Reversible data hiding in encrypted image X Zhang IEEE signal processing letters 18 (4), 255-258, 2011 | 1165 | 2011 |
Separable reversible data hiding in encrypted image X Zhang IEEE transactions on information forensics and security 7 (2), 826-832, 2011 | 948 | 2011 |
Efficient steganographic embedding by exploiting modification direction X Zhang, S Wang IEEE Communications letters 10 (11), 781-783, 2006 | 852 | 2006 |
Reversible data hiding: Advances in the past two decades YQ Shi, X Li, X Zhang, HT Wu, B Ma IEEE access 4, 3210-3237, 2016 | 559 | 2016 |
An effective CU size decision method for HEVC encoders L Shen, Z Liu, X Zhang, W Zhao, Z Zhang IEEE transactions on multimedia 15 (2), 465-470, 2012 | 501 | 2012 |
Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security X Zhang, S Wang Pattern Recognition Letters 25 (3), 331-339, 2004 | 341 | 2004 |
Lossless and reversible data hiding in encrypted images with public-key cryptography X Zhang, J Long, Z Wang, H Cheng IEEE transactions on circuits and systems for video technology 26 (9), 1622-1631, 2015 | 325 | 2015 |
Reversible data hiding in encrypted images with distributed source encoding Z Qian, X Zhang IEEE Transactions on Circuits and Systems for Video Technology 26 (4), 636-646, 2015 | 325 | 2015 |
Reversible data hiding in encrypted JPEG bitstream Z Qian, X Zhang, S Wang IEEE transactions on multimedia 16 (5), 1486-1491, 2014 | 276 | 2014 |
Invisible backdoor attacks on deep neural networks via steganography and regularization S Li, M Xue, BZH Zhao, H Zhu, X Zhang IEEE Transactions on Dependable and Secure Computing 18 (5), 2088-2105, 2020 | 270 | 2020 |
Steganography using multiple-base notational system and human vision sensitivity X Zhang, S Wang IEEE signal processing letters 12 (1), 67-70, 2004 | 266 | 2004 |
Robust hashing for image authentication using Zernike moments and local features Y Zhao, S Wang, X Zhang, H Yao IEEE transactions on information forensics and security 8 (1), 55-63, 2012 | 261 | 2012 |
Lossy compression and iterative reconstruction for encrypted image X Zhang IEEE transactions on information forensics and security 6 (1), 53-58, 2010 | 256 | 2010 |
Reversible data hiding with optimal value transfer X Zhang IEEE Transactions on Multimedia 15 (2), 316-325, 2012 | 238 | 2012 |
Effective reversible data hiding in encrypted image with privacy protection for image content C Qin, X Zhang Journal of Visual Communication and Image Representation 31, 154-164, 2015 | 204 | 2015 |
Reference sharing mechanism for watermark self-embedding X Zhang, S Wang, Z Qian, G Feng IEEE Transactions on Image Processing 20 (2), 485-495, 2010 | 198 | 2010 |
Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy C Qin, P Ji, X Zhang, J Dong, J Wang Signal processing 138, 280-293, 2017 | 197 | 2017 |
Reversible data hiding in encrypted images based on multi-MSB prediction and Huffman coding Z Yin, Y Xiang, X Zhang IEEE Transactions on Multimedia 22 (4), 874-884, 2019 | 196 | 2019 |
Fragile watermarking with error-free restoration capability X Zhang, S Wang IEEE Transactions on Multimedia 10 (8), 1490-1499, 2008 | 187 | 2008 |
Efficient reversible data hiding in encrypted images X Zhang, Z Qian, G Feng, Y Ren Journal of Visual Communication and Image Representation 25 (2), 322-328, 2014 | 181 | 2014 |