Rangding Wang

Orcid: 0000-0003-2576-8705

According to our database1, Rangding Wang authored at least 111 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
HEVC Video Steganalysis Based on PU Maps and Multi-Scale Convolutional Residual Network.
IEEE Trans. Circuits Syst. Video Technol., April, 2024

Centralized Error Distribution-Preserving Adaptive Steganography for HEVC.
IEEE Trans. Multim., 2024

Mixed-Bit Sampling Graphic: When Watermarking Meets Copy Detection Pattern.
IEEE Signal Process. Lett., 2024

Audio steganography cover enhancement via reinforcement learning.
Signal Image Video Process., 2024

2023
Imperceptible adversarial audio steganography based on psychoacoustic model.
Multim. Tools Appl., July, 2023

Adaptive HEVC video steganography based on distortion compensation optimization.
J. Inf. Secur. Appl., March, 2023

Adversarial Examples Protect Your Privacy on Speech Enhancement System.
Comput. Syst. Sci. Eng., 2023

Universal Defensive Underpainting Patch: Making Your Text Invisible to Optical Character Recognition.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Gradient Sign Inversion: Making an Adversarial Attack a Good Defense.
Proceedings of the International Joint Conference on Neural Networks, 2023

Physically Robust Reversible Watermarking.
Proceedings of the 2023 Workshop on Advanced Multimedia Computing for Smart Manufacturing and Engineering, 2023

2022
Decision-Based Attack to Speaker Recognition System via Local Low-Frequency Perturbation.
IEEE Signal Process. Lett., 2022

Detecting and Recovering Adversarial Examples from Extracting Non-robust and Highly Predictive Adversarial Perturbations.
CoRR, 2022

Adversarial Privacy Protection on Speech Enhancement.
CoRR, 2022

Transferability of Adversarial Attacks on Synthetic Speech Detection.
CoRR, 2022

Robust Document Image Forgery Localization Against Image Blending.
Proceedings of the IEEE International Conference on Trust, 2022

High-Capacity Adaptive Steganography Based on Transform Coefficient for HEVC.
Proceedings of the Digital Forensics and Watermarking - 21st International Workshop, 2022

Physical Anti-copying Semi-robust Random Watermarking for QR Code.
Proceedings of the Digital Forensics and Watermarking - 21st International Workshop, 2022

2021
Tackling the Cover Source Mismatch Problem in Audio Steganalysis With Unsupervised Domain Adaptation.
IEEE Signal Process. Lett., 2021

Defending and Detecting Audio Adversarial Example using Frame Offsets.
KSII Trans. Internet Inf. Syst., 2021

Identification of Fake Stereo Audio Using SVM and CNN.
Inf., 2021

Towards breaking DNN-based audio steganalysis with GAN.
Int. J. Auton. Adapt. Commun. Syst., 2021

Adversarial Example Devastation and Detection on Speech Recognition System by Adding Random Noise.
CoRR, 2021

Fast speech adversarial example generation for keyword spotting system with conditional GAN.
Comput. Commun., 2021

Adaptive Audio Steganography Based on Improved Syndrome-Trellis Codes.
IEEE Access, 2021

Learning to Generate Steganographic Cover for Audio Steganography Using GAN.
IEEE Access, 2021

Iteratively Generated Adversarial Perturbation for Audio Stego Post-processing.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2021

Identification of Synthetic Spoofed Speech with Deep Capsule Network.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021

2020
First Steps Toward Concealing the Traces Left by Reversible Image Data Hiding.
IEEE Trans. Circuits Syst. II Express Briefs, 2020

An Antiforensic Method against AMR Compression Detection.
Secur. Commun. Networks, 2020

A Robust Method for Speech Replay Attack Detection.
KSII Trans. Internet Inf. Syst., 2020

Identification of Weakly Pitch-Shifted Voice Based on Convolutional Neural Network.
Int. J. Digit. Multim. Broadcast., 2020

Anti-Forensics of Double Compressed MP3 Audio.
Int. J. Digit. Crime Forensics, 2020

Selecting Optimal Submatrix for Syndrome-Trellis Codes (STCs)-Based Steganography With Segmentation.
IEEE Access, 2020

