Junhui He

Orcid: 0000-0002-1689-0509

According to our database1, Junhui He authored at least 22 papers between 2005 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Reversible data hiding for JPEG images based on improved mapping and frequency ordering.
Signal Process., 2022

Analyzing the Effectiveness of Interaction Between Brand Awareness and Social Network Advertising: The Moderating Role of Social Facilitation.
Int. J. Technol. Hum. Interact., 2022

Research on the Mechanism of Public Opinion Dissemination in Social Networks Based on Opinion Dynamics.
Proceedings of the 3rd International Conference on Computer Engineering and Intelligent Control Virtual Event, 2022

2021
Reversible image visual transformation for privacy and content protection.
Multim. Tools Appl., 2021

Multi-Keyword ranked search based on mapping set matching in cloud ciphertext storage system.
Connect. Sci., 2021

2020
Reversible Data Hiding in JPEG Images Based on Negative Influence Models.
IEEE Trans. Inf. Forensics Secur., 2020

A novel selective encryption scheme for H.264/AVC video with improved visual security.
Signal Process. Image Commun., 2020

On one-time cookies protocol based on one-time password.
Soft Comput., 2020

Improved block ordering and frequency selection for reversible data hiding in JPEG images.
Signal Process., 2020

An Efficient Two-Factor Authentication Scheme Based on the Merkle Tree.
Sensors, 2020

Combining HoloLens and Leap-Motion for Free Hand-Based 3D Interaction in MR Environments.
Proceedings of the Augmented Reality, Virtual Reality, and Computer Graphics, 2020

2019
A Novel High-Capacity Reversible Data Hiding Scheme for Encrypted JPEG Bitstreams.
IEEE Trans. Circuits Syst. Video Technol., 2019

Online collaborative filtering via fusing the rating consistencies.
Knowl. Based Syst., 2019

Kernel Analysis based on SVDD for Face Recognition from Image Set.
J. Intell. Fuzzy Syst., 2019

2018
JPEG Image Encryption With Improved Format Compatibility and File Size Preservation.
IEEE Trans. Multim., 2018

Examining the dynamic effects of social network advertising: A semiotic perspective.
Telematics Informatics, 2018

A Novel AMR-WB Speech Steganography Based on Diameter-Neighbor Codebook Partition.
Secur. Commun. Networks, 2018

2017
A secure image sharing scheme with high quality stego-images based on steganography.
Multim. Tools Appl., 2017

2011
A Survey on Image Steganography and Steganalysis.
J. Inf. Hiding Multim. Signal Process., 2011

2009
A CPK-Based Security Scheme at Network Layer.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

2006
Steganalysis of stochastic modulation steganography.
Sci. China Ser. F Inf. Sci., 2006

2005
A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005


  Loading...