Hongxia Wang

Orcid: 0000-0002-1339-2504

Affiliations:
  • Sichuan University, Chengdu, China
  • Southwest Jiaotong University, School of Information Science and Technology, Chengdu, China
  • University of Electronic Science and Technology of China, Chengdu, China (PhD 2002)


According to our database1, Hongxia Wang authored at least 134 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
From Cover to Immucover: Adversarial Steganography via Immunized Cover Construction.
IEEE Trans. Fuzzy Syst., March, 2024

Biometric template attacks and recent protection mechanisms: A survey.
Inf. Fusion, March, 2024

Exploring Accurate Invariants on Polar Harmonic Fourier Moments in Polar Coordinates for Robust Image Watermarking.
IEEE Trans. Multim., 2024

2023
Reversible adversarial steganography for security enhancement.
J. Vis. Commun. Image Represent., December, 2023

Mode-Dependent Adaptive Event-Triggered Control for Stabilization of Markovian Memristor-Based Reaction-Diffusion Neural Networks.
IEEE Trans. Neural Networks Learn. Syst., August, 2023

The reversibility of cancelable biometric templates based on iterative perturbation stochastic approximation strategy.
Pattern Recognit. Lett., August, 2023

Event-Triggered Impulsive Fault-Tolerant Control for Memristor-Based RDNNs With Actuator Faults.
IEEE Trans. Neural Networks Learn. Syst., June, 2023

Improving security for image steganography using content-adaptive adversarial perturbations.
Appl. Intell., June, 2023

Constructing Immunized Stego-Image for Secure Steganography via Artificial Immune System.
IEEE Trans. Multim., 2023

Robust Blind Video Watermarking Against Geometric Deformations and Online Video Sharing Platform Processing.
IEEE Trans. Dependable Secur. Comput., 2023

NACA: A Joint Distortion-Based Non-Additive Cost Assignment Method for Video Steganography.
IEEE Trans. Dependable Secur. Comput., 2023

Cancelable Fingerprint Template Construction Using Vector Permutation and Shift-Ordering.
IEEE Trans. Dependable Secur. Comput., 2023

Image Steganalysis Against Adversarial Steganography by Combining Confidence and Pixel Artifacts.
IEEE Signal Process. Lett., 2023

Adaptive and Robust Fourier-Mellin-Based Image Watermarking for Social Networking Platforms.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

Content-adaptive Adversarial Embedding for Image Steganography Using Deep Reinforcement Learning.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

2022
Quasisynchronization of Reaction-Diffusion Neural Networks Under Deception Attacks.
IEEE Trans. Syst. Man Cybern. Syst., 2022

Fuzzy Secure Control for Nonlinear $N$-D Parabolic PDE-ODE Coupled Systems Under Stochastic Deception Attacks.
IEEE Trans. Fuzzy Syst., 2022

Dataset mismatched steganalysis using subdomain adaptation with guiding feature.
Telecommun. Syst., 2022

DDCA: A Distortion Drift-Based Cost Assignment Method for Adaptive Video Steganography in the Transform Domain.
IEEE Trans. Dependable Secur. Comput., 2022

Asymmetric Contrastive Learning for Audio Fingerprinting.
IEEE Signal Process. Lett., 2022

Detection of GAN-Generated Images by Estimating Artifact Similarity.
IEEE Signal Process. Lett., 2022

Cost Reassignment for Improving Security of Adaptive Steganography Using an Artificial Immune System.
IEEE Signal Process. Lett., 2022

GAN-based image steganography for enhancing security via adversarial attack and pixel-wise deep fusion.
Multim. Tools Appl., 2022

Exposing unseen GAN-generated image using unsupervised domain adaptation.
Knowl. Based Syst., 2022

Long-term variable Q transform: A novel time-frequency transform algorithm for synthetic speech detection.
Digit. Signal Process., 2022

Robust Blind Video Watermarking by Constructing Spread-Spectrum Matrix.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022

Robust Video Watermarking Based on Residual Synchronization in the DCT Domain.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022

