Dengpan Ye
Dengpan Ye
Verified email at
Cited by
Cited by
A novel image hashing scheme with perceptual robustness using block truncation coding
C Qin, X Chen, D Ye, J Wang, X Sun
Information Sciences 361, 84-99, 2016
A new adaptive watermarking for real-time MPEG videos
D Ye, C Zou, Y Dai, Z Wang
Applied Mathematics and Computation 185 (2), 907-918, 2007
Hierarchical recovery for tampered images based on watermark self-embedding
F Cao, B An, J Wang, D Ye, H Wang
Displays 46, 52-60, 2017
Lossless data hiding algorithm for encrypted images with high capacity
S Zheng, D Li, D Hu, D Ye, L Wang, J Wang
Multimedia Tools and Applications 75 (21), 13765-13778, 2016
Next: a neural network framework for next poi recommendation
Z Zhang, C Li, Z Wu, A Sun, D Ye, X Luo
Frontiers of Computer Science 14 (2), 314-333, 2020
A JPEG-compression resistant adaptive steganography based on relative relationship between DCT coefficients
Y Zhang, X Luo, C Yang, D Ye, F Liu
2015 10th International Conference on Availability, Reliability and Security …, 2015
Efficient secure data provenance scheme in multimedia outsourcing and sharing
Z Yang, Y Huang, X Li, W Wang
Computers, Materials & Continua 56 (1), 1-17, 2018
On improving distortion functions for JPEG steganography
Z Wang, Z Qian, X Zhang, M Yang, D Ye
IEEE Access 6, 74917-74930, 2018
A framework of adaptive steganography resisting JPEG compression and detection
Y Zhang, X Luo, C Yang, D Ye, F Liu
Security and Communication Networks 9 (15), 2957-2971, 2016
Image authentication based on perceptual hash using Gabor filters
L Wang, X Jiang, S Lian, D Hu, D Ye
Soft Computing 15 (3), 493-504, 2011
Secure fractal image coding based on fractal parameter encryption
S Lian, X Chen, D Ye
Fractals 17 (02), 149-160, 2009
An image steganography algorithm based on quantization index modulation resisting scaling attacks and statistical detection
Y Zhang, Q Cheng
Computers, Materials & Continua 56 (1), 151-167, 2018
New zero-watermark copyright protection scheme based on binary bitmap [J]
YE Deng-pan
Application Research of Computers 8, 2007
Reversible data hiding with image enhancement using histogram shifting
Q Ying, Z Qian, X Zhang, D Ye
IEEE Access 7, 46506-46521, 2019
Uncertainty multi-source information fusion for intelligent flood risk analysis based on random set theory
Y Xie, S Yi, Z Tang, D Ye
International Journal of Computational Intelligence Systems 5 (5), 975-984, 2012
Lightweight information hiding in H. 264/AVC video stream
K Liao, D Ye, S Lian, Z Guo, J Wang
2009 International Conference on Multimedia Information Networking and …, 2009
Information hiding technology and application [M]
W Lina, Z Huanguo
University of Wuhan Publishers, 2003
EveDroid: Event-aware Android malware detection against model degrading for IoT devices
T Lei, Z Qin, Z Wang, Q Li, D Ye
IEEE Internet of Things Journal 6 (4), 6668-6680, 2019
Feature fusion based hashing for large scale image copy detection
L Yan, H Ling, D Ye, C Wang, Z Ye, H Chen
International Journal of Computational Intelligence Systems 8 (4), 725-734, 2015
Real-time reversible data hiding with shifting block histogram of pixel differences in encrypted image
Z Tang, S Xu, D Ye, J Wang, X Zhang, C Yu
Journal of Real-Time Image Processing 16 (3), 709-724, 2019
The system can't perform the operation now. Try again later.
Articles 1–20