JPEG image encryption with improved format compatibility and file size preservation J He, S Huang, S Tang, J Huang IEEE Transactions on Multimedia 20 (10), 2645-2658, 2018 | 65 | 2018 |
A novel high-capacity reversible data hiding scheme for encrypted JPEG bitstreams J He, J Chen, W Luo, S Tang, J Huang IEEE Transactions on Circuits and Systems for Video Technology 29 (12), 3501 …, 2018 | 56 | 2018 |
Reversible data hiding in JPEG images based on negative influence models J He, J Chen, S Tang IEEE Transactions on Information Forensics and Security 15, 2121-2133, 2019 | 46 | 2019 |
A secure image sharing scheme with high quality stego-images based on steganography J He, W Lan, S Tang Multimedia Tools and Applications 76, 7677-7698, 2017 | 37 | 2017 |
Improved block ordering and frequency selection for reversible data hiding in JPEG images J He, X Pan, H Wu, S Tang Signal Processing 175, 107647, 2020 | 30 | 2020 |
An adaptive image steganography based on depth-varying embedding J He, S Tang, T Wu 2008 Congress on Image and Signal Processing 5, 660-663, 2008 | 29 | 2008 |
Steganalysis of stochastic modulation steganography J He, J Huang Science in China Series F 49, 273-285, 2006 | 17 | 2006 |
A novel selective encryption scheme for H. 264/AVC video with improved visual security J He, Y Xu, W Luo, S Tang, J Huang Signal Processing: Image Communication 89, 115994, 2020 | 16 | 2020 |
A new robust copyright protection scheme for digital image based on visual cryptography YB Xing, JH He 2010 International Conference on Wavelet Analysis and Pattern Recognition, 6-11, 2010 | 13 | 2010 |
A new approach to estimating hidden message length in stochastic modulation steganography J He, J Huang, G Qiu International Workshop on Digital Watermarking, 1-14, 2005 | 11 | 2005 |
Image Processing JJ Pan, YY Tang, YB Xing, JH He, ZH Xie, GD Liu, SQ Wu, ZJ Fang, ... | 10 | 2014 |
Two-dimensional histogram shifting-based reversible data hiding for H. 264/AVC video Y Xu, J He Applied Sciences 10 (10), 3375, 2020 | 8 | 2020 |
A novel AMR-WB speech steganography based on diameter-neighbor codebook partition J He, J Chen, S Xiao, X Huang, S Tang Security and Communication Networks 2018, 1-11, 2018 | 8 | 2018 |
On the security of steganographic techniques J He, S Tang, T Wu 2008 Congress on Image and Signal Processing 5, 716-719, 2008 | 8 | 2008 |
Reversible data hiding for JPEG images based on improved mapping and frequency ordering Y Chen, J He, Y Xian Signal Processing 198, 108604, 2022 | 4 | 2022 |
Steganalysis principle, actuality and prospect XP Liang, JH He, JQ Li, JW Huang Acta Scientiarum Natralium Universitatis Sunyatseni 43 (6), 93-96, 2004 | 4 | 2004 |
Reversible image visual transformation for privacy and content protection HT Wu, R Jia, JL Dugelay, J He Multimedia Tools and Applications 80, 30863-30877, 2021 | 3 | 2021 |
Kernel analysis based on SVDD for face recognition from image set QS Zeng, XY Huang, XH Xiang, J He Journal of Intelligent & Fuzzy Systems 36 (6), 5499-5511, 2019 | 3 | 2019 |
Model-based steganalytic method towards color jpeg images H Junhui, T Shaohua, L Bin Journal of Computational Information Systems 3 (6), 2293-2302, 2007 | 3 | 2007 |
Steganalysis for color JPEG images. JH He, JW Huang Dianzi Xuebao(Acta Electronica Sinica) 33 (12), 2543-2548, 2005 | 2 | 2005 |