A Siamese CNN for image steganalysis W You, H Zhang, X Zhao IEEE Transactions on Information Forensics and Security 16, 291-306, 2020 | 220 | 2020 |
Motion vector-based video steganography with preserved local optimality H Zhang, Y Cao, X Zhao Multimedia Tools and Applications 75, 13503-13519, 2016 | 79 | 2016 |
Improving the robustness of adaptive steganographic algorithms based on transport channel matching Z Zhao, Q Guan, H Zhang, X Zhao IEEE Transactions on Information Forensics and Security 14 (7), 1843-1856, 2018 | 72 | 2018 |
A steganalytic approach to detect motion vector modification using near-perfect estimation for local optimality H Zhang, Y Cao, X Zhao IEEE Transactions on Information Forensics and Security 12 (2), 465-478, 2016 | 61 | 2016 |
Video steganography based on optimized motion estimation perturbation Y Cao, H Zhang, X Zhao, H Yu Proceedings of the 3rd ACM workshop on information hiding and multimedia …, 2015 | 43 | 2015 |
Video steganography with perturbed macroblock partition H Zhang, Y Cao, X Zhao, W Zhang, N Yu Proceedings of the 2nd ACM workshop on Information hiding and multimedia …, 2014 | 40 | 2014 |
Video steganalysis based on intra prediction mode calibration Y Zhao, H Zhang, Y Cao, P Wang, X Zhao Digital-Forensics and Watermarking: 14th International Workshop, IWDW 2015 …, 2016 | 37 | 2016 |
Covert communication by compressed videos exploiting the uncertainty of motion estimation Y Cao, H Zhang, X Zhao, H Yu IEEE Communications Letters 19 (2), 203-206, 2014 | 37 | 2014 |
Improving the robustness of JPEG steganography with robustness cost J Zhang, X Zhao, X He, H Zhang IEEE Signal Processing Letters 29, 164-168, 2021 | 24 | 2021 |
A novel embedding distortion for motion vector-based steganography considering motion characteristic, local optimality and statistical distribution P Wang, H Zhang, Y Cao, X Zhao Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia …, 2016 | 17 | 2016 |
Robust video steganography for social media sharing based on principal component analysis P Fan, H Zhang, X Zhao EURASIP Journal on Information Security 2022 (1), 4, 2022 | 15 | 2022 |
Adaptive QIM with minimum embedding cost for robust video steganography on social networks P Fan, H Zhang, X Zhao IEEE Transactions on Information Forensics and Security 17, 3801-3815, 2022 | 9 | 2022 |
Adaptive VP8 steganography based on deblocking filtering P Xie, H Zhang, W You, X Zhao, J Yu, Y Ma Proceedings of the ACM Workshop on Information Hiding and Multimedia …, 2019 | 9 | 2019 |
Steganalysis of H. 264/AVC videos exploiting subtractive prediction error blocks Y Cao, H Zhang, X Zhao, X He IEEE Transactions on Information Forensics and Security 16, 3326-3338, 2021 | 8 | 2021 |
A video steganalytic approach against quantized transform coefficient-based H. 264 steganography by exploiting in-loop deblocking filtering H Zhang, W You, X Zhao IEEE Access 8, 186862-186878, 2020 | 8 | 2020 |
A robust video steganographic method against social networking transcoding based on steganographic side channel P Fan, H Zhang, Y Cai, P Xie, X Zhao Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia …, 2020 | 8 | 2020 |
A deep residual multi-scale convolutional network for spatial steganalysis S Zhang, H Zhang, X Zhao, H Yu Digital Forensics and Watermarking: 17th International Workshop, IWDW 2018 …, 2019 | 8 | 2019 |
Data hiding in H. 264/AVC video files using the coded block pattern H Zhang, Y Cao, X Zhao, H Yu, C Liu Digital Forensics and Watermarking: 15th International Workshop, IWDW 2016 …, 2017 | 5 | 2017 |
Steganography based on adaptive pixel-value differencing scheme revisited H Zhang, Q Guan, X Zhao Digital-Forensics and Watermarking: 12th International Workshop, IWDW 2013 …, 2014 | 3 | 2014 |
视频隐写分析技术研究综述 张弘, 尤玮珂, 赵险峰 信息安全学报 3 (6), 13-27, 2018 | 1 | 2018 |