Image forgery detection using adaptive oversegmentation and feature point matching CM Pun, XC Yuan, XL Bi IEEE Transactions on Information Forensics and Security 10 (8), 1705-1716, 2015 | 336 | 2015 |
Triple-Classification of Respiratory Sounds Using Optimized S-Transform and Deep Residual Networks H Chen, X Yuan, Z Pei, M Li, J Li IEEE Access 7, 32845-32852, 2019 | 127 | 2019 |
Multi-Level Dense Descriptor and Hierarchical Feature Matching for Copy–Move Forgery Detection X Bi, CM Pun, XC Yuan Information Sciences 345, 226-242, 2016 | 102 | 2016 |
Multi-scale noise estimation for image splicing forgery detection CM Pun, B Liu, XC Yuan Journal of Visual Communication and Image Representation 38, 195-206, 2016 | 83 | 2016 |
Quaternion-Based Image Hashing for Adaptive Tampering Localization CP Yan, CM Pun, XC Yuan IEEE Transactions on Information Forensics and Security 11 (12), 2664-2677, 2016 | 82 | 2016 |
Multi-scale image hashing using adaptive local feature extraction for robust tampering detection CP Yan, CM Pun, XC Yuan Signal Processing 121, 1-16, 2016 | 82 | 2016 |
Robust segments detector for de-synchronization resilient audio watermarking CM Pun, XC Yuan IEEE Transactions on Audio, Speech, and Language Processing 21 (11), 2412-2424, 2013 | 65 | 2013 |
Digital image forgery detection using JPEG features and local noise discrepancies B Liu, CM Pun, XC Yuan The Scientific World Journal 2014 (1), 230425, 2014 | 54 | 2014 |
Multi-scale feature extraction and adaptive matching for copy-move forgery detection XL Bi, CM Pun, XC Yuan Multimedia Tools and Applications 77, 363-385, 2018 | 48 | 2018 |
Robust Mel-Frequency Cepstral coefficients feature detection and dual-tree complex wavelet transform for digital audio watermarking XC Yuan, CM Pun, CLP Chen Information Sciences 298, 159-179, 2015 | 43 | 2015 |
Geometric invariant watermarking by local Zernike moments of binary image patches XC Yuan, CM Pun, CLP Chen Signal Processing 93 (7), 2087-2095, 2013 | 43 | 2013 |
Power normalized cepstral robust features of deep neural networks in a cloud computing data privacy protection scheme M Li, Z Tian, X Du, X Yuan, C Shan, M Guizani Neurocomputing 518, 165-173, 2023 | 38 | 2023 |
Local multi-watermarking method based on robust and adaptive feature extraction XC Yuan, M Li Signal Processing 149, 103-117, 2018 | 38 | 2018 |
Detection of weak electromagnetic interference attacks based on fingerprint in IIoT systems K Fang, T Wang, X Yuan, C Miao, Y Pan, J Li Future Generation Computer Systems 126, 295-304, 2022 | 37 | 2022 |
Feature extraction and local Zernike moments based geometric invariant watermarking XC Yuan, CM Pun Multimedia tools and applications 72, 777-799, 2014 | 35 | 2014 |
Quaternion Discrete Fourier Transform-Based Color Image Watermarking Method Using Quaternion QR Decomposition M Li, X Yuan, H Chen, J Li IEEE Access 8, 72308-72315, 2020 | 31 | 2020 |
Image Alignment-Based Multi-Region Matching for Object-Level Tampering Detection CM Pun, C Yan, XC Yuan IEEE Transactions on Information Forensics and Security 12 (2), 377-391, 2017 | 27 | 2017 |
Robust image hashing using progressive feature selection for tampering detection CM Pun, CP Yan, XC Yuan Multimedia Tools and Applications 77, 11609-11633, 2018 | 26 | 2018 |
Quaternion-valued correlation learning for few-shot semantic segmentation Z Zheng, G Huang, X Yuan, CM Pun, H Liu, WK Ling IEEE Transactions on Circuits and Systems for Video Technology 33 (5), 2102-2115, 2022 | 25 | 2022 |
Gauss–Jordan elimination-based image tampering detection and self-recovery X Yuan, X Li, T Liu Signal Processing: Image Communication 90, 116038, 2021 | 16 | 2021 |