default search action
Hongxia Wang 0001
Person information
- affiliation: Sichuan University, Chengdu, China
- affiliation: Southwest Jiaotong University, School of Information Science and Technology, Chengdu, China
- affiliation (PhD 2002): University of Electronic Science and Technology of China, Chengdu, China
Other persons with the same name
- Hongxia Wang (aka: Hong-Xia Wang) — disambiguation page
- Hongxia Wang 0002 — Beihang University, School of Electronics and Information Engineering, Beijing, China
- Hongxia Wang 0003 — Wuhan University, School of Electrical and Automation, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j99]Rui Zhang, Hongxia Wang, Hanqing Liu, Yang Zhou, Qiang Zeng:
Generalized face forgery detection with self-supervised face geometry information analysis network. Appl. Soft Comput. 166: 112143 (2024) - [j98]Yuyuan Xiang, Hongxia Wang, Ling Yang, Mingze He, Fei Zhang:
SEDD: Robust Blind Image Watermarking With Single Encoder And Dual Decoders. Comput. J. 67(6): 2390-2402 (2024) - [j97]Yang Zhou, Hongxia Wang, Qiang Zeng, Rui Zhang, Sijiang Meng:
Exploring weakly-supervised image manipulation localization with tampering Edge-based class activation map. Expert Syst. Appl. 249: 123501 (2024) - [j96]Qiang Zeng, Hongxia Wang, Yang Zhou, Rui Zhang, Sijiang Meng:
Semi-supervised image manipulation localization with residual enhancement. Expert Syst. Appl. 252: 124171 (2024) - [j95]Sani M. Abdullahi, Shuifa Sun, Beng Wang, Ning Wei, Hong-Xia Wang:
Biometric template attacks and recent protection mechanisms: A survey. Inf. Fusion 103: 102144 (2024) - [j94]Junjiang He, Yaxin Li, Jiahang Tang, Hongxia Wang, Geying Yang, Tao Li, Xiaolong Lan:
An Immune-Knowledge-Driven SCADA-Based Industrial Virus Propagation Model. IEEE Internet Things J. 11(18): 29956-29970 (2024) - [j93]Yanli Chen, Asad Malik, Hongxia Wang, Ben He, Yonghui Zhou, Hanzhou Wu:
Enhancing robustness in video data hiding against recompression with a wide parameter range. J. Inf. Secur. Appl. 83: 103796 (2024) - [j92]Jinghong Xia, Hongxia Wang, Sani M. Abdullahi, Heng Wang, Fei Zhang, Bingling Luo:
Enhanced Fourier-Mellin domain watermarking for social networking platforms. J. Inf. Secur. Appl. 86: 103884 (2024) - [j91]Mingzhi Hu, Hongxia Wang:
Lightweight JPEG image steganalysis using dilated blind-spot network. J. Vis. Commun. Image Represent. 101: 104182 (2024) - [j90]Xinyi Huang, Hongxia Wang:
Robust text watermarking based on average skeleton mass of characters against cross-media attacks. J. Vis. Commun. Image Represent. 104: 104300 (2024) - [j89]Yang Zhou, Hongxia Wang, Qiang Zeng, Rui Zhang, Sijiang Meng:
A Contribution-Aware Noise Feature representation model for image manipulation localization. Knowl. Based Syst. 298: 111988 (2024) - [j88]Ling Yang, Hongxia Wang, Yulin Zhang, Mingze He, Jinhe Li:
An adaptive video watermarking robust to social platform transcoding and hybrid attacks. Signal Process. 224: 109588 (2024) - [j87]Heng Wang, Hongxia Wang, Jinghong Xia, Fei Zhang:
Robust Watermarking Against Camera Shooting for PowerPoint Presentation. IEEE Signal Process. Lett. 31: 1264-1268 (2024) - [j86]Zhenhao Shi, Hongxia Wang, Heng Wang, Xinyi Huang:
Robust Screen-Shooting Document Watermarking for Multiple Fonts. IEEE Signal Process. Lett. 31: 2215-2219 (2024) - [j85]Wanjie Li, Hongxia Wang, Yijing Chen:
From Cover to Immucover: Adversarial Steganography via Immunized Cover Construction. IEEE Trans. Fuzzy Syst. 32(3): 1233-1247 (2024) - [j84]Yijing Chen, Hongxia Wang, Wanjie Li, Wenshan Li:
A Steganography Immunoprocessing Framework Against CNN-Based and Handcrafted Steganalysis. IEEE Trans. Inf. Forensics Secur. 19: 6055-6069 (2024) - [j83]Mingze He, Hongxia Wang, Fei Zhang, Yuyuan Xiang:
Exploring Accurate Invariants on Polar Harmonic Fourier Moments in Polar Coordinates for Robust Image Watermarking. IEEE Trans. Multim. 26: 5435-5449 (2024) - [j82]Ruimei Zhang, Hongxia Wang, Ju H. Park, Deqiang Zeng, Jun Cheng:
Secure Distributed Control for Consensus of Multiple EL Systems Subject to DoS Attacks. IEEE Trans. Syst. Man Cybern. Syst. 54(6): 3879-3890 (2024) - [c48]Heng Wang, Hongxia Wang, Xinyi Huang, Zhenhao Shi:
Enhanced Screen Shooting Resilient Document Watermarking. ICASSP 2024: 4515-4519 - 2023
- [j81]Jie Luo, Peisong He, Jiayong Liu, Hong-Xia Wang, Chunwang Wu, Chao Yuan, Qiang Xia:
Improving security for image steganography using content-adaptive adversarial perturbations. Appl. Intell. 53(12): 16059-16076 (2023) - [j80]Jie Luo, Peisong He, Jiayong Liu, Hongxia Wang, Chunwang Wu, Shenglie Zhou:
Reversible adversarial steganography for security enhancement. J. Vis. Commun. Image Represent. 97: 103935 (2023) - [j79]Sani M. Abdullahi, Shuifa Sun, Hongxia Wang, Beng Wang:
The reversibility of cancelable biometric templates based on iterative perturbation stochastic approximation strategy. Pattern Recognit. Lett. 172: 221-229 (2023) - [j78]Jingyuan Zhang, Hongxia Wang, Peisong He:
Dual-branch multi-scale densely connected network for image splicing detection and localization. Signal Process. Image Commun. 119: 117045 (2023) - [j77]Mingzhi Hu, Hongxia Wang:
Image Steganalysis Against Adversarial Steganography by Combining Confidence and Pixel Artifacts. IEEE Signal Process. Lett. 30: 987-991 (2023) - [j76]Yi Chen, Zoran Salcic, Hongxia Wang, Kim-Kwang Raymond Choo, Xuyun Zhang:
NACA: A Joint Distortion-Based Non-Additive Cost Assignment Method for Video Steganography. IEEE Trans. Dependable Secur. Comput. 20(3): 2360-2374 (2023) - [j75]Sani M. Abdullahi, Ke Lv, Shuifa Sun, Hongxia Wang:
Cancelable Fingerprint Template Construction Using Vector Permutation and Shift-Ordering. IEEE Trans. Dependable Secur. Comput. 20(5): 3828-3844 (2023) - [j74]Mingze He, Hongxia Wang, Fei Zhang, Sani M. Abdullahi, Ling Yang:
Robust Blind Video Watermarking Against Geometric Deformations and Online Video Sharing Platform Processing. IEEE Trans. Dependable Secur. Comput. 20(6): 4702-4718 (2023) - [j73]Wanjie Li, Hongxia Wang, Yijing Chen, Sani M. Abdullahi, Jie Luo:
Constructing Immunized Stego-Image for Secure Steganography via Artificial Immune System. IEEE Trans. Multim. 25: 8320-8333 (2023) - [j72]Ruimei Zhang, Hongxia Wang, Ju H. Park, Peisong He, Xiangpeng Xie:
Event-Triggered Impulsive Fault-Tolerant Control for Memristor-Based RDNNs With Actuator Faults. IEEE Trans. Neural Networks Learn. Syst. 34(6): 2993-3004 (2023) - [j71]Ruimei Zhang, Hongxia Wang, Ju H. Park, Kaibo Shi, Peisong He:
Mode-Dependent Adaptive Event-Triggered Control for Stabilization of Markovian Memristor-Based Reaction-Diffusion Neural Networks. IEEE Trans. Neural Networks Learn. Syst. 34(8): 3939-3951 (2023) - [c47]Jie Luo, Peisong He, Jiayong Liu, Hongxia Wang, Chunwang Wu, Yijing Chen, Wanjie Li, Jiangchuan Li:
Content-adaptive Adversarial Embedding for Image Steganography Using Deep Reinforcement Learning. ICME 2023: 49-54 - [c46]Jinghong Xia, Hongxia Wang, Sani M. Abdullahi, Heng Wang, Fei Zhang, Bingling Luo:
Adaptive and Robust Fourier-Mellin-Based Image Watermarking for Social Networking Platforms. ICME 2023: 2843-2848 - [c45]Rui Zhang, Hongxia Wang, Mingshan Du, Hanqing Liu, Yang Zhou, Qiang Zeng:
UMMAFormer: A Universal Multimodal-adaptive Transformer Framework for Temporal Forgery Localization. ACM Multimedia 2023: 8749-8759 - [c44]Bingling Luo, Hongxia Wang, Fei Zhang, Jinghong Xia, Heng Wang:
Adaptive Robust Watermarking for Color Images. MSN 2023: 309-316 - [i11]Rui Zhang, Hongxia Wang, Mingshan Du, Hanqing Liu, Yang Zhou, Qiang Zeng:
UMMAFormer: A Universal Multimodal-adaptive Transformer Framework for Temporal Forgery Localization. CoRR abs/2308.14395 (2023) - 2022
- [j70]Jialong Li, Hongxia Wang, Peisong He, Sani M. Abdullahi, Bin Li:
Long-term variable Q transform: A novel time-frequency transform algorithm for synthetic speech detection. Digit. Signal Process. 120: 103256 (2022) - [j69]Mingxu Zhang, Hongxia Wang, Peisong He, Asad Malik, Hanqing Liu:
Exposing unseen GAN-generated image using unsupervised domain adaptation. Knowl. Based Syst. 257: 109905 (2022) - [j68]Chao Yuan, Hongxia Wang, Peisong He, Jie Luo, Bin Li:
GAN-based image steganography for enhancing security via adversarial attack and pixel-wise deep fusion. Multim. Tools Appl. 81(5): 6681-6701 (2022) - [j67]Weichuang Li, Peisong He, Haoliang Li, Hongxia Wang, Ruimei Zhang:
Detection of GAN-Generated Images by Estimating Artifact Similarity. IEEE Signal Process. Lett. 29: 862-866 (2022) - [j66]Yijing Chen, Hongxia Wang, Wanjie Li, Jie Luo:
Cost Reassignment for Improving Security of Adaptive Steganography Using an Artificial Immune System. IEEE Signal Process. Lett. 29: 1564-1568 (2022) - [j65]Xinyu Wu, Hongxia Wang:
Asymmetric Contrastive Learning for Audio Fingerprinting. IEEE Signal Process. Lett. 29: 1873-1877 (2022) - [j64]Yi Chen, Hongxia Wang, Kim-Kwang Raymond Choo, Peisong He, Zoran Salcic, Dali Kaafar, Xuyun Zhang:
DDCA: A Distortion Drift-Based Cost Assignment Method for Adaptive Video Steganography in the Transform Domain. IEEE Trans. Dependable Secur. Comput. 19(4): 2405-2420 (2022) - [j63]Lei Zhang, Sani M. Abdullahi, Peisong He, Hongxia Wang:
Dataset mismatched steganalysis using subdomain adaptation with guiding feature. Telecommun. Syst. 80(2): 263-276 (2022) - [j62]Ruimei Zhang, Hongxia Wang, Ju H. Park, Peisong He, Deqiang Zeng, Xiangpeng Xie:
Fuzzy Secure Control for Nonlinear $N$-D Parabolic PDE-ODE Coupled Systems Under Stochastic Deception Attacks. IEEE Trans. Fuzzy Syst. 30(8): 3347-3359 (2022) - [j61]Ruimei Zhang, Hongxia Wang, Ju H. Park, Hak-Keung Lam, Peisong He:
Quasisynchronization of Reaction-Diffusion Neural Networks Under Deception Attacks. IEEE Trans. Syst. Man Cybern. Syst. 52(12): 7833-7844 (2022) - [c43]Mingxu Zhang, Hongxia Wang, Peisong He, Asad Malik, Hanqing Liu:
Improving GAN-Generated Image Detection Generalization Using Unsupervised Domain Adaptation. ICME 2022: 1-6 - [c42]Fei Zhang, Hongxia Wang, Mingze He, Jinhe Li:
Adaptive Despread Spectrum-Based Image Watermarking for Fast Product Tracking. IWDW 2022: 174-189 - [c41]Jinhe Li, Hongxia Wang, Ling Yang, Dekai Liu:
DST-based Video Watermarking Robust to Lossy Channel Compression. MMSP 2022: 1-6 - [c40]Hanqing Liu, Hong-Xia Wang, Mingxu Zhang:
Exposing DeepFake Videos Using Facial Decomposition-Based Domain Generalization. MMSP 2022: 1-6 - [c39]Ling Yang, Hongxia Wang, Fei Zhang, Dekai Liu:
Robust Video Watermarking Based on Residual Synchronization in the DCT Domain. MMSP 2022: 1-6 - [c38]Fei Zhang, Hongxia Wang, Ling Yang, Mingze He:
Robust Blind Video Watermarking by Constructing Spread-Spectrum Matrix. WIFS 2022: 1-6 - 2021
- [j60]Yanli Chen, Hongxia Wang, Hanzhou Wu, Yonghui Zhou, Limengnan Zhou, Yi Chen:
Exploiting texture characteristics and spatial correlations for robustness metric of data hiding with noisy transmission. IET Image Process. 15(13): 3160-3171 (2021) - [j59]Yue Li, Hongxia Wang, Mauro Barni:
A survey of Deep Neural Network watermarking techniques. Neurocomputing 461: 171-193 (2021) - [j58]Mengxia Shuai, Nenghai Yu, Hongxia Wang, Ling Xiong, Yue Li:
A Lightweight Three-Factor Anonymous Authentication Scheme With Privacy Protection for Personalized Healthcare Applications. J. Organ. End User Comput. 33(3): 1-18 (2021) - [j57]Canghong Shi, Hongxia Wang, Yi Hu, Xiaojie Li:
A novel NMF-based authentication scheme for encrypted speech in cloud computing. Multim. Tools Appl. 80(17): 25773-25798 (2021) - [j56]Peisong He, Hongxia Wang, Ruimei Zhang, Yue Li:
A Two-Stage Cascaded Detection Scheme for Double HEVC Compression Based on Temporal Inconsistency. Secur. Commun. Networks 2021: 5568351:1-5568351:14 (2021) - [j55]Yanli Chen, Hongxia Wang, Hanzhou Wu, Zhiqiang Wu, Tao Li, Asad Malik:
Adaptive Video Data Hiding through Cost Assignment and STCs. IEEE Trans. Dependable Secur. Comput. 18(3): 1320-1335 (2021) - [j54]Peisong He, Haoliang Li, Hongxia Wang, Shiqi Wang, Xinghao Jiang, Ruimei Zhang:
Frame-Wise Detection of Double HEVC Compression by Learning Deep Spatio-Temporal Representations in Compression Domain. IEEE Trans. Multim. 23: 3179-3192 (2021) - [c37]Yue Li, Lydia Abady, Hongxia Wang, Mauro Barni:
A Feature-Map-Based Large-Payload DNN Watermarking Algorithm. IWDW 2021: 135-148 - [c36]Ling Yang, Hongxia Wang, Yulin Zhang, Jinhe Li, Peisong He, Sijiang Meng:
A Robust DCT-Based Video Watermarking Scheme Against Recompression and Synchronization Attacks. IWDW 2021: 149-162 - [i10]Yue Li, Hongxia Wang, Mauro Barni:
A survey of deep neural network watermarking techniques. CoRR abs/2103.09274 (2021) - 2020
- [j53]Canghong Shi, Xiaojie Li, Hongxia Wang:
A Novel Integrity Authentication Algorithm Based on Perceptual Speech Hash and Learned Dictionaries. IEEE Access 8: 22249-22265 (2020) - [j52]Asad Malik, Peisong He, Hongxia Wang, Ahmad Neyaz Khan, Saied Pirasteh, Sani M. Abdullahi:
High-Capacity Reversible Data Hiding in Encrypted Images Using Multi-Layer Embedding. IEEE Access 8: 148997-149010 (2020) - [j51]Yi Chen, Hong-Xia Wang, Xiaoxu Tang, Yong Liu, Hanzhou Wu, Yanli Chen:
A novel two-dimensional reversible data hiding method with high embedding capacity in H.264/advanced video coding. Int. J. Distributed Sens. Networks 16(3) (2020) - [j50]Yong Liu, Hongxia Wang, Yi Chen, Hanzhou Wu, Huan Wang:
A passive forensic scheme for copy-move forgery based on superpixel segmentation and K-means clustering. Multim. Tools Appl. 79(1-2): 477-500 (2020) - [j49]Asad Malik, Hongxia Wang, Yanli Chen, Ahmad Neyaz Khan:
A reversible data hiding in encrypted image based on prediction-error estimation and location map. Multim. Tools Appl. 79(17-18): 11591-11614 (2020) - [j48]Asad Malik, Hong-Xia Wang, Yanli Chen, Ahmad Neyaz Khan:
Correction to: A reversible data hiding in encrypted image based on prediction-error estimation and location map. Multim. Tools Appl. 79(17-18): 11615 (2020) - [j47]Xiaoxu Tang, Hong-Xia Wang, Yi Chen:
Reversible data hiding based on a modified difference expansion for H.264/AVC video streams. Multim. Tools Appl. 79(39-40): 28661-28674 (2020) - [j46]Peisong He, Haoliang Li, Hongxia Wang, Ruimei Zhang:
Detection of Computer Graphics Using Attention-Based Dual-Branch Convolutional Neural Network from Fused Color Components. Sensors 20(17): 4743 (2020) - [j45]Peisong He, Haoliang Li, Bin Li, Hongxia Wang, Liang Liu:
Exposing Fake Bitrate Videos Using Hybrid Deep-Learning Network From Recompression Error. IEEE Trans. Circuits Syst. Video Technol. 30(11): 4034-4049 (2020) - [j44]Sani M. Abdullahi, Hongxia Wang, Tao Li:
Fractal Coding-Based Robust and Alignment-Free Fingerprint Image Hashing. IEEE Trans. Inf. Forensics Secur. 15: 2587-2601 (2020) - [c35]Hongxia Wang, Zhilong Chen, Peisong He:
Constructing Immune Cover for Secure Steganography Based on an Artificial Immune System Approach. IWDW 2020: 53-67 - [e1]Hongxia Wang, Xianfeng Zhao, Yunqing Shi, Hyoung Joong Kim, Alessandro Piva:
Digital Forensics and Watermarking - 18th International Workshop, IWDW 2019, Chengdu, China, November 2-4, 2019, Revised Selected Papers. Lecture Notes in Computer Science 12022, Springer 2020, ISBN 978-3-030-43574-5 [contents]
2010 – 2019
- 2019
- [j43]Mengxia Shuai, Nenghai Yu, Hongxia Wang, Ling Xiong:
Anonymous authentication scheme for smart home environment with provable security. Comput. Secur. 86: 132-146 (2019) - [j42]Asad Malik, Hongxia Wang, Hanzhou Wu, Sani M. Abdullahi:
Reversible Data Hiding with Multiple Data for Multiple Users in an Encrypted Image. Int. J. Digit. Crime Forensics 11(1): 46-61 (2019) - [j41]Asad Malik, Hongxia Wang, Tailong Chen, Tianlong Yang, Ahmad Neyaz Khan, Hanzhou Wu, Yanli Chen, Yi Hu:
Reversible data hiding in homomorphically encrypted image using interpolation technique. J. Inf. Secur. Appl. 48 (2019) - [j40]Canghong Shi, Hongxia Wang, Yi Hu, Qing Qian, Hong Zhao:
A Speech Homomorphic Encryption Scheme with Less Data Expansion in Cloud Computing. KSII Trans. Internet Inf. Syst. 13(5): 2588-2609 (2019) - [j39]Yue Li, Hong-Xia Wang:
Robust H.264/AVC video watermarking without intra distortion drift. Multim. Tools Appl. 78(7): 8535-8557 (2019) - [j38]Yi Chen, Hongxia Wang, Hanzhou Wu, Yong Liu:
Reversible video data hiding using zero QDCT coefficient-pairs. Multim. Tools Appl. 78(16): 23097-23115 (2019) - [c34]Ruixi Yang, Hongxia Wang, Wen Dou:
Acoustic event detection with two-stage judgement in the noisy environment. ACM TUR-C 2019: 127:1-127:7 - [c33]Wen Dou, Hongxia Wang, Ruixi Yang:
Cochleagram-based identification of electronic disguised voice with pitch scaling in the noisy environment. ACM TUR-C 2019: 136:1-136:8 - [c32]Peisong He, Haoliang Li, Hongxia Wang:
Detection of Fake Images Via The Ensemble of Deep Representations from Multi Color Spaces. ICIP 2019: 2299-2303 - [c31]Ting Huang, Hongxia Wang, Yi Chen, Peisong He:
GRU-SVM Model for Synthetic Speech Detection. IWDW 2019: 115-125 - [c30]Asad Malik, Hongxia Wang, Ahmad Neyaz Khan, Yanli Chen, Yi Chen:
A Novel Lossless Data Hiding Scheme in Homomorphically Encrypted Images. IWDW 2019: 213-220 - [c29]Hanzhou Wu, Wei Wang, Jing Dong, Hongxia Wang:
New Graph-Theoretic Approach to Social Steganography. Media Watermarking, Security, and Forensics 2019 - 2018
- [j37]Yanli Chen, Hongxia Wang, Yi Hu, Asad Malik:
Intra-Frame Error Concealment Scheme Using 3D Reversible Data Hiding in Mobile Cloud Environment. IEEE Access 6: 77004-77013 (2018) - [j36]Sani M. Abdullahi, Hongxia Wang, Asad Malik:
Fingerprint Image Hashing Based on Minutiae Points and Shape Context. Int. J. Digit. Crime Forensics 10(4): 1-20 (2018) - [j35]Jin-Feng Li, Hong-Xia Wang, Tao Wu, Xingming Sun, Qing Qian:
Norm ratio-based audio watermarking scheme in DWT domain. Multim. Tools Appl. 77(12): 14481-14497 (2018) - [j34]Yi Chen, Hongxia Wang, Hanzhou Wu, Yong Liu:
An adaptive data hiding algorithm with low bitrate growth for H.264/AVC video stream. Multim. Tools Appl. 77(15): 20157-20175 (2018) - [j33]Sani M. Abdullahi, Hongxia Wang:
Robust enhancement and centroid-based concealment of fingerprint biometric data into audio signals. Multim. Tools Appl. 77(16): 20753-20782 (2018) - [j32]Jing Sang, Hongxia Wang, Qing Qian, Hanzhou Wu, Yi Chen:
An efficient fingerprint identification algorithm based on minutiae and invariant moment. Pers. Ubiquitous Comput. 22(1): 71-80 (2018) - [j31]Dongmei Niu, Hongxia Wang, Minquan Cheng, Canghong Shi:
Reference Sharing Mechanism-Based Self-Embedding Watermarking Scheme with Deterministic Content Reconstruction. Secur. Commun. Networks 2018: 2516324:1-2516324:12 (2018) - [j30]Huan Wang, Hongxia Wang:
Perceptual Hashing-Based Image Copy-Move Forgery Detection. Secur. Commun. Networks 2018: 6853696:1-6853696:11 (2018) - [j29]Mingquan Fan, Hongxia Wang:
An enhanced fragile watermarking scheme to digital image protection and self-recovery. Signal Process. Image Commun. 66: 19-29 (2018) - [j28]Qing Qian, Hongxia Wang, Xingming Sun, Yunhe Cui, Huan Wang, Canghong Shi:
Speech authentication and content recovery scheme for security communication and storage. Telecommun. Syst. 67(4): 635-649 (2018) - [j27]Yanli Chen, Hongxia Wang, Hanzhou Wu, Xingming Sun:
A video error concealment method using data hiding based on compressed sensing over lossy channel. Telecommun. Syst. 68(2): 337-349 (2018) - [c28]Hongxia Wang, Jing Sang:
Speaker Identity Tracing Using Fingerprint Data Hiding against Telecommunications Fraud. APSIPA 2018: 554-559 - [c27]Sani M. Abdullahi, Hongxia Wang:
Fourier-Mellin Transform and Fractal Coding for Secure and Robust Fingerprint Image Hashing. AVSS 2018: 1-7 - [c26]Yi Chen, Hongxia Wang, Hanzhou Wu, Yanli Chen, Yong Liu:
A Data Hiding Scheme with High Quality for H.264/AVC Video Streams. ICCCS (4) 2018: 99-110 - [c25]Hanzhou Wu, Wei Wang, Jing Dong, Yanli Chen, Hongxia Wang, Songyang Wu:
Reversible Embedding to Covers Full of Boundaries. ICCCS (4) 2018: 404-415 - [c24]Yue Li, Hong-Xia Wang:
Robust H.264/AVC Video Watermarking Without Intra Distortion Drift. ICCCS (4) 2018: 416-427 - [c23]Dongmei Niu, Hongxia Wang, Minquan Cheng:
Reducing the Computational Complexity of the Reference-Sharing Based Self-embedding Watermarking Approach. ICCCS (6) 2018: 635-643 - [c22]Hanzhou Wu, Wei Wang, Jing Dong, Hongxia Wang:
Ensemble Reversible Data Hiding. ICPR 2018: 2676-2681 - [i9]Hanzhou Wu, Wei Wang, Jing Dong, Hongxia Wang:
Ensemble Reversible Data Hiding. CoRR abs/1801.04747 (2018) - [i8]Hanzhou Wu, Wei Wang, Jing Dong, Yanli Chen, Hongxia Wang:
Reversible Embedding to Covers Full of Boundaries. CoRR abs/1801.04752 (2018) - [i7]Hanzhou Wu, Wei Wang, Jing Dong, Hongxia Wang, Lizhi Xiong:
The Cut and Dominating Set Problem in A Steganographer Network. CoRR abs/1802.09333 (2018) - [i6]Yanli Chen, Hongxia Wang, Hanzhou Wu, Yi Chen, Asad Malik:
Intra-Frame Error Concealment Scheme using 3D Reversible Data Hiding in Mobile Cloud Environment. CoRR abs/1804.00935 (2018) - [i5]Yi Chen, Hongxia Wang, Hanzhou Wu, Yong Liu:
Reversible Video Data Hiding Using Zero QDCT Coefficient-Pairs. CoRR abs/1804.06628 (2018) - [i4]Yi Chen, Hongxia Wang:
A Novel Reversible Data Hiding Employing All Quantized Nonzero AC Coefficients in JPEG Images. CoRR abs/1804.06645 (2018) - 2017
- [j26]Huan Wang, Hong-Xia Wang, Xingming Sun, Qing Qian:
A passive authentication scheme for copy-move forgery based on package clustering algorithm. Multim. Tools Appl. 76(10): 12627-12644 (2017) - [j25]Han-Zhou Wu, Yun-Qing Shi, Hong-Xia Wang, Lin-Na Zhou:
Separable Reversible Data Hiding for Encrypted Palette Images With Color Partitioning and Flipping Verification. IEEE Trans. Circuits Syst. Video Technol. 27(8): 1620-1631 (2017) - [c21]Yanli Chen, Hongxia Wang, Hanzhou Wu:
Data Hiding-Based Video Error Concealment Method Using Compressed Sensing. ICCCS (1) 2017: 28-38 - [c20]Yong Liu, Hong-Xia Wang, Han-Zhou Wu, Yi Chen:
An Efficient Copy-Move Detection Algorithm Based on Superpixel Segmentation and Harris Key-Points. ICCCS (1) 2017: 61-73 - [i3]Hanzhou Wu, Wei Wang, Jing Dong, Hongxia Wang:
A Simply Study to Steganography on Social Networks. CoRR abs/1712.03621 (2017) - 2016
- [j24]Qing Qian, Hong-Xia Wang, Yi Hu, Lin-Na Zhou, Jin-Feng Li:
A dual fragile watermarking scheme for speech authentication. Multim. Tools Appl. 75(21): 13431-13450 (2016) - [j23]Zhenghui Liu, Fan Zhang, Jing Wang, Hongxia Wang, Jiwu Huang:
Authentication and recovery algorithm for speech signal based on digital watermarking. Signal Process. 123: 157-166 (2016) - [j22]Mingquan Fan, Peipei Liu, Hongxia Wang, Xingming Sun:
Cross correlation feature mining for steganalysis of hash based least significant bit substitution video steganography. Telecommun. Syst. 63(4): 523-529 (2016) - [c19]Qing Qian, Hongxia Wang, Canghong Shi, Huan Wang:
An efficient content authentication scheme in encrypted speech based on integer wavelet transform. APSIPA 2016: 1-8 - [c18]Tian-Qi Wang, Hong-Xia Wang, Yue Li:
Reversible Data Hiding with Low Bit-Rate Growth in H.264/AVC Compressed Video by Adaptive Hybrid Coding. ICCCS (1) 2016: 48-62 - [c17]Canghong Shi, Hongxia Wang, Qing Qian, Huan Wang:
Privacy Protection of Digital Speech Based on Homomorphic Encryption. ICCCS (1) 2016: 365-376 - [c16]Huan Wang, Hongxia Wang, Canghong Shi:
An Efficient Passive Authentication Scheme for Copy-Move Forgery Based on DCT. ICCCS (2) 2016: 417-429 - [c15]Han-Zhou Wu, Hong-Xia Wang, Yun-Qing Shi:
PPE-Based Reversible Data Hiding. IH&MMSec 2016: 187-188 - [c14]Qing Qian, Hongxia Wang, Sani M. Abdullahi, Huan Wang, Canghong Shi:
Speech Authentication and Recovery Scheme in Encrypted Domain. IWDW 2016: 46-60 - [c13]Wencheng Cao, Hongxia Wang, Hong Zhao, Qing Qian, Sani M. Abdullahi:
Identification of Electronic Disguised Voices in the Noisy Environment. IWDW 2016: 75-87 - [c12]Sani M. Abdullahi, Hongxia Wang, Qing Qian, Wencheng Cao:
Concealing Fingerprint-Biometric Data into Audio Signals for Identify Authentication. IWDW 2016: 129-144 - [c11]Han-Zhou Wu, Hong-Xia Wang, Yun-Qing Shi:
Dynamic content selection-and-prediction framework applied to reversible data hiding. WIFS 2016: 1-6 - [i2]Han-Zhou Wu, Hong-Xia Wang, Yun-Qing Shi:
Prediction-error of Prediction Error (PPE)-based Reversible Data Hiding. CoRR abs/1604.04984 (2016) - [i1]Han-Zhou Wu, Hong-Xia Wang, Yun-Qing Shi:
Can Machine Learn Steganography? - Implementing LSB Substitution and Matrix Coding Steganography with Feed-Forward Neural Networks. CoRR abs/1606.05294 (2016) - 2015
- [j21]Fan Zhang, Zhenghui Liu, Hongxia Wang:
A Secure Speech Content Authentication Algorithm Based on Discrete Fractional Fourier Transform. Int. J. Digit. Crime Forensics 7(3): 19-36 (2015) - [j20]Hanzhou Wu, Hongxia Wang, Hong Zhao, Xiuying Yu:
Multi-layer assignment steganography using graph-theoretic approach. Multim. Tools Appl. 74(18): 8171-8196 (2015) - [c10]Dongmei Niu, Hongxia Wang, Minquan Cheng, Linna Zhou:
Self-Embedding Watermarking Scheme Based on MDS Codes. IWDW 2015: 250-258 - 2014
- [j19]Zhenghui Liu, Hongxia Wang:
A novel speech content authentication algorithm based on Bessel-Fourier moments. Digit. Signal Process. 24: 197-208 (2014) - [j18]Ming-Quan Fan, Hong-Xia Wang, Heng-Jian Li:
A fingerprint-based audio authentication scheme using frequency domain statistical characteristic. Multim. Tools Appl. 70(3): 2255-2270 (2014) - [j17]Zhenghui Liu, Hong-Xia Wang:
Pseudo-zernike moments-based audio content authentication algorithm robust against feature-analysed substitution attack. Multim. Tools Appl. 70(3): 2271-2291 (2014) - [j16]Fan Chen, Hongjie He, Heng-Ming Tai, Hongxia Wang:
Chaos-based self-embedding fragile watermarking with flexible watermark payload. Multim. Tools Appl. 72(1): 41-56 (2014) - [j15]Keren Wang, Jiesi Han, Hongxia Wang:
Digital video steganalysis by subtractive prediction error adjacency matrix. Multim. Tools Appl. 72(1): 313-330 (2014) - [j14]Keren Wang, Hong Zhao, Hongxia Wang:
Video Steganalysis Against Motion Vector-Based Steganography by Adding or Subtracting One Motion Vector Value. IEEE Trans. Inf. Forensics Secur. 9(5): 741-751 (2014) - [c9]Hanzhou Wu, Hongxia Wang, Yi Hu, Linna Zhou:
Efficient Reversible Data Hiding Based on Prefix Matching and Directed LSB Embedding. IWDW 2014: 455-469 - 2013
- [j13]Ming-Quan Fan, Peipei Liu, Hong-Xia Wang, Heng-Jian Li:
A semi-fragile watermarking scheme for authenticating audio signal based on dual-tree complex wavelet transform and discrete cosine transform. Int. J. Comput. Math. 90(12): 2588-2602 (2013) - [j12]Zhenghui Liu, Hongxia Wang:
A Speech Content Authentication Algorithm Based on Pseudo-Zernike Moments in DCT Domain. Int. J. Digit. Crime Forensics 5(3): 15-34 (2013) - [j11]Hongxia Wang, Bangxu Yin:
Perceptual Hashing-Based Robust Image Authentication Scheme for Wireless Multimedia Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j10]Hongxia Wang, Bangxu Yin, Linna Zhou:
Geometrically Invariant Image Watermarking using Connected Objects and Gravity Centers. KSII Trans. Internet Inf. Syst. 7(11): 2893-2912 (2013) - [j9]Hongxia Wang, Bangxu Yin:
Watermarking-Based Blind QoS Assessment for Wireless Image Communication. J. Commun. 8(3): 207-215 (2013) - [c8]Hanzhou Wu, Hongxia Wang:
Multibit Color-Mapping Steganography Using Depth-First Search. ISBAST 2013: 224-229 - [c7]Hongxia Wang, Linna Zhou, Wei Zhang, Shuang Liu:
Watermarking-Based Perceptual Hashing Search Over Encrypted Speech. IWDW 2013: 423-434 - 2012
- [c6]Hong Zhao, Hongxia Wang, Hafiz Malik:
Steganalysis of Youtube Compressed Video Using High-order Statistics in 3D DCT Domain. IIH-MSP 2012: 191-194 - [c5]Zhenghui Liu, Hongxia Wang:
An Efficient Speech Content Authentication Algorithm Based on Coefficients Self-correlation Degree. IWDW 2012: 311-326 - 2011
- [j8]Ming-Quan Fan, Hong-Xia Wang:
Statistical characteristic-based robust audio watermarking for resolving playback speed modification. Digit. Signal Process. 21(1): 110-117 (2011) - [j7]Hongxia Wang, Mingquan Fan:
NDFT-based Image Steganographic Scheme with Discrimination of Tampers. KSII Trans. Internet Inf. Syst. 5(12): 2340-2354 (2011) - [j6]Hong Zhao, Hongxia Wang, Muhammad Khurram Khan:
Statistical analysis of several reversible data hiding algorithms. Multim. Tools Appl. 52(2-3): 277-290 (2011) - [j5]Hong Zhao, Hongxia Wang, Muhammad Khurram Khan:
Steganalysis for palette-based images using generalized difference image and color correlogram. Signal Process. 91(11): 2595-2605 (2011) - [c4]Hongxia Wang, Mingquan Fan, Qing Qian:
Efficiently Self-synchronized Audio Watermarking against Re-sampling Attack. CSE 2011: 335-338 - [c3]Fan Chen, Hongjie He, Yaoran Huo, Hongxia Wang:
Self-recovery Fragile Watermarking Scheme with Variable Watermark Payload. IWDW 2011: 142-155 - 2010
- [j4]Hongxia Wang, Mingquan Fan:
Centroid-based semi-fragile audio watermarking in hybrid domain. Sci. China Inf. Sci. 53(3): 619-633 (2010) - [c2]S. Jamal H. Zaidi, Hongxia Wang:
Improved image encryption technique using multi chaotic system. FIT 2010: 35
2000 – 2009
- 2009
- [j3]Mingquan Fan, Hongxia Wang:
Chaos-based discrete fractional Sine transform domain audio watermarking scheme. Comput. Electr. Eng. 35(3): 506-516 (2009) - [c1]Ming-Quan Fan, Hong-Xia Wang:
Time-Scale Invariant Zero-Watermarking Scheme for Audio. IIH-MSP 2009: 157-160 - 2008
- [j2]Ming-Quan Fan, Hong-Xia Wang, Sheng-Kun Li:
Restudy on SVD-based watermarking scheme. Appl. Math. Comput. 203(2): 926-930 (2008) - 2006
- [j1]Jian Luo, Hongxia Wang:
Connectivity-Based Image Watermarking. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(4): 1126-1128 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 21:09 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint