default search action
Zichi Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j46]Zihan Yuan, Li Li, Zichi Wang, Xinpeng Zhang:
Protecting copyright of stable diffusion models from ambiguity attacks. Signal Process. 227: 109722 (2025) - 2024
- [j45]Zihan Yuan, Xinpeng Zhang, Zichi Wang, Zhaoxia Yin:
Semi-fragile neural network watermarking for content authentication and tampering localization. Expert Syst. Appl. 236: 121315 (2024) - [j44]Yong Liu, Li Zhang, Hanzhou Wu, Zichi Wang, Xinpeng Zhang:
Reducing High-Frequency Artifacts for Generative Model Watermarking via Wavelet Transform. IEEE Internet Things J. 11(10): 18503-18515 (2024) - [j43]Deyang Wu, Jiayan Wang, Jing Zhao, Li Li, Zichi Wang, Hanzhou Wu:
Adaptive Robust Watermarking for Resisting Multiple Distortions in Real Scenes. IEEE Internet Things J. 11(20): 33229-33246 (2024) - [j42]Zihan Yuan, Li Li, Zichi Wang, Xinpeng Zhang:
Watermarking for Stable Diffusion Models. IEEE Internet Things J. 11(21): 35238-35249 (2024) - [j41]Yong Liu, Chen Li, Zichi Wang, Hanzhou Wu, Xinpeng Zhang:
Transferable adversarial attack based on sensitive perturbation analysis in frequency domain. Inf. Sci. 678: 120971 (2024) - [j40]Haoxian Song, Zichi Wang, Xinpeng Zhang:
Identification of the Original Images. J. Vis. Commun. Image Represent. 98: 104017 (2024) - [j39]Lingyan Fan, Jinxin Qiu, Zichi Wang, Hongbo Wang:
Maximizing steganalysis performance using siamese networks for image. Multim. Tools Appl. 83(31): 76953-76962 (2024) - [j38]Zihan Yuan, Li Li, Zichi Wang, Xinpeng Zhang:
Ambiguity attack against text-to-image diffusion model watermarking. Signal Process. 221: 109509 (2024) - [j37]Jiang Yu, Fengyong Li, Zichi Wang, Wen Si, Xinpeng Zhang:
Diverse Batch Steganography Using Model-Based Selection and Double-Layered Payload Assignment. IEEE Trans. Circuits Syst. Video Technol. 34(8): 7785-7800 (2024) - [j36]Sheng Li, Zichi Wang, Xiudong Zhang, Xinpeng Zhang:
Robust Image Steganography Against General Downsampling Operations With Lossless Secret Recovery. IEEE Trans. Dependable Secur. Comput. 21(1): 340-352 (2024) - [j35]Xinran Li, Mengqi Guo, Zichi Wang, Jian Li, Chuan Qin:
Robust Image Hashing in Encrypted Domain. IEEE Trans. Emerg. Top. Comput. Intell. 8(1): 670-683 (2024) - [j34]Zihan Yuan, Xinpeng Zhang, Zichi Wang, Zhaoxia Yin:
Semi-Fragile Neural Network Watermarking Based on Adversarial Examples. IEEE Trans. Emerg. Top. Comput. Intell. 8(4): 2775-2790 (2024) - [j33]Quan Wang, Sheng Li, Zichi Wang, Xinpeng Zhang, Guorui Feng:
Multi-Source Style Transfer via Style Disentanglement Network. IEEE Trans. Multim. 26: 1373-1383 (2024) - [j32]Quan Wang, Zichi Wang, Xinpeng Zhang, Guorui Feng:
Art Image Inpainting With Style-Guided Dual-Branch Inpainting Network. IEEE Trans. Multim. 26: 8026-8037 (2024) - [j31]Xinran Li, Zichi Wang, Guorui Feng, Xinpeng Zhang, Chuan Qin:
Perceptual Image Hashing Using Feature Fusion of Orthogonal Moments. IEEE Trans. Multim. 26: 10041-10054 (2024) - 2023
- [j30]Zichi Wang, Guorui Feng, Hanzhou Wu, Xinpeng Zhang:
Data hiding during image processing using capsule networks. Neurocomputing 537: 49-60 (2023) - [j29]Ziyun Yang, Zichi Wang, Xinpeng Zhang:
A general steganographic framework for neural network models. Inf. Sci. 643: 119250 (2023) - [j28]Deyang Wu, Li Li, Jiayan Wang, Penghui Ma, Zichi Wang, Hanzhou Wu:
Robust zero-watermarking scheme using DT CWT and improved differential entropy for color medical images. J. King Saud Univ. Comput. Inf. Sci. 35(8): 101708 (2023) - [j27]Xiong Tang, Zichi Wang, Xinpeng Zhang:
