default search action
Xinpeng Zhang 0001
Person information
- affiliation: Shanghai University, Key Laboratory of Specialty Fiber Optics and Optical Access Networks, China
- affiliation (former): Fudan University, School of Computer Science, Shanghai, China
Other persons with the same name
- Xinpeng Zhang — disambiguation page
- Xinpeng Zhang 0002 — Kyoto University, Department of Social Informatics, Graduate School of Informatics, Japan
- Xinpeng Zhang 0003 — Guangdong University of Technology, GDUT, School of Computer Science and Technology, Guangzhou, China
- Xinpeng Zhang 0004 — Fudan University, Shanghai, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j275]Zihan Yuan, Li Li, Zichi Wang, Xinpeng Zhang:
Protecting copyright of stable diffusion models from ambiguity attacks. Signal Process. 227: 109722 (2025) - 2024
- [j274]Yuliang Xue, Yuhao Zhu, Zhiying Zhu, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Removing Watermarks For Image Processing Networks Via Referenced Subspace Attention. Comput. J. 67(2): 498-507 (2024) - [j273]Nan Zhong, Zhenxing Qian, Xinpeng Zhang:
Sparse Backdoor Attack Against Neural Networks. Comput. J. 67(5): 1783-1793 (2024) - [j272]Le Feng, Zhenxing Qian, Xinpeng Zhang, Sheng Li:
Stealthy Backdoor Attacks On Deep Point Cloud Recognization Networks. Comput. J. 67(5): 1879-1891 (2024) - [j271]Zihan Yuan, Xinpeng Zhang, Zichi Wang, Zhaoxia Yin:
Semi-fragile neural network watermarking for content authentication and tampering localization. Expert Syst. Appl. 236: 121315 (2024) - [j270]Mouke Mo, Chuntao Wang, Qingwen Guo, Shan Bian, Qiong Huang, Xinpeng Zhang:
A novel robust black-box fingerprinting scheme for deep classification neural networks. Expert Syst. Appl. 252: 124201 (2024) - [j269]Yi Luo, Sheng Li, Xinpeng Zhang, Guorui Feng:
Controlling the performance of deep neural networks using a single parameter. Evol. Intell. 17(5): 4303-4313 (2024) - [j268]Mengzhu Yu, Zhenjun Tang, Xiaoping Liang, Xianquan Zhang, Xinpeng Zhang:
Perceptual Hashing With Deep and Texture Features. IEEE Multim. 31(1): 65-75 (2024) - [j267]Mingyun Bian, Guanghui He, Guorui Feng, Xinpeng Zhang, Yanli Ren:
Verifiable Privacy-Preserving Heart Rate Estimation Based on LSTM. IEEE Internet Things J. 11(1): 1719-1731 (2024) - [j266]Yanli Ren, Cien Chen, Mingqi Hu, Guorui Feng, Xinpeng Zhang:
BFDAC: A Blockchain-Based and Fog-Computing-Assisted Data Access Control Scheme in Vehicular Social Networks. IEEE Internet Things J. 11(2): 3510-3523 (2024) - [j265]Xiangyu Zhao, Hanzhou Wu, Xinpeng Zhang:
Effective Backdoor Attack on Graph Neural Networks in Spectral Domain. IEEE Internet Things J. 11(7): 12102-12114 (2024) - [j264]Yong Liu, Li Zhang, Hanzhou Wu, Zichi Wang, Xinpeng Zhang:
Reducing High-Frequency Artifacts for Generative Model Watermarking via Wavelet Transform. IEEE Internet Things J. 11(10): 18503-18515 (2024) - [j263]Nan Zhong, Zhenxing Qian, Xinpeng Zhang:
Backdoor attack detection via prediction trustworthiness assessment. Inf. Sci. 662: 120283 (2024) - [j262]Yanli Ren, Mingqi Hu, Zhe Yang, Guorui Feng, Xinpeng Zhang:
BPFL: Blockchain-based privacy-preserving federated learning against poisoning attack. Inf. Sci. 665: 120377 (2024) - [j261]Mingyun Bian, Yanli Ren, Gang He, Guorui Feng, Xinpeng Zhang:
VMMP: Verifiable privacy-preserving multi-modal multi-task prediction. Inf. Sci. 669: 120547 (2024) - [j260]Yong Liu, Chen Li, Zichi Wang, Hanzhou Wu, Xinpeng Zhang:
Transferable adversarial attack based on sensitive perturbation analysis in frequency domain. Inf. Sci. 678: 120971 (2024) - [j259]Zhiguang Yang, Yazhou Zhang, Xinpeng Zhang, Hanzhou Wu:
Robust and high-fidelity image watermarking with mutual mapping and antispectral aliasing. J. Electronic Imaging 33(2) (2024) - [j258]Haoxian Song, Zichi Wang, Xinpeng Zhang:
Identification of the Original Images. J. Vis. Commun. Image Represent. 98: 104017 (2024) - [j257]Zhicheng Ye, Xinpeng Zhang, Guorui Feng:
Deep neural networks watermark via universal deep hiding and metric learning. Neural Comput. Appl. 36(13): 7421-7438 (2024) - [j256]Yue Wang, Minjie Liu, Yanli Ren, Xinpeng Zhang, Guorui Feng:
Traffic sign attack via pinpoint region probability estimation network. Pattern Recognit. 146: 110035 (2024) - [j255]Zihan Yuan, Li Li, Zichi Wang, Xinpeng Zhang:
Ambiguity attack against text-to-image diffusion model watermarking. Signal Process. 221: 109509 (2024) - [j254]Lin Huang, Yitong Tao, Chuan Qin, Xinpeng Zhang:
Robust Hashing for Neural Network Models via Heterogeneous Graph Representation. IEEE Signal Process. Lett. 31: 2640-2644 (2024) - [j253]Hang Cheng, Xibin Li, Huaxiong Wang, Xinpeng Zhang, Ximeng Liu, Meiqing Wang, Fengyong Li:
DeepDIST: A Black-Box Anti-Collusion Framework for Secure Distribution of Deep Models. IEEE Trans. Circuits Syst. Video Technol. 34(1): 97-109 (2024) - [j252]Fengyong Li, Zhen Qi, Xinpeng Zhang, Chuan Qin:
Progressive Histogram Modification for JPEG Reversible Data Hiding. IEEE Trans. Circuits Syst. Video Technol. 34(2): 1241-1254 (2024) - [j251]Weixiang Li, Shihang Wu, Bin Li, Weixuan Tang, Xinpeng Zhang:
Payload-Independent Direct Cost Learning for Image Steganography. IEEE Trans. Circuits Syst. Video Technol. 34(3): 1970-1975 (2024) - [j250]Jiang Yu, Fengyong Li, Zichi Wang, Wen Si, Xinpeng Zhang:
Diverse Batch Steganography Using Model-Based Selection and Double-Layered Payload Assignment. IEEE Trans. Circuits Syst. Video Technol. 34(8): 7785-7800 (2024) - [j249]Tianyu Yang, Hanzhou Wu, Biao Yi, Guorui Feng, Xinpeng Zhang:
Semantic-Preserving Linguistic Steganography by Pivot Translation and Semantic-Aware Bins Coding. IEEE Trans. Dependable Secur. Comput. 21(1): 139-152 (2024) - [j248]Sheng Li, Zichi Wang, Xiudong Zhang, Xinpeng Zhang:
Robust Image Steganography Against General Downsampling Operations With Lossless Secret Recovery. IEEE Trans. Dependable Secur. Comput. 21(1): 340-352 (2024) - [j247]Fengyong Li, Zongliang Yu, Kui Wu, Chuan Qin, Xinpeng Zhang:
Multi-Modality Ensemble Distortion for Spatial Steganography With Dynamic Cost Correction. IEEE Trans. Dependable Secur. Comput. 21(4): 1557-1571 (2024) - [j246]Xiaoping Liang, Zhenjun Tang, Xianquan Zhang, Mengzhu Yu, Xinpeng Zhang:
Robust Hashing With Local Tangent Space Alignment for Image Copy Detection. IEEE Trans. Dependable Secur. Comput. 21(4): 2448-2460 (2024) - [j245]Zihan Yuan, Xinpeng Zhang, Zichi Wang, Zhaoxia Yin:
Semi-Fragile Neural Network Watermarking Based on Adversarial Examples. IEEE Trans. Emerg. Top. Comput. Intell. 8(4): 2775-2790 (2024) - [j244]Xiaoxiao Hu, Sheng Li, Qichao Ying, Wanli Peng, Xinpeng Zhang, Zhenxing Qian:
Establishing Robust Generative Image Steganography via Popular Stable Diffusion. IEEE Trans. Inf. Forensics Secur. 19: 8094-8108 (2024) - [j243]Fengyong Li, Yang Sheng, Kui Wu, Chuan Qin, Xinpeng Zhang:
LiDiNet: A Lightweight Deep Invertible Network for Image-in-Image Steganography. IEEE Trans. Inf. Forensics Secur. 19: 8817-8831 (2024) - [j242]Fengyong Li, Huajun Zhai, Xinpeng Zhang, Chuan Qin:
Image Manipulation Localization Using Spatial-Channel Fusion Excitation and Fine-Grained Feature Enhancement. IEEE Trans. Instrum. Meas. 73: 1-14 (2024) - [j241]Yalan Qin, Chuan Qin, Xinpeng Zhang, Guorui Feng:
Dual Consensus Anchor Learning for Fast Multi-View Clustering. IEEE Trans. Image Process. 33: 5298-5311 (2024) - [j240]Quan Wang, Sheng Li, Zichi Wang, Xinpeng Zhang, Guorui Feng:
Multi-Source Style Transfer via Style Disentanglement Network. IEEE Trans. Multim. 26: 1373-1383 (2024) - [j239]Chuan Qin, Xiaomeng Li, Zhenyi Zhang, Fengyong Li, Xinpeng Zhang, Guorui Feng:
Print-Camera Resistant Image Watermarking With Deep Noise Simulation and Constrained Learning. IEEE Trans. Multim. 26: 2164-2177 (2024) - [j238]Fengyong Li, Yang Sheng, Xinpeng Zhang, Chuan Qin:
iSCMIS:Spatial-Channel Attention Based Deep Invertible Network for Multi-Image Steganography. IEEE Trans. Multim. 26: 3137-3152 (2024) - [j237]Lizhi Xiong, Jianhua Xu, Ching-Nung Yang, Xinpeng Zhang:
CMCF-Net: An End-to-End Context Multiscale Cross-Fusion Network for Robust Copy-Move Forgery Detection. IEEE Trans. Multim. 26: 6090-6101 (2024) - [j236]Quan Wang, Zichi Wang, Xinpeng Zhang, Guorui Feng:
Art Image Inpainting With Style-Guided Dual-Branch Inpainting Network. IEEE Trans. Multim. 26: 8026-8037 (2024) - [j235]Xinran Li, Zichi Wang, Guorui Feng, Xinpeng Zhang, Chuan Qin:
Perceptual Image Hashing Using Feature Fusion of Orthogonal Moments. IEEE Trans. Multim. 26: 10041-10054 (2024) - [j234]Xianquan Zhang, Feiyi He, Chunqiang Yu, Xinpeng Zhang, Ching-Nung Yang, Zhenjun Tang:
Reversible Data Hiding in Encrypted Images With Asymmetric Coding and Bit-Plane Block Compression. IEEE Trans. Multim. 26: 10174-10188 (2024) - [j233]Yushu Zhang, Jiahao Zhu, Mingfu Xue, Xinpeng Zhang, Xiaochun Cao:
Adaptive 3D Mesh Steganography Based on Feature-Preserving Distortion. IEEE Trans. Vis. Comput. Graph. 30(8): 5299-5312 (2024) - [c127]Guobiao Li, Sheng Li, Zicong Luo, Zhenxing Qian, Xinpeng Zhang:
Purified and Unified Steganographic Network. CVPR 2024: 27559-27568 - [c126]Yuzhou Yang, Yangming Zhou, Qichao Ying, Zhenxing Qian, Xinpeng Zhang:
Search, Examine and Early-Termination: Fake News Detection with Annotation-Free Evidences. ECAI 2024: 1463-1470 - [c125]Yiran Xu, Nan Zhong, Zhenxing Qian, Xinpeng Zhang:
Revocable Backdoor for Deep Model Trading. ECAI 2024: 1471-1478 - [c124]Chenghua He, Deyang Wu, Xinpeng Zhang, Hanzhou Wu:
Watermarking Text Documents With Watermarked Fonts. IH&MMSec 2024: 187-197 - [c123]Li Zhang, Yong Liu, Xinpeng Zhang, Hanzhou Wu:
Suppressing High-Frequency Artifacts for Generative Model Watermarking by Anti-Aliasing. IH&MMSec 2024: 223-234 - [i68]Xueying Mao, Xiaoxiao Hu, Wanli Peng, Zhenliang Gan, Qichao Ying, Zhenxing Qian, Sheng Li, Xinpeng Zhang:
From Covert Hiding to Visual Editing: Robust Generative Video Steganography. CoRR abs/2401.00652 (2024) - [i67]Xuntao Liu, Yuzhou Yang, Qichao Ying, Zhenxing Qian, Xinpeng Zhang, Sheng Li:
PROMPT-IML: Image Manipulation Localization with Pre-trained Foundation Models Through Prompt Tuning. CoRR abs/2401.00653 (2024) - [i66]Meiling Li, Nan Zhong, Xinpeng Zhang, Zhenxing Qian, Sheng Li:
