Follow
Xiao-Wei Yi
Title
Cited by
Cited by
Year
AHCM: Adaptive Huffman code mapping for audio steganography based on psychoacoustic model
X Yi, K Yang, X Zhao, Y Wang, H Yu
IEEE Transactions on Information Forensics and Security 14 (8), 2217-2231, 2019
622019
CNN-based steganalysis of MP3 steganography in the entropy code domain
Y Wang, K Yang, X Yi, X Zhao, Z Xu
Proceedings of the 6th ACM workshop on information hiding and multimedia …, 2018
372018
Fake speech detection using residual network with transformer encoder
Z Zhang, X Yi, X Zhao
Proceedings of the 2021 ACM workshop on information hiding and multimedia …, 2021
342021
Adaptive MP3 steganography using equal length entropy codes substitution
K Yang, X Yi, X Zhao, L Zhou
International Workshop on Digital Watermarking, 202-216, 2017
262017
FMFCC-a: a challenging Mandarin dataset for synthetic speech detection
Z Zhang, Y Gu, X Yi, X Zhao
International Workshop on Digital Watermarking, 117-131, 2021
142021
Pitch delay based adaptive steganography for amr speech stream
C Gong, X Yi, X Zhao
International Workshop on Digital Watermarking, 275-289, 2018
142018
Mediumvc: Any-to-any voice conversion using synthetic specific-speaker speeches as intermedium features
Y Gu, Z Zhang, X Yi, X Zhao
arXiv preprint arXiv:2110.02500, 2021
132021
Recurrent convolutional neural networks for AMR steganalysis based on pulse position
C Gong, X Yi, X Zhao, Y Ma
Proceedings of the ACM Workshop on Information Hiding and Multimedia …, 2019
132019
RHFCN:: Fully CNN-based steganalysis of MP3 with rich high-pass filtering
Y Wang, X Yi, X Zhao, A Su
ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and …, 2019
132019
Detecting fingerprints of audio steganography software
C Gong, J Zhang, Y Yang, X Yi, X Zhao, Y Ma
Forensic Science International: Reports 2, 100075, 2020
122020
MP3 steganalysis based on joint point-wise and block-wise correlations
Y Wang, X Yi, X Zhao
Information Sciences 512, 1118-1133, 2020
112020
Defining joint embedding distortion for adaptive MP3 steganography
Y Yang, Y Wang, X Yi, X Zhao, Y Ma
Proceedings of the ACM Workshop on Information Hiding and Multimedia …, 2019
102019
A scalable encryption scheme for CCSDS image data compression standard
M Li, X Yi, H Ma
2010 IEEE International Conference on Information Theory and Information …, 2010
102010
An adaptive double-layered embedding scheme for MP3 steganography
Y Yang, H Yu, X Zhao, X Yi
IEEE Signal Processing Letters 27, 1984-1988, 2020
92020
A capacity self-adaption information hiding algorithm based on RS code
H Ma, X Yi, X Wu, D Gu, H Pan, C Zheng
2014 International Conference on Multisensor Fusion and Information …, 2014
92014
Deepfake video detection using audio-visual consistency
Y Gu, X Zhao, C Gong, X Yi
Digital Forensics and Watermarking: 19th International Workshop, IWDW 2020 …, 2021
82021
Improving audio steganalysis using deep residual networks
Z Zhang, X Yi, X Zhao
Digital Forensics and Watermarking: 18th International Workshop, IWDW 2019 …, 2020
72020
Aslnet: An encoder-decoder architecture for audio splicing detection and localization
Z Zhang, X Zhao, X Yi
Security and Communication Networks 2022, 2022
62022
An AAC steganography scheme for adaptive embedding with distortion minimization model
Z Zhang, X Yi, X Zhao
Multimedia Tools and Applications 79, 27777-27790, 2020
52020
Efficient authentication of scalable media streams over wireless networks
X Yi, G Zheng, M Li, H Ma, C Zheng
Multimedia tools and applications 71, 1913-1935, 2014
42014
The system can't perform the operation now. Try again later.
Articles 1–20