Exposing DeepFake Videos Using Facial Decomposition-Based Domain Generalization.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022

DST-based Video Watermarking Robust to Lossy Channel Compression.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022

Adaptive Despread Spectrum-Based Image Watermarking for Fast Product Tracking.
Proceedings of the Digital Forensics and Watermarking - 21st International Workshop, 2022

Improving GAN-Generated Image Detection Generalization Using Unsupervised Domain Adaptation.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

2021
Frame-Wise Detection of Double HEVC Compression by Learning Deep Spatio-Temporal Representations in Compression Domain.
IEEE Trans. Multim., 2021

Adaptive Video Data Hiding through Cost Assignment and STCs.
IEEE Trans. Dependable Secur. Comput., 2021

A Two-Stage Cascaded Detection Scheme for Double HEVC Compression Based on Temporal Inconsistency.
Secur. Commun. Networks, 2021

A novel NMF-based authentication scheme for encrypted speech in cloud computing.
Multim. Tools Appl., 2021

A Lightweight Three-Factor Anonymous Authentication Scheme With Privacy Protection for Personalized Healthcare Applications.
J. Organ. End User Comput., 2021

A survey of Deep Neural Network watermarking techniques.
Neurocomputing, 2021

Exploiting texture characteristics and spatial correlations for robustness metric of data hiding with noisy transmission.
IET Image Process., 2021

A Robust DCT-Based Video Watermarking Scheme Against Recompression and Synchronization Attacks.
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021

A Feature-Map-Based Large-Payload DNN Watermarking Algorithm.
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021

2020
Fractal Coding-Based Robust and Alignment-Free Fingerprint Image Hashing.
IEEE Trans. Inf. Forensics Secur., 2020

Exposing Fake Bitrate Videos Using Hybrid Deep-Learning Network From Recompression Error.
IEEE Trans. Circuits Syst. Video Technol., 2020

Detection of Computer Graphics Using Attention-Based Dual-Branch Convolutional Neural Network from Fused Color Components.
Sensors, 2020

Reversible data hiding based on a modified difference expansion for H.264/AVC video streams.
Multim. Tools Appl., 2020

Correction to: A reversible data hiding in encrypted image based on prediction-error estimation and location map.
Multim. Tools Appl., 2020

A reversible data hiding in encrypted image based on prediction-error estimation and location map.
Multim. Tools Appl., 2020

A passive forensic scheme for copy-move forgery based on superpixel segmentation and K-means clustering.
Multim. Tools Appl., 2020

A novel two-dimensional reversible data hiding method with high embedding capacity in H.264/advanced video coding.
Int. J. Distributed Sens. Networks, 2020

A Novel Integrity Authentication Algorithm Based on Perceptual Speech Hash and Learned Dictionaries.
IEEE Access, 2020

High-Capacity Reversible Data Hiding in Encrypted Images Using Multi-Layer Embedding.
IEEE Access, 2020

Constructing Immune Cover for Secure Steganography Based on an Artificial Immune System Approach.
Proceedings of the Digital Forensics and Watermarking - 19th International Workshop, 2020

2019
Robust H.264/AVC video watermarking without intra distortion drift.
Multim. Tools Appl., 2019

Reversible video data hiding using zero QDCT coefficient-pairs.
Multim. Tools Appl., 2019

A Speech Homomorphic Encryption Scheme with Less Data Expansion in Cloud Computing.
KSII Trans. Internet Inf. Syst., 2019

Reversible data hiding in homomorphically encrypted image using interpolation technique.
J. Inf. Secur. Appl., 2019

Reversible Data Hiding with Multiple Data for Multiple Users in an Encrypted Image.
Int. J. Digit. Crime Forensics, 2019

Anonymous authentication scheme for smart home environment with provable security.
Comput. Secur., 2019

New Graph-Theoretic Approach to Social Steganography.
Proceedings of the Media Watermarking, 2019

A Novel Lossless Data Hiding Scheme in Homomorphically Encrypted Images.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

GRU-SVM Model for Synthetic Speech Detection.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

