default search action
Xiaolong Li 0001
Person information
- affiliation: Beijing Jiaotong University, Institute of Information Science, Beijing, China
- affiliation (former): Peking University, Institute of Computer Science and Technology, Beijing, China
- affiliation (PhD 2002): École Polytechnique, Paris, France
Other persons with the same name
- Xiaolong Li — disambiguation page
- Xiaolong Li 0002 — Wuhan University of Technology, School of Automation, China
- Xiaolong Li 0003 — University of Electronic Science and Technology of China, School of Information and Communication Engineering, Chengdu, China
- Xiaolong Li 0004 — Hunan University of Commerce, Key Laboratory of Hunan Province for New Retail Virtual Reality Technology, Changsha, China (and 1 more)
- Xiaolong Li 0005 — Alibaba Group, China (and 1 more)
- Xiaolong Li 0006 — University of California, Center for Pervasive Communications and Computing, Irvine, CA, USA
- Xiaolong Li 0007 — Indiana State University, Department of Electronics, Computer and Mechanical Engineering Technology, Terre Haute, IN, USA (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j74]Mengyao Xiao, Xiaolong Li, Wei Lu, Yao Zhao:
Histogram shifting based reversible data hiding with multiple expansion bin pairs. Displays 83: 102674 (2024) - [j73]Kuiyuan Sun, Xiaolong Li, Yao Zhao:
A keypoints-motion-based landmark transfer method for face reenactment. J. Vis. Commun. Image Represent. 100: 104138 (2024) - [j72]Xinquan Yu, Yuanyuan Ma, Yi Zhang, Xiaolong Li, Yao Zhao:
Fast dominant feature selection with compensation for efficient image steganalysis. Signal Process. 220: 109475 (2024) - [j71]Xiang Li, Mengyao Xiao, Xiaolong Li, Shijun Xiang, Yao Zhao:
Matrix Embedding Based Multiple Histograms Modification for Efficient Reversible Data Hiding. IEEE Signal Process. Lett. 31: 2555-2559 (2024) - [j70]Bin Ma, Kun Li, Jian Xu, Chunpeng Wang, Xiaolong Li:
A High-Performance Image Steganography Scheme Based on Dual-Adversarial Networks. IEEE Signal Process. Lett. 31: 2655-2659 (2024) - [j69]Bin Ma, Zhongquan Tao, Ruihe Ma, Chunpeng Wang, Jian Li, Xiaolong Li:
A High-Performance Robust Reversible Data Hiding Algorithm Based on Polar Harmonic Fourier Moments. IEEE Trans. Circuits Syst. Video Technol. 34(4): 2763-2774 (2024) - [j68]Xiaolong Liu, Yang Yu, Xiaolong Li, Yao Zhao:
MCL: Multimodal Contrastive Learning for Deepfake Detection. IEEE Trans. Circuits Syst. Video Technol. 34(4): 2803-2813 (2024) - [j67]Huan Liu, Xiaolong Liu, Zichang Tan, Xiaolong Li, Yao Zhao:
PADVG: A Simple Baseline of Active Protection for Audio-Driven Video Generation. ACM Trans. Multim. Comput. Commun. Appl. 20(6): 168:1-168:19 (2024) - [c59]Shuo Chen, Jiaying Peng, Xiaolong Li, Yao Zhao:
On the Unstable Convergence Regime of Gradient Descent. AAAI 2024: 11373-11380 - [c58]Bin Ma, Hongtao Duan, Ruihe Ma, Chunpeng Wang, Xiaolong Li:
A Pixel Distribution Complexity Classification Enhanced Convolutional Neural Network Predictor for Reversible Data Hiding. ICIC (9) 2024: 375-385 - 2023
- [j66]Cheng Zhang, Bo Ou, Xiaolong Li, Jianqin Xiong:
