zichi wang
zichi wang
在 shu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Lossless and reversible data hiding in encrypted images with public-key cryptography
X Zhang, J Long, Z Wang, H Cheng
IEEE Transactions on Circuits and Systems for Video Technology 26 (9), 1622-1631, 2015
1862015
Towards robust image steganography
J Tao, S Li, X Zhang, Z Wang
IEEE Transactions on Circuits and Systems for Video Technology 29 (2), 594-600, 2018
382018
Hybrid distortion function for JPEG steganography
Z Wang, X Zhang, Z Yin
Journal of Electronic Imaging 25 (5), 050501, 2016
272016
On improving distortion functions for JPEG steganography
Z Wang, Z Qian, X Zhang, M Yang, D Ye
IEEE Access 6, 74917-74930, 2018
202018
Joint cover-selection and payload-allocation by steganographic distortion optimization
Z Wang, X Zhang, Z Yin
IEEE Signal Processing Letters 25 (10), 1530-1534, 2018
162018
Distortion function based on residual blocks for JPEG steganography
Q Wei, Z Yin, Z Wang, X Zhang
Multimedia Tools and Applications 77 (14), 17875-17888, 2018
132018
Reversible visible watermark embedded in encrypted domain
X Zhang, Z Wang, J Yu, Z Qian
2015 IEEE China Summit and International Conference on Signal and …, 2015
102015
Full text document
J Li, ATS Ho, Z Wang, X Zhang
92014
Distortion function for JPEG steganography based on image texture and correlation in DCT domain
Z Wang, Z Yin, X Zhang
IETE Technical Review 35 (4), 351-358, 2018
82018
Secure cover selection for steganography
Z Wang, X Zhang
IEEE Access 7, 57857-57867, 2019
62019
Distortion function for spatial image steganography based on the polarity of embedding change
Z Wang, J Lv, Q Wei, X Zhang
International Workshop on Digital Watermarking, 487-493, 2016
62016
Distortion function for emoji image steganography
L Shi, Z Wang, Z Qian, N Huang, P Puteaux, X Zhang
CMC-COMPUTERS MATERIALS & CONTINUA 59 (3), 943-953, 2019
52019
Asymmetric distortion function for JPEG steganography using block artifact compensation
Z Wang, Z Yin, X Zhang
International Journal of Digital Crime and Forensics (IJDCF) 11 (1), 90-99, 2019
42019
Breaking steganography: Slight modification with distortion minimization
Z Qian, Z Wang, X Zhang, G Feng
International Journal of Digital Crime and Forensics (IJDCF) 11 (1), 114-125, 2019
42019
Data hiding in Iris image for privacy protection
S Li, X Chen, Z Wang, Z Qian, X Zhang
IETE technical review 35 (sup1), 34-41, 2018
32018
Reversible contrast mapping based reversible data hiding in encrypted images
Y Qiu, H Wang, Z Wang, Z Qian, G Feng, X Zhang
2018 IEEE International Workshop on Information Forensics and Security (WIFS …, 2018
32018
Lost in the digital wild: Hiding information in digital activities
S Li, ATS Ho, Z Wang, X Zhang
Proceedings of the 2nd International Workshop on Multimedia Privacy and …, 2018
32018
Steganography in beautified images
L Liu, Z Wang, Z Qian, X Zhang, G Feng
Math. Biosci. Engineer 16, 2333-2333, 2019
22019
Steganography in Social Networks Based on Behavioral Correlation
Y Hu, Z Wang, X Zhang
IETE Technical Review, 1-7, 2020
12020
An improved steganalysis method using feature combinations
Z Wang, Z Qian, X Zhang, S Li
International Conference on Artificial Intelligence and Security, 115-127, 2019
12019
系统目前无法执行此操作,请稍后再试。
文章 1–20