The Real-Time Steganography Based on Audio-to-Audio Data Bit Steam X Huang, R Kawashima, N Segawa, Y Abe IEICE Technical Report; IEICE Tech. Rep. 106 (235), 15-22, 2006 | 20 | 2006 |
A Fast and Low-Distortion Capacity Adaptive Synchronized Acoustic-to-Acoustic Steganography Scheme X Huang, Y Abe, I Echizen Recent Advances in Information Hiding and Applications, 181-209, 2013 | 19 | 2013 |
Reversible audio information hiding based on integer DCT coefficients with adaptive hiding locations X Huang, N Ono, I Echizen, A Nishimura Digital-Forensics and Watermarking: 12th International Workshop, IWDW 2013 …, 2014 | 18 | 2014 |
A new approach of reversible acoustic steganography for tampering detection X Huang, I Echizen, A Nishimura 2010 Sixth International Conference on Intelligent Information Hiding and …, 2010 | 17 | 2010 |
A reversible acoustic steganography for integrity verification X Huang, A Nishimura, I Echizen Digital Watermarking: 9th International Workshop, IWDW 2010, Seoul, Korea …, 2011 | 16 | 2011 |
Design and implementation of synchronized audio-to-audio steganography scheme X Huang, R Kawashima, N Segawa, Y Abe 2008 International Conference on Intelligent Information Hiding and …, 2008 | 16 | 2008 |
Reversible audio information hiding for tampering detection and localization using sample scanning method X Huang, N Ono, A Nishimura, I Echizen Journal of Information Processing 25, 469-476, 2017 | 7 | 2017 |
Privacy-preserving hypothesis testing for reduced cancer risk on daily physical activity H Kikuchi, X Huang, S Ikuji, M Inoue Journal of Medical Systems 42, 1-12, 2018 | 4 | 2018 |
Imperceptible and Reversible Acoustic Watermarking Based on Modified Integer Discrete Cosine Transform Coefficient Expansion X Huang, A Ito Applied Sciences 14 (7), 2757, 2024 | 3 | 2024 |
Watermarking based data spoofing detection against speech synthesis and impersonation with spectral noise perturbation X Huang 2018 IEEE International Conference on Big Data (Big Data), 4600-4604, 2018 | 3 | 2018 |
Privacy preserved spectral analysis using IoT mHealth biomedical data for stress estimation X Huang, H Kikuchi, CI Fan 2018 IEEE 32nd International Conference on Advanced Information Networking …, 2018 | 3 | 2018 |
Mechanism and implementation of watermarked sample scanning method for speech data tampering detection X Huang Proceedings of the 2nd International Workshop on Multimedia Privacy and …, 2018 | 3 | 2018 |
Mitigate: Toward Comprehensive Research and Development for Analyzing and Combating IoT Malware K Nakao, K Yoshioka, T Sasaki, R Tanabe, X Huang, T Takahashi, ... IEICE TRANSACTIONS on Information and Systems 106 (9), 1302-1315, 2023 | 2 | 2023 |
Simulation of security notification by ISP to malware-infected users X Huang, S Mochizuki, A Fujita, K Yoshioka IEICE Technical Report; IEICE Tech. Rep., 2022 | 2 | 2022 |
Connection Type Identification and Uplink Speed Estimation of Malware Infected Hosts X Huang, S Mochizuki, K Yoshioka Journal of Information Processing 30, 859-864, 2022 | 2 | 2022 |
A Study on Variable Embedding Locations of Reversible Spectral Speech Watermarking X Huang, A Ito 2024 Asia Pacific Signal and Information Processing Association Annual …, 2024 | 1 | 2024 |
Simulating and Estimating the Effectiveness of Security Notification by ISP to Malware-Infected Users X Huang, S Mochizuki, A Fujita, K Yoshioka Journal of Information Processing 31, 165-173, 2023 | 1 | 2023 |
A New Watermarking Scheme Based on SIFT Feature Points with Reversible Rotation X Huang 2019 First International Conference on Digital Data Processing (DDP), 59-64, 2019 | 1 | 2019 |
A reversible and imperceptible acoustic watermarking using partially-applied huffman lossless compression X Huang International Journal of advances in computer science & its applications …, 2015 | 1 | 2015 |
A reversible and tampering detective steganography for probative acoustic data using lossless compression X Huang, A Nishimura, I Echizen IEICE Technical Report; IEICE Tech. Rep. 111 (209), 41-46, 2011 | 1 | 2011 |