zichi wang
TitleCited byYear
Lossless and reversible data hiding in encrypted images with public-key cryptography
X Zhang, J Long, Z Wang, H Cheng
IEEE Transactions on Circuits and Systems for Video Technology 26 (9), 1622-1631, 2015
Hybrid distortion function for JPEG steganography
Z Wang, X Zhang, Z Yin
Journal of Electronic Imaging 25 (5), 050501, 2016
Towards robust image steganography
J Tao, S Li, X Zhang, Z Wang
IEEE Transactions on Circuits and Systems for Video Technology 29 (2), 594-600, 2018
On improving distortion functions for JPEG steganography
Z Wang, Z Qian, X Zhang, M Yang, D Ye
IEEE Access 6, 74917-74930, 2018
Distortion function based on residual blocks for JPEG steganography
Q Wei, Z Yin, Z Wang, X Zhang
Multimedia Tools and Applications 77 (14), 17875-17888, 2018
Reversible visible watermark embedded in encrypted domain
X Zhang, Z Wang, J Yu, Z Qian
2015 IEEE China Summit and International Conference on Signal and …, 2015
Distortion function for JPEG steganography based on image texture and correlation in DCT domain
Z Wang, Z Yin, X Zhang
IETE Technical Review 35 (4), 351-358, 2018
Joint cover-selection and payload-allocation by steganographic distortion optimization
Z Wang, X Zhang, Z Yin
IEEE Signal Processing Letters 25 (10), 1530-1534, 2018
Distortion function for spatial image steganography based on the polarity of embedding change
Z Wang, J Lv, Q Wei, X Zhang
International Workshop on Digital Watermarking, 487-493, 2016
Asymmetric Distortion Function for JPEG Steganography Using Block Artifact Compensation
Z Wang, Z Yin, X Zhang
International Journal of Digital Crime and Forensics (IJDCF) 11 (1), 90-99, 2019
Breaking Steganography: Slight Modification with Distortion Minimization
Z Qian, Z Wang, X Zhang, G Feng
International Journal of Digital Crime and Forensics (IJDCF) 11 (1), 114-125, 2019
Lost in the digital wild: Hiding information in digital activities
S Li, ATS Ho, Z Wang, X Zhang
Proceedings of the 2nd International Workshop on Multimedia Privacy and …, 2018
Secure Cover Selection for Steganography
Z Wang, X Zhang
IEEE Access 7, 57857-57867, 2019
Steganography in beautified images
L Liu, Z Wang, Z Qian, X Zhang, G Feng
Mathematical biosciences and engineering: MBE 16 (4), 2322-2333, 2019
Distortion function for emoji image steganography
L Shi, Z Wang, Z Qian, N Huang, P Puteaux, X Zhang
Computers Mater Continua 59, 943-953, 2019
Reversible Contrast Mapping based Reversible Data Hiding in Encrypted Images
Y Qiu, H Wang, Z Wang, Z Qian, G Feng, X Zhang
2018 IEEE International Workshop on Information Forensics and Security (WIFS …, 2018
王子驰, 张媛, 张新鹏
小型微型计算机系统 35 (10), 2331-2335, 2014
An Improved Steganalysis Method Using Feature Combinations
Z Wang, Z Qian, X Zhang, S Li
International Conference on Artificial Intelligence and Security, 115-127, 2019
Privacy protection based on binary fingerprint compression
S Li, J Su, Z Wang, X Chen
Journal of Real-Time Image Processing 16 (3), 791-798, 2019
Steganography in stylized images
N Zhong, Z Qian, Z Wang, X Zhang
Journal of Electronic Imaging 28 (3), 033005, 2019
The system can't perform the operation now. Try again later.
Articles 1–20