Reversible Data Hiding in Encrypted Images With Distributed Source Encoding
Qian, Zhenxing, Zhang, Xinpeng
Published in IEEE transactions on circuits and systems for video technology (01.04.2016)
Published in IEEE transactions on circuits and systems for video technology (01.04.2016)
Get full text
Journal Article
Reversible Data Hiding in Encrypted JPEG Bitstream
Qian, Zhenxing, Zhang, Xinpeng, Wang, Shuozhong
Published in IEEE transactions on multimedia (01.08.2014)
Published in IEEE transactions on multimedia (01.08.2014)
Get full text
Journal Article
Reversible Data Hiding in Encrypted Images Based on Progressive Recovery
Qian, Zhenxing, Zhang, Xinpeng, Feng, Guorui
Published in IEEE signal processing letters (01.11.2016)
Published in IEEE signal processing letters (01.11.2016)
Get full text
Journal Article
Reference Sharing Mechanism for Watermark Self-Embedding
Zhang, Xinpeng, Wang, Shuozhong, Qian, Zhenxing, Feng, Guorui
Published in IEEE transactions on image processing (01.02.2011)
Published in IEEE transactions on image processing (01.02.2011)
Get full text
Journal Article
Efficient reversible data hiding in encrypted images
Zhang, Xinpeng, Qian, Zhenxing, Feng, Guorui, Ren, Yanli
Published in Journal of visual communication and image representation (01.02.2014)
Published in Journal of visual communication and image representation (01.02.2014)
Get full text
Journal Article
Scalable Coding of Encrypted Images
Zhang, Xinpeng, Feng, Guorui, Ren, Yanli, Qian, Zhenxing
Published in IEEE transactions on image processing (01.06.2012)
Published in IEEE transactions on image processing (01.06.2012)
Get full text
Journal Article
Compressing Encrypted Images With Auxiliary Information
Zhang, Xinpeng, Ren, Yanli, Shen, Liquan, Qian, Zhenxing, Feng, Guorui
Published in IEEE transactions on multimedia (01.08.2014)
Published in IEEE transactions on multimedia (01.08.2014)
Get full text
Journal Article
Dynamic Adjustment of Hidden Node Parameters for Extreme Learning Machine
Feng, Guorui, Lan, Yuan, Zhang, Xinpeng, Qian, Zhenxing
Published in IEEE transactions on cybernetics (01.02.2015)
Published in IEEE transactions on cybernetics (01.02.2015)
Get full text
Journal Article
Defeating data hiding in social networks using generative adversarial network
Wang, Huaqi, Qian, Zhenxing, Feng, Guorui, Zhang, Xinpeng
Published in EURASIP journal on image and video processing (14.07.2020)
Published in EURASIP journal on image and video processing (14.07.2020)
Get full text
Journal Article
Reversible fragile watermarking for locating tampered blocks in JPEG images
Zhang, Xinpeng, Wang, Shuozhong, Qian, Zhenxing, Feng, Guorui
Published in Signal processing (01.12.2010)
Published in Signal processing (01.12.2010)
Get full text
Journal Article
Reversible Data Hiding in Encrypted Images With Dual Data Embedding
Qiu, Yingqiang, Ying, Qichao, Lin, Xiaodan, Zhang, Yaowen, Qian, Zhenxing
Published in IEEE access (2020)
Published in IEEE access (2020)
Get full text
Journal Article
Semi-structured data protection scheme based on robust watermarking
He, Jiahuan, Ying, Qichao, Qian, Zhenxing, Feng, Guorui, Zhang, Xinpeng
Published in EURASIP journal on image and video processing (16.03.2020)
Published in EURASIP journal on image and video processing (16.03.2020)
Get full text
Journal Article
Perceptual Hash of Neural Networks
Zhu, Zhiying, Zhou, Hang, Xing, Siyuan, Qian, Zhenxing, Li, Sheng, Zhang, Xinpeng
Published in Symmetry (Basel) (01.04.2022)
Published in Symmetry (Basel) (01.04.2022)
Get full text
Journal Article