Folgen
Xiaolong LI
Xiaolong LI
Institute of Information Science, Beijing Jiaotong University
Bestätigte E-Mail-Adresse bei bjtu.edu.cn
Titel
Zitiert von
Zitiert von
Jahr
Segmentation-based image copy-move forgery detection scheme
J Li, X Li, B Yang, X Sun
IEEE Transactions on Information Forensics and Security 10 (3), 507-518, 2015
9732015
Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection
X Li, B Yang, T Zeng
IEEE Transactions on Image Processing 20 (12), 3524-3533, 2011
7432011
A new cost function for spatial image steganography
B Li, M Wang, J Huang, X Li
2014 IEEE International Conference on Image Processing (ICIP), 4206-4210, 2014
6172014
Reversible Data Hiding: Advances in the Past Two Decades
YQ Shi, X Li, X Zhang, H Wu, B Ma
IEEE Access 4, 3210-3237, 2016
5432016
Pairwise prediction-error expansion for efficient reversible data hiding
B Ou, X Li, Y Zhao, R Ni, YQ Shi
IEEE Transactions on Image Processing 22 (12), 5010-5021, 2013
5252013
High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion
X Li, J Li, B Li, B Yang
Signal Processing 93 (1), 198-205, 2013
5152013
General framework to histogram-shifting-based reversible data hiding
X Li, B Li, B Yang, T Zeng
IEEE Transactions on Image Processing 22 (6), 2181-2191, 2013
4922013
Efficient reversible data hiding based on multiple histograms modification
X Li, W Zhang, X Gui, B Yang
IEEE Transactions on Information Forensics and Security 10 (9), 2016-2027, 2015
3792015
A novel reversible data hiding scheme based on two-dimensional difference-histogram modification
X Li, W Zhang, X Gui, B Yang
IEEE Transactions on Information Forensics and Security 8 (7), 1091-1100, 2013
3602013
Improved PVO-based reversible data hiding
F Peng, X Li, B Yang
Digital Signal Processing 25, 255–265, 2014
2912014
Adaptive reversible data hiding scheme based on integer transform
F Peng, X Li, B Yang
Signal Processing 92 (1), 54-62, 2012
2782012
A strategy of clustering modification directions in spatial image steganography
B Li, M Wang, X Li, S Tan, J Huang
IEEE Transactions on Information Forensics and Security 10 (9), 1905-1917, 2015
2662015
Recursive Histogram Modification: Establishing Equivalency between Reversible Data Hiding and Lossless Data Compression
W Zhang, X Hu, X Li, N Yu
IEEE Transactions on Image Processing 22 (7), 2775-2785, 2013
2612013
Efficient generalized integer transform for reversible watermarking
X Wang, X Li, B Yang, Z Guo
IEEE Signal Processing Letters 17 (6), 567-570, 2010
2322010
Reversible data hiding using invariant pixel-value-ordering and prediction-error expansion
B Ou, X Li, Y Zhao, R Ni
Signal Processing: Image Communication 29 (7), 760-772, 2014
1892014
Selection of Rich Model Steganalysis Features Based on Decision Rough Set -Positive Region Reduction
Y Ma, X Luo, X Li, Z Bao, Y Zhang
IEEE Transactions on Circuits and Systems for Video Technology 29 (2), 336-350, 2018
1842018
A generalization of LSB matching
X Li, B Yang, D Cheng, T Zeng
IEEE Signal Processing Letters 16 (2), 69-72, 2009
1752009
High-fidelity reversible data hiding based on pixel-value-ordering and pairwise prediction-error expansion
B Ou, X Li, J Wang
Journal of Visual Communication and Image Representation 39, 12-23, 2016
1172016
Reversible data hiding based on PDE predictor
B Ou, X Li, Y Zhao, R Ni
Journal of Systems and Software 86 (10), 2700-2709, 2013
1162013
Minimum rate prediction and optimized histograms modification for reversible data hiding
X Hu, W Zhang, X Li, N Yu
IEEE Transactions on Information Forensics and Security 10 (3), 653-664, 2015
1052015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20