


Остановите войну!
for scientists:
Zhenjun Tang
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j61]Zhenhai Chen
, Zhenjun Tang
, Xinpeng Zhang, Ronghai Sun, Xianquan Zhang:
Efficient video hashing based on low-rank frames. IET Image Process. 16(2): 344-355 (2022) - [j60]Chunqiang Yu, Xianquan Zhang, Guoxiang Li, Shanhua Zhan, Zhenjun Tang:
Reversible data hiding with adaptive difference recovery for encrypted images. Inf. Sci. 584: 89-110 (2022) - [j59]Chunqiang Yu, Xianquan Zhang, Dewang Wang, Zhenjun Tang:
Reversible data hiding with pairwise PEE and 2D-PEH decomposition. Signal Process. 196: 108527 (2022) - [j58]Chunqiang Yu
, Xianquan Zhang
, Xinpeng Zhang
, Guoxiang Li, Zhenjun Tang
:
Reversible Data Hiding With Hierarchical Embedding for Encrypted Images. IEEE Trans. Circuits Syst. Video Technol. 32(2): 451-466 (2022) - [j57]Xianquan Zhang
, Xuelong Li, Zhenjun Tang
, Shichao Zhang
, Shaomin Xie:
Noise Removal in Embedded Image With Bit Approximation. IEEE Trans. Knowl. Data Eng. 34(3): 1359-1369 (2022) - 2021
- [j56]Zhenjun Tang, Mengzhu Yu, Heng Yao, Hanyun Zhang, Chunqiang Yu, Xianquan Zhang:
Robust Image Hashing With Singular Values Of Quaternion SVD. Comput. J. 64(11): 1656-1671 (2021) - [j55]Zhenjun Tang
, Mingyuan Pang, Chunqiang Yu, Guijin Fan, Xianquan Zhang:
Reversible data hiding for encrypted image based on adaptive prediction error coding. IET Image Process. 15(11): 2643-2655 (2021) - [j54]Heng Yao
, Fanyu Mao, Chuan Qin, Zhenjun Tang
:
Dual-JPEG-image reversible data hiding. Inf. Sci. 563: 130-149 (2021) - [j53]Yu Dong, Xianquan Zhang, Chunqiang Yu, Zhenjun Tang, Guoen Xia:
Robust image data hiding method based on multiple backups and pixel bit weight. J. Intell. Fuzzy Syst. 41(6): 6935-6948 (2021) - [j52]Zhenjun Tang, Shaopeng Zhang, Xianquan Zhang, Zhixin Li, Zhenhai Chen
, Chunqiang Yu:
Video hashing with secondary frames and invariant moments. J. Vis. Commun. Image Represent. 79: 103209 (2021) - [j51]Xiaoping Liang, Zhenjun Tang
, Xiaolan Xie, Jingli Wu, Xianquan Zhang:
Robust and fast image hashing with two-dimensional PCA. Multim. Syst. 27(3): 389-401 (2021) - [j50]Zhenjun Tang
, Shaopeng Zhang
, Zhenhai Chen
, Xianquan Zhang
:
Robust Video Hashing Based on Multidimensional Scaling and Ordinal Measures. Secur. Commun. Networks 2021: 9930673:1-9930673:11 (2021) - [c9]Zikai Zhang, Bineng Zhong, Shengping Zhang, Zhenjun Tang, Xin Liu, Zhaoxiang Zhang:
Distractor-Aware Fast Tracking via Dynamic Convolutions and MOT Philosophy. CVPR 2021: 1024-1033 - [c8]Siyuan Cheng, Bineng Zhong, Guorong Li, Xin Liu, Zhenjun Tang, Xianxian Li, Jing Wang:
Learning To Filter: Siamese Relation Network for Robust Tracking. CVPR 2021: 4421-4431 - [i2]Siyuan Cheng, Bineng Zhong, Guorong Li, Xin Liu, Zhenjun Tang, Xianxian Li, Jing Wang:
Learning to Filter: Siamese Relation Network for Robust Tracking. CoRR abs/2104.00829 (2021) - [i1]Zikai Zhang, Bineng Zhong, Shengping Zhang, Zhenjun Tang, Xin Liu, Zhaoxiang Zhang:
Distractor-Aware Fast Tracking via Dynamic Convolutions and MOT Philosophy. CoRR abs/2104.12041 (2021) - 2020
- [j49]Zhenjun Tang
, Hewang Nie, Chi-Man Pun, Heng Yao
, Chunqiang Yu
, Xianquan Zhang:
Color Image Reversible Data Hiding With Double-Layer Embedding. IEEE Access 8: 6915-6926 (2020) - [j48]Zhenjun Tang
, Lv Chen, Heng Yao, Xianquan Zhang, Chunqiang Yu, Fionn Murtagh:
Video Hashing with DCT and NMF. Comput. J. 63(7): 1017-1030 (2020) - [j47]Zhenjun Tang
, Hanyun Zhang, Shenglian Lu, Heng Yao, Xianquan Zhang:
Robust image hashing with compressed sensing and ordinal measures. EURASIP J. Image Video Process. 2020(1): 21 (2020) - [j46]Renjie Zhu, Xinpeng Zhang, Mengte Shi, Zhenjun Tang:
Secure neural network watermarking protocol against forging attack. EURASIP J. Image Video Process. 2020(1): 37 (2020) - [j45]Zhenjun Tang, Hanyun Zhang, Chi-Man Pun, Mengzhu Yu, Chunqiang Yu, Xianquan Zhang:
Robust image hashing with visual attention model and invariant moments. IET Image Process. 14(5): 901-908 (2020) - [j44]Xianquan Zhang, Ju Yang, Yu Dong, Chunqiang Yu, Zhenjun Tang:
Robust data hiding with multiple backups and optimized reference matrix. J. Intell. Fuzzy Syst. 39(5): 6965-6977 (2020) - [j43]Heng Yao, Hongbin Wei, Chuan Qin, Zhenjun Tang:
A real-time reversible image authentication method using uniform embedding strategy. J. Real Time Image Process. 17(1): 41-54 (2020) - [j42]Heng Yao
, Fanyu Mao, Zhenjun Tang
, Chuan Qin:
High-fidelity dual-image reversible data hiding via prediction-error shift. Signal Process. 170: 107447 (2020) - [j41]Shengjia Chen, Zhixin Li
, Zhenjun Tang:
Relation R-CNN: A Graph Based Relation-Aware Network for Object Detection. IEEE Signal Process. Lett. 27: 1680-1684 (2020) - [j40]Zhenjun Tang
, Zixuan Yu, Zhixin Li, Chunqiang Yu, Xianquan Zhang:
Robust Image Hashing with Low-Rank Representation and Ring Partition. Wirel. Commun. Mob. Comput. 2020: 8870467:1-8870467:12 (2020)
2010 – 2019
- 2019
- [j39]Yujie Fu, Ping Kong, Heng Yao
, Zhenjun Tang
, Chuan Qin:
Effective reversible data hiding in encrypted image with adaptive encoding strategy. Inf. Sci. 494: 21-36 (2019) - [j38]Zhenjun Tang
, Shijie Xu, Dengpan Ye, Jinyan Wang, Xianquan Zhang, Chuanqiang Yu:
Real-time reversible data hiding with shifting block histogram of pixel differences in encrypted image. J. Real Time Image Process. 16(3): 709-724 (2019) - [j37]Fang Cao, Bowen An, Heng Yao, Zhenjun Tang:
Local complexity based adaptive embedding mechanism for reversible data hiding in digital images. Multim. Tools Appl. 78(7): 7911-7926 (2019) - [j36]Heng Yao, Xiaokai Liu, Zhenjun Tang, Chuan Qin, Ying Tian:
Adaptive image camouflage using human visual system model. Multim. Tools Appl. 78(7): 8311-8334 (2019) - [j35]Heng Yao, Xiaokai Liu, Zhenjun Tang, Chuan Qin, Ying Tian:
Correction to: Adaptive image camouflage using human visual system model. Multim. Tools Appl. 78(7): 8335 (2019) - [j34]Zhenjun Tang
, Shijie Xu, Heng Yao, Chuan Qin, Xianquan Zhang:
Reversible data hiding with differential compression in encrypted image. Multim. Tools Appl. 78(8): 9691-9715 (2019) - [j33]Zhenjun Tang
, Ye Yang, Shijie Xu, Chunqiang Yu
, Xianquan Zhang
:
Image Encryption with Double Spiral Scans and Chaotic Maps. Secur. Commun. Networks 2019: 8694678:1-8694678:15 (2019) - [j32]Dewang Wang
, Xianquan Zhang
, Chunqiang Yu
, Zhenjun Tang
:
Reversible Data Hiding by Using Adaptive Pixel Value Prediction and Adaptive Embedding Bin Selection. IEEE Signal Process. Lett. 26(11): 1713-1717 (2019) - [j31]Zhenjun Tang
, Lv Chen, Xianquan Zhang, Shichao Zhang
:
Robust Image Hashing with Tensor Decomposition. IEEE Trans. Knowl. Data Eng. 31(3): 549-560 (2019) - 2018
- [j30]Heng Yao
, Xiaokai Liu, Zhenjun Tang, Yu-Chen Hu, Chuan Qin:
An Improved Image Camouflage Technique Using Color Difference Channel Transformation and Optimal Prediction-Error Expansion. IEEE Access 6: 40569-40584 (2018) - [j29]Chunqiang Yu
, Xianquan Zhang, Zhenjun Tang, Xiaojun Xie:
Separable and Error-Free Reversible Data Hiding in Encrypted Image Based on Two-Layer Pixel Errors. IEEE Access 6: 76956-76969 (2018) - [j28]Zhenjun Tang
, Ziqing Huang, Heng Yao, Xianquan Zhang, Lv Chen, Chunqiang Yu:
Perceptual Image Hashing with Weighted DWT Features for Reduced-Reference Image Quality Assessment. Comput. J. 61(11): 1695-1709 (2018) - [j27]Heng Yao, Chuan Qin, Zhenjun Tang, Xinpeng Zhang:
A general framework for shiftable position-based dual-image reversible data hiding. EURASIP J. Image Video Process. 2018: 41 (2018) - [j26]Zhenjun Tang
, Xuelong Li
, Xianquan Zhang, Shichao Zhang, Yumin Dai:
Image hashing with color vector angle. Neurocomputing 308: 147-158 (2018) - [j25]Heng Yao, Fang Cao, Zhenjun Tang, Jinwei Wang, Tong Qiao:
Expose noise level inconsistency incorporating the inhomogeneity scoring strategy. Multim. Tools Appl. 77(14): 18139-18161 (2018) - [j24]Chunqiang Yu
, Xianquan Zhang
, Zhenjun Tang
, Yan Chen, Jingyu Huang:
Reversible Data Hiding with Pixel Prediction and Additive Homomorphism for Encrypted Image. Secur. Commun. Networks 2018: 9103418:1-9103418:13 (2018) - [j23]Jin Liu, Jianxin Wang
, Zhenjun Tang, Bin Hu
, Fang-Xiang Wu
, Yi Pan
:
Improving Alzheimer's Disease Classification by Combining Multiple Measures. IEEE ACM Trans. Comput. Biol. Bioinform. 15(5): 1649-1659 (2018) - [c7]Fang Cao, Yalei Zhang, Bowen An, Heng Yao, Zhenjun Tang:
An Improved Reversible Data Hiding Scheme with Large Payload Based on Image Local-Complexity. ICCCS (4) 2018: 231-241 - 2017
- [j22]Heng Yao, Chuan Qin, Zhenjun Tang, Ying Tian:
Guided filtering based color image reversible data hiding. J. Vis. Commun. Image Represent. 43: 152-163 (2017) - [j21]Zhenjun Tang, Fei Wang, Xianquan Zhang:
Image encryption based on random projection partition and chaotic system. Multim. Tools Appl. 76(6): 8257-8283 (2017) - [j20]Xianquan Zhang, Zerui Sun, Zhenjun Tang, Chunqiang Yu, Xiaoyun Wang:
High capacity data hiding based on interpolated image. Multim. Tools Appl. 76(7): 9195-9218 (2017) - [j19]Heng Yao, Chuan Qin, Zhenjun Tang, Ying Tian:
Improved dual-image reversible data hiding method using the selection strategy of shiftable pixels' coordinates with minimum distortion. Signal Process. 135: 26-35 (2017) - [j18]Zhenjun Tang, Ziqing Huang, Xianquan Zhang, Huan Lao:
Robust image hashing with multidimensional scaling. Signal Process. 137: 240-250 (2017) - [j17]Heng Yao
, Saihua Song, Chuan Qin, Zhenjun Tang, Xiaokai Liu:
Detection of Double-Compressed H.264/AVC Video Incorporating the Features of the String of Data Bits and Skip Macroblocks. Symmetry 9(12): 313 (2017) - 2016
- [j16]Zhenjun Tang, Huan Lao, Xianquan Zhang, Kai Liu:
Robust image hashing via DCT and LLE. Comput. Secur. 62: 133-148 (2016) - [j15]Zhenjun Tang, Xianquan Zhang, Xianxian Li, Shichao Zhang:
Robust Image Hashing With Ring Partition and Invariant Vector Distance. IEEE Trans. Inf. Forensics Secur. 11(1): 200-214 (2016) - [c6]Ping Ji, Chuan Qin, Zhenjun Tang:
Fragile Watermarking with Self-recovery Capability via Absolute Moment Block Truncation Coding. ICCCS (1) 2016: 104-113 - 2015
- [j14]Zhenjun Tang, Linlin Ruan, Chuan Qin, Xianquan Zhang, Chunqiang Yu:
Robust image hashing with embedding vector variance of LLE. Digit. Signal Process. 43: 17-27 (2015) - [j13]Zhenjun Tang, Xianquan Zhang, Weiwei Lan:
Efficient image encryption with block shuffling and chaotic map. Multim. Tools Appl. 74(15): 5429-5448 (2015) - 2014
- [j12]Zhenjun Tang, Xianquan Zhang, Chunqiang Yu, Dan He:
Efficient point pattern matching algorithm for planar point sets under transform of translation, rotation and scale. Appl. Math. Comput. 232: 624-631 (2014) - [j11]Zhenjun Tang, Yumin Dai, Xianquan Zhang, Liyan Huang, Fan Yang:
Robust image hashing via colour vector angles and discrete wavelet transform. IET Image Process. 8(3): 142-149 (2014) - [j10]Zhenjun Tang, Xianquan Zhang, Shichao Zhang:
Robust Perceptual Image Hashing Based on Ring Partition and NMF. IEEE Trans. Knowl. Data Eng. 26(3): 711-724 (2014) - [c5]Zhenjun Tang, Junwei Yu, Xianquan Zhang, Shichao Zhang:
Discovery of Tampered Image with Robust Hashing. ADMA 2014: 112-122 - [c4]Yongqiang Chen, Zhenjun Tang, Xiaozhao Zhao, Dawei Song, Peng Zhang:
A New Approach to Contextual Suggestions Based on Word2Vec. TREC 2014 - 2013
- [j9]Zhixin Li, Zhongzhi Shi, Weizhong Zhao, Zhiqing Li, Zhenjun Tang:
Learning semantic concepts from image database with hybrid generative/discriminative approach. Eng. Appl. Artif. Intell. 26(9): 2143-2152 (2013) - [j8]Zhenjun Tang, Xianquan Zhang, Liyan Huang, Yumin Dai:
Robust image hashing using ring-based entropies. Signal Process. 93(7): 2061-2069 (2013) - 2012
- [j7]Xianquan Zhang, Tao Liang, Zhenjun Tang, Xuan Dai:
Restoration of embedded image from corrupted stego image. Signal Process. 92(7): 1691-1698 (2012) - [c3]Zhenjun Tang, Yumin Dai, Xianquan Zhang, Shichao Zhang:
Perceptual Image Hashing with Histogram of Color Vector Angles. AMT 2012: 237-246 - [c2]Xianquan Zhang, Zhenjun Tang, Tao Liang, Shichao Zhang, Yingjun Zhu, Yonghai Sun:
Data Hiding Method Based on Local Image Features. AMT 2012: 247-256 - 2011
- [j6]Zhenjun Tang, Shuozhong Wang, Xinpeng Zhang, Weimin Wei:
Structural Feature-Based Image Hashing and Similarity Metric for Tampering Detection. Fundam. Informaticae 106(1): 75-91 (2011) - [j5]Zhenjun Tang, Xianquan Zhang:
Secure Image Encryption without Size Limitation Using Arnold Transform and Random Strategies. J. Multim. 6(2): 202-206 (2011) - [j4]Zhenjun Tang, Shuozhong Wang, Xinpeng Zhang, Weimin Wei, Yan Zhao:
Lexicographical framework for image hashing with implementation based on DCT and NMF. Multim. Tools Appl. 52(2-3): 325-345 (2011) - 2010
- [j3]Xianquan Zhang, Zhenjun Tang, Jinhui Yu, Mingming Guo, Lianyuan Jiang:
Convex hull properties and algorithms. Appl. Math. Comput. 216(11): 3209-3218 (2010) - [j2]Xianquan Zhang, Zhenjun Tang, Jinhui Yu, Mingming Guo:
A Fast Convex Hull Algorithm for Binary Image. Informatica (Slovenia) 34(3): 369-376 (2010) - [j1]Weimin Wei, Shuozhong Wang, Xinpeng Zhang, Zhenjun Tang:
Estimation of image rotation angle using interpolation-related spectral signatures with application to blind detection of image forgery. IEEE Trans. Inf. Forensics Secur. 5(3): 507-517 (2010)
2000 – 2009
- 2009
- [c1]Zhenjun Tang, Shuozhong Wang, Xinpeng Zhang, Weimin Wei:
Perceptual Similarity Metric Resilient to Rotation for Application in Robust Image Hashing. MUE 2009: 183-188
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2022-05-16 23:39 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint