Junhui He
Junhui He
Bestätigte E-Mail-Adresse bei
Zitiert von
Zitiert von
JPEG image encryption with improved format compatibility and file size preservation
J He, S Huang, S Tang, J Huang
IEEE Transactions on Multimedia 20 (10), 2645-2658, 2018
A novel high-capacity reversible data hiding scheme for encrypted JPEG bitstreams
J He, J Chen, W Luo, S Tang, J Huang
IEEE Transactions on Circuits and Systems for Video Technology 29 (12), 3501 …, 2018
Reversible data hiding in JPEG images based on negative influence models
J He, J Chen, S Tang
IEEE Transactions on Information Forensics and Security 15, 2121-2133, 2019
A secure image sharing scheme with high quality stego-images based on steganography
J He, W Lan, S Tang
Multimedia Tools and Applications 76, 7677-7698, 2017
Improved block ordering and frequency selection for reversible data hiding in JPEG images
J He, X Pan, H Wu, S Tang
Signal Processing 175, 107647, 2020
An adaptive image steganography based on depth-varying embedding
J He, S Tang, T Wu
2008 Congress on Image and Signal Processing 5, 660-663, 2008
A novel selective encryption scheme for H. 264/AVC video with improved visual security
J He, Y Xu, W Luo, S Tang, J Huang
Signal Processing: Image Communication 89, 115994, 2020
Steganalysis of stochastic modulation steganography
J He, J Huang
Science in China Series F 49, 273-285, 2006
A new robust copyright protection scheme for digital image based on visual cryptography
YB Xing, JH He
2010 International Conference on Wavelet Analysis and Pattern Recognition, 6-11, 2010
A new approach to estimating hidden message length in stochastic modulation steganography
J He, J Huang, G Qiu
International Workshop on Digital Watermarking, 1-14, 2005
Image Processing
JJ Pan, YY Tang, YB Xing, JH He, ZH Xie, GD Liu, SQ Wu, ZJ Fang, ...
Two-dimensional histogram shifting-based reversible data hiding for H. 264/AVC video
Y Xu, J He
Applied Sciences 10 (10), 3375, 2020
A novel AMR-WB speech steganography based on diameter-neighbor codebook partition
J He, J Chen, S Xiao, X Huang, S Tang
Security and Communication Networks 2018, 1-11, 2018
On the security of steganographic techniques
J He, S Tang, T Wu
2008 Congress on Image and Signal Processing 5, 716-719, 2008
Reversible data hiding for JPEG images based on improved mapping and frequency ordering
Y Chen, J He, Y Xian
Signal Processing 198, 108604, 2022
Steganalysis principle, actuality and prospect
XP Liang, JH He, JQ Li, JW Huang
Acta Scientiarum Natralium Universitatis Sunyatseni 43 (6), 93-96, 2004
Reversible image visual transformation for privacy and content protection
HT Wu, R Jia, JL Dugelay, J He
Multimedia Tools and Applications 80, 30863-30877, 2021
Kernel analysis based on SVDD for face recognition from image set
QS Zeng, XY Huang, XH Xiang, J He
Journal of Intelligent & Fuzzy Systems 36 (6), 5499-5511, 2019
Model-based steganalytic method towards color jpeg images
H Junhui, T Shaohua, L Bin
Journal of Computational Information Systems 3 (6), 2293-2302, 2007
Steganalysis for color JPEG images.
JH He, JW Huang
Dianzi Xuebao(Acta Electronica Sinica) 33 (12), 2543-2548, 2005
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20