Steganalysis of Neural Networks Based on Symmetric Histogram Distribution. Symmetry 15(5): 1079 (2023) - [j26]Mingjie Li, Zichi Wang, Xinpeng Zhang:
An Effective Framework for Intellectual Property Protection of NLG Models. Symmetry 15(6): 1287 (2023) - [j25]Zichi Wang, Guorui Feng, Zhenxing Qian, Xinpeng Zhang:
JPEG Steganography With Content Similarity Evaluation. IEEE Trans. Cybern. 53(8): 5082-5093 (2023) - [j24]Zichi Wang, Guorui Feng, Liquan Shen, Xinpeng Zhang:
Cover Selection for Steganography Using Image Similarity. IEEE Trans. Dependable Secur. Comput. 20(3): 2328-2340 (2023) - [j23]Zichi Wang, Sheng Li, Xinpeng Zhang, Guorui Feng:
Exploring Abnormal Behavior in Swarm: Identify User Using Adversarial Examples. IEEE Trans. Emerg. Top. Comput. Intell. 7(1): 250-260 (2023) - [c15]Yunfei Xie, Zichi Wang:
Neural Network Steganography Using Extractor Matching. IWDW 2023: 169-179 - [i4]Ping Wei, Qing Zhou, Zichi Wang, Zhenxing Qian, Xinpeng Zhang, Sheng Li:
Generative Steganography Diffusion. CoRR abs/2305.03472 (2023) - 2022
- [j22]Zichi Wang:
Multisource Data Hiding in Digital Images. Symmetry 14(5): 890 (2022) - [j21]Zichi Wang, Guorui Feng, Xinpeng Zhang:
Repeatable Data Hiding: Towards the Reusability of Digital Images. IEEE Trans. Circuits Syst. Video Technol. 32(1): 135-146 (2022) - [j20]Xinran Li, Chuan Qin, Zichi Wang, Zhenxing Qian, Xinpeng Zhang:
Unified Performance Evaluation Method for Perceptual Image Hashing. IEEE Trans. Inf. Forensics Secur. 17: 1404-1419 (2022) - [c14]Xinran Li, Zichi Wang, Guorui Feng, Xinpeng Zhang, Chuan Qin:
Perceptual Model Hashing: Towards Neural Network Model Authentication. MMSP 2022: 1-5 - [c13]Lecong Wang, Zichi Wang, Xinran Li, Chuan Qin:
Robust Watermarking for Neural Network Models Using Residual Network. MMSP 2022: 1-6 - [c12]Ziyun Yang, Zichi Wang, Xinpeng Zhang, Zhenjun Tang:
Multi-source Data Hiding in Neural Networks. MMSP 2022: 1-6 - [i3]Yong Xu, Zhihua Xia, Zichi Wang, Xinpeng Zhang, Jian Weng:
Deniable Steganography. CoRR abs/2205.12587 (2022) - 2021
- [j19]Zichi Wang, Guorui Feng, Hanzhou Wu, Xinpeng Zhang:
Data Hiding in Neural Networks for Multiple Receivers [Research Frontier]. IEEE Comput. Intell. Mag. 16(4): 70-84 (2021) - [j18]Zichi Wang, Guorui Feng, Yanli Ren, Xinpeng Zhang:
Multichannel Steganography in Digital Images for Multiple Receivers. IEEE Multim. 28(1): 65-73 (2021) - [j17]Liyun Dou, Zichi Wang, Zhenxing Qian, Guorui Feng:
Reversible Privacy Protection with the Capability of Antiforensics. Secur. Commun. Networks 2021: 5558873:1-5558873:12 (2021) - [j16]Nan Zhong, Zhenxing Qian, Zichi Wang, Xinpeng Zhang, Xiaolong Li:
Batch Steganography via Generative Network. IEEE Trans. Circuits Syst. Video Technol. 31(1): 88-97 (2021) - 2020
- [j15]Zichi Wang, Xinpeng Zhang, Zhenxing Qian:
Practical Cover Selection for Steganography. IEEE Signal Process. Lett. 27: 71-75 (2020) - [j14]Jingzhi Lin, Zhenxing Qian, Zichi Wang, Xinpeng Zhang, Guorui Feng:
A New Steganography Method for Dynamic GIF Images Based on Palette Sort. Wirel. Commun. Mob. Comput. 2020: 8812087:1-8812087:13 (2020) - [c11]Pauline Puteaux, Zichi Wang, Xinpeng Zhang, William Puech:
Hierarchical High Capacity Data Hiding in JPEG Crypto-compressed Images. EUSIPCO 2020: 725-729 - [c10]Zichi Wang, Guorui Feng, Xinpeng Zhang:
Steganographic Distortion Function for Enhanced Images. IWDW 2020: 31-40 - [c9]Zhenxing Qian, Zichi Wang, Xinpeng Zhang:
Data Computing in Covert Domain. SPDE 2020: 535-545 - [i2]Zhenxing Qian, Zichi Wang, Xinpeng Zhang:
Computing in Covert Domain Using Data Hiding. CoRR abs/2002.06794 (2020)
2010 – 2019
