Anonymous authentication scheme for smart home environment with provable security M Shuai, N Yu, H Wang, L Xiong Computers & Security 86, 132-146, 2019 | 178 | 2019 |
A survey of deep neural network watermarking techniques Y Li, H Wang, M Barni Neurocomputing 461, 171-193, 2021 | 161 | 2021 |
Restudy on SVD-based watermarking scheme MQ Fan, HX Wang, SK Li Applied Mathematics and Computation 203 (2), 926-930, 2008 | 117 | 2008 |
Video steganalysis against motion vector-based steganography by adding or subtracting one motion vector value K Wang, H Zhao, H Wang IEEE Transactions on Information Forensics and Security 9 (5), 741-751, 2014 | 112 | 2014 |
Chaos-based discrete fractional Sine transform domain audio watermarking scheme M Fan, H Wang Computers & Electrical Engineering 35 (3), 506-516, 2009 | 96 | 2009 |
Efficient image encryption using a chaos-based PWL memristor Z Lin, H Wang IETE Technical Review 27 (4), 318-325, 2010 | 90 | 2010 |
Separable reversible data hiding for encrypted palette images with color partitioning and flipping verification HZ Wu, YQ Shi, HX Wang, LN Zhou IEEE Transactions on Circuits and Systems for Video Technology 27 (8), 1620-1631, 2016 | 86 | 2016 |
Detection of fake images via the ensemble of deep representations from multi color spaces P He, H Li, H Wang 2019 IEEE international conference on image processing (ICIP), 2299-2303, 2019 | 78 | 2019 |
Fractal coding-based robust and alignment-free fingerprint image hashing SM Abdullahi, H Wang, T Li IEEE Transactions on Information Forensics and Security 15, 2587-2601, 2020 | 69 | 2020 |
Authentication and recovery algorithm for speech signal based on digital watermarking Z Liu, F Zhang, J Wang, H Wang, J Huang Signal Processing 123, 157-166, 2016 | 64 | 2016 |
An enhanced fragile watermarking scheme to digital image protection and self-recovery MQ Fan, HX Wang Signal Processing: Image Communication 66, 19-29, 2018 | 63 | 2018 |
Centroid-based semi-fragile audio watermarking in hybrid domain HX Wang, MQ Fan Science China Information Sciences 53, 619-633, 2010 | 61 | 2010 |
Image encryption based on chaos with PWL memristor in Chua's circuit Z Lin, H Wang 2009 International Conference on Communications, Circuits and Systems, 964-968, 2009 | 53 | 2009 |
基于混沌映射的鲁棒性公开水印 王宏霞, 何晨, 丁科 软件学报 15 (8), 2004 | 53 | 2004 |
A novel speech content authentication algorithm based on Bessel–Fourier moments Z Liu, H Wang Digital Signal Processing 24, 197-208, 2014 | 48 | 2014 |
Adaptive video data hiding through cost assignment and STCs Y Chen, H Wang, H Wu, Z Wu, T Li, A Malik IEEE Transactions on Dependable and Secure Computing 18 (3), 1320-1335, 2021 | 45 | 2021 |
A reversible data hiding in encrypted image based on prediction-error estimation and location map A Malik, HX Wang, Y Chen, AN Khan Multimedia Tools and Applications 79, 11591-11614, 2020 | 43 | 2020 |
Perceptual hashing‐based image copy‐move forgery detection H Wang, H Wang Security and Communication Networks 2018 (1), 6853696, 2018 | 42 | 2018 |
A lightweight three-factor Anonymous authentication scheme with privacy protection for personalized healthcare applications M Shuai, N Yu, H Wang, L Xiong, Y Li Journal of Organizational and End User Computing (JOEUC) 33 (3), 1-18, 2021 | 41 | 2021 |
Frame-wise detection of double HEVC compression by learning deep spatio-temporal representations in compression domain P He, H Li, H Wang, S Wang, X Jiang, R Zhang IEEE Transactions on Multimedia 23, 3179-3192, 2020 | 37 | 2020 |