Towards robust image steganography J Tao, S Li, X Zhang, Z Wang IEEE Transactions on Circuits and Systems for Video Technology 29 (2), 594-600, 2018 | 166 | 2018 |
Fingerprint Combination for Privacy Protection S Li, A Kot IEEE Transactions on Information Forensics and Security 8 (2), 350 - 360, 2013 | 100 | 2013 |
Toward construction-based data hiding: from secrets to fingerprint images S Li, X Zhang IEEE Transactions on Image Processing 28 (3), 1482-1497, 2018 | 90 | 2018 |
Exploring stable coefficients on joint sub-bands for robust video watermarking in DT CWT domain W Huan, S Li, Z Qian, X Zhang IEEE Transactions on Circuits and Systems for Video Technology 32 (4), 1955-1965, 2021 | 68 | 2021 |
Privacy protection of fingerprint database S Li, AC Kot IEEE Signal Processing Letters 18 (2), 115-118, 2011 | 54 | 2011 |
Diversity-based cascade filters for JPEG steganalysis G Feng, X Zhang, Y Ren, Z Qian, S Li IEEE transactions on circuits and systems for video technology 30 (2), 376-386, 2019 | 51 | 2019 |
An Improved Scheme for Full Fingerprint Reconstruction S Li, A Kot IEEE Transactions on Information Forensics and Security 7 (6), 1906 - 1912, 2012 | 50 | 2012 |
Multimodal fake news detection via clip-guided learning Y Zhou, Y Yang, Q Ying, Z Qian, X Zhang 2023 IEEE International Conference on Multimedia and Expo (ICME), 2825-2830, 2023 | 49 | 2023 |
Generative steganography network P Wei, S Li, X Zhang, G Luo, Z Qian, Q Zhou Proceedings of the 30th ACM International Conference on Multimedia, 1621-1629, 2022 | 44 | 2022 |
Lossless data hiding in JPEG bitstream using alternative embedding Y Qiu, H He, Z Qian, S Li, X Zhang Journal of Visual Communication and Image Representation 52, 86-91, 2018 | 41 | 2018 |
High-capacity framework for reversible data hiding in encrypted image using pixel prediction and entropy encoding Y Qiu, Q Ying, Y Yang, H Zeng, S Li, Z Qian IEEE Transactions on Circuits and Systems for Video Technology 32 (9), 5874-5887, 2022 | 36 | 2022 |
A novel system for fingerprint privacy protection< sup> 1</sup> S Li, AC Kot 2011 7th International Conference on Information Assurance and Security (IAS …, 2011 | 34 | 2011 |
Attack using reconstructed fingerprint S Li, AC Kot 2011 IEEE International Workshop on Information Forensics and Security (WIFS …, 2011 | 34 | 2011 |
Reversible privacy-preserving recognition Z You, S Li, Z Qian, X Zhang 2021 IEEE International conference on multimedia and expo (ICME), 1-6, 2021 | 32 | 2021 |
Detection of spoofing medium contours for face anti-spoofing X Zhu, S Li, X Zhang, H Li, AC Kot IEEE Transactions on Circuits and Systems for Video Technology 31 (5), 2039-2045, 2019 | 31 | 2019 |
Quality assessment of finger-vein image H Qin, S Li, AC Kot, L Qin Proceedings of the 2012 Asia Pacific signal and information processing …, 2012 | 26 | 2012 |
Fragile neural network watermarking with trigger image set R Zhu, P Wei, S Li, Z Yin, X Zhang, Z Qian Knowledge Science, Engineering and Management: 14th International Conference …, 2021 | 24 | 2021 |
Data hiding in iris image for privacy protection S Li, X Chen, Z Wang, Z Qian, X Zhang IETE technical review 35 (sup1), 34-41, 2018 | 22 | 2018 |
Patch Diffusion: A General Module for Face Manipulation Detection B Zhang, S Li, G Feng, Z Qian, X Zhang Proceedings of the 36th AAAI Conference on Artificial Intelligence 2022, 2022 | 20 | 2022 |
Encryption resistant deep neural network watermarking G Li, S Li, Z Qian, X Zhang ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and …, 2022 | 18 | 2022 |