Follow
Hongxia Wang(王宏霞)
Title
Cited by
Cited by
Year
Anonymous authentication scheme for smart home environment with provable security
M Shuai, N Yu, H Wang, L Xiong
Computers & Security 86, 132-146, 2019
1782019
A survey of deep neural network watermarking techniques
Y Li, H Wang, M Barni
Neurocomputing 461, 171-193, 2021
1612021
Restudy on SVD-based watermarking scheme
MQ Fan, HX Wang, SK Li
Applied Mathematics and Computation 203 (2), 926-930, 2008
1172008
Video steganalysis against motion vector-based steganography by adding or subtracting one motion vector value
K Wang, H Zhao, H Wang
IEEE Transactions on Information Forensics and Security 9 (5), 741-751, 2014
1122014
Chaos-based discrete fractional Sine transform domain audio watermarking scheme
M Fan, H Wang
Computers & Electrical Engineering 35 (3), 506-516, 2009
962009
Efficient image encryption using a chaos-based PWL memristor
Z Lin, H Wang
IETE Technical Review 27 (4), 318-325, 2010
902010
Separable reversible data hiding for encrypted palette images with color partitioning and flipping verification
HZ Wu, YQ Shi, HX Wang, LN Zhou
IEEE Transactions on Circuits and Systems for Video Technology 27 (8), 1620-1631, 2016
862016
Detection of fake images via the ensemble of deep representations from multi color spaces
P He, H Li, H Wang
2019 IEEE international conference on image processing (ICIP), 2299-2303, 2019
782019
Fractal coding-based robust and alignment-free fingerprint image hashing
SM Abdullahi, H Wang, T Li
IEEE Transactions on Information Forensics and Security 15, 2587-2601, 2020
692020
Authentication and recovery algorithm for speech signal based on digital watermarking
Z Liu, F Zhang, J Wang, H Wang, J Huang
Signal Processing 123, 157-166, 2016
642016
An enhanced fragile watermarking scheme to digital image protection and self-recovery
MQ Fan, HX Wang
Signal Processing: Image Communication 66, 19-29, 2018
632018
Centroid-based semi-fragile audio watermarking in hybrid domain
HX Wang, MQ Fan
Science China Information Sciences 53, 619-633, 2010
612010
Image encryption based on chaos with PWL memristor in Chua's circuit
Z Lin, H Wang
2009 International Conference on Communications, Circuits and Systems, 964-968, 2009
532009
基于混沌映射的鲁棒性公开水印
王宏霞, 何晨, 丁科
软件学报 15 (8), 2004
532004
A novel speech content authentication algorithm based on Bessel–Fourier moments
Z Liu, H Wang
Digital Signal Processing 24, 197-208, 2014
482014
Adaptive video data hiding through cost assignment and STCs
Y Chen, H Wang, H Wu, Z Wu, T Li, A Malik
IEEE Transactions on Dependable and Secure Computing 18 (3), 1320-1335, 2021
452021
A reversible data hiding in encrypted image based on prediction-error estimation and location map
A Malik, HX Wang, Y Chen, AN Khan
Multimedia Tools and Applications 79, 11591-11614, 2020
432020
Perceptual hashing‐based image copy‐move forgery detection
H Wang, H Wang
Security and Communication Networks 2018 (1), 6853696, 2018
422018
A lightweight three-factor Anonymous authentication scheme with privacy protection for personalized healthcare applications
M Shuai, N Yu, H Wang, L Xiong, Y Li
Journal of Organizational and End User Computing (JOEUC) 33 (3), 1-18, 2021
412021
Frame-wise detection of double HEVC compression by learning deep spatio-temporal representations in compression domain
P He, H Li, H Wang, S Wang, X Jiang, R Zhang
IEEE Transactions on Multimedia 23, 3179-3192, 2020
372020
The system can't perform the operation now. Try again later.
Articles 1–20