-
1
-
-
67650157209
-
Reversible watermarking based on invariability and adjustment on pixel pairs
-
November
-
S. Weng, Y. Zhao, J. S. Pan and R. Ni, Reversible Watermarking Based on Invariability and Adjustment on Pixel Pairs, IEEE Signal Processing Letters, Vol. 15, No. 20, pp. 721-724, November, 2008.
-
(2008)
IEEE Signal Processing Letters
, vol.15
, Issue.20
, pp. 721-724
-
-
Weng, S.1
Zhao, Y.2
Pan, J.S.3
Ni, R.4
-
2
-
-
84962448916
-
A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
-
February
-
Z. Xia, X. Wang, X. Sun and Q. Wang, A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data, IEEE Transactions on Parallel and Distributed Systems, Vol. 27, No. 2, pp. 340-352, February, 2015.
-
(2015)
IEEE Transactions on Parallel and Distributed Systems
, vol.27
, Issue.2
, pp. 340-352
-
-
Xia, Z.1
Wang, X.2
Sun, X.3
Wang, Q.4
-
3
-
-
82655172377
-
An extended matrix encoding algorithm for steganography of high embedding efficiency
-
November
-
L. Fan, T. Gao, Q. Yang and Y. Cao, An Extended Matrix Encoding Algorithm for Steganography of High Embedding Efficiency, Computers & Electrical Engineering, Vol. 37, No. 6, pp. 973-981, November, 2011.
-
(2011)
Computers & Electrical Engineering
, vol.37
, Issue.6
, pp. 973-981
-
-
Fan, L.1
Gao, T.2
Yang, Q.3
Cao, Y.4
-
4
-
-
84986631527
-
A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing
-
January
-
Z. Xia, X. Wang, L. Zhang, Z. Qin, X. Sun and K. Ren, A Privacy-Preserving and Copy-deterrence Content-Based Image Retrieval Scheme in Cloud Computing, IEEE Transactions on Information Forensics and Security, Vol. 11, No. 11, pp. 2594- 2608, January, 2016.
-
(2016)
IEEE Transactions on Information Forensics and Security
, vol.11
, Issue.11
, pp. 2594-2608
-
-
Xia, Z.1
Wang, X.2
Zhang, L.3
Qin, Z.4
Sun, X.5
Ren, K.6
-
5
-
-
84892373027
-
A fast algorithm for matrix embedding steganography
-
February
-
Q. Mao, A Fast Algorithm for Matrix Embedding Steganography, Digital Signal Processing, Vol. 25, No. 2, pp. 248-254, February, 2014.
-
(2014)
Digital Signal Processing
, vol.25
, Issue.2
, pp. 248-254
-
-
Mao, Q.1
-
6
-
-
84955270987
-
Coverless image steganography without embedding
-
Nanjing, China
-
Z. Zhou, H. Sun, R. Harit, X. Sun and X. Chen, Coverless Image Steganography without Embedding, International Conference of Cloud Computing and Security, Nanjing, China, 2015, pp. 123-132.
-
(2015)
International Conference of Cloud Computing and Security
, pp. 123-132
-
-
Zhou, Z.1
Sun, H.2
Harit, R.3
Sun, X.4
Chen, X.5
-
7
-
-
84863942032
-
New channel selection rule for JPEG steganography
-
August
-
F. Huang, J. Huang and Y. Shi, New Channel Selection Rule for JPEG Steganography, IEEE Transactions on Information Forensics & Security, Vol. 7, No. 4, pp. 1181-1191, August, 2012.
-
(2012)
IEEE Transactions on Information Forensics & Security
, vol.7
, Issue.4
, pp. 1181-1191
-
-
Huang, F.1
Huang, J.2
Shi, Y.3
-
8
-
-
84977125904
-
Fingerprint liveness detection using multiscale difference co-occurrence matrix
-
December
-
C. Yuan, Z. Xia, X. Sun, D. Sun and R. Lv, Fingerprint Liveness Detection Using Multiscale Difference Co-occurrence Matrix, Optical Engineering, Vol. 55, No. 6, pp. 0631111-06300010, December, 2016.
-
(2016)
Optical Engineering
, vol.55
, Issue.6
, pp. 0631111-06300010
-
-
Yuan, C.1
Xia, Z.2
Sun, X.3
Sun, D.4
Lv, R.5
-
9
-
-
70350710022
-
Digital image steganography: Survey and analysis of current methods
-
March
-
A. Cheddad, J. Condell, K. Curran and P. M. Kevitt, Digital Image Steganography: Survey and Analysis of Current Methods, Signal Processing, Vol. 90, No. 3, pp. 727-752, March, 2010.
-
(2010)
Signal Processing
, vol.90
, Issue.3
, pp. 727-752
-
-
Cheddad, A.1
Condell, J.2
Curran, K.3
Kevitt, P.M.4
-
10
-
-
84959136299
-
Steganalysis of LSB matching using differences between nonadjacent pixels
-
February
-
Z. Xia, X. Wang, X. Sun, Q. Liu and N. Xiong, Steganalysis of LSB Matching Using Differences between Nonadjacent Pixels, Multimedia Tools & Applications, Vol. 75, No. 4, pp. 1947-1962, February, 2016.
