Kejiang Chen
Kejiang Chen
Department of Electronic Engineering and Information Science, University of Science and Technology
Verified email at mail.ustc.edu.cn
Title
Cited by
Cited by
Year
Adversarial examples against deep neural network based steganalysis
Y Zhang, W Zhang, K Chen, J Liu, Y Liu, N Yu
Proceedings of the 6th ACM Workshop on information hiding and multimedia …, 2018
482018
Reversible data hiding in color image with grayscale invariance
D Hou, W Zhang, K Chen, SJ Lin, N Yu
IEEE Transactions on Circuits and Systems for Video Technology 29 (2), 363-374, 2018
332018
Dup-net: Denoiser and upsampler network for 3d adversarial point clouds defense
H Zhou, K Chen, W Zhang, H Fang, W Zhou, N Yu
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2019
312019
Defining cost functions for adaptive JPEG steganography at the microscale
K Chen, H Zhou, W Zhou, W Zhang, N Yu
IEEE Transactions on Information Forensics and Security 14 (4), 1052-1066, 2018
282018
Comments on “Steganography using reversible texture synthesis”
H Zhou, K Chen, W Zhang, N Yu
IEEE Transactions on Image Processing 26 (4), 1623-1625, 2017
272017
Defining joint distortion for JPEG steganography
W Li, W Zhang, K Chen, W Zhou, N Yu
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia …, 2018
182018
Defining cost functions for adaptive steganography at the microscale
K Chen, W Zhang, H Zhou, N Yu, G Feng
2016 IEEE International Workshop on Information Forensics and Security (WIFS …, 2016
142016
Lg-gan: Label guided adversarial network for flexible targeted attack of point cloud based deep networks
H Zhou, D Chen, J Liao, K Chen, X Dong, K Liu, W Zhang, G Hua, N Yu
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2020
132020
Robust adaptive steganography based on generalized dither modulation and expanded embedding domain
X Yu, K Chen, Y Wang, W Li, W Zhang, N Yu
Signal Processing 168, 107343, 2020
112020
Distortion design for secure adaptive 3-d mesh steganography
H Zhou, K Chen, W Zhang, Y Yao, N Yu
IEEE Transactions on Multimedia 21 (6), 1384-1398, 2018
92018
Derivative-based steganographic distortion and its non-additive extensions for audio
K Chen, H Zhou, W Li, K Yang, W Zhang, N Yu
IEEE Transactions on Circuits and Systems for Video Technology 30 (7), 2027-2032, 2019
72019
Journal of visual communication and image representation
J Wang, Y Wang, M Jiang
vol 25 (5), 2014
72014
Side channel steganalysis: When behavior is considered in steganographer detection
L Li, W Zhang, K Chen, H Zha, N Yu
Multimedia Tools and Applications 78 (7), 8041-8055, 2019
62019
Targeted attack and security enhancement on texture synthesis based steganography
H Zhou, K Chen, W Zhang, Z Qian, N Yu
Journal of Visual Communication and Image Representation 54, 100-107, 2018
62018
Self-supervised adversarial training
K Chen, Y Chen, H Zhou, X Mao, Y Li, Y He, H Xue, W Zhang, N Yu
ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and …, 2020
52020
Feature-preserving tensor voting model for mesh steganalysis
H Zhou, K Chen, W Zhang, C Qin, N Yu
IEEE transactions on visualization and computer graphics 27 (1), 57-67, 2019
52019
JPEG steganography with estimated side-information
W Li, K Chen, W Zhang, H Zhou, Y Wang, N Yu
IEEE Transactions on Circuits and Systems for Video Technology 30 (7), 2288-2294, 2019
52019
A brief survey on deep learning based data hiding, steganography and watermarking
C Zhang, C Lin, P Benz, K Chen, W Zhang, IS Kweon
arXiv preprint arXiv:2103.01607, 2021
42021
Controversial ‘pixel’prior rule for JPEG adaptive steganography
W Zhou, W Li, K Chen, H Zhou, W Zhang, N Yu
IET Image Processing 13 (1), 24-33, 2018
42018
Provably secure generative steganography based on autoregressive model
K Yang, K Chen, W Zhang, N Yu
International Workshop on Digital Watermarking, 55-68, 2018
42018
The system can't perform the operation now. Try again later.
Articles 1–20