关注
Zichi Wang
Zichi Wang
在 shu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Lossless and reversible data hiding in encrypted images with public-key cryptography
X Zhang, J Long, Z Wang, H Cheng
IEEE transactions on circuits and systems for video technology 26 (9), 1622-1631, 2015
3222015
Towards robust image steganography
J Tao, S Li, X Zhang, Z Wang
IEEE Transactions on Circuits and Systems for Video Technology 29 (2), 594-600, 2018
1552018
On improving distortion functions for JPEG steganography
Z Wang, Z Qian, X Zhang, M Yang, D Ye
IEEE Access 6, 74917-74930, 2018
552018
Joint cover-selection and payload-allocation by steganographic distortion optimization
Z Wang, X Zhang, Z Yin
IEEE Signal Processing Letters 25 (10), 1530-1534, 2018
512018
Hybrid distortion function for JPEG steganography
Z Wang, X Zhang, Z Yin
Journal of Electronic Imaging 25 (5), 050501-050501, 2016
422016
Distortion function based on residual blocks for JPEG steganography
Q Wei, Z Yin, Z Wang, X Zhang
Multimedia Tools and Applications 77, 17875-17888, 2018
362018
Secure cover selection for steganography
Z Wang, X Zhang
IEEE Access 7, 57857-57867, 2019
302019
Batch steganography via generative network
N Zhong, Z Qian, Z Wang, X Zhang, X Li
IEEE Transactions on Circuits and Systems for Video Technology 31 (1), 88-97, 2020
242020
Practical cover selection for steganography
Z Wang, X Zhang, Z Qian
IEEE Signal Processing Letters 27, 71-75, 2019
242019
Data hiding in iris image for privacy protection
S Li, X Chen, Z Wang, Z Qian, X Zhang
IETE technical review 35 (sup1), 34-41, 2018
222018
Reversible visible watermark embedded in encrypted domain
X Zhang, Z Wang, J Yu, Z Qian
2015 IEEE China Summit and International Conference on Signal and …, 2015
192015
JPEG steganography with content similarity evaluation
Z Wang, G Feng, Z Qian, X Zhang
IEEE Transactions on Cybernetics, 2022
172022
Unified performance evaluation method for perceptual image hashing
X Li, C Qin, Z Wang, Z Qian, X Zhang
IEEE Transactions on Information Forensics and Security 17, 1404-1419, 2022
152022
Repeatable data hiding: Towards the reusability of digital images
Z Wang, G Feng, X Zhang
IEEE Transactions on Circuits and Systems for Video Technology 32 (1), 135-146, 2021
142021
Multichannel steganography in digital images for multiple receivers
Z Wang, G Feng, Y Ren, X Zhang
IEEE MultiMedia 28 (1), 65-73, 2020
142020
A new steganography method for dynamic GIF images based on palette sort
J Lin, Z Qian, Z Wang, X Zhang, G Feng
Wireless Communications and Mobile Computing 2020, 1-13, 2020
142020
Distortion function for JPEG steganography based on image texture and correlation in DCT domain
Z Wang, Z Yin, X Zhang
IETE Technical Review 35 (4), 351-358, 2018
132018
Asymmetric distortion function for JPEG steganography using block artifact compensation
Z Wang, Z Yin, X Zhang
International Journal of Digital Crime and Forensics (IJDCF) 11 (1), 90-99, 2019
122019
Distortion function for spatial image steganography based on the polarity of embedding change
Z Wang, J Lv, Q Wei, X Zhang
Digital Forensics and Watermarking: 15th International Workshop, IWDW 2016 …, 2017
112017
Cover selection for steganography using image similarity
Z Wang, G Feng, L Shen, X Zhang
IEEE Transactions on Dependable and Secure Computing, 2022
102022
系统目前无法执行此操作,请稍后再试。
文章 1–20