weiming zhang
TitleCited byYear
Reversible data hiding in encrypted images by reserving room before encryption
K Ma, W Zhang, X Zhao, N Yu, F Li
IEEE Transactions on information forensics and security 8 (3), 553-562, 2013
4422013
Reversibility improved data hiding in encrypted images
W Zhang, K Ma, N Yu
Signal Processing 94, 118-127, 2014
2222014
A novel reversible data hiding scheme based on two-dimensional difference-histogram modification
X Li, W Zhang, X Gui, B Yang
IEEE Transactions on Information Forensics and Security 8 (7), 1091-1100, 2013
2042013
Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression
W Zhang, X Hu, X Li, N Yu
IEEE Transactions on Image Processing 22 (7), 2775-2785, 2013
1542013
Efficient reversible data hiding based on multiple histograms modification
X Li, W Zhang, X Gui, B Yang
IEEE Transactions on Information Forensics and Security 10 (9), 2016-2027, 2015
1402015
Improving various reversible data hiding schemes via optimal codes for binary covers
W Zhang, B Chen, N Yu
IEEE transactions on image processing 21 (6), 2991-3003, 2012
1402012
A double layered “plus-minus one” data embedding scheme
W Zhang, X Zhang, S Wang
IEEE signal processing letters 14 (11), 848-851, 2007
1152007
On the fault-tolerant performance for a class of robust image steganography
Y Zhang, C Qin, W Zhang, F Liu, X Luo
Signal Processing 146, 99-111, 2018
1042018
Improving embedding efficiency of covering codes for applications in steganography
W Zhang, S Wang, X Zhang
IEEE Communications Letters 11 (8), 680-682, 2007
962007
Capacity-approaching codes for reversible data hiding
W Zhang, B Chen, N Yu
International Workshop on Information Hiding, 255-269, 2011
782011
Efficient double-layered steganographic embedding
X Zhang, W Zhang, S Wang
Electronics letters 43 (8), 482-483, 2007
762007
Maximizing steganographic embedding efficiency by combining Hamming codes and wet paper codes
W Zhang, X Zhang, S Wang
International Workshop on Information Hiding, 60-71, 2008
752008
云安全研究进展综述
俞能海, 郝卓, 徐甲甲, 张卫明, 张驰
电子学报 41 (2), 371-381, 2013
722013
以数字图像为载体的隐写分析研究进展
王朔中, 张新鹏, 张卫明 [1
计算机学报 32 (7), 1247-1263, 2009
642009
Reversible data hiding in encrypted images by reversible image transformation
W Zhang, H Wang, D Hou, N Yu
IEEE Transactions on Multimedia 18 (8), 1469-1479, 2016
592016
Minimum rate prediction and optimized histograms modification for reversible data hiding
X Hu, W Zhang, X Li, N Yu
IEEE Transactions on Information Forensics and Security 10 (3), 653-664, 2015
592015
Review of cloud computing security
N Yu, Z Hao, J Xu, WM Zhang, C Zhang
Dianzi Xuebao(Acta Electronica Sinica) 41 (2), 371-381, 2013
582013
Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes
X Luo, X Song, X Li, W Zhang, J Lu, C Yang, F Liu
Multimedia Tools and Applications 75 (21), 13557-13583, 2016
512016
A fast privacy-preserving multi-keyword search scheme on cloud data
C Yang, W Zhang, J Xu, J Xu, N Yu
2012 International Conference on Cloud and Service Computing, 104-110, 2012
512012
Separable reversible data hiding in encrypted JPEG bitstreams
Z Qian, H Zhou, X Zhang, W Zhang
IEEE Transactions on Dependable and Secure Computing 15 (6), 1055-1067, 2016
462016
The system can't perform the operation now. Try again later.
Articles 1–20