Object-oriented backdoor attack against image captioning. CoRR abs/2401.02600 (2024) - [i65]Guobiao Li, Sheng Li, Zicong Luo, Zhenxing Qian, Xinpeng Zhang:
Purified and Unified Steganographic Network. CoRR abs/2402.17210 (2024) - [i64]Meiling Li, Zhenxing Qian, Xinpeng Zhang:
Regeneration Based Training-free Attribution of Fake Images Generated by Text-to-Image Generative Models. CoRR abs/2403.01489 (2024) - [i63]Meiling Li, Hongrun Ren, Haixu Xiong, Zhenxing Qian, Xinpeng Zhang:
Online Prompt Pricing based on Combinatorial Multi-Armed Bandit and Hierarchical Stackelberg Game. CoRR abs/2405.15154 (2024) - [i62]Xiangyu Zhao, Hanzhou Wu, Xinpeng Zhang:
Transferable Watermarking to Self-supervised Pre-trained Graph Encoders by Trigger Embeddings. CoRR abs/2406.13177 (2024) - [i61]Yuzhou Yang, Yangming Zhou, Qichao Ying, Zhenxing Qian, Xinpeng Zhang:
Search, Examine and Early-Termination: Fake News Detection with Annotation-Free Evidences. CoRR abs/2407.07931 (2024) - [i60]Guobiao Li, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Cover-separable Fixed Neural Network Steganography via Deep Generative Models. CoRR abs/2407.11405 (2024) - [i59]Jialiang Li, Haoyue Wang, Sheng Li, Zhenxing Qian, Xinpeng Zhang, Athanasios V. Vasilakos:
Are handcrafted filters helpful for attributing AI-generated images? CoRR abs/2407.14570 (2024) - [i58]Yiran Xu, Nan Zhong, Zhenxing Qian, Xinpeng Zhang:
Revocable Backdoor for Deep Model Trading. CoRR abs/2408.00255 (2024) - [i57]Xiujian Liang, Gaozhi Liu, Yichao Si, Xiaoxiao Hu, Zhenxing Qian, Xinpeng Zhang:
ScreenMark: Watermarking Arbitrary Visual Content on Screen. CoRR abs/2409.03487 (2024) - 2023
- [j232]Xiaolong Duan, Bin Li, Zhaoxia Yin, Xinpeng Zhang, Bin Luo:
Robust image steganography against lossy JPEG compression based on embedding domain selection and adaptive error correction. Expert Syst. Appl. 229(Part A): 120416 (2023) - [j231]Chuan Qin, Shengyan Gao, Xinpeng Zhang, Guorui Feng:
CADW: CGAN-Based Attack on Deep Robust Image Watermarking. IEEE Multim. 30(1): 28-35 (2023) - [j230]Zichi Wang, Guorui Feng, Hanzhou Wu, Xinpeng Zhang:
Data hiding during image processing using capsule networks. Neurocomputing 537: 49-60 (2023) - [j229]Mingjie Li, Hanzhou Wu, Xinpeng Zhang:
A novel watermarking framework for intellectual property protection of NLG APIs. Neurocomputing 558: 126700 (2023) - [j228]Gang He, Yanli Ren, Mingyun Bian, Guorui Feng, Xinpeng Zhang:
Privacy-enhanced and non-interactive linear regression with dropout-resilience. Inf. Sci. 632: 69-86 (2023) - [j227]Ziyun Yang, Zichi Wang, Xinpeng Zhang:
A general steganographic framework for neural network models. Inf. Sci. 643: 119250 (2023) - [j226]Le Feng, Zhenxing Qian, Xinpeng Zhang, Sheng Li:
Unlabeled backdoor poisoning on trained-from-scratch semi-supervised learning. Inf. Sci. 647: 119453 (2023) - [j225]Yalan Qin, Xinpeng Zhang, Liquan Shen, Guorui Feng:
Maximum Block Energy Guided Robust Subspace Clustering. IEEE Trans. Pattern Anal. Mach. Intell. 45(2): 2652-2659 (2023) - [j224]Qichao Ying, Hang Zhou, Zhenxing Qian, Sheng Li, Xinpeng Zhang:
Learning to Immunize Images for Tamper Localization and Self-Recovery. IEEE Trans. Pattern Anal. Mach. Intell. 45(11): 13814-13830 (2023) - [j223]Hanzhou Wu, Chen Li, Gen Liu, Xinpeng Zhang:
Hiding data hiding. Pattern Recognit. Lett. 165: 122-127 (2023) - [j222]Wanli Peng, Tao Wang, Zhenxing Qian, Sheng Li, Xinpeng Zhang:
Cross-Modal Text Steganography Against Synonym Substitution-Based Text Attack. IEEE Signal Process. Lett. 30: 299-303 (2023) - [j221]Xuanbo Zhang, Xinpeng Zhang, Guorui Feng:
Image Steganalysis Network Based on Dual-Attention Mechanism. IEEE Signal Process. Lett. 30: 1287-1291 (2023) - [j220]Jiang Yu, Xiaoyi Zhou, Wen Si, Fengyong Li, Cong Liu, Xinpeng Zhang:
Secure Steganographic Cover Generation via a Noise-Optimization Stacked StyleGAN2. Symmetry 15(5): 979 (2023) - [j219]Xiong Tang, Zichi Wang, Xinpeng Zhang:
Steganalysis of Neural Networks Based on Symmetric Histogram Distribution. Symmetry 15(5): 1079 (2023) - [j218]Mingjie Li, Zichi Wang, Xinpeng Zhang:
An Effective Framework for Intellectual Property Protection of NLG Models. Symmetry 15(6): 1287 (2023) - [j217]Wanli Peng, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Text Steganalysis Based on Hierarchical Supervised Learning and Dual Attention Mechanism. IEEE ACM Trans. Audio Speech Lang. Process. 31: 3513-3526 (2023) - [j216]Lizhi Xiong, Xiao Han, Ching-Nung Yang, Xinpeng Zhang:
Reversible Data Hiding in Shared Images Based on Syndrome Decoding and Homomorphism. IEEE Trans. Cloud Comput. 11(3): 3085-3098 (2023) - [j215]Mingji Yu, Heng Yao, Chuan Qin, Xinpeng Zhang:
Reversible Data Hiding in Palette Images. IEEE Trans. Circuits Syst. Video Technol. 33(2): 648-660 (2023) - [j214]Gongyang Li, Yike Wang, Zhi Liu, Xinpeng Zhang, Dan Zeng:
RGB-T Semantic Segmentation With Location, Activation, and Sharpening. IEEE Trans. Circuits Syst. Video Technol. 33(3): 1223-1235 (2023) - [j213]Zhiying Zhu, Ping Wei, Zhenxing Qian, Sheng Li, Xinpeng Zhang:
Image Sanitization in Online Social Networks: A General Framework for Breaking Robust Information Hiding. IEEE Trans. Circuits Syst. Video Technol. 33(6): 3017-3029 (2023) - [j212]Chuntao Wang, Juan Hu, Shan Bian, Jiangqun Ni, Xinpeng Zhang:
A Customized Deep Network Based Encryption-Then-Lossy-Compression Scheme of Color Images Achieving Arbitrary Compression Ratios. IEEE Trans. Circuits Syst. Video Technol. 33(8): 4322-4336 (2023) - [j211]Shiyi Chen, Asad Malik, Xinpeng Zhang, Guorui Feng, Hanzhou Wu:
A Fast Method for Robust Video Watermarking Based on Zernike Moments. IEEE Trans. Circuits Syst. Video Technol. 33(12): 7342-7353 (2023) - [j210]Yalan Qin, Guorui Feng, Yanli Ren, Xinpeng Zhang:
Consistency-Induced Multiview Subspace Clustering. IEEE Trans. Cybern. 53(2): 832-844 (2023) - [j209]Zichi Wang, Guorui Feng, Zhenxing Qian, Xinpeng Zhang:
JPEG Steganography With Content Similarity Evaluation. IEEE Trans. Cybern. 53(8): 5082-5093 (2023) - [j208]Ziqing Huang, Zhenjun Tang, Xianquan Zhang, Linlin Ruan, Xinpeng Zhang:
Perceptual Image Hashing With Locality Preserving Projection for Copy Detection. IEEE Trans. Dependable Secur. Comput. 20(1): 463-477 (2023) - [j207]Zichi Wang, Guorui Feng, Liquan Shen, Xinpeng Zhang:
Cover Selection for Steganography Using Image Similarity. IEEE Trans. Dependable Secur. Comput. 20(3): 2328-2340 (2023) - [j206]Zhongyun Hua, Yanxiang Wang, Shuang Yi, Yifeng Zheng, Xingyu Liu, Yongyong Chen, Xinpeng Zhang:
Matrix-Based Secret Sharing for Reversible Data Hiding in Encrypted Images. IEEE Trans. Dependable Secur. Comput. 20(5): 3669-3686 (2023) - [j205]Zichi Wang, Sheng Li, Xinpeng Zhang, Guorui Feng:
Exploring Abnormal Behavior in Swarm: Identify User Using Adversarial Examples. IEEE Trans. Emerg. Top. Comput. Intell. 7(1): 250-260 (2023) - [j204]Gongyang Li, Zhi Liu, Xinpeng Zhang, Weisi Lin:
Lightweight Salient Object Detection in Optical Remote-Sensing Images via Semantic Matching and Edge Alignment. IEEE Trans. Geosci. Remote. Sens. 61: 1-11 (2023) - [j203]Shen Wang, Zhaoyang Zhang, Guopu Zhu, Xinpeng Zhang, Yicong Zhou, Jiwu Huang:
Query-Efficient Adversarial Attack With Low Perturbation Against End-to-End Speech Recognition Systems. IEEE Trans. Inf. Forensics Secur. 18: 351-364 (2023) - [j202]Qingxiao Guan, Peng Liu, Weiming Zhang, Wei Lu, Xinpeng Zhang:
Double-Layered Dual-Syndrome Trellis Codes Utilizing Channel Knowledge for Robust Steganography. IEEE Trans. Inf. Forensics Secur. 18: 501-516 (2023) - [j201]Di Chen, Fengbin Zhang, Xinpeng Zhang:
Heterogeneous IoT Intrusion Detection Based on Fusion Word Embedding Deep Transfer Learning. IEEE Trans. Ind. Informatics 19(8): 9183-9193 (2023) - [j200]Mingyun Bian, Joseph K. Liu, Shifeng Sun, Xinpeng Zhang, Yanli Ren:
Verifiable Privacy-Enhanced Rotation Invariant LBP Feature Extraction in Fog Computing. IEEE Trans. Ind. Informatics 19(12): 11518-11530 (2023) - [j199]Yalan Qin, Chuan Qin, Xinpeng Zhang, Donglian Qi, Guorui Feng:
NIM-Nets: Noise-Aware Incomplete Multi-View Learning Networks. IEEE Trans. Image Process. 32: 175-189 (2023) - [j198]Gongyang Li, Zhen Bai, Zhi Liu, Xinpeng Zhang, Haibin Ling:
Salient Object Detection in Optical Remote Sensing Images Driven by Transformer. IEEE Trans. Image Process. 32: 5257-5269 (2023) - [j197]Yalan Qin, Guorui Feng, Yanli Ren, Xinpeng Zhang:
Block-Diagonal Guided Symmetric Nonnegative Matrix Factorization. IEEE Trans. Knowl. Data Eng. 35(3): 2313-2325 (2023) - [j196]Xiaoping Liang, Zhenjun Tang, Jingli Wu, Zhixin Li, Xinpeng Zhang:
Robust Image Hashing With Isomap and Saliency Map for Copy Detection. IEEE Trans. Multim. 25: 1085-1097 (2023) - [j195]Chuan Qin, Jinchuan Hu, Fengyong Li, Zhenxing Qian, Xinpeng Zhang:
JPEG Image Encryption With Adaptive DC Coefficient Prediction and RS Pair Permutation. IEEE Trans. Multim. 25: 2528-2542 (2023) - [j194]Chuntao Wang, Tianjian Zhang, Hao Chen, Qiong Huang, Jiangqun Ni, Xinpeng Zhang:
A Novel Encryption-Then-Lossy-Compression Scheme of Color Images Using Customized Residual Dense Spatial Network. IEEE Trans. Multim. 25: 4026-4040 (2023) - [j193]Yushu Zhang, Wentao Zhou, Ruoyu Zhao, Xinpeng Zhang, Xiaochun Cao:
F-TPE: Flexible Thumbnail-Preserving Encryption Based on Multi-Pixel Sum-Preserving Encryption. IEEE Trans. Multim. 25: 5877-5891 (2023) - [j192]Fengyong Li, Zhenjia Pei, Xinpeng Zhang, Chuan Qin:
Image Manipulation Localization Using Multi-Scale Feature Fusion and Adaptive Edge Supervision. IEEE Trans. Multim. 25: 7851-7866 (2023) - [c122]Guobiao Li, Sheng Li, Meiling Li, Xinpeng Zhang, Zhenxing Qian:
Steganography of Steganographic Networks. AAAI 2023: 5178-5186 - [c121]Manman Zhang, Yuchen Ma, Ge Luo, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Identifying the Style of Chatting. APSIPA ASC 2023: 1085-1092 - [c120]Xiujian Liang, Bingshan Liu, Qichao Ying, Zhenxing Qian, Hsunfang Cho, Xinpeng Zhang:
StyleStegan: Leak-free Style Transfer Based on Feature Steganography. APSIPA ASC 2023: 1443-1450 - [c119]Yusheng Guo, Nan Zhong, Zhenxing Qian, Xinpeng Zhang, Hsunfang Cho:
Preemptive Image Protection against Steganography. APSIPA ASC 2023: 1923-1930 - [c118]Ge Luo, Manman Zhang, Yuchen Ma, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Forward Creation, Reverse Selection: Achieving Highly Pertinent Multimodal Responses in Dialogue Contexts. CIKM 2023: 1687-1696 - [c117]Xiaoxiao Hu, Qichao Ying, Zhenxing Qian, Sheng Li, Xinpeng Zhang:
DRAW: Defending Camera-shooted RAW against Image Manipulation. ICCV 2023: 22377-22387 - [c116]Qichao Ying, Hang Zhou, Xiaoxiao Hu, Zhenxing Qian, Sheng Li, Xinpeng Zhang:
Image Protection for Robust Cropping Localization and Recovery. ICME 2023: 1193-1198 - [c115]Yuwei Zeng, Jingxuan Tan, Zhengxin You, Zhenxing Qian, Xinpeng Zhang:
Watermarks for Generative Adversarial Network Based on Steganographic Invisible Backdoor. ICME 2023: 1211-1216 - [c114]Yangming Zhou, Yuzhou Yang, Qichao Ying, Zhenxing Qian, Xinpeng Zhang:
Multimodal Fake News Detection via CLIP-Guided Learning. ICME 2023: 2825-2830 - [c113]Gejian Zhao, Chuan Qin, Xiangyang Luo, Xinpeng Zhang, Chin-Chen Chang:
Perceptual Robust Hashing for Video Copy Detection with Unsupervised Learning. IH&MMSec 2023: 13-18 - [c112]Xiaoling He, Yuanding Zhou, Chuan Qin, Zhenxing Qian, Xinpeng Zhang:
PDMTT: A Plagiarism Detection Model Towards Multi-turn Text Back-Translation. IWDW 2023: 79-94 - [c111]Yangming Zhou, Yuzhou Yang, Qichao Ying, Zhenxing Qian, Xinpeng Zhang:
Multi-modal Fake News Detection on Social Media via Multi-grained Information Fusion. ICMR 2023: 343-352 - [c110]Qichao Ying, Jiaxin Liu, Sheng Li, Haisheng Xu, Zhenxing Qian, Xinpeng Zhang:
RetouchingFFHQ: A Large-scale Dataset for Fine-grained Face Retouching Detection. ACM Multimedia 2023: 737-746 - [c109]Haoyue Wang, Sheng Li, Silu Cao, Rui Yang, Jishen Zeng, Zhenxing Qian, Xinpeng Zhang:
On Physically Occluded Fake Identity Document Detection. ACM Multimedia 2023: 1556-1564 - [c108]Jingxuan Tan, Nan Zhong, Zhenxing Qian, Xinpeng Zhang, Sheng Li:
Deep Neural Network Watermarking against Model Extraction Attack. ACM Multimedia 2023: 1588-1597 - [c107]Cheng Xiong, Chuan Qin, Guorui Feng, Xinpeng Zhang:
Flexible and Secure Watermarking for Latent Diffusion Model. ACM Multimedia 2023: 1668-1676 - [c106]Manman Zhang, Ge Luo, Yuchen Ma, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
VCMaster: Generating Diverse and Fluent Live Video Comments Based on Multimodal Contexts. ACM Multimedia 2023: 4688-4696 - [c105]Quan Wang, Yanli Ren, Xinpeng Zhang, Guorui Feng:
Interactive Image Style Transfer Guided by Graffiti. ACM Multimedia 2023: 6685-6694 - [c104]Quan Wang, Sheng Li, Xinpeng Zhang, Guorui Feng:
Rethinking Neural Style Transfer: Generating Personalized and Watermarked Stylized Images. ACM Multimedia 2023: 6928-6937 - [c103]Gaozhi Liu, Yichao Si, Zhenxing Qian, Xinpeng Zhang, Sheng Li, Wanli Peng:
WRAP: Watermarking Approach Robust Against Film-coating upon Printed Photographs. ACM Multimedia 2023: 7274-7282 - [c102]Yusheng Guo, Nan Zhong, Zhenxing Qian, Xinpeng Zhang:
Physical Invisible Backdoor Based on Camera Imaging. ACM Multimedia 2023: 7817-7825 - [c101]Zicong Luo, Sheng Li, Guobiao Li, Zhenxing Qian, Xinpeng Zhang:
Securing Fixed Neural Network Steganography. ACM Multimedia 2023: 7943-7951 - [i56]Le Feng, Zhenxing Qian, Sheng Li, Xinpeng Zhang:
Trojaning semi-supervised learning model via poisoning wild images on the web. CoRR abs/2301.00435 (2023) - [i55]Gongyang Li, Zhi Liu, Xinpeng Zhang, Weisi Lin:
Lightweight Salient Object Detection in Optical Remote Sensing Images via Semantic Matching and Edge Alignment. CoRR abs/2301.02778 (2023) - [i54]Guobiao Li, Sheng Li, Meiling Li, Xinpeng Zhang, Zhenxing Qian:
Steganography of Steganographic Networks. CoRR abs/2302.14521 (2023) - [i53]Yangming Zhou, Yuzhou Yang, Qichao Ying, Zhenxing Qian, Xinpeng Zhang:
Multi-modal Fake News Detection on Social Media via Multi-grained Information Fusion. CoRR abs/2304.00827 (2023) - [i52]Xiaolong Duan, Bin Li, Zhaoxia Yin, Xinpeng Zhang, Bin Luo:
Robust image steganography against lossy JPEG compression based on embedding domain selection and adaptive error correction. CoRR abs/2304.13297 (2023) - [i51]Ping Wei, Qing Zhou, Zichi Wang, Zhenxing Qian, Xinpeng Zhang, Sheng Li:
Generative Steganography Diffusion. CoRR abs/2305.03472 (2023) - [i50]Ping Wei, Ge Luo, Qi Song, Xinpeng Zhang, Zhenxing Qian, Sheng Li:
Generative Steganographic Flow. CoRR abs/2305.05838 (2023) - [i49]Zhaoxia Yin, Heng Yin, Hang Su, Xinpeng Zhang, Zhenzhe Gao:
Decision-based iterative fragile watermarking for model integrity verification. CoRR abs/2305.09684 (2023) - [i48]Li Zhang, Yong Liu, Xinpeng Zhang, Hanzhou Wu:
Generative Model Watermarking Suppressing High-Frequency Artifacts. CoRR abs/2305.12391 (2023) - [i47]Xiujian Liang, Bingshan Liu, Qichao Ying, Zhenxing Qian, Xinpeng Zhang:
StyleStegan: Leak-free Style Transfer Based on Feature Steganography. CoRR abs/2307.00225 (2023) - [i46]Guobiao Li, Sheng Li, Meiling Li, Zhenxing Qian, Xinpeng Zhang:
Towards Deep Network Steganography: From Networks to Networks. CoRR abs/2307.03444 (2023) - [i45]Qichao Ying, Jiaxin Liu, Sheng Li, Haisheng Xu, Zhenxing Qian, Xinpeng Zhang:
RetouchingFFHQ: A Large-scale Dataset for Fine-grained Face Retouching Detection. CoRR abs/2307.10642 (2023) - [i44]Xiaoxiao Hu, Qichao Ying, Zhenxing Qian, Sheng Li, Xinpeng Zhang:
DRAW: Defending Camera-shooted RAW against Image Manipulation. CoRR abs/2307.16418 (2023) - [i43]Yusheng Guo, Nan Zhong, Zhenxing Qian, Xinpeng Zhang:
Physical Invisible Backdoor Based on Camera Imaging. CoRR abs/2309.07428 (2023) - [i42]Gongyang Li, Zhen Bai, Zhi Liu, Xinpeng Zhang, Haibin Ling:
Salient Object Detection in Optical Remote Sensing Images Driven by Transformer. CoRR abs/2309.08206 (2023) - [i41]Zicong Luo, Sheng Li, Guobiao Li, Zhenxing Qian, Xinpeng Zhang:
Securing Fixed Neural Network Steganography. CoRR abs/2309.09700 (2023) - [i40]Xingdong Ren, Tianxing Zhang, Hanzhou Wu, Xinpeng Zhang, Yinggui Wang, Guangling Sun:
StegGuard: Fingerprinting Self-supervised Pre-trained Encoders via Secrets Embeder and Extractor. CoRR abs/2310.03380 (2023) - [i39]Nan Zhong, Yiran Xu, Zhenxing Qian, Xinpeng Zhang:
Rich and Poor Texture Contrast: A Simple yet Effective Approach for AI-generated Image Detection. CoRR abs/2311.12397 (2023) - [i38]Ge Luo, Junqiang Huang, Manman Zhang, Zhenxing Qian, Sheng Li, Xinpeng Zhang:
Steal My Artworks for Fine-tuning? A Watermarking Framework for Detecting Art Theft Mimicry in Text-to-Image Models. CoRR abs/2311.13619 (2023) - [i37]Yusheng Guo, Nan Zhong, Zhenxing Qian, Xinpeng Zhang:
Model Copyright Protection in Buyer-seller Environment. CoRR abs/2312.05262 (2023) - 2022
- [j191]Yanli Ren, Yerong Li, Guorui Feng, Xinpeng Zhang:
Privacy-Enhanced and Verification-Traceable Aggregation for Federated Learning. IEEE Internet Things J. 9(24): 24933-24948 (2022) - [j190]Le Feng, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Robust backdoor injection with the capability of resisting network transfer. Inf. Sci. 612: 594-611 (2022) - [j189]Guangling Sun, Haoqi Hu, Xinpeng Zhang, Xiaofeng Lu:
A fully supervised universal adversarial perturbations and the progressive optimization. J. Intell. Fuzzy Syst. 42(6): 4959-4968 (2022) - [j188]Biao Yi, Hanzhou Wu, Guorui Feng, Xinpeng Zhang:
ALiSa: Acrostic Linguistic Steganography Based on BERT and Gibbs Sampling. IEEE Signal Process. Lett. 29: 687-691 (2022) - [j187]Fengyong Li, Yishu Zeng, Xinpeng Zhang, Chuan Qin:
Ensemble Stego Selection for Enhancing Image Steganography. IEEE Signal Process. Lett. 29: 702-706 (2022) - [j186]Ping Wei, Zhiying Zhu, Ge Luo, Zhenxing Qian, Xinpeng Zhang:
Breaking Robust Data Hiding in Online Social Networks. IEEE Signal Process. Lett. 29: 2682-2686 (2022) - [j185]Zhiying Zhu, Hang Zhou, Siyuan Xing, Zhenxing Qian, Sheng Li, Xinpeng Zhang:
Perceptual Hash of Neural Networks. Symmetry 14(4): 810 (2022) - [j184]Zichi Wang, Guorui Feng, Xinpeng Zhang:
Repeatable Data Hiding: Towards the Reusability of Digital Images. IEEE Trans. Circuits Syst. Video Technol. 32(1): 135-146 (2022) - [j183]Chunqiang Yu, Xianquan Zhang, Xinpeng Zhang, Guoxiang Li, Zhenjun Tang:
Reversible Data Hiding With Hierarchical Embedding for Encrypted Images. IEEE Trans. Circuits Syst. Video Technol. 32(2): 451-466 (2022) - [j182]Yushu Zhang, Ruoyu Zhao, Xiangli Xiao, Rushi Lan, Zhe Liu, Xinpeng Zhang:
HF-TPE: High-Fidelity Thumbnail- Preserving Encryption. IEEE Trans. Circuits Syst. Video Technol. 32(3): 947-961 (2022) - [j181]Jianquan Yang, Guopu Zhu, Yao Luo, Sam Kwong, Xinpeng Zhang, Yicong Zhou:
Forensic Analysis of JPEG-Domain Enhanced Images via Coefficient Likelihood Modeling. IEEE Trans. Circuits Syst. Video Technol. 32(3): 1006-1019 (2022) - [j180]Wennan Huan, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Exploring Stable Coefficients on Joint Sub-Bands for Robust Video Watermarking in DT CWT Domain. IEEE Trans. Circuits Syst. Video Technol. 32(4): 1955-1965 (2022) - [j179]Haorui Wu, Xiaolong Li, Xiangyang Luo, Xinpeng Zhang, Yao Zhao:
General Expansion-Shifting Model for Reversible Data Hiding: Theoretical Investigation and Practical Algorithm Design. IEEE Trans. Circuits Syst. Video Technol. 32(9): 5989-6001 (2022) - [j178]Mingji Yu, Heng Yao, Chuan Qin, Xinpeng Zhang:
A Comprehensive Analysis Method for Reversible Data Hiding in Stream-Cipher-Encrypted Images. IEEE Trans. Circuits Syst. Video Technol. 32(10): 7241-7254 (2022) - [j177]Mengzhu Yu, Zhenjun Tang, Xianquan Zhang, Bineng Zhong, Xinpeng Zhang:
Perceptual Hashing With Complementary Color Wavelet Transform and Compressed Sensing for Reduced-Reference Image Quality Assessment. IEEE Trans. Circuits Syst. Video Technol. 32(11): 7559-7574 (2022) - [j176]Fengyong Li, Zhen Qi, Xinpeng Zhang, Chuan Qin:
JPEG Reversible Data Hiding Using Dynamic Distortion Optimizing With Frequency Priority Reassignment. IEEE Trans. Circuits Syst. Video Technol. 32(12): 8849-8863 (2022) - [j175]Yang Du, Zhaoxia Yin, Xinpeng Zhang:
High Capacity Lossless Data Hiding in JPEG Bitstream Based on General VLC Mapping. IEEE Trans. Dependable Secur. Comput. 19(2): 1420-1433 (2022) - [j174]Xinran Li, Chuan Qin, Zichi Wang, Zhenxing Qian, Xinpeng Zhang:
Unified Performance Evaluation Method for Perceptual Image Hashing. IEEE Trans. Inf. Forensics Secur. 17: 1404-1419 (2022) - [j173]Yalan Qin, Hanzhou Wu, Xinpeng Zhang, Guorui Feng:
Semi-Supervised Structured Subspace Learning for Multi-View Clustering. IEEE Trans. Image Process. 31: 1-14 (2022) - [j172]Heng Yao, Mian Zou, Chuan Qin, Xinpeng Zhang:
Signal-Dependent Noise Estimation for a Real-Camera Model via Weight and Shape Constraints. IEEE Trans. Multim. 24: 640-654 (2022) - [j171]Feng Ding, Guopu Zhu, Yingcan Li, Xinpeng Zhang, Pradeep K. Atrey, Siwei Lyu:
Anti-Forensics for Face Swapping Videos via Adversarial Training. IEEE Trans. Multim. 24: 3429-3441 (2022) - [j170]Quan Wang, Sheng Li, Xinpeng Zhang, Guorui Feng:
Multi-granularity Brushstrokes Network for Universal Style Transfer. ACM Trans. Multim. Comput. Commun. Appl. 18(4): 107:1-107:17 (2022) - [c100]Baogen Zhang, Sheng Li, Guorui Feng, Zhenxing Qian, Xinpeng Zhang:
Patch Diffusion: A General Module for Face Manipulation Detection. AAAI 2022: 3243-3251 - [c99]Meiling Li, Nan Zhong, Xinpeng Zhang, Zhenxing Qian, Sheng Li:
Object-Oriented Backdoor Attack Against Image Captioning. ICASSP 2022: 2864-2868 - [c98]Le Feng, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Stealthy Backdoor Attack with Adversarial Training. ICASSP 2022: 2969-2973 - [c97]Guobiao Li, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Encryption Resistant Deep Neural Network Watermarking. ICASSP 2022: 3064-3068 - [c96]Biao Yi, Hanzhou Wu, Guorui Feng, Xinpeng Zhang:
Exploiting Language Model For Efficient Linguistic Steganalysis. ICASSP 2022: 3074-3078 - [c95]Ge Luo, Ping Wei, Shuwen Zhu, Xinpeng Zhang, Zhenxing Qian, Sheng Li:
Image Steganalysis with Convolutional Vision Transformer. ICASSP 2022: 3089-3093 - [c94]Qi Song, Sheng Li, Ping Wei, Ge Luo, Xinpeng Zhang, Zhenxing Qian:
Joint Learning for Addressee Selection and Response Generation in Multi-Party Conversation. ICASSP 2022: 6587-6591 - [c93]Qichao Ying, Hang Zhou, Xianhan Zeng, Haisheng Xu, Zhenxing Qian, Xinpeng Zhang:
Hiding Images Into Images with Real-World Robustness. ICIP 2022: 111-115 - [c92]Qichao Ying, Xiaoxiao Hu, Xiangyu Zhang, Zhenxing Qian, Sheng Li, Xinpeng Zhang:
RWN: Robust Watermarking Network for Image Cropping Localization. ICIP 2022: 301-305 - [c91]Zhaoxia Yin, Heng Yin, Xinpeng Zhang:
Neural Network Fragile watermarking With No Model Performance Degradation. ICIP 2022: 3958-3962 - [c90]Kejiang Chen, Xianhan Zeng, Qichao Ying, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Invertible Image Dataset Protection. ICME 2022: 1-6 - [c89]Le Feng, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Unlabeled Backdoor Poisoning in Semi-Supervised Learning. ICME 2022: 1-6 - [c88]Ping Wei, Ge Luo, Qi Song, Xinpeng Zhang, Zhenxing Qian, Sheng Li:
Generative Steganographic Flow. ICME 2022: 1-6 - [c87]Li Zhang, Yong Liu, Shaoteng Liu, Tianshu Yang, Yexin Wang, Xinpeng Zhang, Hanzhou Wu:
Generative Model Watermarking Based on Human Visual System. IFTC 2022: 136-149 - [c86]Wen Yin, Zhaoxia Yin, Xinpeng Zhang, Bin Luo:
On the Robustness of "Robust Reversible Data Hiding Scheme Based on Two-Layer Embedding Strategy". IFTC 2022: 512-524 - [c85]Nan Zhong, Zhenxing Qian, Xinpeng Zhang:
Imperceptible Backdoor Attack: From Input Space to Feature Representation. IJCAI 2022: 1736-1742 - [c84]Zhuowen Yuan, Zhengxin You, Sheng Li, Zhenxing Qian, Xinpeng Zhang, Alex C. Kot:
On Generating Identifiable Virtual Faces. ACM Multimedia 2022: 1465-1473 - [c83]Ping Wei, Sheng Li, Xinpeng Zhang, Ge Luo, Zhenxing Qian, Qing Zhou:
Generative Steganography Network. ACM Multimedia 2022: 1621-1629 - [c82]Zhengxin You, Qichao Ying, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Image Generation Network for Covert Transmission in Online Social Network. ACM Multimedia 2022: 2834-2842 - [c81]Cheng Xiong, Guorui Feng, Xinran Li, Xinpeng Zhang, Chuan Qin:
Neural Network Model Protection with Piracy Identification and Tampering Localization Capability. ACM Multimedia 2022: 2881-2889 - [c80]Yusheng Guo, Zhenxing Qian, Xinpeng Zhang:
Hiding Function with Neural Networks. MMSP 2022: 1-5 - [c79]Xinran Li, Zichi Wang, Guorui Feng, Xinpeng Zhang, Chuan Qin:
Perceptual Model Hashing: Towards Neural Network Model Authentication. MMSP 2022: 1-5 - [c78]Gaozhi Liu, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
HF-Defend: Defending Against Adversarial Examples Based on Halftoning. MMSP 2022: 1-6 - [c77]Ziyun Yang, Zichi Wang, Xinpeng Zhang, Zhenjun Tang:
Multi-source Data Hiding in Neural Networks. MMSP 2022: 1-6 - [c76]Yangming Zhou, Qichao Ying, Yifei Wang, Xiangyu Zhang, Zhenxing Qian, Xinpeng Zhang:
Robust Watermarking for Video Forgery Detection with Improved Imperceptibility and Robustness. MMSP 2022: 1-6 - [c75]Haoyu Chen, Linqi Song, Zhenxing Qian, Xinpeng Zhang, Kede Ma:
Hiding Images in Deep Probabilistic Models. NeurIPS 2022 - [i36]Tianyu Yang, Hanzhou Wu, Biao Yi, Guorui Feng, Xinpeng Zhang:
Semantic-Preserving Linguistic Steganography by Pivot Translation and Semantic-Aware Bins Coding. CoRR abs/2203.03795 (2022) - [i35]Nan Zhong, Zhenxing Qian, Xinpeng Zhang:
Imperceptible Backdoor Attack: From Input Space to Feature Representation. CoRR abs/2205.03190 (2022) - [i34]Yong Xu, Zhihua Xia, Zichi Wang, Xinpeng Zhang, Jian Weng:
Deniable Steganography. CoRR abs/2205.12587 (2022) - [i33]Yangming Zhou, Qichao Ying, Zhenxing Qian, Sheng Li, Xinpeng Zhang:
Multimodal Fake News Detection via CLIP-Guided Learning. CoRR abs/2205.14304 (2022) - [i32]Yifei Wang, Qichao Ying, Zhenxing Qian, Sheng Li, Xinpeng Zhang:
A DTCWT-SVD Based Video Watermarking resistant to frame rate conversion. CoRR abs/2206.01094 (2022) - [i31]Yangming Zhou, Qichao Ying, Xiangyu Zhang, Zhenxing Qian, Sheng Li, Xinpeng Zhang:
Robust Watermarking for Video Forgery Detection with Improved Imperceptibility and Robustness. CoRR abs/2207.03409 (2022) - [i30]Zhengxin You, Qichao Ying, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Image Generation Network for Covert Transmission in Online Social Network. CoRR abs/2207.10292 (2022) - [i29]Ping Wei, Sheng Li, Xinpeng Zhang, Ge Luo, Zhenxing Qian, Qing Zhou:
Generative Steganography Network. CoRR abs/2207.13867 (2022) - [i28]Yong Liu, Hanzhou Wu, Xinpeng Zhang:
Robust and Imperceptible Black-box DNN Watermarking Based on Fourier Perturbation Analysis and Frequency Sensitivity Clustering. CoRR abs/2208.03944 (2022) - [i27]Zhaoxia Yin, Heng Yin, Xinpeng Zhang:
Neural network fragile watermarking with no model performance degradation. CoRR abs/2208.07585 (2022) - [i26]Yushu Zhang, Jiahao Zhu, Mingfu Xue, Xinpeng Zhang, Xiaochun Cao:
Adaptive 3D Mesh Steganography Based on Feature-Preserving Distortion. CoRR abs/2209.08884 (2022) - [i25]Li Zhang, Yong Liu, Shaoteng Liu, Tianshu Yang, Yexin Wang, Xinpeng Zhang, Hanzhou Wu:
Generative Model Watermarking Based on Human Visual System. CoRR abs/2209.15268 (2022) - [i24]Haoyu Chen, Linqi Song, Zhenxing Qian, Xinpeng Zhang, Kede Ma:
Hiding Images in Deep Probabilistic Models. CoRR abs/2210.02257 (2022) - [i23]Gongyang Li, Yike Wang, Zhi Liu, Xinpeng Zhang, Dan Zeng:
RGB-T Semantic Segmentation with Location, Activation, and Sharpening. CoRR abs/2210.14530 (2022) - [i22]Qichao Ying, Hang Zhou, Zhenxing Qian, Sheng Li, Xinpeng Zhang:
Learning to Immunize Images for Tamper Localization and Self-Recovery. CoRR abs/2210.15902 (2022) - [i21]Haoyue Wang, Meiling Li, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Exploring Depth Information for Face Manipulation Detection. CoRR abs/2212.14230 (2022) - 2021
- [j169]Yanli Ren, Xinpeng Zhang, Dawu Gu, Guorui Feng:
Efficient outsourced extraction of histogram features over encrypted images in cloud. Sci. China Inf. Sci. 64(3) (2021) - [j168]Zichi Wang, Guorui Feng, Hanzhou Wu, Xinpeng Zhang:
Data Hiding in Neural Networks for Multiple Receivers [Research Frontier]. IEEE Comput. Intell. Mag. 16(4): 70-84 (2021) - [j167]Yanli Ren, Xiao Xu, Guorui Feng, Xinpeng Zhang:
Non-Interactive and secure outsourcing of PCA-Based face recognition. Comput. Secur. 110: 102416 (2021) - [j166]Yanyang Guo, Hanzhou Wu, Xinpeng Zhang:
Steganographic visual story with mutual-perceived joint attention. EURASIP J. Image Video Process. 2021(1): 5 (2021) - [j165]Zichi Wang, Guorui Feng, Yanli Ren, Xinpeng Zhang:
Multichannel Steganography in Digital Images for Multiple Receivers. IEEE Multim. 28(1): 65-73 (2021) - [j164]Zhiying Zhu, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Destroying robust steganography in online social networks. Inf. Sci. 581: 605-619 (2021) - [j163]Yanli Ren, Xiangyu Li, Shifeng Sun, Xingliang Yuan, Xinpeng Zhang:
Privacy-preserving batch verification signature scheme based on blockchain for Vehicular Ad-Hoc Networks. J. Inf. Secur. Appl. 58: 102698 (2021) - [j162]Zhiying Zhu, Qichao Ying, Zhenxing Qian, Xinpeng Zhang:
Steganography in animated emoji using self-reference. Multim. Syst. 27(3): 331-340 (2021) - [j161]Zhaoguang Pan, Yanli Ren, Xinpeng Zhang:
Low-complexity fake face detection based on forensic similarity. Multim. Syst. 27(3): 353-361 (2021) - [j160]Lingzan Yu, Yanli Ren, Guorui Feng, Xinpeng Zhang:
Efficient Noninteractive Outsourcing of Large-Scale QR and LU Factorizations. Secur. Commun. Networks 2021: 6184920:1-6184920:14 (2021) - [j159]Hanzhou Wu, Biao Yi, Feng Ding, Guorui Feng, Xinpeng Zhang:
Linguistic Steganalysis With Graph Neural Networks. IEEE Signal Process. Lett. 28: 558-562 (2021) - [j158]Qiangjie Li, Guorui Feng, Yanli Ren, Xinpeng Zhang:
Embedding Probability Guided Network for Image Steganalysis. IEEE Signal Process. Lett. 28: 1095-1099 (2021) - [j157]Yi Luo, Guorui Feng, Xinpeng Zhang:
Hierarchical Authorization of Convolutional Neural Networks for Multi-User. IEEE Signal Process. Lett. 28: 1560-1564 (2021) - [j156]Jiahao Zhu, Yushu Zhang, Xinpeng Zhang, Xiaochun Cao:
Gaussian Model for 3D Mesh Steganography. IEEE Signal Process. Lett. 28: 1729-1733 (2021) - [j155]Chuan Qin, Liang Wu, Xinpeng Zhang, Guorui Feng:
Efficient Non-Targeted Attack for Deep Hashing Based Image Retrieval. IEEE Signal Process. Lett. 28: 1893-1897 (2021) - [j154]Haoqi Hu, Xiaofeng Lu, Xinpeng Zhang, Tianxing Zhang, Guangling Sun:
Inheritance Attention Matrix-Based Universal Adversarial Perturbations on Vision Transformers. IEEE Signal Process. Lett. 28: 1923-1927 (2021) - [j153]Yanli Ren, Min Dong, Zhenxing Qian, Xinpeng Zhang, Guorui Feng:
Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server. IEEE Trans. Cloud Comput. 9(1): 145-154 (2021) - [j152]Nan Zhong, Zhenxing Qian, Zichi Wang, Xinpeng Zhang, Xiaolong Li:
Batch Steganography via Generative Network. IEEE Trans. Circuits Syst. Video Technol. 31(1): 88-97 (2021) - [j151]Yingqiang Qiu, Zhenxing Qian, Han He, Hui Tian, Xinpeng Zhang:
Optimized Lossless Data Hiding in JPEG Bitstream and Relay Transfer-Based Extension. IEEE Trans. Circuits Syst. Video Technol. 31(4): 1380-1394 (2021) - [j150]Xun Zhu, Sheng Li, Xinpeng Zhang, Haoliang Li, Alex C. Kot:
Detection of Spoofing Medium Contours for Face Anti-Spoofing. IEEE Trans. Circuits Syst. Video Technol. 31(5): 2039-2045 (2021) - [j149]Mengyao Xiao, Xiaolong Li, Bin Ma, Xinpeng Zhang, Yao Zhao:
Efficient Reversible Data Hiding for JPEG Images With Multiple Histograms Modification. IEEE Trans. Circuits Syst. Video Technol. 31(7): 2535-2546 (2021) - [j148]Hanzhou Wu, Gen Liu, Yuwei Yao, Xinpeng Zhang:
Watermarking Neural Networks With Watermarked Images. IEEE Trans. Circuits Syst. Video Technol. 31(7): 2591-2601 (2021) - [j147]Xuehu Yan, Yuliang Lu, Ching-Nung Yang, Xinpeng Zhang, Shudong Wang:
A Common Method of Share Authentication in Image Secret Sharing. IEEE Trans. Circuits Syst. Video Technol. 31(7): 2896-2908 (2021) - [j146]Chuan Qin, Enli Liu, Guorui Feng, Xinpeng Zhang:
Perceptual Image Hashing for Content Authentication Based on Convolutional Neural Network With Multiple Constraints. IEEE Trans. Circuits Syst. Video Technol. 31(11): 4523-4537 (2021) - [j145]Shaofeng Li, Minhui Xue, Benjamin Zi Hao Zhao, Haojin Zhu, Xinpeng Zhang:
Invisible Backdoor Attacks on Deep Neural Networks Via Steganography and Regularization. IEEE Trans. Dependable Secur. Comput. 18(5): 2088-2105 (2021) - [c74]Gen Liu, Hanzhou Wu, Xinpeng Zhang:
Covert Communication via Modulating Soft Label of Neural Network. ICAIS (2) 2021: 349-359 - [c73]Mengte Shi, Sheng Li, Zhaoxia Yin, Xinpeng Zhang, Zhenxing Qian:
On Generating JPEG Adversarial Images. ICME 2021: 1-6 - [c72]Zhengxin You, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Reversible Privacy-Preserving Recognition. ICME 2021: 1-6 - [c71]Nan Zhong, Zhenxing Qian, Xinpeng Zhang:
Undetectable Adversarial Examples Based on Microscopical Regularization. ICME 2021: 1-6 - [c70]Xiangyu Zhao, Hanzhou Wu, Xinpeng Zhang:
Watermarking Graph Neural Networks by Random Graphs. ISDFS 2021: 1-6 - [c69]Renjie Zhu, Ping Wei, Sheng Li, Zhaoxia Yin, Xinpeng Zhang, Zhenxing Qian:
Fragile Neural Network Watermarking with Trigger Image Set. KSEM 2021: 280-293 - [c68]Sheng Li, Xun Zhu, Guorui Feng, Xinpeng Zhang, Zhenxing Qian:
Diffusing the Liveness Cues for Face Anti-spoofing. ACM Multimedia 2021: 1636-1644 - [c67]Nan Zhong, Zhenxing Qian, Xinpeng Zhang:
Deep Neural Network Retrieval. ACM Multimedia 2021: 3455-3463 - [c66]Qichao Ying, Zhenxing Qian, Hang Zhou, Haisheng Xu, Xinpeng Zhang, Siyi Li:
From Image to Imuge: Immunized Image Generation. ACM Multimedia 2021: 3565-3573 - [c65]Xiangyu Zhao, Yinzhe Yao, Hanzhou Wu, Xinpeng Zhang:
Structural Watermarking to Deep Neural Networks via Network Channel Pruning. WIFS 2021: 1-6 - [i20]Yalan Qin, Guorui Feng, Hanzhou Wu, Yanli Ren, Xinpeng Zhang:
Orientation Convolutional Networks for Image Recognition. CoRR abs/2102.01523 (2021) - [i19]Hanzhou Wu, Gen Liu, Xinpeng Zhang:
Hiding Data Hiding. CoRR abs/2102.06826 (2021) - [i18]Yingqiang Qiu, Xin Chen, Qichao Ying, Huanqiang Zeng, Zhenxing Qian, Xinpeng Zhang:
High-Capacity Reversible Data Hiding in Encrypted Image Using Pixel Predictions and Huffman Encoding. CoRR abs/2102.12613 (2021) - [i17]Xiangyu Zhao, Yinzhe Yao, Hanzhou Wu, Xinpeng Zhang:
Structural Watermarking to Deep Neural Networks via Network Channel Pruning. CoRR abs/2107.08688 (2021) - [i16]Biao Yi, Hanzhou Wu, Guorui Feng, Xinpeng Zhang:
Exploiting Language Model for Efficient Linguistic Steganalysis: An Empirical Study. CoRR abs/2107.12168 (2021) - [i15]Qichao Ying, Hang Zhou, Xianhan Zeng, Haisheng Xu, Zhenxing Qian, Xinpeng Zhang:
Hiding Images into Images with Real-world Robustness. CoRR abs/2110.05689 (2021) - [i14]Zhuowen Yuan, Sheng Li, Xinpeng Zhang, Zhenxin Qian, Alex C. Kot:
On Generating Identifiable Virtual Faces. CoRR abs/2110.07986 (2021) - [i13]Mingjie Li, Hanzhou Wu, Xinpeng Zhang:
Generating Watermarked Adversarial Texts. CoRR abs/2110.12948 (2021) - [i12]Qichao Ying, Zhenxing Qian, Hang Zhou, Haisheng Xu, Xinpeng Zhang, Siyi Li:
From Image to Imuge: Immunized Image Generation. CoRR abs/2110.14196 (2021) - [i11]Kejiang Chen, Xianhan Zeng, Qichao Ying, Sheng Li, Zhenxing Qian, Xinpeng Zhang:
Invertible Image Dataset Protection. CoRR abs/2112.14420 (2021) - 2020
- [j144]Xianji Cai, Yanli Ren, Xinpeng Zhang:
Privacy-Protected Deletable Blockchain. IEEE Access 8: 6060-6070 (2020) - [j143]Kangli Hao, Guorui Feng, Yanli Ren, Xinpeng Zhang:
Iris Segmentation Using Feature Channel Optimization for Noisy Environments. Cogn. Comput. 12(6): 1205-1216 (2020) - [j142]Jiahuan He, Qichao Ying, Zhenxing Qian, Guorui Feng, Xinpeng Zhang:
Semi-structured data protection scheme based on robust watermarking. EURASIP J. Image Video Process. 2020(1): 12 (2020) - [j141]Huaqi Wang, Zhenxing Qian, Guorui Feng, Xinpeng Zhang:
Defeating data hiding in social networks using generative adversarial network. EURASIP J. Image Video Process. 2020(1): 30 (2020) - [j140]Mengtian Xu, Guorui Feng, Yanli Ren, Xinpeng Zhang:
On Cloud Storage Optimization of Blockchain With a Clustering-Based Genetic Algorithm. IEEE Internet Things J. 7(9): 8547-8558 (2020) - [j139]Liyun Dou, Zhenxing Qian, Chuan Qin, Guorui Feng, Xinpeng Zhang:
Anti-forensics of diffusion-based image inpainting. J. Electronic Imaging 29(4): 043026 (2020) - [j138]Qingyang Liu, Hanzhou Wu, Xinpeng Zhang:
Adaptive video data hiding with low bit-rate growth based on texture selection and ternary syndrome-trellis coding. Multim. Tools Appl. 79(43-44): 32935-32955 (2020) - [j137]Yingqiang Qiu, Zhenxing Qian, Huanqiang Zeng, Xiaodan Lin, Xinpeng Zhang:
Reversible data hiding in encrypted images using adaptive reversible integer transformation. Signal Process. 167 (2020) - [j136]Heng Yao, Hongbin Wei, Chuan Qin, Xinpeng Zhang:
An improved first quantization matrix estimation for nonaligned double compressed JPEG images. Signal Process. 170: 107430 (2020) - [j135]Zhiyang Jin, Guorui Feng, Yanli Ren, Xinpeng Zhang:
Feature extraction optimization of JPEG steganalysis based on residual images. Signal Process. 170: 107455 (2020) - [j134]Zichi Wang, Xinpeng Zhang, Zhenxing Qian:
Practical Cover Selection for Steganography. IEEE Signal Process. Lett. 27: 71-75 (2020) - [j133]Lingchen Zhou, Guorui Feng, Liquan Shen, Xinpeng Zhang:
On Security Enhancement of Steganography via Generative Adversarial Image. IEEE Signal Process. Lett. 27: 166-170 (2020) - [j132]Yanli Ren, Xinpeng Zhang, Guorui Feng, Zhenxing Qian, Fengyong Li:
How to Extract Image Features Based on Co-Occurrence Matrix Securely and Efficiently in Cloud Computing. IEEE Trans. Cloud Comput. 8(1): 207-219 (2020) - [j131]Guorui Feng, Xinpeng Zhang, Yanli Ren, Zhenxing Qian, Sheng Li:
Diversity-Based Cascade Filters for JPEG Steganalysis. IEEE Trans. Circuits Syst. Video Technol. 30(2): 376-386 (2020) - [j130]Sheng Li, Xinpeng Zhang, Zhenxing Qian, Guorui Feng, Yanli Ren:
Key Based Artificial Fingerprint Generation for Privacy Protection. IEEE Trans. Dependable Secur. Comput. 17(4): 828-840 (2020) - [j129]Yushu Zhang, Qi He, Guo Chen, Xinpeng Zhang, Yong Xiang:
A Low-Overhead, Confidentiality-Assured, and Authenticated Data Acquisition Framework for IoT. IEEE Trans. Ind. Informatics 16(12): 7566-7578 (2020) - [j128]Zhaoxia Yin, Youzhi Xiang, Xinpeng Zhang:
Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding. IEEE Trans. Multim. 22(4): 874-884 (2020) - [j127]Jingzhi Lin, Zhenxing Qian, Zichi Wang, Xinpeng Zhang, Guorui Feng:
A New Steganography Method for Dynamic GIF Images Based on Palette Sort. Wirel. Commun. Mob. Comput. 2020: 8812087:1-8812087:13 (2020) - [c64]Pauline Puteaux, Zichi Wang, Xinpeng Zhang, William Puech:
Hierarchical High Capacity Data Hiding in JPEG Crypto-compressed Images. EUSIPCO 2020: 725-729 - [c63]Zichi Wang, Guorui Feng, Xinpeng Zhang:
Steganographic Distortion Function for Enhanced Images. IWDW 2020: 31-40 - [c62]Le Feng, Xinpeng Zhang:
Watermarking Neural Network with Compensation Mechanism. KSEM (2) 2020: 363-375 - [c61]Huixian Kang, Hanzhou Wu, Xinpeng Zhang:
Generative Text Steganography Based on LSTM Network and Attention Mechanism with Keywords. Media Watermarking, Security, and Forensics 2020 - [c60]Jiangfeng Wang, Hanzhou Wu, Xinpeng Zhang, Yuwei Yao:
Watermarking in Deep Neural Networks via Error Back-propagation. Media Watermarking, Security, and Forensics 2020 - [c59]Hanzhou Wu, Xinpeng Zhang:
Reducing Invertible Embedding Distortion Using Graph Matching Model. Media Watermarking, Security, and Forensics 2020 - [c58]Hanzhou Wu, Yuwei Yao, Xinpeng Zhang, Jiangfeng Wang:
Towards Criminal Sketching with Generative Adversarial Network. MMSP 2020: 1-5 - [c57]Zhenxing Qian, Zichi Wang, Xinpeng Zhang:
Data Computing in Covert Domain. SPDE 2020: 535-545 - [i10]Zhenxing Qian, Zichi Wang, Xinpeng Zhang:
Computing in Covert Domain Using Data Hiding. CoRR abs/2002.06794 (2020) - [i9]Xiangyu Zhao, Hanzhou Wu, Xinpeng Zhang:
Watermarking Graph Neural Networks by Random Graphs. CoRR abs/2011.00512 (2020) - [i8]Xinran Li, Chuan Qin, Zhenxing Qian, Heng Yao, Xinpeng Zhang:
Perceptual Robust Hashing for Color Images with Canonical Correlation Analysis. CoRR abs/2012.04312 (2020)
2010 – 2019
- 2019
- [j126]Qichao Ying, Zhenxing Qian, Xinpeng Zhang, Dengpan Ye:
Reversible Data Hiding With Image Enhancement Using Histogram Shifting. IEEE Access 7: 46506-46521 (2019) - [j125]Zichi Wang, Xinpeng Zhang:
Secure Cover Selection for Steganography. IEEE Access 7: 57857-57867 (2019) - [j124]Zichi Wang, Shujun Li, Xinpeng Zhang:
Towards Improved Steganalysis: When Cover Selection is Used in Steganography. IEEE Access 7: 168914-168921 (2019) - [j123]Yimin Wang, Lingsheng Kong, Zhenxing Qian, Guorui Feng, Xinpeng Zhang, Jianmin Zheng:
Breaking Permutation-Based Mesh Steganography and Security Improvement. IEEE Access 7: 183300-183310 (2019) - [j122]Zichi Wang, Zhaoxia Yin, Xinpeng Zhang:
Asymmetric Distortion Function for JPEG Steganography Using Block Artifact Compensation. Int. J. Digit. Crime Forensics 11(1): 90-99 (2019) - [j121]Zhenxing Qian, Zichi Wang, Xinpeng Zhang, Guorui Feng:
Breaking Steganography: Slight Modification with Distortion Minimization. Int. J. Digit. Crime Forensics 11(1): 114-125 (2019) - [j120]Chuan Qin, Xiaokang Qian, Wien Hong, Xinpeng Zhang:
An efficient coding scheme for reversible data hiding in encrypted image with redundancy transfer. Inf. Sci. 487: 176-192 (2019) - [j119]Nan Zhong, Zhenxing Qian, Zichi Wang, Xinpeng Zhang:
Steganography in stylized images. J. Electronic Imaging 28(3): 033005 (2019) - [j118]Chuan Qin, Zhenxing Qian, Guorui Feng, Xinpeng Zhang:
Special issue on real-time image watermarking and forensics in cloud computing. J. Real Time Image Process. 16(3): 559-563 (2019) - [j117]Chuan Qin, Zhenxing Qian, Guorui Feng, Xinpeng Zhang:
Additional articles of special issue on Real-time image watermarking and forensics in cloud computing. J. Real Time Image Process. 16(4): 811-812 (2019) - [j116]Binghua Mao, Zichi Wang, Xinpeng Zhang:
基于DCT域相关性的非对称JPEG隐写 (Asymmetric JPEG Steganography Based on Correlation in DCT Domain). 计算机科学 46(1): 196-200 (2019) - [j115]Ling Du, Wei Zhang, Huazhu Fu, Wenqi Ren, Xinpeng Zhang:
An efficient privacy protection scheme for data security in video surveillance. J. Vis. Commun. Image Represent. 59: 347-362 (2019) - [j114]Haihua Liang, Xinpeng Zhang, Hang Cheng:
Huffman-code based retrieval for encrypted JPEG images. J. Vis. Commun. Image Represent. 61: 149-156 (2019) - [j113]Ximei Zeng, Guorui Feng, Xinpeng Zhang:
Detection of double JPEG compression using modified DenseNet model. Multim. Tools Appl. 78(7): 8183-8196 (2019) - [j112]Yujie Jia, Zhaoxia Yin, Xinpeng Zhang, Yonglong Luo:
Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting. Signal Process. 163: 238-246 (2019) - [j111]Danni Ni, Guorui Feng, Liquan Shen, Xinpeng Zhang:
Selective Ensemble Classification of Image Steganalysis Via Deep Q Network. IEEE Signal Process. Lett. 26(7): 1065-1069 (2019) - [j110]Zhenxing Qian, Haisheng Xu, Xiangyang Luo, Xinpeng Zhang:
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams. IEEE Trans. Circuits Syst. Video Technol. 29(2): 351-362 (2019) - [j109]Jinyuan Tao, Sheng Li, Xinpeng Zhang, Zichi Wang:
Towards Robust Image Steganography. IEEE Trans. Circuits Syst. Video Technol. 29(2): 594-600 (2019) - [j108]Chuan Qin, Qing Zhou, Fang Cao, Jing Dong, Xinpeng Zhang:
Flexible Lossy Compression for Selective Encrypted Image With Image Inpainting. IEEE Trans. Circuits Syst. Video Technol. 29(11): 3341-3355 (2019) - [j107]Sheng Li, Xinpeng Zhang:
Toward Construction-Based Data Hiding: From Secrets to Fingerprint Images. IEEE Trans. Image Process. 28(3): 1482-1497 (2019) - [c56]Zichi Wang, Zhenxing Qian, Xinpeng Zhang, Sheng Li:
An Improved Steganalysis Method Using Feature Combinations. ICAIS (3) 2019: 115-127 - [c55]Qiangjie Li, Guorui Feng, Hanzhou Wu, Xinpeng Zhang:
Ensemble Steganalysis Based on Deep Residual Network. IWDW 2019: 84-95 - [c54]Fang Cao, Tianwei Wu, Chuan Qin, Zhenxing Qian, Xinpeng Zhang:
New Paradigm for Self-embedding Image Watermarking with Poisson Equation. IWDW 2019: 184-191 - [c53]Mengtian Xu, Hanzhou Wu, Guorui Feng, Xinpeng Zhang, Feng Ding:
Broadcasting Steganography in the Blockchain. IWDW 2019: 256-267 - [e1]Rémi Cogranne, Luisa Verdoliva, Siwei Lyu, Juan Ramón Troncoso-Pastoriza, Xinpeng Zhang:
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2019, Paris, France, July 3-5, 2019. ACM 2019, ISBN 978-1-4503-6821-6 [contents] - [i7]Hanzhou Wu, Xinpeng Zhang:
Game-theoretic Analysis to Content-adaptive Reversible Watermarking. CoRR abs/1905.01674 (2019) - [i6]Yujie Jia, Zhaoxia Yin, Xinpeng Zhang, Yonglong Luo:
Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting. CoRR abs/1905.05365 (2019) - [i5]Yang Du, Zhaoxia Yin, Xinpeng Zhang:
High Capacity Lossless Data Hiding for JPEG images by NLCM Relationship Constrcution. CoRR abs/1905.05627 (2019) - 2018
- [j106]Fengyong Li, Kui Wu, Xinpeng Zhang, Jiang Yu, Jingsheng Lei, Mi Wen:
Robust Batch Steganography in Social Networks With Non-Uniform Payload and Data Decomposition. IEEE Access 6: 29912-29925 (2018) - [j105]Zichi Wang, Zhenxing Qian, Xinpeng Zhang, Min Yang, Dengpan Ye:
On Improving Distortion Functions for JPEG Steganography. IEEE Access 6: 74917-74930 (2018) - [j104]Heng Yao, Chuan Qin, Zhenjun Tang, Xinpeng Zhang:
A general framework for shiftable position-based dual-image reversible data hiding. EURASIP J. Image Video Process. 2018: 41 (2018) - [j103]Chuan Qin, Xueqin Chen, Xiangyang Luo, Xinpeng Zhang, Xingming Sun:
Perceptual image hashing via dual-cross pattern encoding and salient structure detection. Inf. Sci. 423: 284-302 (2018) - [j102]Zhenxing Qian, Lin Pan, Nannan Huang, Xinpeng Zhang:
Constructive Steganography by Tangles. KSII Trans. Internet Inf. Syst. 12(8): 3911-3925 (2018) - [j101]Cheonshik Kim, Chin-Chen Chang, Ching-Nung Yang, Xinpeng Zhang, Jinsuk Baek:
Special Issue: Real-Time Data Hiding and Visual Cryptography. J. Real Time Image Process. 14(1): 1-4 (2018) - [j100]Yingqiang Qiu, Han He, Zhenxing Qian, Sheng Li, Xinpeng Zhang:
Lossless data hiding in JPEG bitstream using alternative embedding. J. Vis. Commun. Image Represent. 52: 86-91 (2018) - [j99]Chuan Qin, Weiming Zhang, Xinpeng Zhang:
Guest Editorial: Multimedia Information Security and Its Applications in Cloud Computing. Multim. Tools Appl. 77(14): 17853-17859 (2018) - [j98]Qingde Wei, Zhaoxia Yin, Zichi Wang, Xinpeng Zhang:
Distortion function based on residual blocks for JPEG steganography. Multim. Tools Appl. 77(14): 17875-17888 (2018) - [j97]Jinpeng Lv, Sheng Li, Xinpeng Zhang:
A novel auxiliary data construction scheme for reversible data hiding in JPEG images. Multim. Tools Appl. 77(14): 18029-18041 (2018) - [j96]Zhao-Xia Yin, Xuejing Niu, Xinpeng Zhang, Jin Tang, Bin Luo:
Reversible data hiding in encrypted AMBTC images. Multim. Tools Appl. 77(14): 18067-18083 (2018) - [j95]Zhenxing Qian, Kim-Kwang Raymond Choo, Rémi Cogranne, Xinpeng Zhang:
Multimedia Security: Novel Steganography and Privacy Preserving. Secur. Commun. Networks 2018: 6390945:1-6390945:2 (2018) - [j94]Haihua Liang, Xinpeng Zhang, Hang Cheng, Qiuhan Wei:
Secure and Efficient Image Retrieval over Encrypted Cloud Data. Secur. Commun. Networks 2018: 7915393:1-7915393:14 (2018) - [j93]Chuan Qin, Wei Zhang, Fang Cao, Xinpeng Zhang, Chin-Chen Chang:
Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection. Signal Process. 153: 109-122 (2018) - [j92]Zichi Wang, Xinpeng Zhang, Zhaoxia Yin:
Joint Cover-Selection and Payload-Allocation by Steganographic Distortion Optimization. IEEE Signal Process. Lett. 25(10): 1530-1534 (2018) - [j91]Fengyong Li, Kui Wu, Xinpeng Zhang, Jingsheng Lei, Mi Wen:
Multi-Source Stego Detection with Low-Dimensional Textural Feature and Clustering Ensembles. Symmetry 10(5): 128 (2018) - [j90]Zhenxing Qian, Hang Zhou, Xinpeng Zhang, Weiming Zhang:
Separable Reversible Data Hiding in Encrypted JPEG Bitstreams. IEEE Trans. Dependable Secur. Comput. 15(6): 1055-1067 (2018) - [j89]Chuntao Wang, Jiangqun Ni, Xinpeng Zhang, Qiong Huang:
Efficient Compression of Encrypted Binary Images Using the Markov Random Field. IEEE Trans. Inf. Forensics Secur. 13(5): 1271-1285 (2018) - [c52]Shujun Li, Anthony T. S. Ho, Zichi Wang, Xinpeng Zhang:
Lost in the Digital Wild: Hiding Information in Digital Activities. MPS@CCS 2018: 27-37 - [c51]Yi Puyang, Zhaoxia Yin, Xinpeng Zhang:
Reversible Data Embedding and Scrambling Method Based on JPEG Images. ICCCS (4) 2018: 372-381 - [c50]Zhenxing Qian, Lin Pan, Sheng Li, Xinpeng Zhang:
Steganography by Constructing Marbling Texture. ICCCS (4) 2018: 428-439 - [c49]Yi Puyang, Zhenxing Qian, Zhaoxia Yin, Xinpeng Zhang:
Style Transferring Based Data Hiding for Color Images. ICCCS (4) 2018: 440-449 - [c48]Shaojun Yan, Haihua Liang, Xinpeng Zhang:
Location Privacy-Preserving Scheme Based on Multiple Virtual Maps. ICCCS (5) 2018: 440-452 - [c47]Zichi Wang, Zhenxing Qian, Xinpeng Zhang:
Single Actor Pooled Steganalysis. ICGEC 2018: 339-347 - [c46]Zhenxing Qian, Cheng Huang, Zichi Wang, Xinpeng Zhang:
Breaking CNN-Based Steganalysis. ICGEC 2018: 483-491 - [c45]Lina Shi, Zichi Wang, Zhenxing Qian, Xinpeng Zhang:
Distortion Function for Steganography in Texture Synthesized Images. IIH-MSP (1) 2018: 313-320 - [c44]Zhaoxia Yin, Youzhi Xiang, Zhenxing Qian, Xinpeng Zhang:
Unified Data Hiding and Scrambling Method for JPEG Images. PCM (3) 2018: 373-383 - [c43]Yingqiang Qiu, Hangxing Wang, Zichi Wang, Zhenxing Qian, Gui Feng, Xinpeng Zhang:
Reversible Contrast Mapping based Reversible Data Hiding in Encrypted Images. WIFS 2018: 1-7 - [i4]Shujun Li, Anthony T. S. Ho, Zichi Wang, Xinpeng Zhang:
Lost in the Digital Wild: Hiding Information in Digital Activities. CoRR abs/1809.02888 (2018) - [i3]Youzhi Xiang, Zhaoxia Yin, Xinpeng Zhang:
Reversible Data Hiding in Encrypted Images based on MSB Prediction and Huffman Coding. CoRR abs/1812.09499 (2018) - 2017
- [j88]Beijing Chen, Jianhao Yang, Byeungwoo Jeon, Xinpeng Zhang:
Kernel quaternion principal component analysis and its application in RGB-D object recognition. Neurocomputing 266: 293-303 (2017) - [j87]Min Dong, Yanli Ren, Xinpeng Zhang:
Fully Verifiable Algorithm for Secure Outsourcing of Bilinear Pairing in Cloud Computing. KSII Trans. Internet Inf. Syst. 11(7): 3648-3663 (2017) - [j86]Zhao-Xia Yin, Andrew Abel, Jin Tang, Xinpeng Zhang, Bin Luo:
Reversible data hiding in encrypted images based on multi-level encryption and block histogram modification. Multim. Tools Appl. 76(3): 3899-3920 (2017) - [j85]Heng Yao, Shuozhong Wang, Xinpeng Zhang, Chuan Qin, Jinwei Wang:
Detecting Image Splicing Based on Noise Level Inconsistency. Multim. Tools Appl. 76(10): 12457-12479 (2017) - [j84]Chuan Qin, Ping Ji, Xinpeng Zhang, Jing Dong, Jinwei Wang:
Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process. 138: 280-293 (2017) - [c42]Yang Du, Zhaoxia Yin, Xinpeng Zhang:
An Improved Lossless Data Hiding Scheme in JPEG Bitstream by VLC Mapping. MSN 2017: 84-98 - [i2]Sheng Li, Xin Chen, Zhigao Zheng, Zhenxin Qian, Guorui Feng, Xinpeng Zhang:
Data hiding in Fingerprint Minutiae Template for Privacy Protection. CoRR abs/1710.00516 (2017) - 2016
- [j83]Yun-Qing Shi, Xiaolong Li, Xinpeng Zhang, Hao-Tian Wu, Bin Ma:
Reversible Data Hiding: Advances in the Past Two Decades. IEEE Access 4: 3210-3237 (2016) - [j82]Ling Du, Xiaochun Cao, Wei Zhang, Xinpeng Zhang, Na Liu, Jianguo Wei:
Semi-fragile watermarking for image authentication based on compressive sensing. Sci. China Inf. Sci. 59(5): 059104:1-059104:3 (2016) - [j81]Yanli Ren, Ning Ding, Xinpeng Zhang, Haining Lu, Dawu Gu:
Identity-Based Encryption with Verifiable Outsourced Revocation. Comput. J. 59(11): 1659-1668 (2016) - [j80]Chuan Qin, Xueqin Chen, Jing Dong, Xinpeng Zhang:
Perceptual image hashing with selective sampling for salient structure features. Displays 45: 26-37 (2016) - [j79]Hang Cheng, Xinpeng Zhang, Jiang Yu, Fengyong Li:
Markov process-based retrieval for encrypted JPEG images. EURASIP J. Inf. Secur. 2016: 1 (2016) - [j78]Chuan Qin, Huili Wang, Xinpeng Zhang, Xingming Sun:
Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode. Inf. Sci. 373: 233-250 (2016) - [j77]Zichi Wang, Xinpeng Zhang, Zhaoxia Yin:
Hybrid distortion function for JPEG steganography. J. Electronic Imaging 25(5): 050501 (2016) - [j76]Anxin Wu, Guorui Feng, Xinpeng Zhang, Yanli Ren:
Unbalanced JPEG image steganalysis via multiview data match. J. Vis. Commun. Image Represent. 34: 103-107 (2016) - [j75]Hang Cheng, Xinpeng Zhang, Jiang Yu, Yuan Zhang:
Encrypted JPEG image retrieval using block-wise feature comparison. J. Vis. Commun. Image Represent. 40: 111-117 (2016) - [j74]Zhenxing Qian, Shu Dai, Fei Jiang, Xinpeng Zhang:
Improved joint reversible data hiding in encrypted images. J. Vis. Commun. Image Represent. 40: 732-738 (2016) - [j73]Jiang Yu, Xinpeng Zhang, Fengyong Li:
Spatial steganalysis using redistributed residuals and diverse ensemble classifier. Multim. Tools Appl. 75(21): 13613-13625 (2016) - [j72]Zhenxing Qian, Xinpeng Zhang, Yanli Ren, Guorui Feng:
Block cipher based separable reversible data hiding in encrypted images. Multim. Tools Appl. 75(21): 13749-13763 (2016) - [j71]Hang Cheng, Xinpeng Zhang, Jiang Yu:
AC-coefficient histogram-based retrieval for encrypted JPEG images. Multim. Tools Appl. 75(21): 13791-13803 (2016) - [j70]Fengyong Li, Xinpeng Zhang, Hang Cheng, Jiang Yu:
Digital image steganalysis based on local textural features and double dimensionality reduction. Secur. Commun. Networks 9(8): 729-736 (2016) - [j69]Jiang Yu, Fengyong Li, Hang Cheng, Xinpeng Zhang:
Spatial Steganalysis Using Contrast of Residuals. IEEE Signal Process. Lett. 23(7): 989-992 (2016) - [j68]Zhenxing Qian, Xinpeng Zhang, Guorui Feng:
Reversible Data Hiding in Encrypted Images Based on Progressive Recovery. IEEE Signal Process. Lett. 23(11): 1672-1676 (2016) - [j67]Zhenxing Qian, Xinpeng Zhang:
Reversible Data Hiding in Encrypted Images With Distributed Source Encoding. IEEE Trans. Circuits Syst. Video Technol. 26(4): 636-646 (2016) - [j66]Xinpeng Zhang, Jing Long, Zichi Wang, Hang Cheng:
Lossless and Reversible Data Hiding in Encrypted Images With Public-Key Cryptography. IEEE Trans. Circuits Syst. Video Technol. 26(9): 1622-1631 (2016) - [c41]Yong Yu, Yannan Li, Man Ho Au, Willy Susilo, Kim-Kwang Raymond Choo, Xinpeng Zhang:
Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy. ACISP (1) 2016: 389-405 - [c40]Yanli Ren, Ning Ding, Xinpeng Zhang, Haining Lu, Dawu Gu:
Verifiable Outsourcing Algorithms for Modular Exponentiations with Improved Checkability. AsiaCCS 2016: 293-303 - [c39]Hao Zhang, Zhaoxia Yin, Xinpeng Zhang, Jianpeng Chen, Ruonan Wang, Bin Luo:
Adaptive Algorithm Based on Reversible Data Hiding Method for JPEG Images. CloudComp 2016: 196-203 - [c38]Zhao-Xia Yin, Andrew Abel, Xinpeng Zhang, Bin Luo:
Reversible data hiding in encrypted image based on block histogram shifting. ICASSP 2016: 2129-2133 - [c37]Zhenxing Qian, Xinpeng Zhang, Weiming Zhang, Yimin Wang:
Reversible Contrast Enhancement. ICCCS (1) 2016: 18-27 - [c36]Beijing Chen, Jianhao Yang, Mengru Ding, Tianliang Liu, Xinpeng Zhang:
Quaternion-type moments combining both color and depth information for RGB-D object recognition. ICPR 2016: 704-708 - [c35]Xuejing Niu, Zhao-Xia Yin, Xinpeng Zhang, Jin Tang, Bin Luo:
Reversible Data Hiding in Encrypted AMBTC Compressed Images. IWDW 2016: 436-445 - [c34]Zichi Wang, Jinpeng Lv, Qingde Wei, Xinpeng Zhang:
Distortion Function for Spatial Image Steganography Based on the Polarity of Embedding Change. IWDW 2016: 487-493 - 2015
- [j65]Yanli Ren, Shuozhong Wang, Xinpeng Zhang, Min-Shiang Hwang:
An Efficient Batch Verifying Scheme for Detecting Illegal Signatures. Int. J. Netw. Secur. 17(4): 463-470 (2015) - [j64]Zhenxing Qian, Xinpeng Zhang, Yanli Ren:
JPEG encryption for image rescaling in the encrypted domain. J. Vis. Commun. Image Represent. 26: 9-13 (2015) - [j63]Chuan Qin, Xinpeng Zhang:
Effective reversible data hiding in encrypted image with privacy protection for image content. J. Vis. Commun. Image Represent. 31: 154-164 (2015) - [j62]Liquan Shen, Zhaoyang Zhang, Xinpeng Zhang, Ping An, Zhi Liu:
Fast TU size decision algorithm for HEVC encoders using Bayesian theorem detection. Signal Process. Image Commun. 32: 121-128 (2015) - [j61]Guorui Feng, Yuan Lan, Xinpeng Zhang, Zhenxing Qian:
Dynamic Adjustment of Hidden Node Parameters for Extreme Learning Machine. IEEE Trans. Cybern. 45(2): 279-288 (2015) - [c33]Hang Cheng, Xinpeng Zhang, Jiang Yu, Fengyong Li:
Markov Process Based Retrieval for Encrypted JPEG Images. ARES 2015: 417-421 - [c32]Roland Schmitz, Shujun Li, Christos Grecos, Xinpeng Zhang:
Content-Fragile Commutative Watermarking-Encryption Based on Pixel Entropy. ACIVS 2015: 474-485 - [c31]Xinpeng Zhang, Zichi Wang, Jiang Yu, Zhenxing Qian:
Reversible visible watermark embedded in encrypted domain. ChinaSIP 2015: 826-830 - [c30]Zhao-Xia Yin, Huabin Wang, Haifeng Zhao, Bin Luo, Xinpeng Zhang:
Complete Separable Reversible Data Hiding in Encrypted Image. ICCCS 2015: 101-110 - [c29]Yuan Zhang, Xinpeng Zhang, Chuan Qin, Jiang Yu:
Multiple Description Coding for Encrypted Images. IIH-MSP 2015: 85-88 - 2014
- [j60]Fengyong Li, Xinpeng Zhang, Jiang Yu, Wenfeng Shen:
Adaptive JPEG steganography with new distortion function. Ann. des Télécommunications 69(7-8): 431-440 (2014) - [j59]Xinpeng Zhang, Chuan Qin, Liquan Shen:
Efficient wet paper embedding for steganography with multilayer construction. Ann. des Télécommunications 69(7-8): 441-447 (2014) - [j58]Xiyu Han, Zhenxing Qian, Guorui Feng, Xinpeng Zhang:
Reversible Data Hiding in Encrypted Images Based on Image Interpolation. Int. J. Digit. Crime Forensics 6(3): 16-29 (2014) - [j57]Roland Schmitz, Shujun Li, Christos Grecos, Xinpeng Zhang:
Towards Robust Invariant Commutative Watermarking-Encryption Based on Image Histograms. Int. J. Multim. Data Eng. Manag. 5(4): 36-52 (2014) - [j56]Yanli Ren, Zhihua Niu, Xinpeng Zhang:
Fully Anonymous Identity-based Broadcast Encryption without Random Oracles. Int. J. Netw. Secur. 16(4): 256-264 (2014) - [j55]Liquan Shen, Ping An, Xinpeng Zhang, Zhaoyang Zhang:
Adaptive transform size decision algorithm for high-efficiency video coding inter coding. J. Electronic Imaging 23(4): 043023 (2014) - [j54]Guorui Feng, Haiyan Zhang, Xinpeng Zhang:
Effective feature selection for image steganalysis using extreme learning machine. J. Electronic Imaging 23(6): 063020 (2014) - [j53]Zhenxing Qian, Xinpeng Zhang:
Improved anti-forensics of JPEG compression. J. Syst. Softw. 91: 100-108 (2014) - [j52]Xinpeng Zhang, Zhenxing Qian, Guorui Feng, Yanli Ren:
Efficient reversible data hiding in encrypted images. J. Vis. Commun. Image Represent. 25(2): 322-328 (2014) - [j51]Xinpeng Zhang, Guangling Sun, Liquan Shen, Chuan Qin:
Compression of encrypted images with multi-layer decomposition. Multim. Tools Appl. 72(1): 489-502 (2014) - [j50]Bin Chen, Guorui Feng, Xinpeng Zhang, Fengyong Li:
Mixing high-dimensional features for JPEG steganalysis with ensemble classifier. Signal Image Video Process. 8(8): 1475-1482 (2014) - [j49]Xinpeng Zhang, Yanli Ren, Liquan Shen, Zhenxing Qian, Guorui Feng:
Compressing Encrypted Images With Auxiliary Information. IEEE Trans. Multim. 16(5): 1327-1336 (2014) - [j48]Zhenxing Qian, Xinpeng Zhang, Shuozhong Wang:
Reversible Data Hiding in Encrypted JPEG Bitstream. IEEE Trans. Multim. 16(5): 1486-1491 (2014) - [c28]Xinpeng Zhang, Hang Cheng:
Histogram-based retrieval for encrypted JPEG images. ChinaSIP 2014: 446-449 - 2013
- [j47]Yanli Ren, Shuozhong Wang, Xinpeng Zhang:
Practical parallel key-insulated encryption with multiple helper keys. Comput. Math. Appl. 65(9): 1403-1412 (2013) - [j46]Xinpeng Zhang:
Commutative reversible data hiding and encryption. Secur. Commun. Networks 6(11): 1396-1403 (2013) - [j45]Fengyong Li, Xinpeng Zhang, Bin Chen, Guorui Feng:
JPEG Steganalysis With High-Dimensional Features and Bayesian Ensemble Classifier. IEEE Signal Process. Lett. 20(3): 233-236 (2013) - [j44]Yan Zhao, Shuozhong Wang, Xinpeng Zhang, Heng Yao:
Robust Hashing for Image Authentication Using Zernike Moments and Local Features. IEEE Trans. Inf. Forensics Secur. 8(1): 55-63 (2013) - [j43]Xinpeng Zhang:
Reversible Data Hiding With Optimal Value Transfer. IEEE Trans. Multim. 15(2): 316-325 (2013) - [j42]Liquan Shen, Zhi Liu, Xinpeng Zhang, Wenqiang Zhao, Zhaoyang Zhang:
An Effective CU Size Decision Method for HEVC Encoders. IEEE Trans. Multim. 15(2): 465-470 (2013) - [c27]Roland Schmitz, Shujun Li, Christos Grecos, Xinpeng Zhang:
Towards More Robust Commutative Watermarking-Encryption of Images. ISM 2013: 283-286 - 2012
- [j41]Zhenxing Qian, Xinpeng Zhang:
Lossless data hiding in JPEG bitstream. J. Syst. Softw. 85(2): 309-313 (2012) - [j40]Chuan Qin, Shuozhong Wang, Xinpeng Zhang:
Simultaneous inpainting for image structure and texture using anisotropic heat transfer model. Multim. Tools Appl. 56(3): 469-483 (2012) - [j39]Guorui Feng, Zhenxing Qian, Xinpeng Zhang:
Evolutionary selection extreme learning machine optimization for regression. Soft Comput. 16(9): 1485-1491 (2012) - [j38]Heng Yao, Shuozhong Wang, Yan Zhao, Xinpeng Zhang:
Detecting Image Forgery Using Perspective Constraints. IEEE Signal Process. Lett. 19(3): 123-126 (2012) - [j37]Guorui Feng, Zhenxing Qian, Xinpeng Zhang:
Spectrum-estimation based lossless information recovery for sparse array patterns. Telecommun. Syst. 49(2): 163-169 (2012) - [j36]Xinpeng Zhang, Shuozhong Wang:
Efficient data hiding with histogram-preserving property. Telecommun. Syst. 49(2): 179-185 (2012) - [j35]Xinpeng Zhang:
Separable Reversible Data Hiding in Encrypted Image. IEEE Trans. Inf. Forensics Secur. 7(2): 826-832 (2012) - [j34]Xinpeng Zhang, Guorui Feng, Yanli Ren, Zhenxing Qian:
Scalable Coding of Encrypted Images. IEEE Trans. Image Process. 21(6): 3108-3114 (2012) - [c26]Roland Schmitz, Shujun Li, Christos Grecos, Xinpeng Zhang:
A New Approach to Commutative Watermarking-Encryption. Communications and Multimedia Security 2012: 117-130 - [c25]Yanli Ren, Shuozhong Wang, Xinpeng Zhang:
Anonymous Hierarchical Identity-Based Encryption in Prime Order Groups. ICDKE 2012: 230-242 - [c24]Yanli Ren, Shuozhong Wang, Xinpeng Zhang:
Non-interactive Dynamic Identity-Based Broadcast Encryption without Random Oracles. ICICS 2012: 479-487 - [c23]Zhenxing Qian, Wenwen Wang, Xinpeng Zhang:
Generalized Quality Assessment of Blocking Artifacts for Compressed Images. IFTC 2012: 110-116 - [c22]Xinpeng Zhang, Chuan Qin, Guangling Sun:
Reversible Data Hiding in Encrypted Images Using Pseudorandom Sequence Modulation. IWDW 2012: 358-367 - [c21]Guoqing Li, Guangling Sun, Xinpeng Zhang:
Robust Face Recognition in Low Resolution and Blurred Image Using Joint Information in Space and Frequency. NPC 2012: 616-624 - [i1]Guangling Sun, Guoqing Li, Xinpeng Zhang:
Robust Degraded Face Recognition Using Enhanced Local Frequency Descriptor and Multi-scale Competition. CoRR abs/1210.1033 (2012) - 2011
- [j33]Zhenxing Qian, Guorui Feng, Xinpeng Zhang, Shuozhong Wang:
Image self-embedding with high-quality restoration capability. Digit. Signal Process. 21(2): 278-286 (2011) - [j32]Zhenjun Tang, Shuozhong Wang, Xinpeng Zhang, Weimin Wei:
Structural Feature-Based Image Hashing and Similarity Metric for Tampering Detection. Fundam. Informaticae 106(1): 75-91 (2011) - [j31]Xinpeng Zhang, Shuozhong Wang, Guorui Feng:
Reversible Visible Watermarhing with Lossless Data Embedding Based on Difference Value Shift. Intell. Autom. Soft Comput. 17(2): 233-243 (2011) - [j30]Zhenjun Tang, Shuozhong Wang, Xinpeng Zhang, Weimin Wei, Yan Zhao:
Lexicographical framework for image hashing with implementation based on DCT and NMF. Multim. Tools Appl. 52(2-3): 325-345 (2011) - [j29]Xinpeng Zhang, Shuozhong Wang, Zhenxing Qian, Guorui Feng:
Self-embedding watermark with flexible restoration quality. Multim. Tools Appl. 54(2): 385-395 (2011) - [j28]Xinpeng Zhang:
Reversible Data Hiding in Encrypted Image. IEEE Signal Process. Lett. 18(4): 255-258 (2011) - [j27]Qiumin Wu, Shuozhong Wang, Xinpeng Zhang:
Log-Polar Based Scheme for Revealing Duplicated Regions in Digital Images. IEEE Signal Process. Lett. 18(10): 559-562 (2011) - [j26]Xinpeng Zhang:
Lossy Compression and Iterative Reconstruction for Encrypted Image. IEEE Trans. Inf. Forensics Secur. 6(1): 53-58 (2011) - [j25]Xinpeng Zhang, Zhenxing Qian, Yanli Ren, Guorui Feng:
Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction. IEEE Trans. Inf. Forensics Secur. 6(4): 1223-1232 (2011) - [j24]Xinpeng Zhang, Shuozhong Wang, Zhenxing Qian, Guorui Feng:
Reference Sharing Mechanism for Watermark Self-Embedding. IEEE Trans. Image Process. 20(2): 485-495 (2011) - [c20]Xinpeng Zhang, Yanli Ren, Guorui Feng, Zhenxing Qian:
Compressing Encrypted Image Using Compressive Sensing. IIH-MSP 2011: 222-225 - [c19]Cheonshik Kim, Dongkyoo Shin, Dongil Shin, Xinpeng Zhang:
Improved Steganographic Embedding Exploiting Modification Direction in Multimedia Communications. STA 2011: 130-138 - 2010
- [j23]Yanli Ren, Dawu Gu, Shuozhong Wang, Xinpeng Zhang:
Hierarchical Identity-Based Proxy Re-Encryption without Random Oracles. Int. J. Found. Comput. Sci. 21(6): 1049-1063 (2010) - [j22]Zhenxing Qian, Xinpeng Zhang, Guorui Feng, Yanli Ren:
Colour filter array interpolation based self recovery with anti-cropping capability. Int. J. Multim. Intell. Secur. 1(2): 191-203 (2010) - [j21]Yanli Ren, Dawu Gu, Shuozhong Wang, Xinpeng Zhang:
New Fuzzy Identity-Based Encryption in the Standard Model. Informatica 21(3): 393-407 (2010) - [j20]Chuan Qin, Qian Mao, Xinpeng Zhang:
Image Watermarking Scheme With Unequal Protection Capability Based on Error Correcting Codes. J. Multim. 5(5): 427-433 (2010) - [j19]Xinpeng Zhang, Shuozhong Wang, Zhenxing Qian, Guorui Feng:
Reversible fragile watermarking for locating tampered blocks in JPEG images. Signal Process. 90(12): 3026-3036 (2010) - [j18]Xinpeng Zhang:
Efficient Data Hiding With Plus-Minus One or Two. IEEE Signal Process. Lett. 17(7): 635-638 (2010) - [j17]Weimin Wei, Shuozhong Wang, Xinpeng Zhang, Zhenjun Tang:
Estimation of image rotation angle using interpolation-related spectral signatures with application to blind detection of image forgery. IEEE Trans. Inf. Forensics Secur. 5(3): 507-517 (2010) - [j16]Weiming Zhang, Xinpeng Zhang, Shuozhong Wang:
Near-optimal codes for information embedding in gray-scale signals. IEEE Trans. Inf. Theory 56(3): 1262-1270 (2010) - [c18]Qiumin Wu, Shuozhong Wang, Xinpeng Zhang:
Detection of Image Region-Duplication with Rotation and Scaling Tolerance. ICCCI (1) 2010: 100-108
2000 – 2009
- 2009
- [j15]Xinpeng Zhang, Shuozhong Wang, Weiming Zhang:
Steganography Combining Data Decomposition Mechanism and Stego-coding Method. Informatica (Slovenia) 33(1): 41-48 (2009) - [j14]Xinpeng Zhang, Shuozhong Wang:
Fragile watermarking scheme using a hierarchical mechanism. Signal Process. 89(4): 675-679 (2009) - [c17]Zhenxing Qian, Xinpeng Zhang, Shuozhong Wang:
Matrix Selection in High Payload Embedding. IIH-MSP 2009: 328-331 - [c16]Xinpeng Zhang, Shuozhong Wang, Guorui Feng:
Fragile Watermarking Scheme with Extensive Content Restoration Capability. IWDW 2009: 268-278 - [c15]Zhenjun Tang, Shuozhong Wang, Xinpeng Zhang, Weimin Wei:
Perceptual Similarity Metric Resilient to Rotation for Application in Robust Image Hashing. MUE 2009: 183-188 - 2008
- [j13]Xinpeng Zhang, Shuozhong Wang, Zhenyu Zhou:
Multibit Assignment Steganography in Palette Images. IEEE Signal Process. Lett. 15: 553-556 (2008) - [j12]Xinpeng Zhang, Shuozhong Wang:
Fragile Watermarking With Error-Free Restoration Capability. IEEE Trans. Multim. 10(8): 1490-1499 (2008) - [c14]Weiming Zhang, Xinpeng Zhang, Shuozhong Wang:
Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes. Information Hiding 2008: 60-71 - [c13]Chuan Qin, Shuozhong Wang, Xinpeng Zhang:
Image Editing without Color Inconsistency Using Modified Poisson Equation. IIH-MSP 2008: 397-401 - [c12]Weiming Zhang, Xinpeng Zhang, Shuozhong Wang:
Twice Gric Colorings in Steganography. IIH-MSP 2008: 1301-1304 - 2007
- [j11]Weiming Zhang, Shuozhong Wang, Xinpeng Zhang:
Improving Embedding Efficiency of Covering Codes for Applications in Steganography. IEEE Commun. Lett. 11(8): 680-682 (2007) - [j10]Xinpeng Zhang, Shuozhong Wang:
Watermarking Scheme Capable of Resisting Sensitivity Attack. IEEE Signal Process. Lett. 14(2): 125-128 (2007) - [j9]Xinpeng Zhang, Shuozhong Wang:
Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels. IEEE Signal Process. Lett. 14(10): 727-730 (2007) - [j8]Weiming Zhang, Xinpeng Zhang, Shuozhong Wang:
A Double Layered "Plus-Minus One" Data Embedding Scheme. IEEE Signal Process. Lett. 14(11): 848-851 (2007) - [c11]Chung-Chuan Wang, Chin-Chen Chang, Xinpeng Zhang, Jinn-ke Jan:
Senary Huffman Compression - A Reversible Data Hiding Scheme for Binary Images. MCAM 2007: 351-360 - 2006
- [j7]Xinpeng Zhang, Shuozhong Wang:
Efficient Steganographic Embedding by Exploiting Modification Direction. IEEE Commun. Lett. 10(11): 781-783 (2006) - [j6]Xinpeng Zhang, Shuozhong Wang:
Dynamical running coding in digital steganography. IEEE Signal Process. Lett. 13(3): 165-168 (2006) - [c10]Chuan Qin, Wei-Bin Lee, Xinpeng Zhang, Shuozhong Wang:
Copyright Management Using Progressive Image Delivery, Visible Watermarking and Robust Fingerprinting. ICARCV 2006: 1-4 - [c9]Chao Chen, Shuozhong Wang, Xinpeng Zhang:
Information Hiding in Text Using Typesetting Tools with Stego-Encoding. ICICIC (1) 2006: 459-462 - [c8]Xinpeng Zhang, Shuozhong Wang:
Information capacity of quantization steganography in the presence of active attack. MMM 2006 - 2005
- [j5]Xinpeng Zhang, Shuozhong Wang:
Stego-Encoding with Error Correction Capability. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(12): 3663-3667 (2005) - [j4]Xinpeng Zhang, Shuozhong Wang:
Steganography using multiple-base notational system and human vision sensitivity. IEEE Signal Process. Lett. 12(1): 67-70 (2005) - [c7]Xinpeng Zhang, Shuozhong Wang:
Analysis of Parity Assignment Steganography in Palette Images. KES (3) 2005: 1025-1031 - [c6]Xinpeng Zhang, Shuozhong Wang:
Watermarking Protocol Compatible with Secret Algorithms for Resisting Invertibility Attack. KES (2) 2005: 1134-1144 - 2004
- [j3]Xinpeng Zhang, Shuozhong Wang:
Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recognit. Lett. 25(3): 331-339 (2004) - [j2]Xinpeng Zhang, Shuozhong Wang:
Invertibility attack against watermarking based on forged algorithm and a countermeasure. Pattern Recognit. Lett. 25(8): 967-973 (2004) - [c5]Xinpeng Zhang, Shuozhong Wang:
A new watermarking scheme against inserter-based attacks suitable for digital media with moderate size. InfoSecu 2004: 247-248 - 2003
- [c4]Kaiwen Zhang, Shuozhong Wang, Xinpeng Zhang:
Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation. MMM-ACNS 2003: 360-370 - [c3]Shuozhong Wang, Xinpeng Zhang, Kaiwen Zhang:
Data Hiding in Digital Audio by Frequency Domain Dithering. MMM-ACNS 2003: 383-394 - [c2]Xinpeng Zhang, Shuozhong Wang, Kaiwen Zhang:
Steganography with Least Histogram Abnormality. MMM-ACNS 2003: 395-406 - [c1]Xinpeng Zhang, Shuozhong Wang, Kaiwen Zhang:
Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences. MMM-ACNS 2003: 407-418 - 2002
- [j1]Xinpeng Zhang, Shuozhong Wang:
Watermarking scheme capable of resisting attacks based on availability of inserter. Signal Process. 82(11): 1801-1804 (2002)
Coauthor Index
aka: Zhaoxia Yin
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 20:17 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint