Structural design of convolutional neural networks for steganalysis G Xu, H Wu, Y Shi IEEE Signal Processing Letters 23 (5), 708-712, 2016 | 780 | 2016 |
Watermarking neural networks with watermarked images H Wu, G Liu, Y Yao, X Zhang IEEE Transactions on Circuits and Systems for Video Technology 31 (7), 2591-2601, 2021 | 183 | 2021 |
Ensemble of CNNs for steganalysis: an empirical study G Xu, H Wu, Y Shi ACM Workshop on Information Hiding and Multimedia Security, 103-107, 2016 | 183 | 2016 |
Watermarking in deep neural networks via error back-propagation J Wang, H Wu, X Zhang, Y Yao IS&T Electronic Imaging, Media Watermarking, Security and Forensics, 22-1-22-9, 2020 | 90 | 2020 |
Separable reversible data hiding for encrypted palette images with color partitioning and flipping verification H Wu, Y Shi, H Wang, L Zhou IEEE Transactions on Circuits and Systems for Video Technology 27 (8), 1620-1631, 2017 | 85 | 2017 |
Semi-supervised structured subspace learning for multi-view clustering Y Qin, H Wu, X Zhang, G Feng IEEE Transactions on Image Processing 31, 1-14, 2022 | 54 | 2022 |
Linguistic steganalysis with graph neural networks H Wu, B Yi, F Ding, G Feng, X Zhang IEEE Signal Processing Letters 28, 558-562, 2021 | 46 | 2021 |
Adaptive video data hiding through cost assignment and STCs Y Chen, H Wang, H Wu, Z Wu, T Li, A Malik IEEE Transactions on Dependable and Secure Computing 18 (3), 1320-1335, 2021 | 45 | 2021 |
Generative text steganography based on LSTM network and attention mechanism with keywords H Kang, H Wu, X Zhang IS&T Electronic Imaging, Media Watermarking, Security and Forensics, 291-1-291-8, 2020 | 45 | 2020 |
Watermarking graph neural networks by random graphs X Zhao, H Wu, X Zhang IEEE International Symposium on Digital Forensics and Security, 1-6, 2021 | 42 | 2021 |
Structural watermarking to deep neural networks via network channel pruning X Zhao, Y Yao, H Wu, X Zhang IEEE International Workshop on Information Forensics and Security, 1-6, 2021 | 37 | 2021 |
A novel model watermarking for protecting generative adversarial network T Qiao, Y Ma, N Zheng, H Wu, Y Chen, M Xu, X Luo Computers & Security 127, 103102, 2023 | 36 | 2023 |
Multi-layer assignment steganography using graph-theoretic approach H Wu, H Wang, H Zhao, X Yu Multimedia Tools and Applications 74, 8171-8196, 2015 | 35 | 2015 |
PPE-based reversible data hiding H Wu, H Wang, Y Shi ACM Workshop on Information Hiding and Multimedia Security, 187-188, 2016 | 33 | 2016 |
Reversible data hiding in homomorphically encrypted image using interpolation technique A Malik, H Wang, H Wu, AN Khan, Y Chen Journal of Information Security and Applications 48, 102374, 2019 | 32 | 2019 |
METEOR: Measurable energy map toward the estimation of resampling rate via a convolutional neural network F Ding, H Wu, G Zhu, Y Shi IEEE Transactions on Circuits and Systems for Video Technology 30 (12), 4715 …, 2020 | 31 | 2020 |
Broadcasting steganography in the blockchain M Xu, H Wu, G Feng, X Zhang, F Ding International Workshop on Digital-forensics and Watermarking, 256-267, 2019 | 31 | 2019 |
Surveillance video anomaly detection via non-local U-Net frame prediction Q Zhang, G Feng, H Wu Multimedia Tools and Applications 81 (19), 27073-27088, 2022 | 30 | 2022 |
An efficient fingerprint identification algorithm based on minutiae and invariant moment J Sang, H Wang, Q Qian, H Wu, Y Chen Personal and Ubiquitous Computing 22, 71-80, 2018 | 29 | 2018 |
A passive forensic scheme for copy-move forgery based on superpixel segmentation and K-means clustering Y Liu, H Wang, Y Chen, H Wu, H Wang Multimedia Tools and Applications 79, 477-500, 2020 | 28 | 2020 |