关注
Xinpeng Zhang (张新鹏)
Xinpeng Zhang (张新鹏)
Professor, Shanghai University/Fudan University
在 shu.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Reversible data hiding in encrypted image
X Zhang
IEEE signal processing letters 18 (4), 255-258, 2011
12032011
Separable reversible data hiding in encrypted image
X Zhang
IEEE transactions on information forensics and security 7 (2), 826-832, 2011
9752011
Efficient steganographic embedding by exploiting modification direction
X Zhang, S Wang
IEEE Communications letters 10 (11), 781-783, 2006
8712006
Reversible data hiding: Advances in the past two decades
YQ Shi, X Li, X Zhang, HT Wu, B Ma
IEEE access 4, 3210-3237, 2016
5942016
An effective CU size decision method for HEVC encoders
L Shen, Z Liu, X Zhang, W Zhao, Z Zhang
IEEE transactions on multimedia 15 (2), 465-470, 2012
5022012
Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security
X Zhang, S Wang
Pattern Recognition Letters 25 (3), 331-339, 2004
3552004
Reversible data hiding in encrypted images with distributed source encoding
Z Qian, X Zhang
IEEE Transactions on Circuits and Systems for Video Technology 26 (4), 636-646, 2015
3382015
Invisible backdoor attacks on deep neural networks via steganography and regularization
S Li, M Xue, BZH Zhao, H Zhu, X Zhang
IEEE Transactions on Dependable and Secure Computing 18 (5), 2088-2105, 2020
3362020
Lossless and reversible data hiding in encrypted images with public-key cryptography
X Zhang, J Long, Z Wang, H Cheng
IEEE transactions on circuits and systems for video technology 26 (9), 1622-1631, 2015
3322015
Reversible data hiding in encrypted JPEG bitstream
Z Qian, X Zhang, S Wang
IEEE transactions on multimedia 16 (5), 1486-1491, 2014
2852014
Steganography using multiple-base notational system and human vision sensitivity
X Zhang, S Wang
IEEE signal processing letters 12 (1), 67-70, 2004
2712004
Robust hashing for image authentication using Zernike moments and local features
Y Zhao, S Wang, X Zhang, H Yao
IEEE transactions on information forensics and security 8 (1), 55-63, 2012
2632012
Lossy compression and iterative reconstruction for encrypted image
X Zhang
IEEE transactions on information forensics and security 6 (1), 53-58, 2010
2592010
Reversible data hiding with optimal value transfer
X Zhang
IEEE Transactions on Multimedia 15 (2), 316-325, 2012
2432012
Reversible data hiding in encrypted images based on multi-MSB prediction and Huffman coding
Z Yin, Y Xiang, X Zhang
IEEE Transactions on Multimedia 22 (4), 874-884, 2019
2192019
Effective reversible data hiding in encrypted image with privacy protection for image content
C Qin, X Zhang
Journal of Visual Communication and Image Representation 31, 154-164, 2015
2092015
Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy
C Qin, P Ji, X Zhang, J Dong, J Wang
Signal processing 138, 280-293, 2017
2052017
Reference sharing mechanism for watermark self-embedding
X Zhang, S Wang, Z Qian, G Feng
IEEE Transactions on Image Processing 20 (2), 485-495, 2010
2052010
Fragile watermarking with error-free restoration capability
X Zhang, S Wang
IEEE Transactions on Multimedia 10 (8), 1490-1499, 2008
1902008
Efficient reversible data hiding in encrypted images
X Zhang, Z Qian, G Feng, Y Ren
Journal of Visual Communication and Image Representation 25 (2), 322-328, 2014
1842014
系统目前无法执行此操作,请稍后再试。
文章 1–20