- 2019
- [j13]Zichi Wang, Xinpeng Zhang:
Secure Cover Selection for Steganography. IEEE Access 7: 57857-57867 (2019) - [j12]Zichi Wang, Shujun Li, Xinpeng Zhang:
Towards Improved Steganalysis: When Cover Selection is Used in Steganography. IEEE Access 7: 168914-168921 (2019) - [j11]Zichi Wang, Zhaoxia Yin, Xinpeng Zhang:
Asymmetric Distortion Function for JPEG Steganography Using Block Artifact Compensation. Int. J. Digit. Crime Forensics 11(1): 90-99 (2019) - [j10]Zhenxing Qian, Zichi Wang, Xinpeng Zhang, Guorui Feng:
Breaking Steganography: Slight Modification with Distortion Minimization. Int. J. Digit. Crime Forensics 11(1): 114-125 (2019) - [j9]Nan Zhong, Zhenxing Qian, Zichi Wang, Xinpeng Zhang:
Steganography in stylized images. J. Electronic Imaging 28(3): 033005 (2019) - [j8]Sheng Li, Jiajun Su, Zichi Wang, Xin Chen:
Privacy protection based on binary fingerprint compression. J. Real Time Image Process. 16(3): 791-798 (2019) - [j7]Binghua Mao, Zichi Wang, Xinpeng Zhang:
基于DCT域相关性的非对称JPEG隐写 (Asymmetric JPEG Steganography Based on Correlation in DCT Domain). 计算机科学 46(1): 196-200 (2019) - [j6]Jinyuan Tao, Sheng Li, Xinpeng Zhang, Zichi Wang:
Towards Robust Image Steganography. IEEE Trans. Circuits Syst. Video Technol. 29(2): 594-600 (2019) - [c8]Zichi Wang, Zhenxing Qian, Xinpeng Zhang, Sheng Li:
An Improved Steganalysis Method Using Feature Combinations. ICAIS (3) 2019: 115-127 - 2018
- [j5]Zichi Wang, Zhenxing Qian, Xinpeng Zhang, Min Yang, Dengpan Ye:
On Improving Distortion Functions for JPEG Steganography. IEEE Access 6: 74917-74930 (2018) - [j4]Qingde Wei, Zhaoxia Yin, Zichi Wang, Xinpeng Zhang:
Distortion function based on residual blocks for JPEG steganography. Multim. Tools Appl. 77(14): 17875-17888 (2018) - [j3]Zichi Wang, Xinpeng Zhang, Zhaoxia Yin:
Joint Cover-Selection and Payload-Allocation by Steganographic Distortion Optimization. IEEE Signal Process. Lett. 25(10): 1530-1534 (2018) - [c7]Shujun Li, Anthony T. S. Ho, Zichi Wang, Xinpeng Zhang:
Lost in the Digital Wild: Hiding Information in Digital Activities. MPS@CCS 2018: 27-37 - [c6]Zichi Wang, Zhenxing Qian, Xinpeng Zhang:
Single Actor Pooled Steganalysis. ICGEC 2018: 339-347 - [c5]Zhenxing Qian, Cheng Huang, Zichi Wang, Xinpeng Zhang:
Breaking CNN-Based Steganalysis. ICGEC 2018: 483-491 - [c4]Lina Shi, Zichi Wang, Zhenxing Qian, Xinpeng Zhang:
Distortion Function for Steganography in Texture Synthesized Images. IIH-MSP (1) 2018: 313-320 - [c3]Yingqiang Qiu, Hangxing Wang, Zichi Wang, Zhenxing Qian, Gui Feng, Xinpeng Zhang:
Reversible Contrast Mapping based Reversible Data Hiding in Encrypted Images. WIFS 2018: 1-7 - [i1]Shujun Li, Anthony T. S. Ho, Zichi Wang, Xinpeng Zhang:
Lost in the Digital Wild: Hiding Information in Digital Activities. CoRR abs/1809.02888 (2018) - 2016
- [j2]Zichi Wang, Xinpeng Zhang, Zhaoxia Yin:
Hybrid distortion function for JPEG steganography. J. Electronic Imaging 25(5): 050501 (2016) - [j1]Xinpeng Zhang, Jing Long, Zichi Wang, Hang Cheng:
Lossless and Reversible Data Hiding in Encrypted Images With Public-Key Cryptography. IEEE Trans. Circuits Syst. Video Technol. 26(9): 1622-1631 (2016) - [c2]Zichi Wang, Jinpeng Lv, Qingde Wei, Xinpeng Zhang:
Distortion Function for Spatial Image Steganography Based on the Polarity of Embedding Change. IWDW 2016: 487-493 - 2015
- [c1]Xinpeng Zhang, Zichi Wang, Jiang Yu, Zhenxing Qian:
Reversible visible watermark embedded in encrypted domain. ChinaSIP 2015: 826-830
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 20:36 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint