关注
Hong Zhang
Hong Zhang
Institiute of Information Engineering, Chinese Academy of Sciences
在 iie.ac.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
A Siamese CNN for image steganalysis
W You, H Zhang, X Zhao
IEEE Transactions on Information Forensics and Security 16, 291-306, 2020
1792020
Motion vector-based video steganography with preserved local optimality
H Zhang, Y Cao, X Zhao
Multimedia Tools and Applications 75, 13503-13519, 2016
792016
Improving the robustness of adaptive steganographic algorithms based on transport channel matching
Z Zhao, Q Guan, H Zhang, X Zhao
IEEE Transactions on Information Forensics and Security 14 (7), 1843-1856, 2018
672018
A steganalytic approach to detect motion vector modification using near-perfect estimation for local optimality
H Zhang, Y Cao, X Zhao
IEEE Transactions on Information Forensics and Security 12 (2), 465-478, 2016
582016
Video steganography based on optimized motion estimation perturbation
Y Cao, H Zhang, X Zhao, H Yu
Proceedings of the 3rd ACM workshop on information hiding and multimedia …, 2015
422015
Video steganography with perturbed macroblock partition
H Zhang, Y Cao, X Zhao, W Zhang, N Yu
Proceedings of the 2nd ACM workshop on Information hiding and multimedia …, 2014
392014
Covert communication by compressed videos exploiting the uncertainty of motion estimation
Y Cao, H Zhang, X Zhao, H Yu
IEEE Communications Letters 19 (2), 203-206, 2014
382014
Video steganalysis based on intra prediction mode calibration
Y Zhao, H Zhang, Y Cao, P Wang, X Zhao
Digital-Forensics and Watermarking: 14th International Workshop, IWDW 2015 …, 2016
372016
Improving the robustness of JPEG steganography with robustness cost
J Zhang, X Zhao, X He, H Zhang
IEEE Signal Processing Letters 29, 164-168, 2021
202021
A novel embedding distortion for motion vector-based steganography considering motion characteristic, local optimality and statistical distribution
P Wang, H Zhang, Y Cao, X Zhao
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia …, 2016
172016
Robust video steganography for social media sharing based on principal component analysis
P Fan, H Zhang, X Zhao
EURASIP Journal on Information Security 2022 (1), 4, 2022
112022
Adaptive VP8 steganography based on deblocking filtering
P Xie, H Zhang, W You, X Zhao, J Yu, Y Ma
Proceedings of the ACM Workshop on Information Hiding and Multimedia …, 2019
92019
Steganalysis of H. 264/AVC videos exploiting subtractive prediction error blocks
Y Cao, H Zhang, X Zhao, X He
IEEE Transactions on Information Forensics and Security 16, 3326-3338, 2021
82021
A video steganalytic approach against quantized transform coefficient-based H. 264 steganography by exploiting in-loop deblocking filtering
H Zhang, W You, X Zhao
IEEE Access 8, 186862-186878, 2020
82020
A robust video steganographic method against social networking transcoding based on steganographic side channel
P Fan, H Zhang, Y Cai, P Xie, X Zhao
Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia …, 2020
82020
Adaptive QIM with minimum embedding cost for robust video steganography on social networks
P Fan, H Zhang, X Zhao
IEEE Transactions on Information Forensics and Security 17, 3801-3815, 2022
72022
A deep residual multi-scale convolutional network for spatial steganalysis
S Zhang, H Zhang, X Zhao, H Yu
Digital Forensics and Watermarking: 17th International Workshop, IWDW 2018 …, 2019
72019
Data hiding in H. 264/AVC video files using the coded block pattern
H Zhang, Y Cao, X Zhao, H Yu, C Liu
Digital Forensics and Watermarking: 15th International Workshop, IWDW 2016 …, 2017
52017
Steganography based on adaptive pixel-value differencing scheme revisited
H Zhang, Q Guan, X Zhao
Digital-Forensics and Watermarking: 12th International Workshop, IWDW 2013 …, 2014
32014
视频隐写分析技术研究综述
张弘, 尤玮珂, 赵险峰
Journal of Cyber Security 信息安全学报 3 (6), 2018
12018
系统目前无法执行此操作,请稍后再试。
文章 1–20