A novel image hashing scheme with perceptual robustness using block truncation coding C Qin, X Chen, D Ye, J Wang, X Sun Information Sciences 361, 84-99, 2016 | 74 | 2016 |
Hierarchical recovery for tampered images based on watermark self-embedding F Cao, B An, J Wang, D Ye, H Wang Displays 46, 52-60, 2017 | 33 | 2017 |
A new adaptive watermarking for real-time MPEG videos D Ye, C Zou, Y Dai, Z Wang Applied Mathematics and Computation 185 (2), 907-918, 2007 | 30 | 2007 |
Next: a neural network framework for next poi recommendation Z Zhang, C Li, Z Wu, A Sun, D Ye, X Luo Frontiers of Computer Science 14 (2), 314-333, 2020 | 28 | 2020 |
Lossless data hiding algorithm for encrypted images with high capacity S Zheng, D Li, D Hu, D Ye, L Wang, J Wang Multimedia Tools and Applications 75 (21), 13765-13778, 2016 | 25 | 2016 |
On improving distortion functions for JPEG steganography Z Wang, Z Qian, X Zhang, M Yang, D Ye IEEE Access 6, 74917-74930, 2018 | 24 | 2018 |
A JPEG-compression resistant adaptive steganography based on relative relationship between DCT coefficients Y Zhang, X Luo, C Yang, D Ye, F Liu 2015 10th International Conference on Availability, Reliability and Security …, 2015 | 19 | 2015 |
Efficient secure data provenance scheme in multimedia outsourcing and sharing Z Yang, Y Huang, X Li, W Wang Computers, Materials & Continua 56 (1), 1-17, 2018 | 18 | 2018 |
An image steganography algorithm based on quantization index modulation resisting scaling attacks and statistical detection Y Zhang, Q Cheng Computers, Materials & Continua 56 (1), 151-167, 2018 | 17 | 2018 |
A framework of adaptive steganography resisting JPEG compression and detection Y Zhang, X Luo, C Yang, D Ye, F Liu Security and Communication Networks 9 (15), 2957-2971, 2016 | 17 | 2016 |
EveDroid: Event-aware Android malware detection against model degrading for IoT devices T Lei, Z Qin, Z Wang, Q Li, D Ye IEEE Internet of Things Journal 6 (4), 6668-6680, 2019 | 15 | 2019 |
Secure fractal image coding based on fractal parameter encryption S Lian, X Chen, D Ye Fractals 17 (02), 149-160, 2009 | 15 | 2009 |
Image authentication based on perceptual hash using Gabor filters L Wang, X Jiang, S Lian, D Hu, D Ye Soft Computing 15 (3), 493-504, 2011 | 14 | 2011 |
Reversible data hiding with image enhancement using histogram shifting Q Ying, Z Qian, X Zhang, D Ye IEEE Access 7, 46506-46521, 2019 | 11 | 2019 |
New zero-watermark copyright protection scheme based on binary bitmap [J] YE Deng-pan Application Research of Computers 8, 2007 | 9 | 2007 |
Uncertainty multi-source information fusion for intelligent flood risk analysis based on random set theory Y Xie, S Yi, Z Tang, D Ye International Journal of Computational Intelligence Systems 5 (5), 975-984, 2012 | 8 | 2012 |
Lightweight information hiding in H. 264/AVC video stream K Liao, D Ye, S Lian, Z Guo, J Wang 2009 International Conference on Multimedia Information Networking and …, 2009 | 8 | 2009 |
Information hiding technology and application [M] W Lina, Z Huanguo University of Wuhan Publishers, 2003 | 8 | 2003 |
Real-time reversible data hiding with shifting block histogram of pixel differences in encrypted image Z Tang, S Xu, D Ye, J Wang, X Zhang, C Yu Journal of Real-Time Image Processing 16 (3), 709-724, 2019 | 7 | 2019 |
Feature fusion based hashing for large scale image copy detection L Yan, H Ling, D Ye, C Wang, Z Ye, H Chen International Journal of Computational Intelligence Systems 8 (4), 725-734, 2015 | 6 | 2015 |