Designing near-optimal steganographic codes in practice based on polar codes W Li, W Zhang, L Li, H Zhou, N Yu IEEE Transactions on Communications 68 (7), 3948-3962, 2020 | 86 | 2020 |
Robust adaptive steganography based on generalized dither modulation and expanded embedding domain X Yu, K Chen, Y Wang, W Li, W Zhang, N Yu Signal Processing 168, 107343, 2020 | 54 | 2020 |
Non-additive cost functions for color image steganography based on inter-channel correlations and differences Y Wang, W Zhang, W Li, X Yu, N Yu IEEE Transactions on Information Forensics and Security 15, 2081-2095, 2019 | 49 | 2019 |
Defining joint distortion for JPEG steganography W Li, W Zhang, K Chen, W Zhou, N Yu Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia …, 2018 | 42 | 2018 |
Non-additive cost functions for JPEG steganography based on block boundary maintenance Y Wang, W Zhang, W Li, N Yu IEEE Transactions on Information Forensics and Security 16, 1117-1130, 2020 | 32 | 2020 |
BBC++: Enhanced block boundary continuity on defining non-additive distortion for JPEG steganography Y Wang, W Li, W Zhang, X Yu, K Liu, N Yu IEEE Transactions on Circuits and Systems for Video Technology 31 (5), 2082-2088, 2020 | 30 | 2020 |
JPEG steganography with estimated side-information W Li, K Chen, W Zhang, H Zhou, Y Wang, N Yu IEEE Transactions on Circuits and Systems for Video Technology 30 (7), 2288-2294, 2019 | 24 | 2019 |
Three-dimensional mesh steganography and steganalysis: a review H Zhou, W Zhang, K Chen, W Li, N Yu IEEE Transactions on Visualization and Computer Graphics 28 (12), 5006-5025, 2021 | 22 | 2021 |
Shortening the cover for fast JPEG steganography W Li, W Zhou, W Zhang, C Qin, H Hu, N Yu IEEE Transactions on Circuits and Systems for Video Technology 30 (6), 1745-1757, 2019 | 19 | 2019 |
Derivative-based steganographic distortion and its non-additive extensions for audio K Chen, H Zhou, W Li, K Yang, W Zhang, N Yu IEEE Transactions on Circuits and Systems for Video Technology 30 (7), 2027-2032, 2019 | 16 | 2019 |
Reinforcement learning of non-additive joint steganographic embedding costs with attention mechanism W Tang, B Li, W Li, Y Wang, J Huang Science China Information Sciences 66 (3), 132305, 2023 | 14 | 2023 |
Payload-independent direct cost learning for image steganography W Li, S Wu, B Li, W Tang, X Zhang IEEE Transactions on Circuits and Systems for Video Technology, 2023 | 11 | 2023 |
Steganography with Generated Images: Leveraging Volatility to Enhance Security J Zhang, K Chen, W Li, W Zhang, N Yu IEEE Transactions on Dependable and Secure Computing, 2023 | 7 | 2023 |
Controversial ‘pixel’prior rule for JPEG adaptive steganography W Zhou, W Li, K Chen, H Zhou, W Zhang, N Yu IET Image Processing 13 (1), 24-33, 2019 | 7 | 2019 |
Quaternary Quantized Gaussian Modulation with Optimal Polarity Map Selection for JPEG Steganography W Li, B Li, W Zhang, S Zhang IEEE Transactions on Information Forensics and Security, 2023 | 5 | 2023 |
多媒体隐写研究进展 张卫明, 王宏霞, 李斌, 任延珍, 杨忠良, 陈可江, 李伟祥, 张新鹏, 俞能海 中国图象图形学报 27 (06), 1918-1943, 2022 | 5 | 2022 |
Standing on the Shoulders of Giants: Reprogramming Visual-Language Model for General Deepfake Detection K Lin, Y Lin, W Li, T Yao, B Li arXiv preprint arXiv:2409.02664, 2024 | 1 | 2024 |
WebP-JPEG Transcoding Detection by Spotting Re-Compression Artifacts With CNN-ViT for Processing Dual-Domain Features B Li, J Shi, W Li, H Li IEEE Transactions on Circuits and Systems for Video Technology, 2024 | 1 | 2024 |
DRAW: Dual-Decoder-Based Robust Audio Watermarking Against Desynchronization and Replay Attacks B Li, J Chen, Y Xu, W Li, Z Liu IEEE Transactions on Information Forensics and Security, 2024 | 1 | 2024 |
Constructing an Intrinsically Robust Steganalyzer via Learning Neighboring Feature Relationships and Self-Adversarial Adjustment K Lin, B Li, W Li, M Barni, B Tondi, X Liu IEEE Transactions on Information Forensics and Security, 2024 | | 2024 |