DDCA: A distortion drift-based cost assignment method for adaptive video steganography in the transform domain Y Chen, H Wang, KKR Choo, P He, Z Salcic, D Kaafar, X Zhang IEEE transactions on dependable and secure computing 19 (4), 2405-2420, 2021 | 31 | 2021 |
An efficient fingerprint identification algorithm based on minutiae and invariant moment J Sang, H Wang, Q Qian, H Wu, Y Chen Personal and Ubiquitous Computing 22, 71-80, 2018 | 28 | 2018 |
A passive forensic scheme for copy-move forgery based on superpixel segmentation and K-means clustering Y Liu, H Wang, Y Chen, H Wu, H Wang Multimedia Tools and Applications 79, 477-500, 2020 | 26 | 2020 |
An adaptive data hiding algorithm with low bitrate growth for H. 264/AVC video stream Y Chen, H Wang, H Wu, Y Liu Multimedia Tools and Applications 77, 20157-20175, 2018 | 17 | 2018 |
Reversible video data hiding using zero QDCT coefficient-pairs Y Chen, H Wang, H Wu, Y Liu Multimedia Tools and Applications 78, 23097-23115, 2019 | 16 | 2019 |
EAR: An Enhanced Adversarial Regularization Approach against Membership Inference Attacks H Hu, Z Salcic, G Dobbie, Y Chen, X Zhang IJCNN, 2021 | 14 | 2021 |
A novel two-dimensional reversible data hiding scheme based on high-efficiency histogram shifting for JPEG images B He, Y Chen, Y Zhou, Y Wang, Y Chen International Journal of Distributed Sensor Networks 18 (3), 15501329221084226, 2022 | 9 | 2022 |
Reversible data hiding based on a modified difference expansion for H. 264/AVC video streams X Tang, H Wang, Y Chen Multimedia Tools and Applications 79, 28661-28674, 2020 | 7 | 2020 |
A data hiding scheme with high quality for H. 264/AVC video streams Y Chen, H Wang, H Wu, Y Chen, Y Liu Cloud Computing and Security: 4th International Conference, ICCCS 2018 …, 2018 | 7 | 2018 |
A novel lossless data hiding scheme in homomorphically encrypted images A Malik, H Wang, AN Khan, Y Chen, Y Chen Digital Forensics and Watermarking: 18th International Workshop, IWDW 2019 …, 2020 | 6 | 2020 |
A novel two-dimensional reversible data hiding method with high embedding capacity in H. 264/advanced video coding Y Chen, H Wang, X Tang, Y Liu, H Wu, Y Chen International Journal of Distributed Sensor Networks 16 (3), 1550147720911001, 2020 | 4 | 2020 |
An efficient copy-move detection algorithm based on superpixel segmentation and Harris key-points Y Liu, HX Wang, HZ Wu, Y Chen Cloud Computing and Security: Third International Conference, ICCCS 2017 …, 2017 | 4 | 2017 |
NACA: a joint distortion-based non-additive cost assignment method for video steganography Y Chen, Z Salcic, H Wang, KKR Choo, X Zhang IEEE Transactions on Dependable and Secure Computing 20 (3), 2360-2374, 2022 | 3 | 2022 |
Exploiting texture characteristics and spatial correlations forrobustness metric of data hiding with noisy transmission Y Chen, H Wang, H Wu, Y Zhou, L Zhou, Y Chen IET Image Processing, 2021 | 3 | 2021 |
GRU-SVM model for synthetic speech detection T Huang, H Wang, Y Chen, P He Digital Forensics and Watermarking: 18th International Workshop, IWDW 2019 …, 2020 | 3 | 2020 |
Reversible data hiding based on run-level coding in H.264/AVC video streams Y Chen, HX Wang, XY Zhang Computers, Materials & Continua, 2020 | 3 | 2020 |
USAGE: Uncertain flow graph and spatio-temporal graph convolutional network-based saturation attack detection method K Wang, Y Cui, Q Qian, Y Chen, C Guo, G Shen Journal of Network and Computer Applications 219, 103722, 2023 | 2 | 2023 |
SNDMI: Spyware network traffic detection method based on inducement operations J Peng, C Guo, Y Ping, Y Cui, Y Chen, G Shen Computers & Security 140, 103806, 2024 | 1 | 2024 |
Robust video watermarking using normalized Zernike moments S Chen, Y Chen, Y Chen, L Zhou, H Wu International Conference on Artificial Intelligence and Security, 323-336, 2022 | 1 | 2022 |
Defining cost function for robust embedding YL Chen, H Wang, H Wu, Y Chen, Z Dong International Conference on Artificial Intelligence and Security, 2020 | 1* | 2020 |