Color image zero-watermarking based on fast quaternion generic polar complex exponential transform H Yang, S Qi, P Niu, X Wang Signal Processing: Image Communication 82, 2020 | 77 | 2020 |
A survey of orthogonal moments for image representation: Theory, implementation, and evaluation S Qi, Y Zhang, C Wang, J Zhou, X Cao ACM Computing Surveys 55 (1), 1-35, 2021 | 55 | 2021 |
Security and privacy on generative data in AIGC: A survey T Wang, Y Zhang, S Qi, R Zhao, Z Xia, J Weng ACM Computing Surveys 57 (4), 1 - 34, 2024 | 45 | 2024 |
Robust and discriminative image representation: Fractional-order Jacobi-Fourier moments H Yang, S Qi, J Tian, P Niu, X Wang Pattern Recognition 115, 2021 | 33 | 2021 |
Image analysis by log-polar Exponent-Fourier moments H Yang, S Qi, C Wang, S Yang, X Wang Pattern Recognition 101, 2020 | 27 | 2020 |
A principled design of image representation: Towards forensic tasks S Qi, Y Zhang, C Wang, J Zhou, X Cao IEEE Transactions on Pattern Analysis and Machine Intelligence 45 (5), 5337 …, 2022 | 23 | 2022 |
Shrinking the semantic gap: Spatial pooling of local moment invariants for copy-move forgery detection C Wang, Z Huang, S Qi, Y Yu, G Shen, Y Zhang IEEE Transactions on Information Forensics and Security 18, 1064 - 1079, 2023 | 22 | 2023 |
Copy-move forgery detection based on adaptive keypoints extraction and matching H Yang, S Qi, Y Niu, P Niu, X Wang Multimedia Tools and Applications 78 (24), 34585-34612, 2019 | 19 | 2019 |
PRNU-based image forgery localization with deep multi-scale fusion Y Zhang, Q Tan, S Qi*, M Xue ACM Transactions on Multimedia Computing, Communications, and Applications …, 2023 | 13 | 2023 |
Joint coverless steganography and image transformation for covert communication of secret messages W Wen, H Huang, S Qi, Y Zhang, Y Fang IEEE Transactions on Network Science and Engineering 11 (3), 2951 - 2962, 2024 | 10 | 2024 |
Localization of inpainting forgery with feature enhancement network Y Zhang, Z Fu, S Qi*, M Xue, Z Hua, Y Xiang IEEE Transactions on Big Data 9 (3), 936 - 948, 2022 | 8 | 2022 |
Detection of recolored image by texture features in chrominance components Y Zhang, N Chen, S Qi*, M Xue, Z Hua ACM Transactions on Multimedia Computing, Communications and Applications 19 …, 2023 | 6 | 2023 |
PPM-SEM: A privacy-preserving mechanism for sharing electronic patient records and medical images in telemedicine W Wen, Z Yuan, S Qi, Y Zhang, Y Fang IEEE Transactions on Multimedia 26, 5795 - 5806, 2023 | 5 | 2023 |
Representing noisy image without denoising S Qi, Y Zhang, C Wang, T Xiang, X Cao, Y Xiang IEEE Transactions on Pattern Analysis and Machine Intelligence 46 (10), 6713 …, 2024 | 3 | 2024 |
Spatial-frequency discriminability for revealing adversarial perturbations C Wang, S Qi*, Z Huang, Y Zhang, R Lan, X Cao, F Fan IEEE Transactions on Circuits and Systems for Video Technology 34 (12 …, 2024 | 2 | 2024 |
PS-Net: A learning strategy for accurately exposing the professional Photoshop inpainting Y Zhang, Z Fu, S Qi*, M Xue, X Cao, Y Xiang IEEE Transactions on Neural Networks and Learning Systems 34 (10), 13874 - 13886, 2023 | 2 | 2023 |
MLVPP: Multilevel visual privacy protection via thumbnail preservation and key sharing W Wen, H Huang, S Qi, Y Zhang, Y Fang IEEE Transactions on Computational Social Systems 12 (1), 140 - 151, 2024 | 1 | 2024 |
Hierarchical invariance for robust and interpretable vision tasks at larger scales S Qi, Y Zhang, C Wang, Z Xia, X Cao, J Weng arXiv preprint, 2024 | 1 | 2024 |
Representing blurred image without deblurring S Qi, Y Zhang, C Wang, R Lan Mathematics 11 (10), 2023 | 1 | 2023 |
Atkscopes: Multiresolution adversarial perturbation as a unified attack on perceptual hashing and beyond Y Zhang, Y Sun, S Qi*, Z Hua, W Wen, Y Fang USENIX Security, 2025 | | 2025 |