Xiangyang Luo

Orcid: 0000-0002-2747-4236

According to our database1, Xiangyang Luo authored at least 250 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
IP2vec: an IP node representation model for IP geolocation.
Frontiers Comput. Sci., December, 2024

An anonymous authentication and secure data transmission scheme for the Internet of Things based on blockchain.
Frontiers Comput. Sci., June, 2024

Steganalysis Feature Selection With Multidimensional Evaluation and Dynamic Threshold Allocation.
IEEE Trans. Circuits Syst. Video Technol., March, 2024

CSC-Net: Cross-Color Spatial Co-Occurrence Matrix Network for Detecting Synthesized Fake Images.
IEEE Trans. Cogn. Dev. Syst., February, 2024

Trustworthy adaptive adversarial perturbations in social networks.
J. Inf. Secur. Appl., February, 2024

Quantization Step Estimation of Color Images Based on Res2Net-C With Frequency Clustering Prior Knowledge.
IEEE Trans. Circuits Syst. Video Technol., January, 2024

Reversible Data Hiding-Based Contrast Enhancement With Multi-Group Stretching for ROI of Medical Image.
IEEE Trans. Multim., 2024

2023
Correction: Geolocation of covert communication entity on the Internet for post-steganalysis.
EURASIP J. Image Video Process., December, 2023

A Siamese Inverted Residuals Network Image Steganalysis Scheme based on Deep Learning.
ACM Trans. Multim. Comput. Commun. Appl., November, 2023

Twitter user geolocation based on heterogeneous relationship modeling and representation learning.
Inf. Sci., November, 2023

Adaptive feature selection for image steganalysis based on classification metrics.
Inf. Sci., October, 2023

A Covert Communication Method Adapted to Social Media Based on Time Modulation of Bullet Comments.
IEEE Trans. Consumer Electron., August, 2023

UGCC: Social Media User Geolocation via Cyclic Coupling.
IEEE Trans. Big Data, August, 2023

CNN-Transformer Based Generative Adversarial Network for Copy-Move Source/ Target Distinguishment.
IEEE Trans. Circuits Syst. Video Technol., May, 2023

Handwritten CAPTCHA recognizer: a text CAPTCHA breaking method based on style transfer network.
Multim. Tools Appl., April, 2023

A novel model watermarking for protecting generative adversarial network.
Comput. Secur., April, 2023

Self-Recoverable Adversarial Examples: A New Effective Protection Mechanism in Social Networks.
IEEE Trans. Circuits Syst. Video Technol., February, 2023

Time Controlled Expressive Predicate Query With Accountable Anonymity.
IEEE Trans. Serv. Comput., 2023

GNN-Geo: A Graph Neural Network-Based Fine-Grained IP Geolocation Framework.
IEEE Trans. Netw. Sci. Eng., 2023

FGDNet: Fine-Grained Detection Network Towards Face Anti-Spoofing.
IEEE Trans. Multim., 2023

2PCLA: Provable Secure and Privacy Preserving Enhanced Certificateless Authentication Scheme for Distributed Learning.
IEEE Trans. Inf. Forensics Secur., 2023

Extraction Method of Secret Message Based on Optimal Hypothesis Test.
IEEE Trans. Dependable Secur. Comput., 2023

Dual Traceable Distributed Attribute-Based Searchable Encryption and Ownership Transfer.
IEEE Trans. Cloud Comput., 2023

SNENet: An adaptive stego noise extraction network using parallel dilated convolution for JPEG image steganalysis.
IET Image Process., 2023

Construction of a high-precision general geographical location words dataset.
Comput. Stand. Interfaces, 2023

Prefix-diffusion: A Lightweight Diffusion Model for Diverse Image Captioning.
CoRR, 2023

Immune Defense: A Novel Adversarial Defense Mechanism for Preventing the Generation of Adversarial Examples.
CoRR, 2023

Improving Transferability of Adversarial Attacks with Gaussian Gradient Enhance Momentum.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

Improving the Transferability of Adversarial Attacks through Experienced Precise Nesterov Momentum.
Proceedings of the International Joint Conference on Neural Networks, 2023

Perceptual Robust Hashing for Video Copy Detection with Unsupervised Learning.
Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2023

A Compact Transformer for Adaptive Style Transfer.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

Improving CoatNet for Spatial and JPEG Domain Steganalysis.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

Quantum Augmented Lattice Attack on NTRU with Side Information.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2022
Stance detection for online public opinion awareness: An overview.
Int. J. Intell. Syst., December, 2022

DR-NET: a novel mobile anchor-assisted localization method based on the density of nodes distribution.
Wirel. Networks, 2022

Contrast-Enhanced Color Visual Cryptography for (k, n) Threshold Schemes.
ACM Trans. Multim. Comput. Commun. Appl., 2022

A Group Covert Communication Method of Digital Currency Based on Blockchain Technology.
IEEE Trans. Netw. Sci. Eng., 2022

SmsNet: A New Deep Convolutional Neural Network Model for Adversarial Example Detection.
IEEE Trans. Multim., 2022

A Novel Covert Communication Method Based on Bitcoin Transaction.
IEEE Trans. Ind. Informatics, 2022

Inverse Interpolation and Its Application in Robust Image Steganography.
IEEE Trans. Circuits Syst. Video Technol., 2022

General Expansion-Shifting Model for Reversible Data Hiding: Theoretical Investigation and Practical Algorithm Design.
IEEE Trans. Circuits Syst. Video Technol., 2022

Detecting Aligned Double JPEG Compressed Color Image With Same Quantization Matrix Based on the Stability of Image.
IEEE Trans. Circuits Syst. Video Technol., 2022

Reversible Data Hiding for Color Images Based on Adaptive 3D Prediction-Error Expansion and Double Deep Q-Network.
IEEE Trans. Circuits Syst. Video Technol., 2022

Lightweight and Expressive Fine-Grained Access Control for Healthcare Internet-of-Things.
IEEE Trans. Cloud Comput., 2022

A Novel High-Capacity Behavioral Steganographic Method Combining Timestamp Modulation and Carrier Selection Based on Social Networks.
Symmetry, 2022

Contrastive Learning based Multi-task Network for Image Manipulation Detection.
Signal Process., 2022

Sign steganography revisited with robust domain selection.
Signal Process., 2022

A Method for Identifying Tor Users Visiting Websites Based on Frequency Domain Fingerprinting of Network Traffic.
Secur. Commun. Networks, 2022

GAN-generated fake face detection via two-stream CNN with PRNU in the wild.
Multim. Tools Appl., 2022

Steganographic key recovery for adaptive steganography under "known-message attacks".
Multim. Tools Appl., 2022

ESGAN for generating high quality enhanced samples.
Multim. Syst., 2022

Classifying between computer generated and natural images: An empirical study from RAW to JPEG format.
J. Vis. Commun. Image Represent., 2022

Single underwater image haze removal with a learning-based approach to blurriness estimation.
J. Vis. Commun. Image Represent., 2022

A novel authentication scheme for edge computing-enabled Internet of Vehicles providing anonymity and identity tracing with drone-assistance.
J. Syst. Archit., 2022

Who are there: Discover Twitter users and tweets for target area using mention relationship strength and local tweet ratio.
J. Netw. Comput. Appl., 2022

A perfect secret sharing scheme for general access structures.
Inf. Sci., 2022

IP-geolocater: a more reliable IP geolocation algorithm based on router error training.
Frontiers Comput. Sci., 2022

Extracting embedded messages using adaptive steganography based on optimal syndrome-trellis decoding paths.
Digit. Commun. Networks, 2022

A Robust Image Steganographic Scheme against General Scaling Attacks.
CoRR, 2022

Node localization algorithm for wireless sensor networks based on static anchor node location selection strategy.
Comput. Commun., 2022

HeteroTiC: A robust network flow watermarking based on heterogeneous time channels.
Comput. Networks, 2022

Improving the Transferability of Adversarial Attacks Through Both Front and Rear Vector Method.
Proceedings of the Digital Forensics and Watermarking - 21st International Workshop, 2022

A Rapid Device Type Identification Method Based on Feature Reduction and Dynamical Feature Weights Assignment.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

A Cross-Platform Instant Messaging User Association Method Based on Supervised Learning.
Proceedings of the Big Data and Security - 4th International Conference, 2022

Multi-Attribute Controlled Text Generation with Contrastive-Generator and External-Discriminator.
Proceedings of the 29th International Conference on Computational Linguistics, 2022

Watch Out for Race Condition Attacks When Using Android External Storage.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Detecting Non-Aligned Double JPEG Compression Based on Amplitude-Angle Feature.
ACM Trans. Multim. Comput. Commun. Appl., 2021

LandmarkMiner: Street-level Network Landmarks Mining Method for IP Geolocation.
ACM Trans. Internet Things, 2021

Shielding Collaborative Learning: Mitigating Poisoning Attacks Through Client-Side Detection.
IEEE Trans. Dependable Secur. Comput., 2021

Adaptive Steganalysis Based on Statistical Model of Quantized DCT Coefficients for JPEG Images.
IEEE Trans. Dependable Secur. Comput., 2021

Where Are WeChat Users: A Geolocation Method Based on User Missequence State Analysis.
IEEE Trans. Comput. Soc. Syst., 2021

Multi-scale Multi-attention Network for Moiré Document Image Binarization.
Signal Process. Image Commun., 2021

Invariances of JPEG-quantized DCT coefficients and their application in robust image steganography.
Signal Process., 2021

Robust steganography resisting JPEG compression by improving selection of cover element.
Signal Process., 2021

PRUDA: A Novel Measurement Attribute Set towards Robust Steganography in Social Networks.
Secur. Commun. Networks, 2021

Spatial-Channel Attention-Based Class Activation Mapping for Interpreting CNN-Based Image Classification Models.
Secur. Commun. Networks, 2021

Cryptographic Secrecy Analysis of Adaptive Steganographic Syndrome-Trellis Codes.
Secur. Commun. Networks, 2021

A Street-Level IP Geolocation Method Based on Delay-Distance Correlation and Multilayered Common Routers.
Secur. Commun. Networks, 2021

A City-Level Boundary Nodes Identification Algorithm Based on Bidirectional Approaching.
KSII Trans. Internet Inf. Syst., 2021

Image robust adaptive steganography adapted to lossy channels in open social networks.
Inf. Sci., 2021

Instant messaging user geolocating method based on multi-source information association.
Int. J. Sens. Networks, 2021

A lightweight 3D convolutional neural network for deepfake detection.
Int. J. Intell. Syst., 2021

Privacy-preserving inpainting for outsourced image.
Int. J. Distributed Sens. Networks, 2021

GCN-Geo: A Graph Convolution Network-based Fine-grained IP Geolocation System.
CoRR, 2021

Self-embedding watermarking method for G-code used in 3D printing.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2021

Research of Robust Video Object Tracking Algorithm Based on Jetson Nano Embedded Platform.
Proceedings of the Pattern Recognition and Computer Vision - 4th Chinese Conference, 2021

Modify the Quantization Table in the JPEG Header File for Forensics and Anti-forensics.
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021

StrGAN for Generating Enhanced Samples.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

Microblog User Location Inference Based on POI and Query Likelihood Model.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

Imperceptible and Reliable Adversarial Attack.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021

2020
Survive and Thrive: A Stochastic Game for DDoS Attacks in Bitcoin Mining Pools.
IEEE/ACM Trans. Netw., 2020

Multiple Robustness Enhancements for Image Adaptive Steganography in Lossy Channels.
IEEE Trans. Circuits Syst. Video Technol., 2020

Detecting Double JPEG Compressed Color Images With the Same Quantization Matrix in Spherical Coordinates.
IEEE Trans. Circuits Syst. Video Technol., 2020

Evaluator: A Multilevel Decision Approach for Web-Based Landmark Evaluation.
Secur. Commun. Networks, 2020

Steganalysis of homogeneous-representation based steganography for high dynamic range images.
Multim. Tools Appl., 2020

Anti-steganalysis for image on convolutional neural networks.
Multim. Tools Appl., 2020

A novel haze image steganography method via cover-source switching.
J. Vis. Commun. Image Represent., 2020

Enhancing reliability and efficiency for real-time robust adaptive steganography using cyclic redundancy check codes.
J. Real Time Image Process., 2020

Non-aligned double JPEG compression detection based on refined Markov features in QDCT domain.
J. Real Time Image Process., 2020

Correction to: A robust image steganography based on the concatenated error correction encoder and discrete cosine transform coefficients.
J. Ambient Intell. Humaniz. Comput., 2020

A robust image steganography based on the concatenated error correction encoder and discrete cosine transform coefficients.
J. Ambient Intell. Humaniz. Comput., 2020

Microblog User Geolocation by Extracting Local Words Based on Word Clustering and Wrapper Feature Selection.
KSII Trans. Internet Inf. Syst., 2020

Image splicing detection based on convolutional neural network with weight combination strategy.
J. Inf. Secur. Appl., 2020

Heterogeneous graph-based joint representation learning for users and POIs in location-based social network.
Inf. Process. Manag., 2020

An overview of microblog user geolocation methods.
Inf. Process. Manag., 2020

Color image steganalysis based on embedding change probabilities in differential channels.
Int. J. Distributed Sens. Networks, 2020

A reversible database watermarking method non-redundancy shifting-based histogram gaps.
Int. J. Distributed Sens. Networks, 2020

NEXT: a neural network framework for next POI recommendation.
Frontiers Comput. Sci., 2020

Geolocation of covert communication entity on the Internet for post-steganalysis.
EURASIP J. Image Video Process., 2020

Twitter User Location Inference Based on Representation Learning and Label Propagation.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Steganalysis of Adaptive Steganography Under the Known Cover Image.
Proceedings of the Security and Privacy in Digital Economy, 2020

A Hybrid Loss Network for Localization of Image Manipulation.
Proceedings of the Digital Forensics and Watermarking - 19th International Workshop, 2020

RNBG: A Ranking Nodes Based IP Geolocation Method.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Network Topology Boundary Routing IP Identification for IP Geolocation.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

2019
A Context-Aware User-Item Representation Learning for Item Recommendation.
ACM Trans. Inf. Syst., 2019

Statistical Model-Based Detector via Texture Weight Map: Application in Re-Sampling Authentication.
IEEE Trans. Multim., 2019

CReam: A Smart Contract Enabled Collusion-Resistant e-Auction.
IEEE Trans. Inf. Forensics Secur., 2019

<i>PROST</i>: Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation.
IEEE Trans. Inf. Forensics Secur., 2019

Identifying Computer Generated Images Based on Quaternion Central Moments in Color Quaternion Wavelet Domain.
IEEE Trans. Circuits Syst. Video Technol., 2019

New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams.
IEEE Trans. Circuits Syst. Video Technol., 2019

Selection of Rich Model Steganalysis Features Based on Decision Rough Set α-Positive Region Reduction.
IEEE Trans. Circuits Syst. Video Technol., 2019

Access Control Based on Ciphertext Attribute Authentication and Threshold Policy for the Internet of Things.
Sensors, 2019

Steganalysis aided by fragile detection of image manipulations.
Multim. Tools Appl., 2019

Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes.
J. Univers. Comput. Sci., 2019

Efficient stego key recovery based on distribution differences of extracting message bits.
J. Real Time Image Process., 2019

Color image-spliced localization based on quaternion principal component analysis and quaternion skewness.
J. Inf. Secur. Appl., 2019

Attributes revocation through ciphertext puncturation.
J. Inf. Secur. Appl., 2019

A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem.
Inf. Sci., 2019

An indoor Wi-Fi access points localization algorithm based on improved path loss model parameter calculation method and recursive partition.
Int. J. Distributed Sens. Networks, 2019

Color image steganalysis based on channel gradient correlation.
Int. J. Distributed Sens. Networks, 2019

A Reversible Watermarking Algorithm Resistant to Image Geometric Transformation.
Int. J. Digit. Crime Forensics, 2019

Shielding Collaborative Learning: Mitigating Poisoning Attacks through Client-Side Detection.
CoRR, 2019

Delay-Distance Correlation Study for IP Geolocation.
CoRR, 2019

IP Geolocation based on identification routers and local delay distribution similarity.
Concurr. Comput. Pract. Exp., 2019

A localization and tracking scheme for target gangs based on big data of Wi-Fi locations.
Clust. Comput., 2019

Street-Level Geolocation Based on Router Multilevel Partitioning.
IEEE Access, 2019

Group Key Agreement Protocol Based on Privacy Protection and Attribute Authentication.
IEEE Access, 2019

Zernike Moment-Based Spatial Image Steganography Resisting Scaling Attack and Statistic Detection.
IEEE Access, 2019

A High Completeness PoP Partition Algorithm for IP Geolocation.
IEEE Access, 2019

Quaternion Convolutional Neural Network for Color Image Classification and Forensics.
IEEE Access, 2019

A Comprehensive Survey on Secure Outsourced Computation and Its Applications.
IEEE Access, 2019

Detection of Triple JPEG Compressed Color Images.
IEEE Access, 2019

Selective Learning Confusion Class for Text-Based CAPTCHA Recognition.
IEEE Access, 2019

DLocRL: A Deep Learning Pipeline for Fine-Grained Location Recognition and Linking in Tweets.
Proceedings of the World Wide Web Conference, 2019

Double JPEG Compression Detection Based on Markov Model.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Gated Neural Network with Regularized Loss for Multi-label Text Classification.
Proceedings of the International Joint Conference on Neural Networks, 2019

An Efficient Framework by Topic Model for Multi-label Text Classification.
Proceedings of the International Joint Conference on Neural Networks, 2019

A Review-Driven Neural Model for Sequential Recommendation.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Moiré Pattern Removal with Multi-scale Feature Enhancing Network.
Proceedings of the IEEE International Conference on Multimedia & Expo Workshops, 2019

An Landmark Evaluation Algorithm Based on Router Identification and Delay Measurement.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

A Label-Specific Attention-Based Network with Regularized Loss for Multi-label Classification.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2019: Deep Learning, 2019

Feature selection method for image steganalysis based on weighted inner-inter class distance and dispersion criterion.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
Hydra-Bite: Static Taint Immunity, Split, and Complot Based Information Capture Method for Android Device.
Wirel. Commun. Mob. Comput., 2018

Parameter estimation of image gamma transformation based on zero-value histogram bin locations.
Signal Process. Image Commun., 2018

On the fault-tolerant performance for a class of robust image steganography.
Signal Process., 2018

Big Data Analytics for Information Security.
Secur. Commun. Networks, 2018

Street-Level Landmark Evaluation Based on Nearest Routers.
Secur. Commun. Networks, 2018

Dither modulation based adaptive steganography resisting jpeg compression and statistic detection.
Multim. Tools Appl., 2018

Stego key recovery based on the optimal hypothesis test.
Multim. Tools Appl., 2018

Reliable steganalysis of HUGO steganography based on partially known plaintext.
Multim. Tools Appl., 2018

Blind forensics of image gamma transformation and its application in splicing detection.
J. Vis. Commun. Image Represent., 2018

网络空间测绘的概念及其技术体系的研究 (Research on Definition and Technological System of Cyberspace Surveying and Mapping).
计算机科学, 2018

An authenticated asymmetric group key agreement based on attribute encryption.
J. Netw. Comput. Appl., 2018

Quantitative steganalysis of JPEG additive steganography based on boundary effect.
J. Electronic Imaging, 2018

Reversible data hiding in encrypted image with separable capability and high embedding capacity.
Inf. Sci., 2018

Perceptual image hashing via dual-cross pattern encoding and salient structure detection.
Inf. Sci., 2018

Geolocating a WeChat user based on the relation between reported and actual distance.
Int. J. Distributed Sens. Networks, 2018

Survey on the Indoor Localization Technique of Wi-Fi Access Points.
Int. J. Digit. Crime Forensics, 2018

Extracting hidden messages of MLSB steganography based on optimal stego subset.
Sci. China Inf. Sci., 2018

City-Level IP Geolocation Algorithm Based on PoP Network Topology.
IEEE Access, 2018

Multi-View Analysis Dictionary Learning for Image Classification.
IEEE Access, 2018

Partial Multi-view Subspace Clustering.
Proceedings of the 2018 ACM Multimedia Conference on Multimedia Conference, 2018

Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Attack on Deep Steganalysis Neural Networks.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Class-Aware Analysis Dictionary Learning for Pattern Classification.
IEEE Signal Process. Lett., 2017

A Survey on Breaking Technique of Text-Based CAPTCHA.
Secur. Commun. Networks, 2017

Joint JPEG compression and detection resistant performance enhancement for adaptive steganography using feature regions selection.
Multim. Tools Appl., 2017

2D Gabor filters-based steganalysis of content-adaptive JPEG steganography.
Multim. Tools Appl., 2017

Improving side-informed JPEG steganography using two-dimensional decomposition embedding method.
Multim. Tools Appl., 2017

Steganalysis of content-adaptive JPEG steganography based on Gauss partial derivative filter bank.
J. Electronic Imaging, 2017

On the probability density function and characteristic function moments of image steganalysis in the log prediction error wavelet subband.
J. Electronic Imaging, 2017

Optimal Gabor Filters for Steganalysis of Content-Adaptive JPEG Steganography.
KSII Trans. Internet Inf. Syst., 2017

Recognizing Substitution Steganography of Spatial Domain Based on the Characteristics of Pixels Correlation.
Int. J. Digit. Crime Forensics, 2017

Joint Adaptive Neighbours and Metric Learning for Multi-view Subspace Clustering.
CoRR, 2017

City-level IP geolocation based on network topology community detection.
Proceedings of the 2017 International Conference on Information Networking, 2017

A Network Coordinate System Constructing Algorithm Based on Optimal Neighbor Nodes.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Steganalysis Feature Subspace Selection Based on Fisher Criterion.
Proceedings of the 2017 IEEE International Conference on Data Science and Advanced Analytics, 2017

IP Geolocation Base on Local Delay Distribution Similarity.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

A WeChat User Geolocating Algorithm Based on the Relation Between Reported and Actual Distance.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
A framework of adaptive steganography resisting JPEG compression and detection.
Secur. Commun. Networks, 2016

Guest Editorial: Information Hiding and Forensics for Multimedia Security.
Multim. Tools Appl., 2016

Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes.
Multim. Tools Appl., 2016

Improving Scanned Binary Image Watermarking Based On Additive Model and Sampling.
Int. J. Digit. Crime Forensics, 2016

Random table and hash coding-based binary code obfuscation against stack trace analysis.
IET Inf. Secur., 2016

A landmark calibration-based IP geolocation approach.
EURASIP J. Inf. Secur., 2016

Stego key searching for LSB steganography on JPEG decompressed image.
Sci. China Inf. Sci., 2016

2015
Steganalysis of perturbed quantization steganography based on the enhanced histogram features.
Multim. Tools Appl., 2015

Detection of perturbed quantization class stego images based on possible change modes.
J. Electronic Imaging, 2015

Steganalysis of Adaptive JPEG Steganography by Selecting DCT Coefficients According to Embedding Distortion.
KSII Trans. Internet Inf. Syst., 2015

A study on JPEG steganalytic features: Co-occurrence matrix vs. Markov transition probability matrix.
Digit. Investig., 2015

An Algorithm of City-Level Landmark Mining Based on Internet Forum.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters.
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015

City-Level Geolocation Based on Routing Feature.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

A JPEG-Compression Resistant Adaptive Steganography Based on Relative Relationship between DCT Coefficients.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
On Data and Virtualization Security Risks and Solutions of Cloud Computing.
J. Networks, 2014

Recognizing F5-like Stego images from Multi-class JPEG Stego Images.
KSII Trans. Internet Inf. Syst., 2014

Selection of image features for steganalysis based on the Fisher criterion.
Digit. Investig., 2014

2013
Rule-Based Security Capabilities Matching for Web Services.
Wirel. Pers. Commun., 2013

Pixel Group Trace Model-Based Quantitative Steganalysis for Multiple Least-Significant Bits Steganography.
IEEE Trans. Inf. Forensics Secur., 2013

A transcoding-resistant video watermarking algorithm based on corners and singular value decomposition.
Telecommun. Syst., 2013

Steganalysis of a PVD-based content adaptive image steganography.
Signal Process., 2013

A System for Extracting and Ranking Name Aliases in Emails.
J. Softw., 2013

Fusion of Two Typical Quantitative Steganalysis Based on SVR.
J. Softw., 2013

Model of Domain based RBAC and Supporting Technologies.
J. Comput., 2013

Embedding change rate estimation based on ensemble learning.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

Steganalysis of F5-like steganography based on selection of joint distribution features.
Proceedings of the International Conference on Internet Multimedia Computing and Service, 2013

2012
Steganalysis of adaptive image steganography in multiple gray code bit-planes.
Multim. Tools Appl., 2012

Parameter-estimation and algorithm-selection based United-Judgment for image steganalysis.
Multim. Tools Appl., 2012

Blind image steganalysis based on wavelet coefficient correlation.
Digit. Investig., 2012

Abstract interpretation-based semantic framework for software birthmark.
Comput. Secur., 2012

Weighted Stego-Image Steganalysis of Messages Hidden into Each Bit Plane.
Comput. J., 2012

On F5 Steganography in Images.
Comput. J., 2012

LSB Replacement Steganography Software Detection Based on Model Checking.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

2011
On the Typical Statistic Features for Image Blind Steganalysis.
IEEE J. Sel. Areas Commun., 2011

Software Watermarking Through Obfuscated Interpretation: Implementation and Analysis.
J. Multim., 2011

Identification of steganography software based on register dependence.
Int. J. Multim. Intell. Secur., 2011

Pulse position checking-based steganalysis of G.723.1 compressed speech in VoIP.
Int. J. Multim. Intell. Secur., 2011

2010
Image universal steganalysis based on best wavelet packet decomposition.
Sci. China Inf. Sci., 2010

Modification ratio estimation for a category of adaptive steganography.
Sci. China Inf. Sci., 2010

2009
Classification between PS and Stego Images Based on Noise Model.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009

Embedding Ratio Estimating for Each Bit Plane of Image.
Proceedings of the Information Hiding, 11th International Workshop, 2009

2008
Steganalysis Frameworks of Embedding in Multiple Least-Significant Bits.
IEEE Trans. Inf. Forensics Secur., 2008

A review on blind detection for image steganography.
Signal Process., 2008

Image universal steganalysis based on wavelet packet transform.
Proceedings of the International Workshop on Multimedia Signal Processing, 2008

2007
LTSB Steganalysis Based on Quartic Equation.
Trans. Data Hiding Multim. Secur., 2007

A Software Birthmark Based on Dynamic Opcode n-gram.
Proceedings of the First IEEE International Conference on Semantic Computing (ICSC 2007), 2007

Secret Key Estimation for Image Sequential Steganograph in Transform Domain.
Proceedings of the Global Communications Conference, 2007

2006
Searching and Detecting Spatial LSB Steganographic Images on the Internet.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2006

Real-Time Steganography in Compressed Video.
Proceedings of the Multimedia Content Representation, 2006

A Chaos-Based Robust Software Watermarking.
Proceedings of the Information Security Practice and Experience, 2006

Fast and Blind Restoration Scheme for the Initial States of LFSRs.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

An Improved Secret Key Estimation Method for Sequential Steganography.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods.
Proceedings of the Communications and Multimedia Security, 2006

2005
Blind recognition of punctured convolutional codes.
Sci. China Ser. F Inf. Sci., 2005

Detecting LSB Steganography Based on Dynamic Masks.
Proceedings of the Fifth International Conference on Intelligent Systems Design and Applications (ISDA 2005), 2005

Improved RS Method for Detection of LSB Steganography.
Proceedings of the Computational Science and Its Applications, 2005

2004
Equivalence of Punctured Convolutional Codes from Shift Equivalent Puncturing Patterns.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Blind recognition of punctured convolutional codes.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

An Improved Sample Pairs Method for Detection of LSB Embedding.
Proceedings of the Information Hiding, 6th International Workshop, 2004


  Loading...