Zhi-Hui Wang

According to our database1, Zhi-Hui Wang authored at least 42 papers between 2008 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Blind Image Deblurring via Adaptive Optimization with Flexible Sparse Structure Control.
J. Comput. Sci. Technol., 2019

Multi-Instance Sketch to Image Synthesis With Progressive Generative Adversarial Networks.
IEEE Access, 2019

Dual-Independent-Output Inverter for Dynamic Wireless Power Transfer System.
IEEE Access, 2019

2018
New Secret Sharing Scheme Based on Faster R-CNNs Image Retrieval.
IEEE Access, 2018

2017
An Optimized CLBP Descriptor Based on a Scalable Block Size for Texture Classification.
TIIS, 2017

A Verifiable E-voting Scheme with Secret Sharing.
I. J. Network Security, 2017

Performance Analysis for Content Distribution in Crowdsourced Content-Centric Mobile Networking.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2017

2016
Progressive secret image sharing scheme using meaningful shadows.
Security and Communication Networks, 2016

A Robust and Removable Watermarking Scheme Using Singular Value Decomposition.
TIIS, 2016

A magic cube based information hiding scheme of large payload.
J. Inf. Sec. Appl., 2016

Reversible Data Hiding Based on Geometric Structure of Pixel Groups.
I. J. Network Security, 2016

Efficient Pixel Prediction Algorithm for Reversible Data Hiding.
I. J. Network Security, 2016

2015
Sharing a Large Secret Image Using Meaningful Shadows Based on VQ and Inpainting.
TIIS, 2015

A Novel Proactive Multi-secret Sharing Scheme.
I. J. Network Security, 2015

2014
Lossless VQ Indices Compression Based on the High Correlation of Adjacent Image Blocks.
TIIS, 2014

A Novel Reversible Chinese Text Information Hiding Scheme based on Lookalike Traditional and Simplified Chinese Characters.
TIIS, 2014

A Simple Password Authentication Scheme Based on Geometric Hashing Function.
I. J. Network Security, 2014

An Adaptable (n, n) Secret Image Sharing Mechanism Based on Boolean Operation.
I. J. Network Security, 2014

2013
An Image Data Hiding Scheme Based on Vector Quantization and Graph Coloring.
Proceedings of the Recent Advances in Information Hiding and Applications, 2013

Single Bitmap Block Truncation Coding of Color Images Using Cat Swarm Optimization.
Proceedings of the Recent Advances in Information Hiding and Applications, 2013

Lossless Information Hiding in the VQ Index Table.
JSW, 2013

A high-performance reversible data-hiding scheme for LZW codes.
Journal of Systems and Software, 2013

Histogram-shifting-imitated reversible data hiding.
Journal of Systems and Software, 2013

An Efficient Smart Card Based Authentication Scheme Using Image Encryption.
J. Inf. Sci. Eng., 2013

2012
Optimizing least-significant-bit substitution using cat swarm optimization strategy.
Inf. Sci., 2012

Reversible Data Hiding Scheme Based on Image Inpainting.
Fundam. Inform., 2012

2011
A Simple Image Encoding Method with Data Lossless Information Hiding.
JNW, 2011

A Secret Image Sharing Scheme with High Quality Shadows Based on Exploiting Modification Direction.
Journal of Multimedia, 2011

Secure Key Transfer Protocol Based on Secret Sharing for Group Communications.
IEICE Transactions, 2011

Image Data Hiding Schemes Based on Graph Coloring.
Proceedings of the Ubiquitous Intelligence and Computing - 8th International Conference, 2011

A Two-Layer Steganography Scheme Using Sudoku for Digital Images.
Proceedings of the Ubiquitous Intelligence and Computing - 8th International Conference, 2011

2010
An encoding method for both image compression and data lossless information hiding.
Journal of Systems and Software, 2010

Hiding Secret Data in an Image Using Codeword Imitation.
JIPS, 2010

A Sudoku-based Secret Image Sharing Scheme with Reversibility (Invited Paper).
JCM, 2010

A data-hiding scheme based on one-way hash function.
IJMIS, 2010

A simple image encoding method with data lossless information hiding.
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010

A technique of embedding digital data in an image compression code reversibly.
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, 2010

2009
A reversible information hiding scheme using left-right and up-down chinese character representation.
Journal of Systems and Software, 2009

Sharing Secrets and Reversibly Reconstructing the Cover Image Using Two Meaningful Shadows.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Reversible Steganography for VQ Indices Using the Modified State Codebook.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

A New Intelligent Authorization Agent Model in Grid.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

2008
Granularity Considering in a Trust Model for P2P Networks.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008


  Loading...