Lossless and reversible data hiding in encrypted images with public-key cryptography X Zhang, J Long, Z Wang, H Cheng IEEE transactions on circuits and systems for video technology 26 (9), 1622-1631, 2015 | 335 | 2015 |
Towards robust image steganography J Tao, S Li, X Zhang, Z Wang IEEE Transactions on Circuits and Systems for Video Technology 29 (2), 594-600, 2018 | 177 | 2018 |
On improving distortion functions for JPEG steganography Z Wang, Z Qian, X Zhang, M Yang, D Ye IEEE Access 6, 74917-74930, 2018 | 58 | 2018 |
Joint cover-selection and payload-allocation by steganographic distortion optimization Z Wang, X Zhang, Z Yin IEEE Signal Processing Letters 25 (10), 1530-1534, 2018 | 55 | 2018 |
Distortion function based on residual blocks for JPEG steganography Q Wei, Z Yin, Z Wang, X Zhang Multimedia Tools and Applications 77, 17875-17888, 2018 | 45 | 2018 |
Hybrid distortion function for JPEG steganography Z Wang, X Zhang, Z Yin Journal of Electronic Imaging 25 (5), 050501-050501, 2016 | 44 | 2016 |
Secure cover selection for steganography Z Wang, X Zhang IEEE Access 7, 57857-57867, 2019 | 36 | 2019 |
Batch steganography via generative network N Zhong, Z Qian, Z Wang, X Zhang, X Li IEEE Transactions on Circuits and Systems for Video Technology 31 (1), 88-97, 2020 | 30 | 2020 |
Practical cover selection for steganography Z Wang, X Zhang, Z Qian IEEE Signal Processing Letters 27, 71-75, 2019 | 27 | 2019 |
Unified performance evaluation method for perceptual image hashing X Li, C Qin, Z Wang, Z Qian, X Zhang IEEE Transactions on Information Forensics and Security 17, 1404-1419, 2022 | 25 | 2022 |
JPEG steganography with content similarity evaluation Z Wang, G Feng, Z Qian, X Zhang IEEE Transactions on Cybernetics 53 (8), 5082-5093, 2022 | 23 | 2022 |
Data hiding in iris image for privacy protection S Li, X Chen, Z Wang, Z Qian, X Zhang IETE technical review 35 (sup1), 34-41, 2018 | 22 | 2018 |
Reversible visible watermark embedded in encrypted domain X Zhang, Z Wang, J Yu, Z Qian 2015 IEEE China Summit and International Conference on Signal and …, 2015 | 19 | 2015 |
Generative steganography diffusion P Wei, Q Zhou, Z Wang, Z Qian, X Zhang, S Li arXiv preprint arXiv:2305.03472, 2023 | 18 | 2023 |
Cover selection for steganography using image similarity Z Wang, G Feng, L Shen, X Zhang IEEE Transactions on Dependable and Secure Computing 20 (3), 2328-2340, 2022 | 18 | 2022 |
Data hiding in neural networks for multiple receivers [research frontier] Z Wang, G Feng, H Wu, X Zhang IEEE Computational Intelligence Magazine 16 (4), 70-84, 2021 | 16 | 2021 |
Repeatable data hiding: Towards the reusability of digital images Z Wang, G Feng, X Zhang IEEE Transactions on Circuits and Systems for Video Technology 32 (1), 135-146, 2021 | 16 | 2021 |
Semi-fragile neural network watermarking for content authentication and tampering localization Z Yuan, X Zhang, Z Wang, Z Yin Expert Systems with Applications 236, 121315, 2024 | 15 | 2024 |
Multichannel steganography in digital images for multiple receivers Z Wang, G Feng, Y Ren, X Zhang IEEE MultiMedia 28 (1), 65-73, 2020 | 15 | 2020 |
Distortion function for JPEG steganography based on image texture and correlation in DCT domain Z Wang, Z Yin, X Zhang IETE Technical Review 35 (4), 351-358, 2018 | 15 | 2018 |