暂无分享,去创建一个
[1] Jessica J. Fridrich,et al. Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.
[2] Zhenxing Qian,et al. Reversible Data Hiding in Encrypted Images With Distributed Source Encoding , 2016, IEEE Transactions on Circuits and Systems for Video Technology.
[3] Gwoboa Horng,et al. Encrypted signal-based reversible data hiding with public key cryptosystem , 2014, J. Vis. Commun. Image Represent..
[4] Xinpeng Zhang,et al. Huffman-code based retrieval for encrypted JPEG images , 2019, J. Vis. Commun. Image Represent..
[5] Zhenxing Qian,et al. Reversible visible watermark embedded in encrypted domain , 2015, 2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP).
[6] Zhenxing Qian,et al. How to Extract Image Features Based on Co-Occurrence Matrix Securely and Efficiently in Cloud Computing , 2020, IEEE Transactions on Cloud Computing.
[7] Yang Li,et al. Histogram shifting in encrypted images with public key cryptosystem for reversible data hiding , 2017, Signal Process..
[8] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[9] Tomás Pevný,et al. Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.
[10] Xinpeng Zhang,et al. AC-coefficient histogram-based retrieval for encrypted JPEG images , 2015, Multimedia Tools and Applications.
[11] Rajendra Bharti,et al. Lossless and Reversible Data Hiding in Encrypted Images With Public Key Cryptography , 2017, RICE.
[12] Zhenxing Qian,et al. Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server , 2018 .
[13] Kai Peng,et al. SocInf: Membership Inference Attacks on Social Media Health Data With Machine Learning , 2019, IEEE Transactions on Computational Social Systems.
[14] Ling Shao,et al. Image Super-Resolution as a Defense Against Adversarial Attacks , 2020, IEEE Transactions on Image Processing.
[15] Jin Chen,et al. Information Privacy Concern About Peer Disclosure in Online Social Networks , 2015, IEEE Transactions on Engineering Management.
[16] Zhenxing Qian,et al. On Improving Distortion Functions for JPEG Steganography , 2018, IEEE Access.
[17] Zhenxing Qian,et al. Data Hiding in Iris Image for Privacy Protection , 2018, IETE Technical Review.
[18] Zhenxing Qian,et al. New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams , 2019, IEEE Transactions on Circuits and Systems for Video Technology.
[19] Xinpeng Zhang,et al. Fully Verifiable Algorithm for Secure Outsourcing of Bilinear Pairing in Cloud Computing , 2017, KSII Trans. Internet Inf. Syst..
[20] William Puech,et al. An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images , 2018, IEEE Transactions on Information Forensics and Security.
[21] Jessica J. Fridrich,et al. Matrix embedding for large payloads , 2006, IEEE Transactions on Information Forensics and Security.
[22] Xinpeng Zhang,et al. Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.
[23] Jessica J. Fridrich,et al. Random Projections of Residuals for Digital Image Steganalysis , 2013, IEEE Transactions on Information Forensics and Security.
[24] Gerald Schaefer,et al. UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.
[25] Tao Peng,et al. Enhanced Location Privacy Preserving Scheme in Location-Based Services , 2017, IEEE Systems Journal.