Human Visual System Guided Reversible Data Hiding Based On Multiple Histograms Modification. Comput. J. 66(4): 888-906 (2023) - [j65]Bin Ma, Songkun Wang, Jian Xu, Chunpeng Wang, Jian Li, Xiaolong Li:
A multi-level sorting prediction enhancement-based two-dimensional reversible data hiding algorithm for JPEG images. Digit. Signal Process. 141: 104145 (2023) - [j64]Wenfa Qi, Tong Zhang, Xiaolong Li, Bin Ma, Zongming Guo:
Reversible data hiding based on prediction-error value ordering and multiple-embedding. Signal Process. 207: 108956 (2023) - [j63]Xiaolong Liu, Yang Yu, Xiaolong Li, Yao Zhao:
Magnifying multimodal forgery clues for Deepfake detection. Signal Process. Image Commun. 118: 117010 (2023) - [j62]Mengyao Xiao, Xiaolong Li, Yao Zhao, Bin Ma, Guodong Guo:
A Novel Reversible Data Hiding Scheme Based on Pixel-Residual Histogram. ACM Trans. Multim. Comput. Commun. Appl. 19(1s): 46:1-46:19 (2023) - [j61]Xiaolong Liu, Yang Yu, Xiaolong Li, Yao Zhao, Guodong Guo:
TCSD: Triple Complementary Streams Detector for Comprehensive Deepfake Detection. ACM Trans. Multim. Comput. Commun. Appl. 19(6): 213:1-213:22 (2023) - [c57]Huan Liu, Qiang Chen, Zichang Tan, Jiang-Jiang Liu, Jian Wang, Xiangbo Su, Xiaolong Li, Kun Yao, Junyu Han, Errui Ding, Yao Zhao, Jingdong Wang:
Group Pose: A Simple Baseline for End-to-End Multi-person Pose Estimation. ICCV 2023: 14983-14992 - [c56]Bin Ma, Songkun Wang, Jian Xu, Chunpeng Wang, Jian Li, Xiaolong Li:
A Multi-level Sorting Prediction Enhancement-Based Two-Dimensional Reversible Data Hiding Algorithm for JPEG Images. SciSec 2023: 481-495 - [i4]Huan Liu, Qiang Chen, Zichang Tan, Jiang-Jiang Liu, Jian Wang, Xiangbo Su, Xiaolong Li, Kun Yao, Junyu Han, Errui Ding, Yao Zhao, Jingdong Wang:
Group Pose: A Simple Baseline for End-to-End Multi-person Pose Estimation. CoRR abs/2308.07313 (2023) - 2022
- [j60]Shi-Mei Ma, Xiaolong Li, Mengyao Xiao, Bin Ma, Yao Zhao:
Fast Expansion-Bins-Determination for Multiple Histograms Modification Based Reversible Data Hiding. IEEE Signal Process. Lett. 29: 662-666 (2022) - [j59]Mengyao Xiao, Xiaolong Li, Yao Zhao:
General Distortion Based Reversible Data Hiding for Binary Covers. IEEE Signal Process. Lett. 29: 2537-2541 (2022) - [j58]Yakun Niu, Xiaolong Li, Yao Zhao, Rongrong Ni:
Detection of Double JPEG Compression With the Same Quantization Matrix via Convergence Analysis. IEEE Trans. Circuits Syst. Video Technol. 32(5): 3279-3290 (2022) - [j57]Wenjie Li, Xiaolong Li, Rongrong Ni, Yao Zhao:
Quantization Step Estimation for JPEG Image Forensics. IEEE Trans. Circuits Syst. Video Technol. 32(7): 4816-4827 (2022) - [j56]Qi Chang, Xiaolong Li, Yao Zhao:
Reversible Data Hiding for Color Images Based on Adaptive Three-Dimensional Histogram Modification. IEEE Trans. Circuits Syst. Video Technol. 32(9): 5725-5735 (2022) - [j55]Haorui Wu, Xiaolong Li, Xiangyang Luo, Xinpeng Zhang, Yao Zhao:
General Expansion-Shifting Model for Reversible Data Hiding: Theoretical Investigation and Practical Algorithm Design. IEEE Trans. Circuits Syst. Video Technol. 32(9): 5989-6001 (2022) - [c55]Jiaxing Zhang, Xiaolong Li, Yao Zhao:
A new robust watermarking algorithm based on intra-frame difference. MMSP 2022: 1-5 - 2021
- [j54]Jie Chang, Feng Ding, Xiaolong Li, Guopu Zhu:
Hybrid prediction-based pixel-value-ordering method for reversible data hiding. J. Vis. Commun. Image Represent. 77: 103097 (2021) - [j53]Wenjie Li, Xiaolong Li, Rongrong Ni, Yao Zhao:
PVO-based reversible data hiding using adaptive multiple histogram generation and modification. Signal Process. Image Commun. 99: 116405 (2021) - [j52]Mengyao Xiao, Xiaolong Li, Yao Zhao:
Reversible Data Hiding for JPEG Images Based on Multiple Two-Dimensional Histograms. IEEE Signal Process. Lett. 28: 1620-1624 (2021) - [j51]Nan Zhong, Zhenxing Qian, Zichi Wang, Xinpeng Zhang, Xiaolong Li:
Batch Steganography via Generative Network. IEEE Trans. Circuits Syst. Video Technol. 31(1): 88-97 (2021) - [j50]Mengyao Xiao, Xiaolong Li, Bin Ma, Xinpeng Zhang, Yao Zhao:
Efficient Reversible Data Hiding for JPEG Images With Multiple Histograms Modification. IEEE Trans. Circuits Syst. Video Technol. 31(7): 2535-2546 (2021) - [j49]Qi Chang, Xiaolong Li, Yao Zhao, Rongrong Ni:
Adaptive Pairwise Prediction-Error Expansion and Multiple Histograms Modification for Reversible Data Hiding. IEEE Trans. Circuits Syst. Video Technol. 31(12): 4850-4863 (2021) - [c54]Rongrong Gao, Xiaolong Li, Yao Zhao:
A Novel Method of Cropped Images Forensics in Social Networks. PRCV (2) 2021: 649-661 - 2020
- [j48]Zhenkun Bao, Yanqing Guo, Xiaolong Li, Yi Zhang, Meng Xu, Xiangyang Luo:
A robust image steganography based on the concatenated error correction encoder and discrete cosine transform coefficients. J. Ambient Intell. Humaniz. Comput. 11(5): 1889-1901 (2020) - [j47]Zhenkun Bao, Yanqing Guo, Xiaolong Li, Yi Zhang, Meng Xu, Xiangyang Luo:
Correction to: A robust image steganography based on the concatenated error correction encoder and discrete cosine transform coefficients. J. Ambient Intell. Humaniz. Comput. 11(5): 1903 (2020) - [j46]Haorui Wu, Xiaolong Li, Yao Zhao, Rongrong Ni:
Improved PPVO-based high-fidelity reversible data hiding. Signal Process. 167 (2020) - [j45]Wenfa Qi, Xiaolong Li, Tong Zhang, Zongming Guo:
Optimal Reversible Data Hiding Scheme Based on Multiple Histograms Modification. IEEE Trans. Circuits Syst. Video Technol. 30(8): 2300-2312 (2020) - [j44]Xiang Wang, Xiaolong Li, Qingqi Pei:
Independent Embedding Domain Based Two-Stage Robust Reversible Watermarking. IEEE Trans. Circuits Syst. Video Technol. 30(8): 2406-2417 (2020) - [j43]Tong Zhang, Xiaolong Li, Wenfa Qi, Zongming Guo:
Location-Based PVO and Adaptive Pairwise Modification for Efficient Reversible Data Hiding. IEEE Trans. Inf. Forensics Secur. 15: 2306-2319 (2020) - [c53]Yakun Niu, Xiaolong Li, Yao Zhao, Rongrong Ni:
Primary Quality Factor Estimation Of Resized Double Compressed JPEG Images. ICIP 2020: 583-587 - [c52]Tong Zhang, Xiaolong Li, Wenfa Qi, Zongming Guo:
Prediction-Error Value Ordering for High-Fidelity Reversible Data Hiding. MMM (1) 2020: 317-328
2010 – 2019
- 2019
- [j42]Guorong Xuan, Xiaolong Li, Yun-Qing Shi:
Minimum entropy and histogram-pair based JPEG image reversible data hiding. J. Inf. Secur. Appl. 45: 1-9 (2019) - [j41]Tong Zhang, Xiaolong Li, Wenfa Qi, Wei Li, Zongming Guo:
Real-time reversible data hiding based on multiple histogram modification. J. Real Time Image Process. 16(3): 661-671 (2019) - [j40]Haorui Wu, Xiaolong Li, Yao Zhao, Rongrong Ni:
Improved reversible data hiding based on PVO and adaptive pairwise embedding. J. Real Time Image Process. 16(3): 685-695 (2019) - [j39]Xiaolong Li, Wei Li:
A case study of a two-stage image segmentation algorithm. Multim. Tools Appl. 78(7): 8197-8206 (2019) - [j38]Wenjie Li, Rongrong Ni, Xiaolong Li, Yao Zhao:
Robust median filtering detection based on the difference of frequency residuals. Multim. Tools Appl. 78(7): 8363-8381 (2019) - [j37]Mengyao Xiao, Xiaolong Li, Yangyang Wang, Yao Zhao, Rongrong Ni:
Reversible data hiding based on pairwise embedding and optimal expansion path. Signal Process. 158: 210-218 (2019) - [j36]Yakun Niu, Xiaolong Li, Yao Zhao, Rongrong Ni:
An enhanced approach for detecting double JPEG compression with the same quantization matrix. Signal Process. Image Commun. 76: 89-96 (2019) - [j35]Yuanyuan Ma, Xiangyang Luo, Xiaolong Li, Zhenkun Bao, Yi Zhang:
Selection of Rich Model Steganalysis Features Based on Decision Rough Set α-Positive Region Reduction. IEEE Trans. Circuits Syst. Video Technol. 29(2): 336-350 (2019) - [j34]Bo Ou, Xiaolong Li, Weiming Zhang, Yao Zhao:
Improving Pairwise PEE via Hybrid-Dimensional Histogram Generation and Adaptive Mapping Selection. IEEE Trans. Circuits Syst. Video Technol. 29(7): 2176-2190 (2019) - [j33]Zhipeng Chen, Benedetta Tondi, Xiaolong Li, Rongrong Ni, Yao Zhao, Mauro Barni:
Secure Detection of Image Manipulation by Means of Random Feature Selection. IEEE Trans. Inf. Forensics Secur. 14(9): 2454-2469 (2019) - [c51]Liwen Qin, Xiaolong Li, Yao Zhao:
A New JPEG Image Watermarking Method Exploiting Spatial JND Model. IWDW 2019: 161-170 - 2018
- [j32]Guorong Xuan, Xiaolong Li, Yun-Qing Shi:
Histogram-pair based reversible data hiding via searching for optimal four thresholds. J. Inf. Secur. Appl. 39: 58-67 (2018) - [j31]Hongshen Tang, Rongrong Ni, Yao Zhao, Xiaolong Li:
Median filtering detection of small-size image based on CNN. J. Vis. Commun. Image Represent. 51: 162-168 (2018) - [j30]Guangyuan Yang, Xiaolong Li, Jinwei Wang, Zongming Guo:
Efficient large payloads ternary matrix embedding. Multim. Tools Appl. 77(2): 1605-1622 (2018) - [j29]Ran Hu, Xiaolong Li, Zongming Guo:
Decorrelated local binary patterns for efficient texture classification. Multim. Tools Appl. 77(6): 6863-6882 (2018) - [c50]Qi Chang, Gene Cheung, Yao Zhao, Xiaolong Li, Rongrong Ni:
Non-Local Graph-Based Prediction for Reversible Data Hiding in Images. ICIP 2018: 1693-1697 - [i3]Zhipeng Chen, Benedetta Tondi, Xiaolong Li, Rongrong Ni, Yao Zhao, Mauro Barni:
Secure Detection of Image Manipulation by means of Random Feature Selection. CoRR abs/1802.00573 (2018) - [i2]Qi Chang, Gene Cheung, Yao Zhao, Xiaolong Li, Rongrong Ni:
Non-Local Graph-Based Prediction For Reversible Data Hiding In Images. CoRR abs/1802.06935 (2018) - 2017
- [j28]Bowen Xue, Xiaolong Li, Jinwei Wang, Zongming Guo:
Improved reversible data hiding based on two-dimensional difference-histogram modification. Multim. Tools Appl. 76(11): 13473-13491 (2017) - [c49]Yanhong Wu, Xiaolong Li, Yao Zhao, Rongrong Ni:
A new detector for JPEG decompressed bitmap identification. APSIPA 2017: 842-845 - [c48]Hongshen Tang, Rongrong Ni, Yao Zhao, Xiaolong Li:
Detection of various image operations based on CNN. APSIPA 2017: 1479-1485 - [c47]Guangyuan Yang, Wenfa Qi, Xiaolong Li, Zongming Guo:
Improved Reversible Visible Watermarking Based on Adaptive Block Partition. IWDW 2017: 303-317 - [c46]Zhipeng Chen, Benedetta Tondi, Xiaolong Li, Rongrong Ni, Yao Zhao, Mauro Barni:
A gradient-based pixel-domain attack against SVM detection of global image manipulations. WIFS 2017: 1-6 - 2016
- [j27]Yun-Qing Shi, Xiaolong Li, Xinpeng Zhang, Hao-Tian Wu, Bin Ma:
Reversible Data Hiding: Advances in the Past Two Decades. IEEE Access 4: 3210-3237 (2016) - [j26]Xiangyang Luo, Xiaofeng Song, Xiaolong Li, Weiming Zhang, Jicang Lu, Chunfang Yang, Fenlin Liu:
Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes. Multim. Tools Appl. 75(21): 13557-13583 (2016) - [c45]Xiaolong Li, Zongming Guo:
General expansion-shifting model for reversible data hiding. APSIPA 2016: 1-4 - [c44]Siren Cai, Xiaolong Li, Jiaying Liu, Zongming Guo:
A new reversible data hiding scheme exploiting high-dimensional prediction-error histogram. ICIP 2016: 2732-2736 - [c43]Siren Cai, Xiaolong Li, Bowen Xue, Zongming Guo:
A new reversible data hiding scheme based on high-dimensional pixel-intensity-histogram modification. ICME Workshops 2016: 1-6 - 2015
- [j25]Xiaolong Li, Siren Cai, Weiming Zhang, Bin Yang:
A further study of large payloads matrix embedding. Inf. Sci. 324: 257-269 (2015) - [j24]Bo Ou, Xiaolong Li, Yao Zhao, Rongrong Ni:
Efficient color image reversible data hiding based on channel-dependent payload partition and adaptive embedding. Signal Process. 108: 642-657 (2015) - [j23]Xiaolong Li, Siren Cai, Weiming Zhang, Bin Yang:
Matrix embedding in finite abelian group. Signal Process. 113: 250-258 (2015) - [j22]Jian Li, Xiaolong Li, Bin Yang, Xingming Sun:
Segmentation-Based Image Copy-Move Forgery Detection Scheme. IEEE Trans. Inf. Forensics Secur. 10(3): 507-518 (2015) - [j21]Bin Li, Tian-Tsong Ng, Xiaolong Li, Shunquan Tan, Jiwu Huang:
Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis. IEEE Trans. Inf. Forensics Secur. 10(3): 558-573 (2015) - [j20]Xiaocheng Hu, Weiming Zhang, Xiaolong Li, Nenghai Yu:
Minimum Rate Prediction and Optimized Histograms Modification for Reversible Data Hiding. IEEE Trans. Inf. Forensics Secur. 10(3): 653-664 (2015) - [j19]Bin Li, Ming Wang, Xiaolong Li, Shunquan Tan, Jiwu Huang:
A Strategy of Clustering Modification Directions in Spatial Image Steganography. IEEE Trans. Inf. Forensics Secur. 10(9): 1905-1917 (2015) - [j18]Xiaolong Li, Weiming Zhang, Xinlu Gui, Bin Yang:
Efficient Reversible Data Hiding Based on Multiple Histograms Modification. IEEE Trans. Inf. Forensics Secur. 10(9): 2016-2027 (2015) - [j17]Weiming Zhang, Xiaocheng Hu, Xiaolong Li, Nenghai Yu:
Optimal Transition Probability of Reversible Data Hiding for General Distortion Metrics and Its Applications. IEEE Trans. Image Process. 24(1): 294-304 (2015) - [j16]Bin Li, Tian-Tsong Ng, Xiaolong Li, Shunquan Tan, Jiwu Huang:
Statistical Model of JPEG Noises and Its Application in Quantization Step Estimation. IEEE Trans. Image Process. 24(5): 1471-1484 (2015) - [c42]Guangyuan Yang, Xiaolong Li, Bin Li, Zongming Guo:
A new detector of LSB matching steganography based on likelihood ratio test for multivariate Gaussian covers. APSIPA 2015: 757-760 - [c41]Bo Ou, Xiaolong Li, Weiming Zhang:
PVO-based reversible data hiding for encrypted images. ChinaSIP 2015: 831-835 - [c40]Bowen Xue, Xiaolong Li, Bin Li, Zongming Guo:
Steganalysis of LSB replacement for multivariate Gaussian covers. ChinaSIP 2015: 836-840 - [c39]Fei Peng, Xiaolong Li, Bin Yang:
An adaptive PEE-based reversible data hiding scheme exploiting referential prediction-errors. ICME 2015: 1-6 - [c38]Bowen Xue, Xiaolong Li, Zongming Guo:
A New SDCS-based Content-adaptive Steganography Using Iterative Noise-Level Estimation. IIH-MSP 2015: 68-71 - 2014
- [j15]Fei Peng, Xiaolong Li, Bin Yang:
Improved PVO-based reversible data hiding. Digit. Signal Process. 25: 255-265 (2014) - [j14]Xinlu Gui, Xiaolong Li, Bin Yang:
A high capacity reversible data hiding scheme based on generalized prediction-error expansion and adaptive embedding. Signal Process. 98: 370-380 (2014) - [j13]Bo Ou, Xiaolong Li, Yao Zhao, Rongrong Ni:
Reversible data hiding using invariant pixel-value-ordering and prediction-error expansion. Signal Process. Image Commun. 29(7): 760-772 (2014) - [c37]Xinlu Gui, Xiaolong Li, Wenfa Qi, Bin Yang:
Blind median filtering detection based on histogram features. APSIPA 2014: 1-4 - [c36]Xiaolong Li, Weiming Zhang, Bo Ou, Bin Yang:
A brief review on reversible data hiding: Current techniques and future prospects. ChinaSIP 2014: 426-430 - [c35]Ran Hu, Xiaolong Li, Bin Yang:
A new lossy compression scheme for encrypted gray-scale images. ICASSP 2014: 7387-7390 - [c34]Xinlu Gui, Xiaolong Li, Bin Yang:
Efficient reversible data hiding based on two-dimensional pixel-intensity-histogram modification. ICASSP 2014: 7420-7424 - [c33]Bin Li, Ming Wang, Jiwu Huang, Xiaolong Li:
A new cost function for spatial image steganography. ICIP 2014: 4206-4210 - [c32]Xinlu Gui, Siren Cai, Xiaolong Li, Bin Yang:
A Novel Reversible Data Hiding Scheme Based on Reference Pixels and Adaptive Block Selection. IIH-MSP 2014: 276-280 - [c31]Xinlu Gui, Xiaolong Li, Bin Yang:
Steganalysis of LSB Matching Based on Local Binary Patterns. IIH-MSP 2014: 475-480 - [c30]Xinlu Gui, Xiaolong Li, Bin Yang:
High-Dimensional Histogram Utilization for Reversible Data Hiding. IWDW 2014: 243-253 - [i1]Bin Li, Tian-Tsong Ng, Xiaolong Li, Shunquan Tan, Jiwu Huang:
JPEG Noises beyond the First Compression Cycle. CoRR abs/1405.7571 (2014) - 2013
- [j12]Bo Ou, Xiaolong Li, Yao Zhao, Rongrong Ni:
Reversible data hiding based on PDE predictor. J. Syst. Softw. 86(10): 2700-2709 (2013) - [j11]Xiaolong Li, Jian Li, Bin Li, Bin Yang:
High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Process. 93(1): 198-205 (2013) - [j10]Xiaolong Li, Bin Li, Xiangyang Luo, Bin Yang, Ruihui Zhu:
Steganalysis of a PVD-based content adaptive image steganography. Signal Process. 93(9): 2529-2538 (2013) - [j9]Jian Li, Xiaolong Li, Bin Yang:
Reversible data hiding scheme for color image based on prediction-error expansion and cross-channel correlation. Signal Process. 93(9): 2748-2758 (2013) - [j8]Xiaolong Li, Weiming Zhang, Xinlu Gui, Bin Yang:
A Novel Reversible Data Hiding Scheme Based on Two-Dimensional Difference-Histogram Modification. IEEE Trans. Inf. Forensics Secur. 8(7): 1091-1100 (2013) - [j7]Xiaolong Li, Bin Li, Bin Yang, Tieyong Zeng:
General Framework to Histogram-Shifting-Based Reversible Data Hiding. IEEE Trans. Image Process. 22(6): 2181-2191 (2013) - [j6]Weiming Zhang, Xiaocheng Hu, Xiaolong Li, Nenghai Yu:
Recursive Histogram Modification: Establishing Equivalency Between Reversible Data Hiding and Lossless Data Compression. IEEE Trans. Image Process. 22(7): 2775-2785 (2013) - [j5]Bo Ou, Xiaolong Li, Yao Zhao, Rongrong Ni, Yun-Qing Shi:
Pairwise Prediction-Error Expansion for Efficient Reversible Data Hiding. IEEE Trans. Image Process. 22(12): 5010-5021 (2013) - 2012
- [j4]Fei Peng, Xiaolong Li, Bin Yang:
Adaptive reversible data hiding scheme based on integer transform. Signal Process. 92(1): 54-62 (2012) - [c29]Xinlu Gui, Xiaolong Li, Bin Yang:
A content-adaptive ±1-based steganography by minimizing the distortion of first order statistics. ICASSP 2012: 1781-1784 - [c28]Xinlu Gui, Xiaolong Li, Bin Yang:
Improved payload location for LSB matching steganography. ICIP 2012: 1125-1128 - [c27]Jian Li, Xiaolong Li, Bin Yang:
A new PEE-based reversible watermarking algorithm for color image. ICIP 2012: 2181-2184 - [c26]Xinlu Gui, Xiaolong Li, Bin Yang:
A novel integer transform for efficient reversible watermarking. ICPR 2012: 947-950 - [c25]Yuanzhi Qi, Xiaolong Li, Bin Wang, Bin Yang:
A Study of Optimal Matrix for Efficient Matrix Embedding in. IWDW 2012: 8-18 - [c24]Fei Peng, Xiaolong Li, Bin Yang:
Calibration Based Reliable Detector for Detecting LSB Matching Steganography. IWDW 2012: 44-53 - [c23]Jie Yu, Guopu Zhu, Xiaolong Li, Jianquan Yang:
An Improved Algorithm for Reversible Data Hiding in Encrypted Image. IWDW 2012: 384-394 - 2011
- [j3]Xiaolong Li, Bin Yang, Tieyong Zeng:
Efficient Reversible Watermarking Based on Adaptive Prediction-Error Expansion and Pixel Selection. IEEE Trans. Image Process. 20(12): 3524-3533 (2011) - [c22]Ruoyu Wu, Xiaolong Li, Bin Yang:
Identifying computer generated graphics VIA histogram features. ICIP 2011: 1933-1936 - [c21]Yi Luo, Xiaolong Li, Bin Yang:
Locating steganographic payload for LSB matching embedding. ICME 2011: 1-6 - [c20]Yi Luo, Fei Peng, Xiaolong Li, Bin Yang:
Reversible image water marking based on prediction-error expansion and compensation. ICME 2011: 1-6 - 2010
