Lossless and reversible data hiding in encrypted images with public-key cryptography X Zhang, J Long, Z Wang, H Cheng IEEE Transactions on Circuits and Systems for Video Technology 26 (9), 1622-1631, 2015 | 318 | 2015 |
Towards robust image steganography J Tao, S Li, X Zhang, Z Wang IEEE Transactions on Circuits and Systems for Video Technology 29 (2), 594-600, 2018 | 148 | 2018 |
On improving distortion functions for JPEG steganography Z Wang, Z Qian, X Zhang, M Yang, D Ye IEEE Access 6, 74917-74930, 2018 | 51 | 2018 |
Joint cover-selection and payload-allocation by steganographic distortion optimization Z Wang, X Zhang, Z Yin IEEE Signal Processing Letters 25 (10), 1530-1534, 2018 | 45 | 2018 |
Hybrid distortion function for JPEG steganography Z Wang, X Zhang, Z Yin Journal of Electronic Imaging 25 (5), 050501-050501, 2016 | 42 | 2016 |
Distortion function based on residual blocks for JPEG steganography Q Wei, Z Yin, Z Wang, X Zhang Multimedia Tools and Applications 77, 17875-17888, 2018 | 34 | 2018 |
Secure cover selection for steganography Z Wang, X Zhang IEEE Access 7, 57857-57867, 2019 | 29 | 2019 |
Batch steganography via generative network N Zhong, Z Qian, Z Wang, X Zhang, X Li IEEE Transactions on Circuits and Systems for Video Technology 31 (1), 88-97, 2020 | 22 | 2020 |
Data hiding in iris image for privacy protection S Li, X Chen, Z Wang, Z Qian, X Zhang IETE technical review 35 (sup1), 34-41, 2018 | 21 | 2018 |
Practical cover selection for steganography Z Wang, X Zhang, Z Qian IEEE Signal Processing Letters 27, 71-75, 2019 | 19 | 2019 |
Reversible visible watermark embedded in encrypted domain X Zhang, Z Wang, J Yu, Z Qian 2015 IEEE China Summit and International Conference on Signal and …, 2015 | 18 | 2015 |
Repeatable data hiding: Towards the reusability of digital images Z Wang, G Feng, X Zhang IEEE Transactions on Circuits and Systems for Video Technology 32 (1), 135-146, 2021 | 14 | 2021 |
JPEG steganography with content similarity evaluation Z Wang, G Feng, Z Qian, X Zhang IEEE Transactions on Cybernetics, 2022 | 13 | 2022 |
Unified performance evaluation method for perceptual image hashing X Li, C Qin, Z Wang, Z Qian, X Zhang IEEE Transactions on Information Forensics and Security 17, 1404-1419, 2022 | 13 | 2022 |
Multichannel steganography in digital images for multiple receivers Z Wang, G Feng, Y Ren, X Zhang IEEE MultiMedia 28 (1), 65-73, 2020 | 13 | 2020 |
Distortion function for JPEG steganography based on image texture and correlation in DCT domain Z Wang, Z Yin, X Zhang IETE Technical Review 35 (4), 351-358, 2018 | 13 | 2018 |
A new steganography method for dynamic GIF images based on palette sort J Lin, Z Qian, Z Wang, X Zhang, G Feng Wireless Communications and Mobile Computing 2020, 1-13, 2020 | 12 | 2020 |
Asymmetric distortion function for JPEG steganography using block artifact compensation Z Wang, Z Yin, X Zhang International Journal of Digital Crime and Forensics (IJDCF) 11 (1), 90-99, 2019 | 11 | 2019 |
Distortion function for spatial image steganography based on the polarity of embedding change Z Wang, J Lv, Q Wei, X Zhang Digital Forensics and Watermarking: 15th International Workshop, IWDW 2016 …, 2017 | 11 | 2017 |
Distortion function for emoji image steganography L Shi, Z Wang, Z Qian, N Huang, P Puteaux, X Zhang CMC-Computers, Materials & Continua 59 (3), 943-953, 2019 | 10 | 2019 |