Coverless image steganography without embedding Z Zhou, H Sun, R Harit, X Chen, X Sun Cloud Computing and Security: First International Conference, ICCCS 2015 …, 2015 | 209 | 2015 |
A copy-move forgery detection method based on CMFD-SIFT B Yang, X Sun, H Guo, Z Xia, X Chen Multimedia Tools and Applications 77, 837-855, 2018 | 121 | 2018 |
Reversible watermarking method based on asymmetric-histogram shifting of prediction errors X Chen, X Sun, H Sun, Z Zhou, J Zhang Journal of Systems and Software 86 (10), 2620-2626, 2013 | 111 | 2013 |
Multi-scale context-guided deep network for automated lesion segmentation with endoscopy images of gastrointestinal tract S Wang, Y Cong, H Zhu, X Chen, L Qu, H Fan, Q Zhang, M Liu IEEE Journal of Biomedical and Health Informatics 25 (2), 514-525, 2020 | 93 | 2020 |
Coverless information hiding method based on the Chinese character encoding X Chen, S Chen, Y Wu Journal of Internet Technology 18 (2), 313-320, 2017 | 88 | 2017 |
Coverless information hiding method based on the Chinese mathematical expression X Chen, H Sun, Y Tobe, Z Zhou, X Sun Cloud Computing and Security: First International Conference, ICCCS 2015 …, 2015 | 88 | 2015 |
A Privacy-Preserving Image Retrieval Based on AC-Coefficients and Color Histograms in Cloud Environment. Z Xia, L Lu, T Qiu, HJ Shim, X Chen, B Jeon Computers, Materials & Continua 58 (1), 2019 | 66 | 2019 |
Novel coverless steganography method based on image selection and StarGAN X Chen, Z Zhang, A Qiu, Z Xia, NN Xiong IEEE Transactions on Network Science and Engineering 9 (1), 219-230, 2020 | 54 | 2020 |
Histogram shifting based reversible data hiding method using directed-prediction scheme X Chen, X Sun, H Sun, L Xiang, B Yang Multimedia Tools and Applications 74, 5747-5765, 2015 | 36 | 2015 |
High-capacity reversible data hiding for encrypted multimedia data with somewhat homomorphic encryption L Xiong, D Dong, Z Xia, X Chen IEEE Access 6, 60635-60644, 2018 | 33 | 2018 |
Semi-supervised stacked autoencoder-based deep hierarchical semantic feature for real-time fingerprint liveness detection C Yuan, X Chen, P Yu, R Meng, W Cheng, QMJ Wu, X Sun Journal of Real-Time Image Processing 17 (1), 55-71, 2020 | 27 | 2020 |
Convolutional neural network for smooth filtering detection B Yang, X Sun, E Cao, W Hu, X Chen IET Image Processing 12 (8), 1432-1438, 2018 | 27 | 2018 |
Text coverless information hiding based on compound and selection of words X Chen, S Chen Soft Computing 23, 6323-6330, 2019 | 26 | 2019 |
A GLCM-Feature-Based Approach for Reversible Image Transformation. X Chen, H Zhong, Z Bao Computers, Materials & Continua 59 (1), 2019 | 23 | 2019 |
Coverless image steganography method based on feature selection A Qiu, X Chen, X Sun, S Wang, W Guo Journal of Information Hiding and Privacy Protection 1 (2), 49, 2019 | 22 | 2019 |
Steganalysis of LSB matching using characteristic function moment of pixel differences X Chen, G Gao, D Liu, Z Xia China Communications 13 (7), 66-73, 2016 | 18 | 2016 |
Privacy‐Guarding Optimal Route Finding with Support for Semantic Search on Encrypted Graph in Cloud Computing Scenario B Wu, X Chen, Z Wu, Z Zhao, Z Mei, C Zhang Wireless Communications and Mobile Computing 2021 (1), 6617959, 2021 | 17 | 2021 |
Modeling complex networks with accelerating growth and aging effect J Liu, J Li, Y Chen, X Chen, Z Zhou, Z Yang, CJ Zhang Physics Letters A 383 (13), 1396-1400, 2019 | 16 | 2019 |
Reversible data hiding scheme in multiple encrypted images based on code division multiplexing X Chen, H Zhong, A Qiu Multimedia Tools and Applications 78, 7499-7516, 2019 | 15 | 2019 |
A novel signature based on the combination of global and local signatures for image copy detection Z Zhou, X Sun, X Chen, C Chang, Z Fu Security and Communication Networks 7 (11), 1702-1711, 2014 | 12 | 2014 |