Kejiang Chen
Kejiang Chen
Department of Electronic Engineering and Information Science, University of Science and Technology
Verified email at mail.ustc.edu.cn
TitleCited byYear
Reversible data hiding in color image with grayscale invariance
D Hou, W Zhang, K Chen, SJ Lin, N Yu
IEEE Transactions on Circuits and Systems for Video Technology 29 (2), 363-374, 2018
152018
Comments on “Steganography Using Reversible Texture Synthesis”
H Zhou, K Chen, W Zhang, N Yu
IEEE Transactions on Image Processing 26 (4), 1623-1625, 2017
142017
Adversarial examples against deep neural network based steganalysis
Y Zhang, W Zhang, K Chen, J Liu, Y Liu, N Yu
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia …, 2018
122018
Defining cost functions for adaptive steganography at the microscale
K Chen, W Zhang, H Zhou, N Yu, G Feng
2016 IEEE International Workshop on Information Forensics and Security (WIFS …, 2016
112016
Defining cost functions for adaptive jpeg steganography at the microscale
K Chen, H Zhou, W Zhou, W Zhang, N Yu
IEEE Transactions on Information Forensics and Security 14 (4), 1052-1066, 2018
72018
Defining joint distortion for jpeg steganography
W Li, W Zhang, K Chen, W Zhou, N Yu
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia …, 2018
72018
Journal of Visual Communication and Image Representation
J Wang, Y Wang, M Jiang
vol 25 (5), 2014
62014
Distortion Design for Secure Adaptive 3-D Mesh Steganography
H Zhou, K Chen, W Zhang, Y Yao, N Yu
IEEE Transactions on Multimedia 21 (6), 1384-1398, 2018
42018
Controversial ‘pixel’prior rule for JPEG adaptive steganography
W Zhou, W Li, K Chen, H Zhou, W Zhang, N Yu
IET Image Processing 13 (1), 24-33, 2018
42018
Side channel steganalysis: When behavior is considered in steganographer detection
L Li, W Zhang, K Chen, H Zha, N Yu
Multimedia Tools and Applications 78 (7), 8041-8055, 2019
32019
Targeted attack and security enhancement on texture synthesis based steganography
H Zhou, K Chen, W Zhang, Z Qian, N Yu
Journal of Visual Communication and Image Representation 54, 100-107, 2018
32018
Feature-Preserving Tensor Voting Model for Mesh Steganalysis
H Zhou, K Chen, W Zhang, C Qin, N Yu
IEEE transactions on visualization and computer graphics, 2019
22019
Deflecting 3D adversarial point clouds through outlier-guided removal
H Zhou, K Chen, W Zhang, H Fang, W Zhou, N Yu
arXiv preprint arXiv:1812.11017, 2018
22018
Provably Secure Generative Steganography Based on Autoregressive Model
K Yang, K Chen, W Zhang, N Yu
International Workshop on Digital Watermarking, 55-68, 2018
22018
JPEG Steganography with Estimated Side-information
W Li, K Chen, W Zhang, H Zhou, Y Wang, N Yu
IEEE Transactions on Circuits and Systems for Video Technology, 2019
12019
Derivative-based Steganographic Distortion and Its Non-additive Extensions for Audio
K Chen, H Zhou, W Li, K Yang, W Zhang, N Yu
IEEE Transactions on Circuits and Systems for Video Technology, 2019
12019
Robust adaptive steganography based on generalized dither modulation and expanded embedding domain
X Yu, K Chen, Y Wang, W Li, W Zhang, N Yu
Signal Processing 168, 107343, 2020
2020
Steganographic Security Analysis from Side Channel Steganalysis and its Complementary Attacks
L Li, W Zhang, K Chen, NH Yu
IEEE Transactions on Multimedia, 2019
2019
Semi-supervised Learning Approach to Generate Neuroimaging Modalities with Adversarial Training
H Nguyen, S Luo, F Ramos
arXiv preprint arXiv:1912.04391, 2019
2019
Self-supervised Adversarial Training
K Chen, H Zhou, Y Chen, X Mao, Y Li, Y He, H Xue, W Zhang, N Yu
arXiv preprint arXiv:1911.06470, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20