Xuehu Yan

Orcid: 0000-0001-6388-1720

According to our database1, Xuehu Yan authored at least 116 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Invisible backdoor learning in regional transform domain.
Neural Comput. Appl., May, 2024

MGE: A Training-Free and Efficient Model Generation and Enhancement Scheme.
CoRR, 2024

2023
Secret image sharing scheme with lossless recovery and high efficiency.
Signal Process., May, 2023

Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing.
Frontiers Inf. Technol. Electron. Eng., January, 2023

Fake and Dishonest Participant Immune Secret Image Sharing.
ACM Trans. Multim. Comput. Commun. Appl., 2023

2022
CTTGAN: Traffic Data Synthesizing Scheme Based on Conditional GAN.
Sensors, 2022

Wet Paper Coding-Based Deep Neural Network Watermarking.
Sensors, 2022

Sparse Adversarial Video Attacks via Superpixel-Based Jacobian Computation.
Sensors, 2022

Meaningful secret image sharing resist to typical image processing of shadows.
Multim. Tools Appl., 2022

Information hiding in the sharing domain.
J. Vis. Commun. Image Represent., 2022

Visual secret sharing scheme with (n, n) threshold based on WeChat Mini Program codes.
J. Vis. Commun. Image Represent., 2022

Comprehensive reversible secret image sharing with palette cover images.
J. Inf. Secur. Appl., 2022

Renewal of secret and shadows in secret image sharing.
IET Inf. Secur., 2022

MTS-Stega: Linguistic Steganography Based on Multi-Time-Step.
Entropy, 2022

A Novel General (n, n)-Threshold Multiple Secret Images Sharing Scheme Based on Information Hiding in the Sharing Domain.
Entropy, 2022

Minimum Adversarial Examples.
Entropy, 2022

Meaningful Secret Image Sharing with Saliency Detection.
Entropy, 2022

An Enhanced Steganography Network for Concealing and Protecting Secret Image Data.
Entropy, 2022

Generative Text Steganography via Multiple Social Network Channels Based on Transformers.
Proceedings of the Natural Language Processing and Chinese Computing, 2022

A General Steganalysis Method of QR Codes.
Proceedings of the Digital Forensics and Cyber Crime - 13th EAI International Conference, 2022

2021
Robust Secret Image Sharing Resistant to Noise in Shares.
ACM Trans. Multim. Comput. Commun. Appl., 2021

A Common Method of Share Authentication in Image Secret Sharing.
IEEE Trans. Circuits Syst. Video Technol., 2021

An Intragroup and Intergroup Multiple Secret Images' Sharing Scheme with Each Participant Holding One Shadow Image.
Secur. Commun. Networks, 2021

Weighted Polynomial-Based Secret Image Sharing Scheme with Lossless Recovery.
Secur. Commun. Networks, 2021

Data Hiding Based on Mini Program Code.
Secur. Commun. Networks, 2021

BAT: real-time inaudible sound capture with smartphones.
Multim. Tools Appl., 2021

A novel (k1, k2, n)-threshold two-in-one secret image sharing scheme for multiple secrets.
J. Vis. Commun. Image Represent., 2021

Multiparty verification in image secret sharing.
Inf. Sci., 2021

Applying Secret Image Sharing to Economics.
Int. J. Digit. Crime Forensics, 2021

An Audio Steganography Based on Run Length Encoding and Integer Wavelet Transform.
Int. J. Digit. Crime Forensics, 2021

Robust Secret Image Sharing Scheme Against Noise in Shadow Images.
IEEE Access, 2021

Data Hiding Based on Redundant Space of WeChat Mini Program Codes.
Proceedings of the Digital Forensics and Watermarking - 20th International Workshop, 2021

Comparison and analysis of secret image sharing principles.
Proceedings of the International Conference on Communications, 2021

2020
Reversible Image Secret Sharing.
IEEE Trans. Inf. Forensics Secur., 2020

Adaptive Partial Image Secret Sharing.
Symmetry, 2020

Secret image sharing with separate shadow authentication ability.
Signal Process. Image Commun., 2020

On the Value of Order Number and Power in Secret Image Sharing.
Secur. Commun. Networks, 2020

Penrose tiling for visual secret sharing.
Multim. Tools Appl., 2020

Weighted visual cryptographic scheme with improved image quality.
Multim. Tools Appl., 2020

Visual secret sharing scheme with (n, n) threshold for selective secret content based on QR codes.
Multim. Tools Appl., 2020

XOR-ed visual secret sharing scheme with robust and meaningful shadows based on QR codes.
Multim. Tools Appl., 2020

A Common General Access Structure Construction Approach in Secret Image Sharing.
Int. J. Digit. Crime Forensics, 2020

Application of random elements in ISS.
IET Image Process., 2020

Feature Selection for Image Steganalysis Using Binary Bat Algorithm.
IEEE Access, 2020

Improved wavelet domain centroid-based adaptive audio steganography.
Proceedings of the ICDSP 2020: 4th International Conference on Digital Signal Processing, 2020

2019
A general progressive secret image sharing construction method.
Signal Process. Image Commun., 2019

Polynomial-based extended secret image sharing scheme with reversible and unexpanded covers.
Multim. Tools Appl., 2019

Generalized general access structure in secret image sharing.
J. Vis. Commun. Image Represent., 2019

Security analysis and classification of image secret sharing.
J. Inf. Secur. Appl., 2019

A Novel Behavior Steganography Model Based on Secret Sharing.
Int. J. Digit. Crime Forensics, 2019

Weighted Secret Image Sharing for a $(k, n)$ Threshold Based on the Chinese Remainder Theorem.
IEEE Access, 2019

Lossless $(k, n)$ -Threshold Image Secret Sharing Based on the Chinese Remainder Theorem Without Auxiliary Encryption.
IEEE Access, 2019

Efficient and Lossless Polynomial-Based Secret Image Sharing for Color Images.
IEEE Access, 2019

Destructive Method with High Quality and Speed to Counter Information Hiding.
Proceedings of the Data Science, 2019

2018
Lossless and Efficient Polynomial-Based Secret Image Sharing with Reduced Shadow Size.
Symmetry, 2018

An Image Secret Sharing Method Based on Matrix Theory.
Symmetry, 2018

Chinese Remainder Theorem-Based Secret Image Sharing with Small-Sized Shadow Images.
Symmetry, 2018

Robust Visual Secret Sharing Scheme Applying to QR Code.
Secur. Commun. Networks, 2018

Progressive visual secret sharing for general access structure with multiple decryptions.
Multim. Tools Appl., 2018

Random grid-based threshold visual secret sharing with improved visual quality and lossless recovery ability.
Multim. Tools Appl., 2018

Greyscale-images-oriented progressive secret sharing based on the linear congruence equation.
Multim. Tools Appl., 2018

Partial secret image sharing for (k, n) threshold based on image inpainting.
J. Vis. Commun. Image Represent., 2018

An enhanced threshold visual secret sharing based on random grids.
J. Real Time Image Process., 2018

Participants increasing for threshold random grids-based visual secret sharing.
J. Real Time Image Process., 2018

Visual secret sharing scheme for (k, n) threshold based on QR code with multiple decryptions.
J. Real Time Image Process., 2018

Centroid-Based Audio Steganography Scheme in Wavelet Domain.
J. Inf. Hiding Multim. Signal Process., 2018

Image Secret Sharing Construction for General Access Structure with Meaningful Share.
Int. J. Digit. Crime Forensics, 2018

Polynomial-Based Secret Image Sharing Scheme with Fully Lossless Recovery.
Int. J. Digit. Crime Forensics, 2018

Chinese remainder theorem-based two-in-one image secret sharing with three decoding options.
Digit. Signal Process., 2018

General Meaningful Shadow Construction in Secret Image Sharing.
IEEE Access, 2018

2017
Homomorphic Visual Cryptography.
J. Inf. Hiding Multim. Signal Process., 2017

Exploiting the Homomorphic Property of Visual Cryptography.
Int. J. Digit. Crime Forensics, 2017

A Novel Visual Secret Sharing Scheme Based on QR Codes.
Int. J. Digit. Crime Forensics, 2017

A Novel Progressive Secret Image Sharing Scheme Based on Arithmetic Mean.
Int. J. Digit. Crime Forensics, 2017

Contrast-improved visual secret sharing based on random grid for general access structure.
Digit. Signal Process., 2017

Secret Image Sharing for (k, k) Threshold Based on Chinese Remainder Theorem and Image Characteristics.
Proceedings of the Image and Video Technology - 8th Pacific-Rim Symposium, 2017

Security Analysis of Secret Image Sharing.
Proceedings of the Data Science, 2017

Secret Data-Driven Carrier-Free Secret Sharing Scheme Based on Error Correction Blocks of QR Codes.
Proceedings of the Data Science, 2017

A Novel Progressive Secret Image Sharing Method with Better Robustness.
Proceedings of the Data Science, 2017

A General (k, n) Threshold Secret Image Sharing Construction Based on Matrix Theory.
Proceedings of the Data Science, 2017

Partial Secret Image Sharing for (n, n) Threshold Based on Image Inpainting.
Proceedings of the Image and Graphics - 9th International Conference, 2017

Chinese Remainder Theorem-Based Secret Image Sharing for (k, n) Threshold.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
Threshold progressive visual cryptography construction with unexpanded shares.
Multim. Tools Appl., 2016

Meaningful visual secret sharing based on error diffusion and random grids.
Multim. Tools Appl., 2016

Design a new visual cryptography for human-verifiable authentication in accessing a database.
J. Real Time Image Process., 2016

Perceptual Secret Sharing Scheme Based on Boolean Operations and Random Grids.
Proceedings of the Wireless Internet - 9th International Conference, 2016

High Capacity Embedding Methods of QR Code Error Correction.
Proceedings of the Wireless Internet - 9th International Conference, 2016

Visual Secret Sharing Scheme with (k, n) Threshold Based on QR Codes.
Proceedings of the 12th International Conference on Mobile Ad-Hoc and Sensor Networks, 2016

A Progressive Threshold Secret Image Sharing with Meaningful Shares for Gray-Scale Image.
Proceedings of the 12th International Conference on Mobile Ad-Hoc and Sensor Networks, 2016

Random Grids-Based Threshold Visual Secret Sharing with Improved Visual Quality.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Contrast-Improved Visual Cryptography for General Access Structure.
Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2016

Clarity Corresponding to Contrast in Visual Cryptography.
Proceedings of the Social Computing, 2016

2015
Threshold visual secret sharing with comprehensive properties based on random grids.
Signal Image Video Process., 2015

New approaches for efficient information hiding-based secret image sharing schemes.
Signal Image Video Process., 2015

A novel template protection scheme for multibiometrics based on fuzzy commitment and chaotic system.
Signal Image Video Process., 2015

Generalized random grids-based threshold visual cryptography with meaningful shares.
Signal Process., 2015

Random grids-based visual secret sharing with improved visual quality via error diffusion.
Multim. Tools Appl., 2015

Visual secret sharing based on random grids with abilities of AND and XOR lossless recovery.
Multim. Tools Appl., 2015

Random grid-based visual secret sharing with multiple decryptions.
J. Vis. Commun. Image Represent., 2015

A novel representation for Multi-Channel log-polar quantum images.
J. Inf. Hiding Multim. Signal Process., 2015

Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality.
Digit. Signal Process., 2015

2014
A Novel Perceptual Secret Sharing Scheme.
Trans. Data Hiding Multim. Secur., 2014

Threshold construction from specific cases in visual cryptography without the pixel expansion.
Signal Process., 2014

Random Girds-Based Threshold Visual Secret Sharing with Improved Contrast by Boolean Operations.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Progressive Visual Secret Sharing with Multiple Decryptions and Unexpanded Shares.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Equivalence Proof of Two (2, n) Progressive Visual Secret Sharing.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Flexible Quantum Image Secret Sharing Based on Measurement and Strip.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Essential Visual Cryptographic Scheme with Different Importance of Shares.
Proceedings of the Neural Information Processing - 21st International Conference, 2014

Threshold Visual Secret Sharing Based on Boolean Operations and Random Grids.
Proceedings of the Neural Information Processing - 21st International Conference, 2014

Equivalence Proof of Traditional and Random Grid-Based (2, 2) Visual Secret Sharing.
Proceedings of the Intelligent Data analysis and its Applications, Volume II, 2014

2013
Corrigendum to "T. Chen, K. Tsao, Threshold visual secret sharing by random grids" [J. Syst. Softw. 84(2011) 1197-1208].
J. Syst. Softw., 2013

A New Assessment Measure of Shadow Image Quality Based on Error Diffusion Techniques.
J. Inf. Hiding Multim. Signal Process., 2013

A Novel Hybrid Multibiometrics Based on the Fusion of Dual Iris, Visible and Thermal Face Images.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

2012
A Novel Coding Method for Multiple System Barcode Based on QR Code.
Proceedings of the Intelligent Information and Database Systems - 4th Asian Conference, 2012

2008
Research on the Capacity of Error-Correcting Codes-Based Information Hiding.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

2007
An Improved Algorithm for Iris Location.
Proceedings of the Computational Intelligence and Security, International Conference, 2007


  Loading...