A High-Capacity Reversible Data Hiding Scheme Using Dual-Channel Audio.
IEEE Access, 2020

Targeted Speech Adversarial Example Generation With Generative Adversarial Network.
IEEE Access, 2020

Post-processing for Enhancing Audio Steganographic Undetectability.
Proceedings of the Security and Privacy in Digital Economy, 2020

Adversarial Examples Attack and Countermeasure for Speech Recognition System: A Survey.
Proceedings of the Security and Privacy in Digital Economy, 2020

Robust, Imperceptible and End-to-End Audio Steganography Based on CNN.
Proceedings of the Security and Privacy in Digital Economy, 2020

Efficient Generation of Speech Adversarial Examples with Generative Model.
Proceedings of the Digital Forensics and Watermarking - 19th International Workshop, 2020

Towards Designing an Effective Complexity Indicator for Audio Steganography.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
Detection of double compression in HEVC videos based on TU size and quantised DCT coefficients.
IET Inf. Secur., 2019

Source smartphone identification by exploiting encoding characteristics of recorded speech.
Digit. Investig., 2019

Detection of HMM Synthesized Speech by Wavelet Logarithmic Spectrum.
Autom. Control. Comput. Sci., 2019

Anti-Forensics of Audio Source Identification Using Generative Adversarial Network.
IEEE Access, 2019

Audio Steganalysis with Improved Convolutional Neural Network.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

2018
Separable Reversible Data Hiding in Encrypted Images Based on Two-Dimensional Histogram Modification.
Secur. Commun. Networks, 2018

Compression history detection for MP3 audio.
KSII Trans. Internet Inf. Syst., 2018

Source Cell-Phone Identification in the Presence of Additive Noise from CQT Domain.
Inf., 2018

An Inter-Frame Forgery Detection Algorithm for Surveillance Video.
Inf., 2018

AAC Double Compression Audio Detection Algorithm Based on the Difference of Scale Factor.
Inf., 2018

A Replay Speech Detection Algorithm Based on Sub-band Analysis.
Proceedings of the Intelligent Information Processing IX, 2018

A Replay Voice Detection Algorithm Based on Multi-feature Fusion.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

AAC Audio Compression Detection Based on QMDCT Coefficient.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Steganalysis of MP3Stego with low embedding-rate using Markov feature.
Multim. Tools Appl., 2017

Tunable data hiding in partially encrypted H.264/AVC videos.
J. Vis. Commun. Image Represent., 2017

High-quality JPEG compression history detection for fake uncompressed images.
J. Electronic Imaging, 2017

2016
Two-dimensional reversible data hiding-based approach for intra-frame error concealment in H.264/AVC.
Signal Process. Image Commun., 2016

Separable and error-free reversible data hiding in encrypted images.
Signal Process., 2016

An efficient algorithm for double compressed AAC audio detection.
Multim. Tools Appl., 2016

An improved scheme for data hiding in encrypted H.264/AVC videos.
J. Vis. Commun. Image Represent., 2016

Source Cell-Phone Identification Using Spectral Features of Device Self-noise.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Two-Dimensional Histogram Modification for Reversible Data Hiding in Partially Encrypted H.264/AVC Videos.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Audio Tampering Detection Based on Quantization Artifacts.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

An Information Hiding Algorithm for HEVC Based on Differences of Intra Prediction Modes.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
In-camera JPEG compression detection for doubly compressed images.
Multim. Tools Appl., 2015

An Information Hiding Algorithm for HEVC Based on Angle Differences of Intra Prediction Mode.
J. Softw., 2015

Context adaptive binary arithmetic coding-based data hiding in partially encrypted H.264/AVC videos.
J. Electronic Imaging, 2015

Multiple MP3 Compression Detection Based on the Statistical Properties of Scale Factors.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

Detection of Double Compression for HEVC Videos Based on the Co-occurrence Matrix of DCT Coefficients.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

Completely Separable Reversible Data Hiding in Encrypted Images.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

2014
Data Hiding in Encrypted H.264/AVC Video Streams by Codeword Substitution.
IEEE Trans. Inf. Forensics Secur., 2014

Human Perception of Visual Realism for Photo and Computer-Generated Face Images.
ACM Trans. Appl. Percept., 2014

