Jia Liu

Orcid: 0000-0001-8104-0079

Affiliations:
  • Engineering University of People Armed Police Force, Xi'an, China


According to our database1, Jia Liu authored at least 33 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Remote Sensing Images Secure Distribution Scheme Based on Deep Information Hiding.
Remote. Sens., April, 2024

2022
A Reversible Data Hiding Scheme in Encrypted Domain for Secret Image Sharing Based on Chinese Remainder Theorem.
IEEE Trans. Circuits Syst. Video Technol., 2022

Reversible Data hiding in Encrypted Domain with Public Key Embedding Mechanism.
CoRR, 2022

2021
High-Capacity Image Steganography Algorithm Based on Image Style Transfer.
Secur. Commun. Networks, 2021

Robust image steganography framework based on generative adversarial network.
J. Electronic Imaging, 2021

Lossless Data Hiding in LWE-Encrypted Domains Based on Key-Switching.
Int. J. Digit. Crime Forensics, 2021

2020
Fully Homomorphic Encryption Encapsulated Difference Expansion for Reversible Data Hiding in Encrypted Domain.
IEEE Trans. Circuits Syst. Video Technol., 2020

Recent Advances of Image Steganography With Generative Adversarial Networks.
IEEE Access, 2020

2019
Generative steganography with Kerckhoffs' principle.
Multim. Tools Appl., 2019

High-fidelity reversible data hiding by Quadtree-based pixel value ordering.
Multim. Tools Appl., 2019

Reversible data hiding in JPEG images based on zero coefficients and distortion cost function.
Multim. Tools Appl., 2019

Recent Advances of Image Steganography with Generative Adversarial Networks.
CoRR, 2019

Generative Steganography by Sampling.
IEEE Access, 2019

2018
Reversible data hiding in encrypted images with high capacity by bitplane operations and adaptive embedding.
Multim. Tools Appl., 2018

A multilevel reversible data hiding scheme in encrypted domain based on LWE.
J. Vis. Commun. Image Represent., 2018

Reversible Data Hiding for Encrypted Image Based on Interpolation Error Expansion.
Int. J. Mob. Comput. Multim. Commun., 2018

Generative Steganography by Sampling.
CoRR, 2018

The Reincarnation of Grille Cipher.
CoRR, 2018

Digital Cardan Grille: A Modern Approach for Information Hiding.
CoRR, 2018

Steganography Security: Principle and Practice.
IEEE Access, 2018

Generative Steganography Based on GANs.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Digital Cardan Grille: A Modern Approach for Information Hiding.
Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, 2018

2017
Coverless Information Hiding Based on Generative adversarial networks.
CoRR, 2017

Generative Steganography with Kerckhoffs' Principle based on Generative Adversarial Networks.
CoRR, 2017

Reversible Image Data Hiding with Homomorphic Encryption and Contrast Enhancement.
Proceedings of the Advances in Internetworking, 2017

Encrypted Image-Based Reversible Data Hiding with Public Key Cryptography from Interpolation-Error Expansion.
Proceedings of the Advances in Internetworking, 2017

2016
A Novel Video Steganography Algorithm Based on Trailing Coecients for H.264/AVC.
Informatica (Slovenia), 2016

Separable Multiple Bits Reversible Data Hiding in Encrypted Domain.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

2015
Video Steganography Algorithm Based on Trailing Coefficients.
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015

2014
Virus-Evolutionary Genetic Algorithm Based Selective Ensemble for Steganalysis.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2010
Recognizing human actions using bag-of-features and Intersection Kernel Support Vector Machines.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

2009
Universal Steganalysis to Images with WBMC Model.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2007
A New Multi-class SVM Algorithm Based on One-Class SVM.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007


  Loading...