Detection of Fake Images Via The Ensemble of Deep Representations from Multi Color Spaces.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

Acoustic event detection with two-stage judgement in the noisy environment.
Proceedings of the ACM Turing Celebration Conference - China, 2019

Cochleagram-based identification of electronic disguised voice with pitch scaling in the noisy environment.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
Speech authentication and content recovery scheme for security communication and storage.
Telecommun. Syst., 2018

A video error concealment method using data hiding based on compressed sensing over lossy channel.
Telecommun. Syst., 2018

An enhanced fragile watermarking scheme to digital image protection and self-recovery.
Signal Process. Image Commun., 2018

Perceptual Hashing-Based Image Copy-Move Forgery Detection.
Secur. Commun. Networks, 2018

Reference Sharing Mechanism-Based Self-Embedding Watermarking Scheme with Deterministic Content Reconstruction.
Secur. Commun. Networks, 2018

An efficient fingerprint identification algorithm based on minutiae and invariant moment.
Pers. Ubiquitous Comput., 2018

Norm ratio-based audio watermarking scheme in DWT domain.
Multim. Tools Appl., 2018

An adaptive data hiding algorithm with low bitrate growth for H.264/AVC video stream.
Multim. Tools Appl., 2018

Robust enhancement and centroid-based concealment of fingerprint biometric data into audio signals.
Multim. Tools Appl., 2018

Fingerprint Image Hashing Based on Minutiae Points and Shape Context.
Int. J. Digit. Crime Forensics, 2018

A Novel Reversible Data Hiding Employing All Quantized Nonzero AC Coefficients in JPEG Images.
CoRR, 2018

Intra-Frame Error Concealment Scheme using 3D Reversible Data Hiding in Mobile Cloud Environment.
CoRR, 2018

The Cut and Dominating Set Problem in A Steganographer Network.
CoRR, 2018

Reversible Embedding to Covers Full of Boundaries.
CoRR, 2018

Intra-Frame Error Concealment Scheme Using 3D Reversible Data Hiding in Mobile Cloud Environment.
IEEE Access, 2018

Ensemble Reversible Data Hiding.
Proceedings of the 24th International Conference on Pattern Recognition, 2018

Reversible Embedding to Covers Full of Boundaries.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Reducing the Computational Complexity of the Reference-Sharing Based Self-embedding Watermarking Approach.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A Data Hiding Scheme with High Quality for H.264/AVC Video Streams.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Fourier-Mellin Transform and Fractal Coding for Secure and Robust Fingerprint Image Hashing.
Proceedings of the 15th IEEE International Conference on Advanced Video and Signal Based Surveillance, 2018

Speaker Identity Tracing Using Fingerprint Data Hiding against Telecommunications Fraud.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

2017
Separable Reversible Data Hiding for Encrypted Palette Images With Color Partitioning and Flipping Verification.
IEEE Trans. Circuits Syst. Video Technol., 2017

A passive authentication scheme for copy-move forgery based on package clustering algorithm.
Multim. Tools Appl., 2017

A Simply Study to Steganography on Social Networks.
CoRR, 2017

An Efficient Copy-Move Detection Algorithm Based on Superpixel Segmentation and Harris Key-Points.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

Data Hiding-Based Video Error Concealment Method Using Compressed Sensing.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
Cross correlation feature mining for steganalysis of hash based least significant bit substitution video steganography.
Telecommun. Syst., 2016

Authentication and recovery algorithm for speech signal based on digital watermarking.
Signal Process., 2016

A dual fragile watermarking scheme for speech authentication.
Multim. Tools Appl., 2016

Can Machine Learn Steganography? - Implementing LSB Substitution and Matrix Coding Steganography with Feed-Forward Neural Networks.
CoRR, 2016

Prediction-error of Prediction Error (PPE)-based Reversible Data Hiding.
CoRR, 2016

Dynamic content selection-and-prediction framework applied to reversible data hiding.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016

Speech Authentication and Recovery Scheme in Encrypted Domain.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Identification of Electronic Disguised Voices in the Noisy Environment.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Concealing Fingerprint-Biometric Data into Audio Signals for Identify Authentication.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

PPE-Based Reversible Data Hiding.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016

An Efficient Passive Authentication Scheme for Copy-Move Forgery Based on DCT.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

Reversible Data Hiding with Low Bit-Rate Growth in H.264/AVC Compressed Video by Adaptive Hybrid Coding.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

Privacy Protection of Digital Speech Based on Homomorphic Encryption.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

An efficient content authentication scheme in encrypted speech based on integer wavelet transform.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2016

2015
Multi-layer assignment steganography using graph-theoretic approach.
Multim. Tools Appl., 2015

A Secure Speech Content Authentication Algorithm Based on Discrete Fractional Fourier Transform.
Int. J. Digit. Crime Forensics, 2015

Self-Embedding Watermarking Scheme Based on MDS Codes.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

2014
Video Steganalysis Against Motion Vector-Based Steganography by Adding or Subtracting One Motion Vector Value.
IEEE Trans. Inf. Forensics Secur., 2014

Digital video steganalysis by subtractive prediction error adjacency matrix.
Multim. Tools Appl., 2014

Pseudo-zernike moments-based audio content authentication algorithm robust against feature-analysed substitution attack.
Multim. Tools Appl., 2014

A fingerprint-based audio authentication scheme using frequency domain statistical characteristic.
Multim. Tools Appl., 2014

Chaos-based self-embedding fragile watermarking with flexible watermark payload.
Multim. Tools Appl., 2014

A novel speech content authentication algorithm based on Bessel-Fourier moments.
Digit. Signal Process., 2014

Efficient Reversible Data Hiding Based on Prefix Matching and Directed LSB Embedding.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

2013
Watermarking-Based Blind QoS Assessment for Wireless Image Communication.
J. Commun., 2013

Geometrically Invariant Image Watermarking using Connected Objects and Gravity Centers.
KSII Trans. Internet Inf. Syst., 2013

Perceptual Hashing-Based Robust Image Authentication Scheme for Wireless Multimedia Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

A Speech Content Authentication Algorithm Based on Pseudo-Zernike Moments in DCT Domain.
Int. J. Digit. Crime Forensics, 2013

A semi-fragile watermarking scheme for authenticating audio signal based on dual-tree complex wavelet transform and discrete cosine transform.
Int. J. Comput. Math., 2013

Watermarking-Based Perceptual Hashing Search Over Encrypted Speech.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Multibit Color-Mapping Steganography Using Depth-First Search.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

2012
An Efficient Speech Content Authentication Algorithm Based on Coefficients Self-correlation Degree.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

Steganalysis of Youtube Compressed Video Using High-order Statistics in 3D DCT Domain.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

2011
Steganalysis for palette-based images using generalized difference image and color correlogram.
Signal Process., 2011

Statistical analysis of several reversible data hiding algorithms.
Multim. Tools Appl., 2011

NDFT-based Image Steganographic Scheme with Discrimination of Tampers.
KSII Trans. Internet Inf. Syst., 2011

Statistical characteristic-based robust audio watermarking for resolving playback speed modification.
Digit. Signal Process., 2011

Self-recovery Fragile Watermarking Scheme with Variable Watermark Payload.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

Efficiently Self-synchronized Audio Watermarking against Re-sampling Attack.
Proceedings of the 14th IEEE International Conference on Computational Science and Engineering, 2011

2010
Centroid-based semi-fragile audio watermarking in hybrid domain.
Sci. China Inf. Sci., 2010

Improved image encryption technique using multi chaotic system.
Proceedings of the FIT '10, 2010

2009
Chaos-based discrete fractional Sine transform domain audio watermarking scheme.
Comput. Electr. Eng., 2009

Time-Scale Invariant Zero-Watermarking Scheme for Audio.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

2008
Restudy on SVD-based watermarking scheme.
Appl. Math. Comput., 2008

2006
Connectivity-Based Image Watermarking.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006


  Loading...