Adversarial examples against deep neural network based steganalysis Y Zhang, W Zhang, K Chen, J Liu, Y Liu, N Yu Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia …, 2018 | 28 | 2018 |
Reversible data hiding in color image with grayscale invariance D Hou, W Zhang, K Chen, SJ Lin, N Yu IEEE Transactions on Circuits and Systems for Video Technology 29 (2), 363-374, 2018 | 25 | 2018 |
Comments on “Steganography using reversible texture synthesis” H Zhou, K Chen, W Zhang, N Yu IEEE Transactions on Image Processing 26 (4), 1623-1625, 2017 | 24 | 2017 |
Defining cost functions for adaptive JPEG steganography at the microscale K Chen, H Zhou, W Zhou, W Zhang, N Yu IEEE Transactions on Information Forensics and Security 14 (4), 1052-1066, 2018 | 20 | 2018 |
Dup-net: Denoiser and upsampler network for 3d adversarial point clouds defense H Zhou, K Chen, W Zhang, H Fang, W Zhou, N Yu Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2019 | 16 | 2019 |
Defining joint distortion for JPEG steganography W Li, W Zhang, K Chen, W Zhou, N Yu Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia …, 2018 | 15 | 2018 |
Defining cost functions for adaptive steganography at the microscale K Chen, W Zhang, H Zhou, N Yu, G Feng 2016 IEEE International Workshop on Information Forensics and Security (WIFS …, 2016 | 13 | 2016 |
Distortion Design for Secure Adaptive 3-D Mesh Steganography H Zhou, K Chen, W Zhang, Y Yao, N Yu IEEE Transactions on Multimedia 21 (6), 1384-1398, 2018 | 7 | 2018 |
Journal of visual communication and image representation J Wang, Y Wang, M Jiang vol 25 (5), 2014 | 7 | 2014 |
Side channel steganalysis: When behavior is considered in steganographer detection L Li, W Zhang, K Chen, H Zha, N Yu Multimedia Tools and Applications 78 (7), 8041-8055, 2019 | 6 | 2019 |
Robust adaptive steganography based on generalized dither modulation and expanded embedding domain X Yu, K Chen, Y Wang, W Li, W Zhang, N Yu Signal Processing 168, 107343, 2020 | 5 | 2020 |
Derivative-based steganographic distortion and its non-additive extensions for audio K Chen, H Zhou, W Li, K Yang, W Zhang, N Yu IEEE Transactions on Circuits and Systems for Video Technology 30 (7), 2027-2032, 2019 | 5 | 2019 |
Targeted attack and security enhancement on texture synthesis based steganography H Zhou, K Chen, W Zhang, Z Qian, N Yu Journal of Visual Communication and Image Representation 54, 100-107, 2018 | 5 | 2018 |
Controversial ‘pixel’prior rule for JPEG adaptive steganography W Zhou, W Li, K Chen, H Zhou, W Zhang, N Yu IET Image Processing 13 (1), 24-33, 2018 | 4 | 2018 |
Provably secure generative steganography based on autoregressive model K Yang, K Chen, W Zhang, N Yu International Workshop on Digital Watermarking, 55-68, 2018 | 3 | 2018 |
Deflecting 3d adversarial point clouds through outlier-guided removal H Zhou, K Chen, W Zhang, H Fang, W Zhou, N Yu arXiv preprint arXiv, 1812 | 3 | 1812 |
LG-GAN: Label Guided Adversarial Network for Flexible Targeted Attack of Point Cloud Based Deep Networks H Zhou, D Chen, J Liao, K Chen, X Dong, K Liu, W Zhang, G Hua, N Yu Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2020 | 2 | 2020 |
Feature-preserving tensor voting model for mesh steganalysis H Zhou, K Chen, W Zhang, C Qin, N Yu IEEE transactions on visualization and computer graphics 27 (1), 57-67, 2019 | 2 | 2019 |
Jpeg steganography with estimated side-information W Li, K Chen, W Zhang, H Zhou, Y Wang, N Yu IEEE Transactions on Circuits and Systems for Video Technology 30 (7), 2288-2294, 2019 | 2 | 2019 |
When provably secure steganography meets generative models K Chen, H Zhou, H Zhao, D Chen, W Zhang, N Yu arXiv preprint arXiv:1811.03732, 2018 | 2 | 2018 |