Zhaoxia YIN 殷赵霞
Zhaoxia YIN 殷赵霞
Associate Professor, Anhui University
Verified email at ahu.edu.cn - Homepage
TitleCited byYear
Separable and error-free reversible data hiding in encrypted image with high payload
Z Yin, B Luo, W Hong
The scientific world journal 2014, 2014
382014
Hybrid distortion function for JPEG steganography
Z Wang, X Zhang, Z Yin
Journal of Electronic Imaging 25 (5), 050501, 2016
242016
High capacity data hiding scheme based on (7, 4) Hamming code
Z Cao, Z Yin, H Hu, X Gao, L Wang
SpringerPlus 5 (1), 175, 2016
152016
Data hiding in AMBTC images using quantization level modification and perturbation technique
W Hong, TS Chen, Z Yin, B Luo, Y Ma
Multimedia tools and applications 76 (3), 3761-3782, 2017
142017
Improved reversible image authentication scheme
Z Yin, X Niu, Z Zhou, J Tang, B Luo
Cognitive Computation 8 (5), 890-899, 2016
142016
Reversible data hiding in encrypted image based on block histogram shifting
Z Yin, A Abel, X Zhang, B Luo
2016 IEEE International Conference on Acoustics, Speech and Signal …, 2016
142016
An information hiding scheme based on (7, 4) hamming code oriented wet paper codes
Z Yin, C Chang, Y Zhang
International Journal of Innovative Computing, Information and Control 6 (7 …, 2010
122010
Reversible data hiding in encrypted images based on multi-level encryption and block histogram modification
Z Yin, A Abel, J Tang, X Zhang, B Luo
Multimedia Tools and Applications 76 (3), 3899-3920, 2017
112017
Improved lossless data hiding for jpeg images based on histogram modification
Y Du, Z Yin, X Zhang
Computers, Materials & Continua 55 (3), 495-507, 2018
102018
Distortion function based on residual blocks for JPEG steganography
Q Wei, Z Yin, Z Wang, X Zhang
Multimedia Tools and Applications 77 (14), 17875-17888, 2018
92018
Reversible data hiding in encrypted AMBTC images
Z Yin, X Niu, X Zhang, J Tang, B Luo
Multimedia Tools and Applications 77 (14), 18067-18083, 2018
92018
Distortion function for JPEG steganography based on image texture and correlation in DCT domain
Z Wang, Z Yin, X Zhang
IETE Technical Review 35 (4), 351-358, 2018
82018
MDE‐based image steganography with large embedding capacity
Z Yin, B Luo
Security and Communication Networks 9 (8), 721-728, 2016
82016
High capacity reversible steganography in encrypted images based on feature mining in plaintext domain.
ZX Yin, W Hong, J Tang, B Luo
IJES 8 (2/3), 249-257, 2016
82016
Joint cover-selection and payload-allocation by steganographic distortion optimization
Z Wang, X Zhang, Z Yin
IEEE Signal Processing Letters 25 (10), 1530-1534, 2018
72018
Second-order steganographic method based on adaptive reference matrix
ZX Yin, CC Chang, Q Xu, B Luo
IET Image Processing 9 (4), 300-305, 2014
72014
Complete separable reversible data hiding in encrypted image
Y Zhaoxia, W Huabin, Z Haifeng, L Bin, Z Xinpeng
International Conference on Cloud Computing and Security, 101-110, 2015
62015
Image steganography via fully exploiting modification direction
X Niu, M Ma, R Tang, Z Yin
International Journal of Security and Its Applications 9 (5), 243-254, 2015
62015
A high embedding efficiency steganography scheme for wet paper codes
ZX Yin, CC Chang, YP Zhang
2009 Fifth International Conference on Information Assurance and Security 2 …, 2009
62009
Reversible Data Hiding in Encrypted Images with Two-MSB Prediction
Y Puyang, Z Yin, Z Qian
2018 IEEE International Workshop on Information Forensics and Security (WIFS …, 2018
52018
The system can't perform the operation now. Try again later.
Articles 1–20