Domain.
Entropy, 2022
Entropy, 2022
Generative Text Steganography via Multiple Social Network Channels Based on Transformers.
Proceedings of the Natural Language Processing and Chinese Computing, 2022
Proceedings of the Digital Forensics and Cyber Crime - 13th EAI International Conference, 2022
2021
ACM Trans. Multim. Comput. Commun. Appl., 2021
IEEE Trans. Circuits Syst. Video Technol., 2021
An Intragroup and Intergroup Multiple Secret Images' Sharing Scheme with Each Participant Holding One Shadow Image.
Secur. Commun. Networks, 2021
Secur. Commun. Networks, 2021
A novel (k1, k2, n)-threshold two-in-one secret image sharing scheme for multiple secrets.
J. Vis. Commun. Image Represent., 2021
Int. J. Digit. Crime Forensics, 2021
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021
Proceedings of the International Conference on Communications, 2021
2020
Signal Process. Image Commun., 2020
Secur. Commun. Networks, 2020
Multim. Tools Appl., 2020
Visual secret sharing scheme with (n, n) threshold for selective secret content based on QR codes.
Multim. Tools Appl., 2020
XOR-ed visual secret sharing scheme with robust and meaningful shadows based on QR codes.
Multim. Tools Appl., 2020
Int. J. Digit. Crime Forensics, 2020
IEEE Access, 2020
Proceedings of the ICDSP 2020: 4th International Conference on Digital Signal Processing, 2020
2019
Signal Process. Image Commun., 2019
Polynomial-based extended secret image sharing scheme with reversible and unexpanded covers.
Multim. Tools Appl., 2019
J. Vis. Commun. Image Represent., 2019
J. Inf. Secur. Appl., 2019
Int. J. Digit. Crime Forensics, 2019
Weighted Secret Image Sharing for a $(k, n)$ Threshold Based on the Chinese Remainder Theorem.
IEEE Access, 2019
Lossless $(k, n)$ -Threshold Image Secret Sharing Based on the Chinese Remainder Theorem Without Auxiliary Encryption.
IEEE Access, 2019
IEEE Access, 2019
Proceedings of the Data Science, 2019
2018
Lossless and Efficient Polynomial-Based Secret Image Sharing with Reduced Shadow Size.
Symmetry, 2018
Symmetry, 2018
Secur. Commun. Networks, 2018
Progressive visual secret sharing for general access structure with multiple decryptions.
Multim. Tools Appl., 2018
Random grid-based threshold visual secret sharing with improved visual quality and lossless recovery ability.
Multim. Tools Appl., 2018
Greyscale-images-oriented progressive secret sharing based on the linear congruence equation.
Multim. Tools Appl., 2018
J. Vis. Commun. Image Represent., 2018
J. Real Time Image Process., 2018
J. Real Time Image Process., 2018
Visual secret sharing scheme for (k, n) threshold based on QR code with multiple decryptions.
J. Real Time Image Process., 2018
J. Inf. Hiding Multim. Signal Process., 2018
Image Secret Sharing Construction for General Access Structure with Meaningful Share.
Int. J. Digit. Crime Forensics, 2018
Int. J. Digit. Crime Forensics, 2018
Chinese remainder theorem-based two-in-one image secret sharing with three decoding options.
Digit. Signal Process., 2018
2017
Int. J. Digit. Crime Forensics, 2017
Int. J. Digit. Crime Forensics, 2017
Int. J. Digit. Crime Forensics, 2017
Contrast-improved visual secret sharing based on random grid for general access structure.
Digit. Signal Process., 2017
Secret Image Sharing for (k, k) Threshold Based on Chinese Remainder Theorem and Image Characteristics.
Proceedings of the Image and Video Technology - 8th Pacific-Rim Symposium, 2017
Secret Data-Driven Carrier-Free Secret Sharing Scheme Based on Error Correction Blocks of QR Codes.
Proceedings of the Data Science, 2017
Proceedings of the Data Science, 2017
Proceedings of the Data Science, 2017
Proceedings of the Image and Graphics - 9th International Conference, 2017
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
Proceedings of the 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), 2017
Proceedings of the 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), 2017
Proceedings of the 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), 2017
2016
Multim. Tools Appl., 2016
Multim. Tools Appl., 2016
Design a new visual cryptography for human-verifiable authentication in accessing a database.
J. Real Time Image Process., 2016
Proceedings of the Wireless Internet - 9th International Conference, 2016
Proceedings of the Wireless Internet - 9th International Conference, 2016
Proceedings of the 12th International Conference on Mobile Ad-Hoc and Sensor Networks, 2016
A Progressive Threshold Secret Image Sharing with Meaningful Shares for Gray-Scale Image.
Proceedings of the 12th International Conference on Mobile Ad-Hoc and Sensor Networks, 2016
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2016
Proceedings of the Social Computing, 2016
2015
Signal Image Video Process., 2015
Signal Image Video Process., 2015
A novel template protection scheme for multibiometrics based on fuzzy commitment and chaotic system.
Signal Image Video Process., 2015
Signal Process., 2015
Random grids-based visual secret sharing with improved visual quality via error diffusion.
Multim. Tools Appl., 2015
Visual secret sharing based on random grids with abilities of AND and XOR lossless recovery.
Multim. Tools Appl., 2015
J. Vis. Commun. Image Represent., 2015
J. Inf. Hiding Multim. Signal Process., 2015
Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality.
Digit. Signal Process., 2015
2014
Threshold construction from specific cases in visual cryptography without the pixel expansion.
Signal Process., 2014
Random Girds-Based Threshold Visual Secret Sharing with Improved Contrast by Boolean Operations.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Proceedings of the Neural Information Processing - 21st International Conference, 2014
Proceedings of the Neural Information Processing - 21st International Conference, 2014
Proceedings of the Intelligent Data analysis and its Applications, Volume II, 2014
2013
Corrigendum to "T. Chen, K. Tsao, Threshold visual secret sharing by random grids" [J. Syst. Softw. 84(2011) 1197-1208].
J. Syst. Softw., 2013
A New Assessment Measure of Shadow Image Quality Based on Error Diffusion Techniques.
J. Inf. Hiding Multim. Signal Process., 2013
A Novel Hybrid Multibiometrics Based on the Fusion of Dual Iris, Visible and Thermal Face Images.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013
2012
Proceedings of the Intelligent Information and Database Systems - 4th Asian Conference, 2012
2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007