default search action
Zhao-Xia Yin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j40]Zihan Yuan, Xinpeng Zhang, Zichi Wang, Zhaoxia Yin:
Semi-fragile neural network watermarking for content authentication and tampering localization. Expert Syst. Appl. 236: 121315 (2024) - [j39]Li Chen, Shaowei Zhu, Abel Andrew, Zhaoxia Yin:
Reversible attack based on local visible adversarial perturbation. Multim. Tools Appl. 83(4): 11215-11227 (2024) - [j38]Zhenzhe Gao, Zhaoxia Yin, Hongjian Zhan, Heng Yin, Yue Lu:
Adaptive watermarking with self-mutual check parameters in deep neural networks. Pattern Recognit. Lett. 180: 9-15 (2024) - [j37]Xiaoyi Zhou, Kaiyue Hou, Yu-Jian Zhuang, Zhaoxia Yin, Wenbao Han:
General Pairwise Modification Framework for Reversible Data Hiding in JPEG Images. IEEE Trans. Circuits Syst. Video Technol. 34(1): 153-167 (2024) - [j36]Zihan Yuan, Xinpeng Zhang, Zichi Wang, Zhaoxia Yin:
Semi-Fragile Neural Network Watermarking Based on Adversarial Examples. IEEE Trans. Emerg. Top. Comput. Intell. 8(4): 2775-2790 (2024) - [j35]Lichun Tang, Zhaoxia Yin, Hang Su, Wanli Lyu, Bin Luo:
WFSS: weighted fusion of spectral transformer and spatial self-attention for robust hyperspectral image classification against adversarial attacks. Vis. Intell. 2(1) (2024) - [c37]Haoyu Shen, Shuyuan Liu, Zhaoxia Yin:
Pixel Complexity Sorting Embedding for Reversible Data Hiding Based on Elastic net Predictor. CPSS@AsiaCCS 2024: 36-42 - [c36]Zhenzhe Gao, Zhenjun Tang, Zhaoxia Yin, Baoyuan Wu, Yue Lu:
Fragile Model Watermark for integrity protection: leveraging boundary volatility and sensitive sample-pairing. ICME 2024: 1-6 - [c35]Shuyuan Liu, Jiawei Chen, Shouwei Ruan, Hang Su, Zhaoxia Yin:
Exploring the Robustness of Decision-Level Through Adversarial Attacks on LLM-Based Embodied Models. ACM Multimedia 2024: 8120-8128 - [i35]Zhenzhe Gao, Zhenjun Tang, Zhaoxia Yin, Baoyuan Wu, Yue Lu:
Fragile Model Watermark for integrity protection: leveraging boundary volatility and sensitive sample-pairing. CoRR abs/2404.07572 (2024) - [i34]Jiawei Chen, Xiao Yang, Yinpeng Dong, Hang Su, Jianteng Peng, Zhaoxia Yin:
FaceCat: Enhancing Face Recognition Security with a Unified Generative Model Framework. CoRR abs/2404.09193 (2024) - [i33]Jiawei Chen, Xiao Yang, Zhengwei Fang, Yu Tian, Yinpeng Dong, Zhaoxia Yin, Hang Su:
AutoBreach: Universal and Adaptive Jailbreaking with Efficient Wordplay-Guided Optimization. CoRR abs/2405.19668 (2024) - [i32]Shuyuan Liu, Jiawei Chen, Shouwei Ruan, Hang Su, Zhaoxia Yin:
Exploring the Robustness of Decision-Level Through Adversarial Attacks on LLM-Based Embodied Models. CoRR abs/2405.19802 (2024) - [i31]Cong Kong, Rui Xu, Weixi Chen, Jiawei Chen, Zhaoxia Yin:
Protecting Copyright of Medical Pre-trained Language Models: Training-Free Backdoor Watermarking. CoRR abs/2409.10570 (2024) - 2023
- [j34]Jiawei Chen, Xiao Yang, Heng Yin, Mingzhi Ma, Bihui Chen, Jianteng Peng, Yandong Guo, Zhaoxia Yin, Hang Su:
AdvFAS: A robust face anti-spoofing framework against adversarial examples. Comput. Vis. Image Underst. 235: 103779 (2023) - [j33]Xiaolong Duan, Bin Li, Zhaoxia Yin, Xinpeng Zhang, Bin Luo:
Robust image steganography against lossy JPEG compression based on embedding domain selection and adaptive error correction. Expert Syst. Appl. 229(Part A): 120416 (2023) - [j32]Wan-Li Lyu, Yajie Yue, Zhaoxia Yin:
Reversible data hiding based on automatic contrast enhancement using histogram expansion. J. Vis. Commun. Image Represent. 92: 103798 (2023) - [j31]Zhaoxia Yin, Li Chen, Wanli Lyu, Bin Luo:
Reversible attack based on adversarial perturbation and reversible data hiding in YUV colorspace. Pattern Recognit. Lett. 166: 1-7 (2023) - [c34]Yujie Yin, Heng Yin, Zhaoxia Yin, Wanli Lyu, Sha Wei:
High-Quality Triggers Based Fragile Watermarking for Optical Character Recognition Model. APSIPA ASC 2023: 468-475 - [c33]Wanli Lyu, Lulu Cheng, Zhaoxia Yin, Bin Luo:
Efficient Reversible Data Hiding for 3D Mesh Models Based on Multi-LSB Substitution and Ring-prediction. APSIPA ASC 2023: 1907-1914 - [c32]Wanli Lyu, Mengjiang Wu, Zhaoxia Yin, Bin Luo:
MAEDefense: An Effective Masked AutoEncoder Defense against Adversarial Attacks. APSIPA ASC 2023: 1915-1922 - [c31]Jialin Duan, Zhaoxia Yin, Chenyi Yang, Kunhao Liang:
Reversible Data Hiding Based on Elastic Net Predictor. ICCT 2023: 1247-1252 - [c30]Mingzhi Ma, Weijie Zheng, Wanli Lv, Lu Ren, Hang Su, Zhaoxia Yin:
Multi-Label Adversarial Attack Based on Label Correlation. ICIP 2023: 2050-2054 - [c29]Jiefei Zhang, Jie Wang, Wanli Lyu, Zhaoxia Yin:
Local Texture Complexity Guided Adversarial Attack. ICIP 2023: 2065-2069 - [c28]Tong Zhu, Zhaoxia Yin, Wanli Lyu, Jiefei Zhang, Bin Luo:
Imperceptible Adversarial Attack on S Channel of HSV Colorspace. IJCNN 2023: 1-7 - [i30]Xiaolong Duan, Bin Li, Zhaoxia Yin, Xinpeng Zhang, Bin Luo:
Robust image steganography against lossy JPEG compression based on embedding domain selection and adaptive error correction. CoRR abs/2304.13297 (2023) - [i29]Zhaoxia Yin, Shaowei Zhu, Hang Su, Jianteng Peng, Wanli Lyu, Bin Luo:
Adversarial Examples Detection with Enhanced Image Difference Features based on Local Histogram Equalization. CoRR abs/2305.04436 (2023) - [i28]Zhaoxia Yin, Heng Yin, Hang Su, Xinpeng Zhang, Zhenzhe Gao:
Decision-based iterative fragile watermarking for model integrity verification. CoRR abs/2305.09684 (2023) - [i27]Jiawei Chen, Xiao Yang, Heng Yin, Mingzhi Ma, Bihui Chen, Jianteng Peng, Yandong Guo, Zhaoxia Yin, Hang Su:
AdvFAS: A robust face anti-spoofing framework against adversarial examples. CoRR abs/2308.02116 (2023) - [i26]Zhenzhe Gao, Zhaoxia Yin, Hongjian Zhan, Heng Yin, Yue Lu:
Adaptive White-Box Watermarking with Self-Mutual Check Parameters in Deep Neural Networks. CoRR abs/2308.11235 (2023) - 2022
- [j30]Na Xu, Jin Tang, Bin Luo, Zhaoxia Yin:
Separable Reversible Data Hiding Based on Integer Mapping and MSB Prediction for Encrypted 3D Mesh Models. Cogn. Comput. 14(3): 1172-1181 (2022) - [j29]Jie Wang, Zhaoxia Yin, Jing Jiang, Jin Tang, Bin Luo:
PISA: Pixel skipping-based attentional black-box adversarial attack. Comput. Secur. 123: 102947 (2022) - [j28]Jie Wang, Zhaoxia Yin, Jing Jiang, Yang Du:
Attention-guided black-box adversarial attacks with large-scale multiobjective evolutionary optimization. Int. J. Intell. Syst. 37(10): 7526-7547 (2022) - [j27]Yang Du, Zhaoxia Yin:
New framework for code-mapping-based reversible data hiding in JPEG images. Inf. Sci. 609: 319-338 (2022) - [j26]Wan-Li Lyu, Lulu Cheng, Zhaoxia Yin:
High-capacity reversible data hiding in encrypted 3D mesh models based on multi-MSB prediction. Signal Process. 201: 108686 (2022) - [j25]Zhaoxia Yin, Yinyin Peng, Youzhi Xiang:
Reversible Data Hiding in Encrypted Images Based on Pixel Prediction and Bit-Plane Compression. IEEE Trans. Dependable Secur. Comput. 19(2): 992-1002 (2022) - [j24]Yang Du, Zhaoxia Yin, Xinpeng Zhang:
High Capacity Lossless Data Hiding in JPEG Bitstream Based on General VLC Mapping. IEEE Trans. Dependable Secur. Comput. 19(2): 1420-1433 (2022) - [c27]Zhaoxia Yin, Heng Yin, Xinpeng Zhang:
Neural Network Fragile watermarking With No Model Performance Degradation. ICIP 2022: 3958-3962 - [c26]Shaowei Zhu, Wanli Lyu, Bin Li, Zhaoxia Yin, Bin Luo:
Adversarial Example Defense via Perturbation Grading Strategy. IFTC 2022: 407-420 - [c25]Wen Yin, Zhaoxia Yin, Xinpeng Zhang, Bin Luo:
On the Robustness of "Robust Reversible Data Hiding Scheme Based on Two-Layer Embedding Strategy". IFTC 2022: 512-524 - [c24]Yun Tang, Lulu Cheng, Wanli Lyu, Zhaoxia Yin:
High Capacity Reversible Data Hiding for Encrypted 3D Mesh Models Based on Topology. IWDW 2022: 205-218 - [c23]Qingyu Wang, Guorui Feng, Zhaoxia Yin, Bin Luo:
Universal adversarial perturbation for remote sensing images. MMSP 2022: 1-6 - [i25]Zhaoxia Yin, Qingyu Wang, Jin Tang, Bin Luo:
Universal adversarial perturbation for remote sensing images. CoRR abs/2202.10693 (2022) - [i24]Zhaoxia Yin, Heng Yin, Xinpeng Zhang:
Neural network fragile watermarking with no model performance degradation. CoRR abs/2208.07585 (2022) - [i23]Yun Tang, Lulu Cheng, Wanli Lyv, Zhaoxia Yin:
High Capacity Reversible Data Hiding for Encrypted 3D Mesh Models Based on Topology. CoRR abs/2211.02801 (2022) - [i22]Shaowei Zhu, Wanli Lyu, Bin Li, Zhaoxia Yin, Bin Luo:
Adversarial Example Defense via Perturbation Grading Strategy. CoRR abs/2212.08341 (2022) - 2021
- [j23]Longfei Ke, Zhaoxia Yin:
On the security and robustness of "Keyless dynamic optimal multi-bit image steganography using energetic pixels". Multim. Tools Appl. 80(3): 3997-4005 (2021) - [j22]Zhaoxia Yin, Xiaomeng She, Jin Tang, Bin Luo:
Reversible data hiding in encrypted images based on pixel prediction and multi-MSB planes rearrangement. Signal Process. 187: 108146 (2021) - [j21]Zhaoxia Yin, Longfei Ke:
Robust Adaptive Steganography Based on Dither Modulation and Modification With Re-Compression. IEEE Trans. Signal Inf. Process. over Networks 7: 336-345 (2021) - [c22]Wanli Lv, Hongnian Guo, Yang Du, Jinmin Hu, Zhaoxia Yin:
Multi-domain Reversible Data Hiding in JPEG Images. ACM TUR-C 2021: 241-247 - [c21]Mengte Shi, Sheng Li, Zhaoxia Yin, Xinpeng Zhang, Zhenxing Qian:
On Generating JPEG Adversarial Images. ICME 2021: 1-6 - [c20]Renjie Zhu, Ping Wei, Sheng Li, Zhaoxia Yin, Xinpeng Zhang, Zhenxing Qian:
Fragile Neural Network Watermarking with Trigger Image Set. KSEM 2021: 280-293 - [c19]Zhaoxia Yin, Na Xu, Feng Wang, Lulu Cheng, Bin Luo:
Separable Reversible Data Hiding Based on Integer Mapping and Multi-MSB Prediction for Encrypted 3D Mesh Models. PRCV (2) 2021: 336-348 - [i21]Jie Wang, Zhaoxia Yin, Jing Jiang, Yang Du:
Attention-Guided Black-box Adversarial Attacks with Large-Scale Multiobjective Evolutionary Optimization. CoRR abs/2101.07512 (2021) - [i20]Jie Wang, Zhaoxia Yin, Jin Tang, Jing Jiang, Bin Luo:
PICA: A Pixel Correlation-based Attentional Black-box Adversarial Attack. CoRR abs/2101.07538 (2021) - [i19]Youqing Wu, Wenjing Ma, Zhaoxia Yin:
High-Capacity Reversible Data Hiding in Encrypted Images using Adaptive Encoding. CoRR abs/2102.12620 (2021) - [i18]Wen Yin, Longfei Ke, Zhaoxia Yin, Jin Tang, Bin Luo:
Comments on "Robust reversible data hiding scheme based on two-layer embedding strategy". CoRR abs/2109.11735 (2021) - [i17]Wanli Lv, Lulu Cheng, Zhaoxia Yin:
High Capacity Reversible Data Hiding in Encrypted 3D mesh models Based on multi-MSB Prediction. CoRR abs/2110.01010 (2021) - [i16]Zhaoxia Yin, Li Chen, Shaowei Zhu:
Reversible adversarial examples against local visual perturbation. CoRR abs/2110.02700 (2021) - 2020
- [j20]Zhaoxia Yin, Hua Wang, Jie Wang, Jin Tang, Wenzhong Wang:
Defense against adversarial attacks by low-level image transformations. Int. J. Intell. Syst. 35(10): 1453-1466 (2020) - [j19]Jun-Chou Chuang, Yu-Chen Hu, Chia-Mei Chen, Zhaoxia Yin:
Adaptive grayscale image coding scheme based on dynamic multi-grouping absolute moment block truncation coding. Multim. Tools Appl. 79(37-38): 28189-28205 (2020) - [j18]Zhaoxia Yin, Yuan Ji, Bin Luo:
Reversible Data Hiding in JPEG Images With Multi-Objective Optimization. IEEE Trans. Circuits Syst. Video Technol. 30(8): 2343-2352 (2020) - [j17]Zhaoxia Yin, Youzhi Xiang, Xinpeng Zhang:
Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding. IEEE Trans. Multim. 22(4): 874-884 (2020) - [j16]Youqing Wu, Youzhi Xiang, Yutang Guo, Jin Tang, Zhaoxia Yin:
An Improved Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling. IEEE Trans. Multim. 22(8): 1929-1938 (2020) - [c18]Zhaoxia Yin, Hua Wang, Jie Wang:
War: An Efficient Pre-processing Method for Defending Adversarial Attacks. ML4CS (2) 2020: 514-524 - [i15]Zhaoxia Yin, Yang Du, Yuan Ji:
A Universal Framework to Construct a Huffman-Code-Mapping-based Reversible Data Hiding Scheme for JPEG Images. CoRR abs/2006.15984 (2020) - [i14]Zhaoxia Yin, Xiaomeng She, Jin Tang, Bin Luo:
Reversible data hiding in encrypted images based on pixel prediction and multi-MSB planes rearrangement. CoRR abs/2007.03922 (2020) - [i13]Youqing Wu, Wenjing Ma, Yinyin Peng, Ruiling Zhang, Zhaoxia Yin:
Reversible Data Hiding in Encrypted Images Based on Bit plane Compression of Prediction Error. CoRR abs/2007.04057 (2020) - [i12]Zhaoxia Yin, Longfei Ke:
Robust adaptive steganography based on dither modulation and modification with re-compression. CoRR abs/2007.08301 (2020) - [i11]Zhaoxia Yin, Hongnian Guo, Yang Du:
Multi-domain Reversible Data Hiding in JPEG. CoRR abs/2011.04959 (2020)
2010 – 2019
- 2019
- [j15]Zichi Wang, Zhaoxia Yin, Xinpeng Zhang:
Asymmetric Distortion Function for JPEG Steganography Using Block Artifact Compensation. Int. J. Digit. Crime Forensics 11(1): 90-99 (2019) - [j14]Yujie Jia, Zhaoxia Yin, Xinpeng Zhang, Yonglong Luo:
Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting. Signal Process. 163: 238-246 (2019) - [i10]Zhaoxia Yin, Yuan Ji, Bin Luo:
Reversible Data Hiding in JPEG Images with Multi-objective Optimization. CoRR abs/1905.03533 (2019) - [i9]Yujie Jia, Zhaoxia Yin, Xinpeng Zhang, Yonglong Luo:
Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting. CoRR abs/1905.05365 (2019) - [i8]Yang Du, Zhaoxia Yin, Xinpeng Zhang:
High Capacity Lossless Data Hiding for JPEG images by NLCM Relationship Constrcution. CoRR abs/1905.05627 (2019) - [i7]Hua Wang, Jie Wang, Zhaoxia Yin:
War: Detecting adversarial examples by pre-processing input data. CoRR abs/1905.08614 (2019) - [i6]Youqing Wu, Youzhi Xiang, Yutang Guo, Jin Tang, Zhaoxia Yin:
An Improved Reversible Data Hiding in Encrypted Images using Parametric Binary Tree Labeling. CoRR abs/1905.09625 (2019) - [i5]Xiaoqing Liu, Yinyin Peng, Jie Wang, Zhaoxia Yin:
Image Encryption Algorithm Based on Facebook Social Network. CoRR abs/1906.03175 (2019) - [i4]Na Xu, Zhaoxia Yin:
Separable Reversible Data Hiding Based on MSB Prediction for Encrypted 3D Mesh Models. CoRR abs/1908.02473 (2019) - [i3]Zhaoxia Yin, Yinyin Peng, Youzhi Xiang:
Reversible Data Hiding in Encrypted Images based on Pixel Prediction and Bit-plane Compression. CoRR abs/1911.01699 (2019) - [i2]Hua Wang, Zhaoxia Yin:
Reversible Adversarial Examples based on Reversible Image Transformation. CoRR abs/1911.02360 (2019) - 2018
- [j13]Zhaoxia Yin:
Training & Evaluation System of Intelligent Oral Phonics Based on Speech Recognition Technology. Int. J. Emerg. Technol. Learn. 13(4): 45-57 (2018) - [j12]Yinyin Peng, Xuejing Niu, Lei Fu, Zhao-Xia Yin:
Image authentication scheme based on reversible fragile watermarking with two images. J. Inf. Secur. Appl. 40: 236-246 (2018) - [j11]Qingde Wei, Zhaoxia Yin, Zichi Wang, Xinpeng Zhang:
Distortion function based on residual blocks for JPEG steganography. Multim. Tools Appl. 77(14): 17875-17888 (2018) - [j10]Zhao-Xia Yin, Xuejing Niu, Xinpeng Zhang, Jin Tang, Bin Luo:
Reversible data hiding in encrypted AMBTC images. Multim. Tools Appl. 77(14): 18067-18083 (2018) - [j9]Zichi Wang, Xinpeng Zhang, Zhaoxia Yin:
Joint Cover-Selection and Payload-Allocation by Steganographic Distortion Optimization. IEEE Signal Process. Lett. 25(10): 1530-1534 (2018) - [c17]Zhigao Hong, Zhao-Xia Yin, Bin Luo:
Improved Reversible Data Hiding in JPEG Images Based on Interval Correlation. BICS 2018: 687-696 - [c16]Lei Fu, Zhaoxia Yin, Xin Wang, Yi Liu:
A Hybrid Algorithm for Text Classification Based on CNN-BLSTM with Attention. IALP 2018: 31-34 - [c15]Yi Puyang, Zhaoxia Yin, Xinpeng Zhang:
Reversible Data Embedding and Scrambling Method Based on JPEG Images. ICCCS (4) 2018: 372-381 - [c14]Yi Puyang, Zhenxing Qian, Zhaoxia Yin, Xinpeng Zhang:
Style Transferring Based Data Hiding for Color Images. ICCCS (4) 2018: 440-449 - [c13]Yinyin Peng, Zhao-Xia Yin:
A Strategy of Distinguishing Texture Feature for Reversible Data Hiding Based on Histogram Shifting. IWDW 2018: 206-215 - [c12]Lei Fu, Zhaoxia Yin, Yi Liu, Jun Zhang:
Convolution Neural Network with Active Learning for Information Extraction of Enterprise Announcements. NLPCC (2) 2018: 330-339 - [c11]Zhaoxia Yin, Youzhi Xiang, Zhenxing Qian, Xinpeng Zhang:
Unified Data Hiding and Scrambling Method for JPEG Images. PCM (3) 2018: 373-383 - [c10]Yi Puyang, Zhaoxia Yin, Zhenxing Qian:
Reversible Data Hiding in Encrypted Images with Two-MSB Prediction. WIFS 2018: 1-7 - [i1]Youzhi Xiang, Zhaoxia Yin, Xinpeng Zhang:
Reversible Data Hiding in Encrypted Images based on MSB Prediction and Huffman Coding. CoRR abs/1812.09499 (2018) - 2017
- [j8]Bing Cao, Guorui Feng, Zhaoxia Yin, Lingyan Fan:
Unsupervised Image Steganalysis Method Using Self-Learning Ensemble Discriminant Clustering. IEICE Trans. Inf. Syst. 100-D(5): 1144-1147 (2017) - [j7]Wien Hong, Tung-Shou Chen, Zhao-Xia Yin, Bin Luo, Yuanbo Ma:
Data hiding in AMBTC images using quantization level modification and perturbation technique. Multim. Tools Appl. 76(3): 3761-3782 (2017) - [j6]Zhao-Xia Yin, Andrew Abel, Jin Tang, Xinpeng Zhang, Bin Luo:
Reversible data hiding in encrypted images based on multi-level encryption and block histogram modification. Multim. Tools Appl. 76(3): 3899-3920 (2017) - [c9]Yi Puyang, Zhaoxia Yin, Guorui Feng, Andrew K. Abel:
An Improved Reversible Information Hiding Scheme Based on AMBTC Compressed Images. ICCCS (1) 2017: 49-60 - [c8]Yang Du, Zhaoxia Yin, Xinpeng Zhang:
An Improved Lossless Data Hiding Scheme in JPEG Bitstream by VLC Mapping. MSN 2017: 84-98 - 2016
- [j5]Zhao-Xia Yin, Xuejing Niu, Zhili Zhou, Jin Tang, Bin Luo:
Improved Reversible Image Authentication Scheme. Cogn. Comput. 8(5): 890-899 (2016) - [j4]Zhao-Xia Yin, Wien Hong, Jin Tang, Bin Luo:
High capacity reversible steganography in encrypted images based on feature mining in plaintext domain. Int. J. Embed. Syst. 8(2/3): 249-257 (2016) - [j3]Zichi Wang, Xinpeng Zhang, Zhaoxia Yin:
Hybrid distortion function for JPEG steganography. J. Electronic Imaging 25(5): 050501 (2016) - [j2]Zhao-Xia Yin, Bin Luo:
MDE-based image steganography with large embedding capacity. Secur. Commun. Networks 9(8): 721-728 (2016) - [c7]Hao Zhang, Zhaoxia Yin, Xinpeng Zhang, Jianpeng Chen, Ruonan Wang, Bin Luo:
Adaptive Algorithm Based on Reversible Data Hiding Method for JPEG Images. CloudComp 2016: 196-203 - [c6]Zhao-Xia Yin, Andrew Abel, Xinpeng Zhang, Bin Luo:
Reversible data hiding in encrypted image based on block histogram shifting. ICASSP 2016: 2129-2133 - [c5]Bing Cao, Guorui Feng, Zhaoxia Yin:
Optimizing Feature for JPEG Steganalysis via Gabor Filter and Co-occurrences Matrices. ICCCS (1) 2016: 84-93 - [c4]Xuejing Niu, Zhao-Xia Yin, Xinpeng Zhang, Jin Tang, Bin Luo:
Reversible Data Hiding in Encrypted AMBTC Compressed Images. IWDW 2016: 436-445 - 2015
- [j1]Zhao-Xia Yin, Chin-Chen Chang, Qin Xu, Bin Luo:
Second-order steganographic method based on adaptive reference matrix. IET Image Process. 9(4): 300-305 (2015) - [c3]Zhao-Xia Yin, Huabin Wang, Haifeng Zhao, Bin Luo, Xinpeng Zhang:
Complete Separable Reversible Data Hiding in Encrypted Image. ICCCS 2015: 101-110 - [c2]Yan Xia, Zhaoxia Yin, Liangmin Wang:
Image Data Embedding with Large Payload Based on Reference-Matrix. IGTA 2015: 55-62
2000 – 2009
- 2009
- [c1]Zhao-Xia Yin, Chin-Chen Chang, Yan-Ping Zhang:
A High Embedding Efficiency Steganography Scheme for Wet Paper Codes. IAS 2009: 611-614
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint