AHCM: Adaptive Huffman code mapping for audio steganography based on psychoacoustic model X Yi, K Yang, X Zhao, Y Wang, H Yu IEEE Transactions on Information Forensics and Security 14 (8), 2217-2231, 2019 | 62 | 2019 |
CNN-based steganalysis of MP3 steganography in the entropy code domain Y Wang, K Yang, X Yi, X Zhao, Z Xu Proceedings of the 6th ACM workshop on information hiding and multimedia …, 2018 | 37 | 2018 |
Fake speech detection using residual network with transformer encoder Z Zhang, X Yi, X Zhao Proceedings of the 2021 ACM workshop on information hiding and multimedia …, 2021 | 34 | 2021 |
Adaptive MP3 steganography using equal length entropy codes substitution K Yang, X Yi, X Zhao, L Zhou International Workshop on Digital Watermarking, 202-216, 2017 | 26 | 2017 |
FMFCC-a: a challenging Mandarin dataset for synthetic speech detection Z Zhang, Y Gu, X Yi, X Zhao International Workshop on Digital Watermarking, 117-131, 2021 | 14 | 2021 |
Pitch delay based adaptive steganography for amr speech stream C Gong, X Yi, X Zhao International Workshop on Digital Watermarking, 275-289, 2018 | 14 | 2018 |
Mediumvc: Any-to-any voice conversion using synthetic specific-speaker speeches as intermedium features Y Gu, Z Zhang, X Yi, X Zhao arXiv preprint arXiv:2110.02500, 2021 | 13 | 2021 |
Recurrent convolutional neural networks for AMR steganalysis based on pulse position C Gong, X Yi, X Zhao, Y Ma Proceedings of the ACM Workshop on Information Hiding and Multimedia …, 2019 | 13 | 2019 |
RHFCN:: Fully CNN-based steganalysis of MP3 with rich high-pass filtering Y Wang, X Yi, X Zhao, A Su ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and …, 2019 | 13 | 2019 |
Detecting fingerprints of audio steganography software C Gong, J Zhang, Y Yang, X Yi, X Zhao, Y Ma Forensic Science International: Reports 2, 100075, 2020 | 12 | 2020 |
MP3 steganalysis based on joint point-wise and block-wise correlations Y Wang, X Yi, X Zhao Information Sciences 512, 1118-1133, 2020 | 11 | 2020 |
Defining joint embedding distortion for adaptive MP3 steganography Y Yang, Y Wang, X Yi, X Zhao, Y Ma Proceedings of the ACM Workshop on Information Hiding and Multimedia …, 2019 | 10 | 2019 |
A scalable encryption scheme for CCSDS image data compression standard M Li, X Yi, H Ma 2010 IEEE International Conference on Information Theory and Information …, 2010 | 10 | 2010 |
An adaptive double-layered embedding scheme for MP3 steganography Y Yang, H Yu, X Zhao, X Yi IEEE Signal Processing Letters 27, 1984-1988, 2020 | 9 | 2020 |
A capacity self-adaption information hiding algorithm based on RS code H Ma, X Yi, X Wu, D Gu, H Pan, C Zheng 2014 International Conference on Multisensor Fusion and Information …, 2014 | 9 | 2014 |
Deepfake video detection using audio-visual consistency Y Gu, X Zhao, C Gong, X Yi Digital Forensics and Watermarking: 19th International Workshop, IWDW 2020 …, 2021 | 8 | 2021 |
Improving audio steganalysis using deep residual networks Z Zhang, X Yi, X Zhao Digital Forensics and Watermarking: 18th International Workshop, IWDW 2019 …, 2020 | 7 | 2020 |
Aslnet: An encoder-decoder architecture for audio splicing detection and localization Z Zhang, X Zhao, X Yi Security and Communication Networks 2022, 2022 | 6 | 2022 |
An AAC steganography scheme for adaptive embedding with distortion minimization model Z Zhang, X Yi, X Zhao Multimedia Tools and Applications 79, 27777-27790, 2020 | 5 | 2020 |
Efficient authentication of scalable media streams over wireless networks X Yi, G Zheng, M Li, H Ma, C Zheng Multimedia tools and applications 71, 1913-1935, 2014 | 4 | 2014 |