A new cost function for spatial image steganography B Li, M Wang, J Huang, X Li 2014 IEEE International conference on image processing (ICIP), 4206-4210, 2014 | 638 | 2014 |
High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion X Li, J Li, B Li, B Yang Signal processing 93 (1), 198-205, 2013 | 530 | 2013 |
General framework to histogram-shifting-based reversible data hiding X Li, B Li, B Yang, T Zeng IEEE Transactions on image processing 22 (6), 2181-2191, 2013 | 501 | 2013 |
Automatic steganographic distortion learning using a generative adversarial network W Tang, S Tan, B Li, J Huang IEEE Signal Processing Letters 24 (10), 1547-1551, 2017 | 364 | 2017 |
A novel image steganography method via deep convolutional generative adversarial networks D Hu, L Wang, W Jiang, S Zheng, B Li IEEE access 6, 38303-38314, 2018 | 295 | 2018 |
A new payload partition strategy in color image steganography X Liao, Y Yu, B Li, Z Li, Z Qin IEEE transactions on circuits and systems for video technology 30 (3), 685-696, 2019 | 291 | 2019 |
Identification of deep network generated images using disparities in color components H Li, B Li, S Tan, J Huang Signal Processing 174, 107616, 2020 | 279 | 2020 |
CNN-based adversarial embedding for image steganography W Tang, B Li, S Tan, M Barni, J Huang IEEE Transactions on Information Forensics and Security 14 (8), 2074-2087, 2019 | 275 | 2019 |
A strategy of clustering modification directions in spatial image steganography B Li, M Wang, X Li, S Tan, J Huang IEEE Transactions on Information Forensics and Security 10 (9), 1905-1917, 2015 | 268 | 2015 |
Stacked convolutional auto-encoders for steganalysis of digital images S Tan, B Li Signal and information processing association annual summit and conference …, 2014 | 266 | 2014 |
Large-scale JPEG image steganalysis using hybrid deep-learning framework J Zeng, S Tan, B Li, J Huang IEEE Transactions on Information Forensics and Security 13 (5), 1200-1214, 2017 | 246 | 2017 |
Detecting doubly compressed JPEG images by using mode based first digit features B Li, YQ Shi, J Huang 2008 IEEE 10th workshop on multimedia signal processing, 730-735, 2008 | 224 | 2008 |
Investigation on cost assignment in spatial image steganography B Li, S Tan, M Wang, J Huang IEEE Transactions on Information Forensics and Security 9 (8), 1264-1277, 2014 | 179 | 2014 |
Automatic detection of object-based forgery in advanced video S Chen, S Tan, B Li, J Huang IEEE Transactions on Circuits and Systems for Video Technology 26 (11), 2138 …, 2015 | 155 | 2015 |
An automatic cost learning framework for image steganography using deep reinforcement learning W Tang, B Li, M Barni, J Li, J Huang IEEE Transactions on Information Forensics and Security 16, 952-967, 2020 | 135 | 2020 |
ReST-Net: Diverse activation modules and parallel subnets-based CNN for spatial image steganalysis B Li, W Wei, A Ferreira, S Tan IEEE Signal Processing Letters 25 (5), 650-654, 2018 | 133 | 2018 |
Steganalysis of YASS B Li, YQ Shi, J Huang Proceedings of the 10th ACM workshop on Multimedia and security, 139-148, 2008 | 102 | 2008 |
Image tampering localization using a dense fully convolutional network P Zhuang, H Li, S Tan, B Li, J Huang IEEE Transactions on Information Forensics and Security 16, 2986-2999, 2021 | 96 | 2021 |
New steganalytic features for spatial image steganography based on derivative filters and threshold LBP operator B Li, Z Li, S Zhou, S Tan, X Zhang IEEE Transactions on Information Forensics and Security 13 (5), 1242-1257, 2017 | 86 | 2017 |
Attack LSB matching steganography by counting alteration rate of the number of neighbourhood gray levels F Huang, B Li, J Huang 2007 IEEE international conference on image processing 1, I-401-I-404, 2007 | 83 | 2007 |