关注
chen xianyi
chen xianyi
在 nuist.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Coverless image steganography without embedding
Z Zhou, H Sun, R Harit, X Chen, X Sun
Cloud Computing and Security: First International Conference, ICCCS 2015 …, 2015
2092015
A copy-move forgery detection method based on CMFD-SIFT
B Yang, X Sun, H Guo, Z Xia, X Chen
Multimedia Tools and Applications 77, 837-855, 2018
1212018
Reversible watermarking method based on asymmetric-histogram shifting of prediction errors
X Chen, X Sun, H Sun, Z Zhou, J Zhang
Journal of Systems and Software 86 (10), 2620-2626, 2013
1112013
Multi-scale context-guided deep network for automated lesion segmentation with endoscopy images of gastrointestinal tract
S Wang, Y Cong, H Zhu, X Chen, L Qu, H Fan, Q Zhang, M Liu
IEEE Journal of Biomedical and Health Informatics 25 (2), 514-525, 2020
932020
Coverless information hiding method based on the Chinese character encoding
X Chen, S Chen, Y Wu
Journal of Internet Technology 18 (2), 313-320, 2017
882017
Coverless information hiding method based on the Chinese mathematical expression
X Chen, H Sun, Y Tobe, Z Zhou, X Sun
Cloud Computing and Security: First International Conference, ICCCS 2015 …, 2015
882015
A Privacy-Preserving Image Retrieval Based on AC-Coefficients and Color Histograms in Cloud Environment.
Z Xia, L Lu, T Qiu, HJ Shim, X Chen, B Jeon
Computers, Materials & Continua 58 (1), 2019
662019
Novel coverless steganography method based on image selection and StarGAN
X Chen, Z Zhang, A Qiu, Z Xia, NN Xiong
IEEE Transactions on Network Science and Engineering 9 (1), 219-230, 2020
542020
Histogram shifting based reversible data hiding method using directed-prediction scheme
X Chen, X Sun, H Sun, L Xiang, B Yang
Multimedia Tools and Applications 74, 5747-5765, 2015
362015
High-capacity reversible data hiding for encrypted multimedia data with somewhat homomorphic encryption
L Xiong, D Dong, Z Xia, X Chen
IEEE Access 6, 60635-60644, 2018
332018
Semi-supervised stacked autoencoder-based deep hierarchical semantic feature for real-time fingerprint liveness detection
C Yuan, X Chen, P Yu, R Meng, W Cheng, QMJ Wu, X Sun
Journal of Real-Time Image Processing 17 (1), 55-71, 2020
272020
Convolutional neural network for smooth filtering detection
B Yang, X Sun, E Cao, W Hu, X Chen
IET Image Processing 12 (8), 1432-1438, 2018
272018
Text coverless information hiding based on compound and selection of words
X Chen, S Chen
Soft Computing 23, 6323-6330, 2019
262019
A GLCM-Feature-Based Approach for Reversible Image Transformation.
X Chen, H Zhong, Z Bao
Computers, Materials & Continua 59 (1), 2019
232019
Coverless image steganography method based on feature selection
A Qiu, X Chen, X Sun, S Wang, W Guo
Journal of Information Hiding and Privacy Protection 1 (2), 49, 2019
222019
Steganalysis of LSB matching using characteristic function moment of pixel differences
X Chen, G Gao, D Liu, Z Xia
China Communications 13 (7), 66-73, 2016
182016
Privacy‐Guarding Optimal Route Finding with Support for Semantic Search on Encrypted Graph in Cloud Computing Scenario
B Wu, X Chen, Z Wu, Z Zhao, Z Mei, C Zhang
Wireless Communications and Mobile Computing 2021 (1), 6617959, 2021
172021
Modeling complex networks with accelerating growth and aging effect
J Liu, J Li, Y Chen, X Chen, Z Zhou, Z Yang, CJ Zhang
Physics Letters A 383 (13), 1396-1400, 2019
162019
Reversible data hiding scheme in multiple encrypted images based on code division multiplexing
X Chen, H Zhong, A Qiu
Multimedia Tools and Applications 78, 7499-7516, 2019
152019
A novel signature based on the combination of global and local signatures for image copy detection
Z Zhou, X Sun, X Chen, C Chang, Z Fu
Security and Communication Networks 7 (11), 1702-1711, 2014
122014
系统目前无法执行此操作,请稍后再试。
文章 1–20