Zichi Wang

Orcid: 0000-0003-0283-5338

According to our database1, Zichi Wang authored at least 51 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Robust Image Hashing in Encrypted Domain.
IEEE Trans. Emerg. Top. Comput. Intell., February, 2024

Semi-fragile neural network watermarking for content authentication and tampering localization.
Expert Syst. Appl., February, 2024

Multi-Source Style Transfer via Style Disentanglement Network.
IEEE Trans. Multim., 2024

Robust Image Steganography Against General Downsampling Operations With Lossless Secret Recovery.
IEEE Trans. Dependable Secur. Comput., 2024

2023
Robust zero-watermarking scheme using DT CWT and improved differential entropy for color medical images.
J. King Saud Univ. Comput. Inf. Sci., September, 2023

Data hiding during image processing using capsule networks.
Neurocomputing, June, 2023

Exploring Abnormal Behavior in Swarm: Identify User Using Adversarial Examples.
IEEE Trans. Emerg. Top. Comput. Intell., February, 2023

Cover Selection for Steganography Using Image Similarity.
IEEE Trans. Dependable Secur. Comput., 2023

JPEG Steganography With Content Similarity Evaluation.
IEEE Trans. Cybern., 2023

Steganalysis of Neural Networks Based on Symmetric Histogram Distribution.
Symmetry, 2023

An Effective Framework for Intellectual Property Protection of NLG Models.
Symmetry, 2023

A general steganographic framework for neural network models.
Inf. Sci., 2023

Generative Steganography Diffusion.
CoRR, 2023

2022
Unified Performance Evaluation Method for Perceptual Image Hashing.
IEEE Trans. Inf. Forensics Secur., 2022

Repeatable Data Hiding: Towards the Reusability of Digital Images.
IEEE Trans. Circuits Syst. Video Technol., 2022

Multisource Data Hiding in Digital Images.
Symmetry, 2022

Deniable Steganography.
CoRR, 2022

Multi-source Data Hiding in Neural Networks.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022

Robust Watermarking for Neural Network Models Using Residual Network.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022

Perceptual Model Hashing: Towards Neural Network Model Authentication.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022

2021
Batch Steganography via Generative Network.
IEEE Trans. Circuits Syst. Video Technol., 2021

Reversible Privacy Protection with the Capability of Antiforensics.
Secur. Commun. Networks, 2021

Multichannel Steganography in Digital Images for Multiple Receivers.
IEEE Multim., 2021

Data Hiding in Neural Networks for Multiple Receivers [Research Frontier].
IEEE Comput. Intell. Mag., 2021

2020
A New Steganography Method for Dynamic GIF Images Based on Palette Sort.
Wirel. Commun. Mob. Comput., 2020

Practical Cover Selection for Steganography.
IEEE Signal Process. Lett., 2020

Computing in Covert Domain Using Data Hiding.
CoRR, 2020

Data Computing in Covert Domain.
Proceedings of the Security and Privacy in Digital Economy, 2020

Steganographic Distortion Function for Enhanced Images.
Proceedings of the Digital Forensics and Watermarking - 19th International Workshop, 2020

Hierarchical High Capacity Data Hiding in JPEG Crypto-compressed Images.
Proceedings of the 28th European Signal Processing Conference, 2020

2019
Towards Robust Image Steganography.
IEEE Trans. Circuits Syst. Video Technol., 2019

基于DCT域相关性的非对称JPEG隐写 (Asymmetric JPEG Steganography Based on Correlation in DCT Domain).
计算机科学, 2019

Privacy protection based on binary fingerprint compression.
J. Real Time Image Process., 2019

Steganography in stylized images.
J. Electronic Imaging, 2019

Asymmetric Distortion Function for JPEG Steganography Using Block Artifact Compensation.
Int. J. Digit. Crime Forensics, 2019

Breaking Steganography: Slight Modification with Distortion Minimization.
Int. J. Digit. Crime Forensics, 2019

Secure Cover Selection for Steganography.
IEEE Access, 2019

Towards Improved Steganalysis: When Cover Selection is Used in Steganography.
IEEE Access, 2019

An Improved Steganalysis Method Using Feature Combinations.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

2018
Joint Cover-Selection and Payload-Allocation by Steganographic Distortion Optimization.
IEEE Signal Process. Lett., 2018

Distortion function based on residual blocks for JPEG steganography.
Multim. Tools Appl., 2018

On Improving Distortion Functions for JPEG Steganography.
IEEE Access, 2018

Reversible Contrast Mapping based Reversible Data Hiding in Encrypted Images.
Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, 2018

Distortion Function for Steganography in Texture Synthesized Images.
Proceedings of the Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2018

Single Actor Pooled Steganalysis.
Proceedings of the Genetic and Evolutionary Computing, 2018

Breaking CNN-Based Steganalysis.
Proceedings of the Genetic and Evolutionary Computing, 2018

Lost in the Digital Wild: Hiding Information in Digital Activities.
Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, 2018

2016
Lossless and Reversible Data Hiding in Encrypted Images With Public-Key Cryptography.
IEEE Trans. Circuits Syst. Video Technol., 2016

Hybrid distortion function for JPEG steganography.
J. Electronic Imaging, 2016

Distortion Function for Spatial Image Steganography Based on the Polarity of Embedding Change.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

2015
Reversible visible watermark embedded in encrypted domain.
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015


  Loading...