- [j2]Xiang Wang, Xiaolong Li, Bin Yang, Zongming Guo:
Efficient Generalized Integer Transform for Reversible Watermarking. IEEE Signal Process. Lett. 17(6): 567-570 (2010) - [c19]Chao Wang, Xiaolong Li, Bin Yang, Xiaoqing Lu, Chengcheng Liu:
A content-adaptive approach for reducing embedding impact in steganography. ICASSP 2010: 1762-1765 - [c18]Xudong Chen, Xiaolong Li, Bin Yang, Yingmin Tang:
Reversible image watermarking based on a generalized integer transform. ICASSP 2010: 2382-2385 - [c17]Chao Wang, Xiaolong Li, Bin Yang:
High capacity reversible image watermarking based on integer transform. ICIP 2010: 217-220 - [c16]Kaiwei Cai, Xiaolong Li, Tieyong Zeng, Bin Yang, Xiaoqing Lu:
Reliable histogram features for detecting LSB matching. ICIP 2010: 1761-1764 - [c15]Chao Wang, Xiaolong Li, Bin Yang:
Efficient reversible image watermarking by using dynamical prediction-error expansion. ICIP 2010: 3673-3676
2000 – 2009
- 2009
- [j1]Xiaolong Li, Bin Yang, Daofang Cheng, Tieyong Zeng:
A Generalization of LSB Matching. IEEE Signal Process. Lett. 16(2): 69-72 (2009) - [c14]Yunkai Gao, Xiaolong Li, Bin Yang, Yifeng Lu:
Detecting LSB matching by characterizing the amplitude of histogram. ICASSP 2009: 1505-1508 - [c13]Yunkai Gao, Xiaolong Li, Tieyong Zeng, Bin Yang:
Improving embedding efficiency via matrix embedding: A case study. ICIP 2009: 109-112 - [c12]Yunkai Gao, Xiaolong Li, Bin Yang:
Constructing specific matrix for efficient matrix embedding. ICME 2009: 1006-1009 - [c11]Chengcheng Liu, Xiaolong Li, Xiaoqing Lu, Bin Yang:
Improving embedding efficiency by incorporating SDCS and WPC. ICME 2009: 1018-1021 - [c10]Yunkai Gao, Xiaolong Li, Bin Yang:
Employing Optimal Matrix for Efficient Matrix Embedding. IIH-MSP 2009: 161-165 - [c9]Yifeng Lu, Xiaolong Li, Bin Yang:
A ±1-Based Steganography by Minimizing the Distortion of First Order Statistics. IIH-MSP 2009: 754-758 - [c8]Wenfa Qi, Xiaolong Li, Bin Yang:
Bilinear Coons Patch and its Application in Security Pattern Design. IIH-MSP 2009: 881-884 - [c7]Yifeng Lu, Xiaolong Li, Bin Yang:
A Secure Steganography: Noisy Region Embedding. IIH-MSP 2009: 1046-1051 - [c6]Xiang Wang, Xiaolong Li, Bin Yang, Zongming Guo:
A Reversible Watermarking Scheme for High-Fidelity Applications. PCM 2009: 613-624 - [c5]Gaoyang Wang, Xiaolong Li, Bin Yang:
A High Capacity Reversible Watermarking Scheme Based on an Integer Transform. PCM 2009: 1287-1292 - 2008
- [c4]Xiaolong Li, Tieyong Zeng, Bin Yang:
A further study on steganalysis of LSB matching by calibration. ICIP 2008: 2072-2075 - [c3]Xiaolong Li, Tieyong Zeng, Bin Yang:
Improvement of the embedding efficiency of LSB matching by sum and difference covering set. ICME 2008: 209-212 - [c2]Daofang Cheng, Xiaolong Li, Wenfa Qi, Bin Yang:
A Statistics-Based Watermarking Scheme Robust to Print-and-Scan. ISECS 2008: 894-898 - [c1]Xiaolong Li, Tieyong Zeng, Bin Yang:
Detecting LSB matching by applying calibration technique for difference image. MM&Sec 2008: 133-138
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-27 21:22 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint