Reversible data hiding for audio based on prediction error expansion D Yan, R Wang 2008 International Conference on Intelligent Information Hiding and …, 2008 | 50 | 2008 |
Steganography for MP3 audio by exploiting the rule of window switching D Yan, R Wang, X Yu, J Zhu Computers & Security 31 (5), 704-716, 2012 | 46 | 2012 |
Steganalysis of MP3Stego with low embedding-rate using Markov feature C Jin, R Wang, D Yan Multimedia Tools and Applications 76, 6143-6158, 2017 | 38 | 2017 |
Targeted speech adversarial example generation with generative adversarial network D Wang, L Dong, R Wang, D Yan, J Wang IEEE Access 8, 124503-124513, 2020 | 37 | 2020 |
Identification of fake stereo audio using SVM and CNN T Liu, D Yan, R Wang, N Yan, G Chen Information 12 (7), 263, 2021 | 35 | 2021 |
Audio steganalysis with improved convolutional neural network Y Lin, R Wang, D Yan, L Dong, X Zhang Proceedings of the ACM workshop on information hiding and multimedia …, 2019 | 34 | 2019 |
Steganalysis for MP3Stego using differential statistics of quantization step D Yan, R Wang, X Yu, J Zhu Digital Signal Processing 23 (4), 1181-1185, 2013 | 32 | 2013 |
Source cell-phone identification in the presence of additive noise from CQT domain T Qin, R Wang, D Yan, L Lin Information 9 (8), 205, 2018 | 31 | 2018 |
Quantization step parity-based steganography for MP3 audio Y Diqun, W Rangding, Z Liguang Fundamenta Informaticae 97 (1-2), 1-14, 2009 | 29 | 2009 |
Huffman table swapping-based steganograpy for MP3 audio D Yan, R Wang Multimedia Tools and Applications 52, 291-305, 2011 | 28 | 2011 |
Learning to generate steganographic cover for audio steganography using gan L Chen, R Wang, D Yan, J Wang IEEE Access 9, 88098-88107, 2021 | 26 | 2021 |
Semi-supervised semantic segmentation with cross teacher training H Xiao, D Li, H Xu, S Fu, D Yan, K Song, C Peng Neurocomputing 508, 36-46, 2022 | 24 | 2022 |
Adaptive audio steganography based on improved syndrome-trellis codes K Ying, R Wang, Y Lin, D Yan IEEE Access 9, 11705-11715, 2021 | 23 | 2021 |
Detection of MP3Stego exploiting recompression calibration-based feature D Yan, R Wang Multimedia tools and applications 72, 865-878, 2014 | 23 | 2014 |
Adversarial examples attack and countermeasure for speech recognition system: A survey D Wang, R Wang, L Dong, D Yan, X Zhang, Y Gong International Conference on Security and Privacy in Digital Economy, 443-468, 2020 | 22 | 2020 |
Source smartphone identification by exploiting encoding characteristics of recorded speech C Jin, R Wang, D Yan Digital Investigation 29, 129-146, 2019 | 22 | 2019 |
Anti-forensics of audio source identification using generative adversarial network X Li, D Yan, L Dong, R Wang IEEE Access 7, 184332-184339, 2019 | 21 | 2019 |
A high capacity MP3 steganography based on Huffman coding D Yan, R Wang, LG Zhang Journal of Sichuan University (Natural Science Edition) 6, 013, 2011 | 21 | 2011 |
The sign bits of huffman codeword-based steganography for aac audio J Zhu, R Wang, D Yan 2010 International conference on multimedia technology, 1-4, 2010 | 17 | 2010 |
A high-capacity reversible data hiding scheme using dual-channel audio H Yu, R Wang, L Dong, D Yan, Y Gong, Y Lin IEEE Access 8, 162271-162278, 2020 | 14 | 2020 |