-
(2016)
Multimedia Tools & Applications
, vol.75
, Issue.4
, pp. 1947-1962
-
-
Xia, Z.1
Wang, X.2
Sun, X.3
Liu, Q.4
Xiong, N.5
-
11
-
-
0037411306
-
Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy
-
July
-
C. C. Chang, J. Y. Hsiao and C. S. Chan, Finding Optimal Least-Significant-Bit Substitution in Image Hiding by Dynamic Programming Strategy, Pattern Recognition, Vol. 36, No. 7, pp. 1583-1595, July, 2003.
-
(2003)
Pattern Recognition
, vol.36
, Issue.7
, pp. 1583-1595
-
-
Chang, C.C.1
Hsiao, J.Y.2
Chan, C.S.3
-
12
-
-
84921899998
-
Image segmentation by generalized hierarchical fuzzy C-Means algorithm
-
February
-
Y. Zheng, J. Byeungwoo, D. Xu, Q. M. J. Wu and H. Zhang, Image Segmentation by Generalized Hierarchical Fuzzy C-Means Algorithm, Journal of Intelligent and Fuzzy Systems, Vol. 28, No. 2, pp. 961-973, February, 2015.
-
(2015)
Journal of Intelligent and Fuzzy Systems
, vol.28
, Issue.2
, pp. 961-973
-
-
Zheng, Y.1
Byeungwoo, J.2
Xu, D.3
Wu, Q.M.J.4
Zhang, H.5
-
13
-
-
84955254168
-
Coverless information hiding method based on the Chinese mathematical expression
-
Nanjing, China
-
X. Chen, H. Sun, Y. Tobe, Z. Zhou and X. Sun, Coverless Information Hiding Method Based on the Chinese Mathematical Expression, International Conference of Cloud Computing and Security, Nanjing, China, 2015, pp. 133-143.
-
(2015)
International Conference of Cloud Computing and Security
, pp. 133-143
-
-
Chen, X.1
Sun, H.2
Tobe, Y.3
Zhou, Z.4
Sun, X.5
-
14
-
-
84990858692
-
Fingerprint liveness detection based on multi-scale LPQ and PCA
-
June
-
C. Yuan, X. Sun and R. Lv, Fingerprint Liveness Detection Based on Multi-scale LPQ and PCA, China Communications, Vol. 13, No. 7, pp. 60-65, June, 2016.
-
(2016)
China Communications
, vol.13
, Issue.7
, pp. 60-65
-
-
Yuan, C.1
Sun, X.2
Lv, R.3
-
15
-
-
49149097304
-
A DWT based approach for image steganography
-
January
-
P. Y. Chen and H. J. Lin, A DWT Based Approach for Image Steganography, International Journal of Applied Science & Engineering, Vol. 4, No. 3, pp. 275-290, January, 2006.
-
(2006)
International Journal of Applied Science & Engineering
, vol.4
, Issue.3
, pp. 275-290
-
-
Chen, P.Y.1
Lin, H.J.2
-
16
-
-
77957872283
-
Detecting image region duplication using SIFT features
-
March
-
X. Pan and S. Lyu, Detecting Image Region Duplication Using SIFT Features, IEEE International Conference on Acoustic, Vol. 329, No. 1, pp. 1706- 1709, March, 2010.
-
(2010)
IEEE International Conference on Acoustic
, vol.329
, Issue.1
, pp. 1706-1709
-
-
Pan, X.1
Lyu, S.2
-
17
-
-
84904903882
-
Steganalysis of least significant bit matching using multi-order differences
-
August
-
Z. Xia, X. Wang, X. Sun and B. Wang, Steganalysis of Least Significant Bit Matching Using Multi-order Differences, Security & Communication Networks, Vol. 7, No. 8, pp. 1283-1291, August, 2014.
-
(2014)
Security & Communication Networks
, vol.7
, Issue.8
, pp. 1283-1291
-
-
Xia, Z.1
Wang, X.2
Sun, X.3
Wang, B.4
-
18
-
-
85032751954
-
Watermarking schemes evaluation
-
August
-
F. A. P. Petitcolas, Watermarking Schemes Evaluation, IEEE Signal Processing Magazine, Vol. 17, No. 5, pp. 58-64, August, 2000.
-
(2000)
IEEE Signal Processing Magazine
, vol.17
, Issue.5
, pp. 58-64
-
-
Petitcolas, F.A.P.1
-
19
-
-
35048891531
-
Improved detection of LSB steganography in grayscale images
-
Toronto, Canada
-
A.D . Ker, Improved Detection of LSB Steganography in Grayscale Images, International Conference on Information Hiding, Toronto, Canada, 2004, pp. 97-115.
-
(2004)
International Conference on Information Hiding
, pp. 97-115
-
-
Ker, A.D.1
-
20
-
-
20444404178
-
Steganalysis of LSB matching in grayscale images
-
May
-
A. D. Ker, Steganalysis of LSB Matching in Grayscale Images, IEEE Signal Processing Letters, Vol. 12, No. 6, pp. 441-444, May, 2005.
-
(2005)
IEEE Signal Processing Letters
, vol.12
, Issue.6
, pp. 441-444
-
-
Ker, A.D.1
|