Остановите войну!
for scientists:
default search action
Bin Yang 0001
- > Home > Persons > Bin Yang 0001
Publications
- 2015
- [j15]Xiaolong Li, Siren Cai, Weiming Zhang, Bin Yang:
A further study of large payloads matrix embedding. Inf. Sci. 324: 257-269 (2015) - [j14]Xiaolong Li, Siren Cai, Weiming Zhang, Bin Yang:
Matrix embedding in finite abelian group. Signal Process. 113: 250-258 (2015) - [j13]Jian Li, Xiaolong Li, Bin Yang, Xingming Sun:
Segmentation-Based Image Copy-Move Forgery Detection Scheme. IEEE Trans. Inf. Forensics Secur. 10(3): 507-518 (2015) - [j12]Xiaolong Li, Weiming Zhang, Xinlu Gui, Bin Yang:
Efficient Reversible Data Hiding Based on Multiple Histograms Modification. IEEE Trans. Inf. Forensics Secur. 10(9): 2016-2027 (2015) - [c36]Fei Peng, Xiaolong Li, Bin Yang:
An adaptive PEE-based reversible data hiding scheme exploiting referential prediction-errors. ICME 2015: 1-6 - 2014
- [j11]Fei Peng, Xiaolong Li, Bin Yang:
Improved PVO-based reversible data hiding. Digit. Signal Process. 25: 255-265 (2014) - [j10]Xinlu Gui, Xiaolong Li, Bin Yang:
A high capacity reversible data hiding scheme based on generalized prediction-error expansion and adaptive embedding. Signal Process. 98: 370-380 (2014) - [c35]Xinlu Gui, Xiaolong Li, Wenfa Qi, Bin Yang:
Blind median filtering detection based on histogram features. APSIPA 2014: 1-4 - [c34]Xiaolong Li, Weiming Zhang, Bo Ou, Bin Yang:
A brief review on reversible data hiding: Current techniques and future prospects. ChinaSIP 2014: 426-430 - [c33]Ran Hu, Xiaolong Li, Bin Yang:
A new lossy compression scheme for encrypted gray-scale images. ICASSP 2014: 7387-7390 - [c32]Xinlu Gui, Xiaolong Li, Bin Yang:
Efficient reversible data hiding based on two-dimensional pixel-intensity-histogram modification. ICASSP 2014: 7420-7424 - [c31]Xinlu Gui, Siren Cai, Xiaolong Li, Bin Yang:
A Novel Reversible Data Hiding Scheme Based on Reference Pixels and Adaptive Block Selection. IIH-MSP 2014: 276-280 - [c30]Xinlu Gui, Xiaolong Li, Bin Yang:
Steganalysis of LSB Matching Based on Local Binary Patterns. IIH-MSP 2014: 475-480 - [c29]Xinlu Gui, Xiaolong Li, Bin Yang:
High-Dimensional Histogram Utilization for Reversible Data Hiding. IWDW 2014: 243-253 - 2013
- [j9]Xiaolong Li, Jian Li, Bin Li, Bin Yang:
High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion. Signal Process. 93(1): 198-205 (2013) - [j8]Xiaolong Li, Bin Li, Xiangyang Luo, Bin Yang, Ruihui Zhu:
Steganalysis of a PVD-based content adaptive image steganography. Signal Process. 93(9): 2529-2538 (2013) - [j7]Jian Li, Xiaolong Li, Bin Yang:
Reversible data hiding scheme for color image based on prediction-error expansion and cross-channel correlation. Signal Process. 93(9): 2748-2758 (2013) - [j6]Xiaolong Li, Weiming Zhang, Xinlu Gui, Bin Yang:
A Novel Reversible Data Hiding Scheme Based on Two-Dimensional Difference-Histogram Modification. IEEE Trans. Inf. Forensics Secur. 8(7): 1091-1100 (2013) - [j5]Xiaolong Li, Bin Li, Bin Yang, Tieyong Zeng:
General Framework to Histogram-Shifting-Based Reversible Data Hiding. IEEE Trans. Image Process. 22(6): 2181-2191 (2013) - 2012
- [j4]Fei Peng, Xiaolong Li, Bin Yang:
Adaptive reversible data hiding scheme based on integer transform. Signal Process. 92(1): 54-62 (2012) - [c28]Xinlu Gui, Xiaolong Li, Bin Yang:
A content-adaptive ±1-based steganography by minimizing the distortion of first order statistics. ICASSP 2012: 1781-1784 - [c27]Xinlu Gui, Xiaolong Li, Bin Yang:
Improved payload location for LSB matching steganography. ICIP 2012: 1125-1128 - [c26]Jian Li, Xiaolong Li, Bin Yang:
A new PEE-based reversible watermarking algorithm for color image. ICIP 2012: 2181-2184 - [c25]Xinlu Gui, Xiaolong Li, Bin Yang:
A novel integer transform for efficient reversible watermarking. ICPR 2012: 947-950 - [c24]Yuanzhi Qi, Xiaolong Li, Bin Wang, Bin Yang:
A Study of Optimal Matrix for Efficient Matrix Embedding in. IWDW 2012: 8-18 - [c23]Fei Peng, Xiaolong Li, Bin Yang:
Calibration Based Reliable Detector for Detecting LSB Matching Steganography. IWDW 2012: 44-53 - 2011
- [j3]Xiaolong Li, Bin Yang, Tieyong Zeng:
Efficient Reversible Watermarking Based on Adaptive Prediction-Error Expansion and Pixel Selection. IEEE Trans. Image Process. 20(12): 3524-3533 (2011) - [c22]Ruoyu Wu, Xiaolong Li, Bin Yang:
Identifying computer generated graphics VIA histogram features. ICIP 2011: 1933-1936 - [c21]Yi Luo, Xiaolong Li, Bin Yang:
Locating steganographic payload for LSB matching embedding. ICME 2011: 1-6 - [c20]Yi Luo, Fei Peng, Xiaolong Li, Bin Yang:
Reversible image water marking based on prediction-error expansion and compensation. ICME 2011: 1-6 - 2010
- [j2]Xiang Wang, Xiaolong Li, Bin Yang, Zongming Guo:
Efficient Generalized Integer Transform for Reversible Watermarking. IEEE Signal Process. Lett. 17(6): 567-570 (2010) - [c19]Chao Wang, Xiaolong Li, Bin Yang, Xiaoqing Lu, Chengcheng Liu:
A content-adaptive approach for reducing embedding impact in steganography. ICASSP 2010: 1762-1765 - [c18]Xudong Chen, Xiaolong Li, Bin Yang, Yingmin Tang:
Reversible image watermarking based on a generalized integer transform. ICASSP 2010: 2382-2385 - [c17]Chao Wang, Xiaolong Li, Bin Yang:
High capacity reversible image watermarking based on integer transform. ICIP 2010: 217-220 - [c16]Kaiwei Cai, Xiaolong Li, Tieyong Zeng, Bin Yang, Xiaoqing Lu:
Reliable histogram features for detecting LSB matching. ICIP 2010: 1761-1764 - [c15]Chao Wang, Xiaolong Li, Bin Yang:
Efficient reversible image watermarking by using dynamical prediction-error expansion. ICIP 2010: 3673-3676 - 2009
- [j1]Xiaolong Li, Bin Yang, Daofang Cheng, Tieyong Zeng:
A Generalization of LSB Matching. IEEE Signal Process. Lett. 16(2): 69-72 (2009) - [c14]Yunkai Gao, Xiaolong Li, Bin Yang, Yifeng Lu:
Detecting LSB matching by characterizing the amplitude of histogram. ICASSP 2009: 1505-1508 - [c13]Yunkai Gao, Xiaolong Li, Tieyong Zeng, Bin Yang:
Improving embedding efficiency via matrix embedding: A case study. ICIP 2009: 109-112 - [c12]Yunkai Gao, Xiaolong Li, Bin Yang:
Constructing specific matrix for efficient matrix embedding. ICME 2009: 1006-1009 - [c11]Chengcheng Liu, Xiaolong Li, Xiaoqing Lu, Bin Yang:
Improving embedding efficiency by incorporating SDCS and WPC. ICME 2009: 1018-1021 - [c10]Yunkai Gao, Xiaolong Li, Bin Yang:
Employing Optimal Matrix for Efficient Matrix Embedding. IIH-MSP 2009: 161-165 - [c9]Yifeng Lu, Xiaolong Li, Bin Yang:
A ±1-Based Steganography by Minimizing the Distortion of First Order Statistics. IIH-MSP 2009: 754-758 - [c8]Wenfa Qi, Xiaolong Li, Bin Yang:
Bilinear Coons Patch and its Application in Security Pattern Design. IIH-MSP 2009: 881-884 - [c7]Yifeng Lu, Xiaolong Li, Bin Yang:
A Secure Steganography: Noisy Region Embedding. IIH-MSP 2009: 1046-1051 - [c6]Xiang Wang, Xiaolong Li, Bin Yang, Zongming Guo:
A Reversible Watermarking Scheme for High-Fidelity Applications. PCM 2009: 613-624 - [c5]Gaoyang Wang, Xiaolong Li, Bin Yang:
A High Capacity Reversible Watermarking Scheme Based on an Integer Transform. PCM 2009: 1287-1292 - 2008
- [c4]Xiaolong Li, Tieyong Zeng, Bin Yang:
A further study on steganalysis of LSB matching by calibration. ICIP 2008: 2072-2075 - [c3]Xiaolong Li, Tieyong Zeng, Bin Yang:
Improvement of the embedding efficiency of LSB matching by sum and difference covering set. ICME 2008: 209-212 - [c2]Daofang Cheng, Xiaolong Li, Wenfa Qi, Bin Yang:
A Statistics-Based Watermarking Scheme Robust to Print-and-Scan. ISECS 2008: 894-898 - [c1]Xiaolong Li, Tieyong Zeng, Bin Yang:
Detecting LSB matching by applying calibration technique for difference image. MM&Sec 2008: 133-138
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 23:39 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint