Dengpan Ye
Dengpan Ye
Verified email at
TitleCited byYear
A novel image hashing scheme with perceptual robustness using block truncation coding
C Qin, X Chen, D Ye, J Wang, X Sun
Information Sciences 361, 84-99, 2016
A new adaptive watermarking for real-time MPEG videos
D Ye, C Zou, Y Dai, Z Wang
Applied Mathematics and Computation 185 (2), 907-918, 2007
Hierarchical recovery for tampered images based on watermark self-embedding
F Cao, B An, J Wang, D Ye, H Wang
Displays 46, 52-60, 2017
Lossless data hiding algorithm for encrypted images with high capacity
S Zheng, D Li, D Hu, D Ye, L Wang, J Wang
Multimedia Tools and Applications 75 (21), 13765-13778, 2016
Next: a neural network framework for next poi recommendation
Z Zhang, C Li, Z Wu, A Sun, D Ye, X Luo
Frontiers of Computer Science 14 (2), 314-333, 2020
A JPEG-compression resistant adaptive steganography based on relative relationship between DCT coefficients
Y Zhang, X Luo, C Yang, D Ye, F Liu
2015 10th International Conference on Availability, Reliability and Security …, 2015
Image authentication based on perceptual hash using Gabor filters
L Wang, X Jiang, S Lian, D Hu, D Ye
Soft Computing 15 (3), 493-504, 2011
On improving distortion functions for JPEG steganography
Z Wang, Z Qian, X Zhang, M Yang, D Ye
IEEE Access 6, 74917-74930, 2018
Secure fractal image coding based on fractal parameter encryption
S Lian, XI Chen, D Ye
Fractals 17 (02), 149-160, 2009
A framework of adaptive steganography resisting JPEG compression and detection
Y Zhang, X Luo, C Yang, D Ye, F Liu
Security and Communication Networks 9 (15), 2957-2971, 2016
Efficient secure data provenance scheme in multimedia outsourcing and sharing
Z Yang, Y Huang, X Li, W Wang, F Wu, X Zhang, W Yao, Z Zheng, L Xiang, ...
Computers, Materials & Continua 56 (1), 1-17, 2018
New zero-watermark copyright protection scheme based on binary bitmap [J]
YE Deng-pan
Application Research of Computers 8, 2007
Lightweight information hiding in H. 264/AVC video stream
K Liao, D Ye, S Lian, Z Guo, J Wang
2009 International Conference on Multimedia Information Networking and …, 2009
Uncertainty multi-source information fusion for intelligent flood risk analysis based on random set theory
Y Xie, S Yi, Z Tang, D Ye
International Journal of Computational Intelligence Systems 5 (5), 975-984, 2012
An image steganography algorithm based on quantization index modulation resisting scaling attacks and statistical detection
Y Zhang, D Ye, J Gan, Z Li, Q Cheng
Comput., Mater. Continua 56 (1), 151-167, 2018
A multi-feature based invertible authentication watermarking for JPEG Images
Y Deng-Pan, M Yao-Bin, D Yue-Wei, W Zhi-Quan
International Workshop on Digital Watermarking, 152-162, 2004
Attack on deep steganalysis neural networks
S Li, D Ye, S Jiang, C Liu, X Niu, X Luo
International Conference on Cloud Computing and Security, 265-276, 2018
Perceptual mpeg-4 video encryption and its usage in video-on demand systems
S Lian, D Ye, J Sun, Z Wang
IEEE International Symposium on Consumer Electronics, 2004, 83-86, 2004
Mobile crowd-sensing context aware based fine-grained access control mode
D Ye, Y Mei, Y Shang, J Zhu, K Ouyang
Multimedia Tools and Applications 75 (21), 13977-13993, 2016
Robust perceptual image Hash using Gabor filters
L Wang, X Jiang, D Hu, D Ye, S Lian
2009 International Conference on Multimedia Information Networking and …, 2009
The system can't perform the operation now. Try again later.
Articles 1–20