Detection of MP3Stego exploiting recompression calibration-based feature.
Multim. Tools Appl., 2014

A multipurpose audio aggregation watermarking based on multistage vector quantization.
Multim. Tools Appl., 2014

An improved reversible data hiding-based approach for intra-frame error concealment in H.264/AVC.
J. Vis. Commun. Image Represent., 2014

Detecting Fake-Quality MP3 based on Huffman Table Index.
J. Softw., 2014

Detecting double-compressed MP3 with the Same Bit-rate.
J. Softw., 2014

Efficient reversible data hiding in encrypted H.264/AVC videos.
J. Electronic Imaging, 2014

A Novel Audio Aggregation Watermarking Algorithm Based on Copyright Protection.
Int. J. Comput. Intell. Syst., 2014

Detecting Fake-Quality WAV Audio Based on Phase Differences.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Reversible Data Hiding in Encrypted Images Using Interpolation and Histogram Shifting.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

An Automated Estimator of Image Visual Realism Based on Human Cognition.
Proceedings of the 2014 IEEE Conference on Computer Vision and Pattern Recognition, 2014

A novel detection scheme for MP3Stego with low payload.
Proceedings of the IEEE China Summit & International Conference on Signal and Information Processing, 2014

2013
Detecting MP3Stego using calibrated side information features.
J. Softw., 2013

Watermarking in H.264/AVC Compressed Domain Using CAVLC.
J. Comput., 2013

Steganalysis for MP3Stego using differential statistics of quantization step.
Digit. Signal Process., 2013

Reversible Data Hiding in Encrypted H.264/AVC Video Streams.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

A Huffman Table Index Based Approach to Detect Double MP3 Compression.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

2012
A New Spectrum Sensing Algorithm Based on Antenna Correlation for Cognitive Radio Systems.
Wirel. Pers. Commun., 2012

Prediction mode modulated data-hiding algorithm for H.264/AVC.
J. Real Time Image Process., 2012

Steganography for MP3 audio by exploiting the rule of window switching.
Comput. Secur., 2012

2011
A novel watermarking scheme for H.264/AVC video authentication.
Signal Process. Image Commun., 2011

Huffman table swapping-based steganograpy for MP3 audio.
Multim. Tools Appl., 2011

Distinguishing Photographic Images and Photorealistic Computer Graphics Using Visual Vocabulary on Local Image Edges.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

2010
Low complexity video watermarking algorithm by exploiting CAVLC in H.264/AVC.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

A novel audio aggregation watermarking for copyright protection.
Proceedings of the 2010 IEEE International Conference on Intelligent Systems and Knowledge Engineering, 2010

To Explore Embedded System Education for Developing Local Economy.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

2009
Quantization Step Parity-based Steganography for MP3 Audio.
Fundam. Informaticae, 2009

Blind Digital Watermarking of Low Bit-Rate Advanced H.264/AVC Compressed Video.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009

A Robust Audio Aggregate Zero-Watermark Algorithm.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

2008
Video Watermarking Based on Spatio-temporal JND Profile.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

Reversible Data Hiding for Audio Based on Prediction Error Expansion.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Breaking Boundaries among Hardware Curriculums by EDA Technology.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

An Audio Zero-Watermark Algorithm Combined DCT with Zernike Moments.
Proceedings of the International Conference on Cyberworlds 2008, 2008

The Analysis of VLC-Coded Efficiency Based on MPEG-I Layer III Audio.
Proceedings of the International Conference on Cyberworlds 2008, 2008

2007
Robust Audio Zero-Watermark Based on LWT and Chaotic Modulation.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

2005
New Multiple Description Layered Coding Method For Video Communication.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Audio Watermarking Algorithm Based on Wavelet Packet and Psychoacoustic Model.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

New Ray-Space Interpolation Method For Free Viewpoint Video System.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Fast Ray-Space Interpolation with Depth Discontinuity Preserving for Free Viewpoint Video System.
Proceedings of the Advances in Multimedia Information Processing, 2005

Fast Ray-Space Interpolation Based on Occlusion Analysis and Feature Points Detection.
Proceedings of the Computational Intelligence and Security, International Conference, 2005


  Loading...