BibTeX records: Zhao-Xia Yin

download as .bib file

@article{DBLP:journals/ijdcf/WangYZ19,
  author    = {Zichi Wang and
               Zhaoxia Yin and
               Xinpeng Zhang},
  title     = {Asymmetric Distortion Function for {JPEG} Steganography Using Block
               Artifact Compensation},
  journal   = {{IJDCF}},
  volume    = {11},
  number    = {1},
  pages     = {90--99},
  year      = {2019},
  url       = {https://doi.org/10.4018/IJDCF.2019010107},
  doi       = {10.4018/IJDCF.2019010107},
  timestamp = {Fri, 07 Dec 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijdcf/WangYZ19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/JiaYZL19,
  author    = {Yujie Jia and
               Zhaoxia Yin and
               Xinpeng Zhang and
               Yonglong Luo},
  title     = {Reversible data hiding based on reducing invalid shifting of pixels
               in histogram shifting},
  journal   = {Signal Process.},
  volume    = {163},
  pages     = {238--246},
  year      = {2019},
  url       = {https://doi.org/10.1016/j.sigpro.2019.05.020},
  doi       = {10.1016/j.sigpro.2019.05.020},
  timestamp = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/sigpro/JiaYZL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-03533,
  author    = {Zhaoxia Yin and
               Yuan Ji and
               Bin Luo},
  title     = {Reversible Data Hiding in {JPEG} Images with Multi-objective Optimization},
  journal   = {CoRR},
  volume    = {abs/1905.03533},
  year      = {2019},
  url       = {http://arxiv.org/abs/1905.03533},
  archivePrefix = {arXiv},
  eprint    = {1905.03533},
  timestamp = {Mon, 27 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/abs-1905-03533.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-05365,
  author    = {Yujie Jia and
               Zhaoxia Yin and
               Xinpeng Zhang and
               Yonglong Luo},
  title     = {Reversible data hiding based on reducing invalid shifting of pixels
               in histogram shifting},
  journal   = {CoRR},
  volume    = {abs/1905.05365},
  year      = {2019},
  url       = {http://arxiv.org/abs/1905.05365},
  archivePrefix = {arXiv},
  eprint    = {1905.05365},
  timestamp = {Tue, 28 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/abs-1905-05365.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-05627,
  author    = {Yang Du and
               Zhaoxia Yin and
               Xinpeng Zhang},
  title     = {High Capacity Lossless Data Hiding for {JPEG} images by {NLCM} Relationship
               Constrcution},
  journal   = {CoRR},
  volume    = {abs/1905.05627},
  year      = {2019},
  url       = {http://arxiv.org/abs/1905.05627},
  archivePrefix = {arXiv},
  eprint    = {1905.05627},
  timestamp = {Tue, 28 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/abs-1905-05627.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-08614,
  author    = {Hua Wang and
               Jie Wang and
               Zhaoxia Yin},
  title     = {War: Detecting adversarial examples by pre-processing input data},
  journal   = {CoRR},
  volume    = {abs/1905.08614},
  year      = {2019},
  url       = {http://arxiv.org/abs/1905.08614},
  archivePrefix = {arXiv},
  eprint    = {1905.08614},
  timestamp = {Wed, 29 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/abs-1905-08614.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-09625,
  author    = {Youqing Wu and
               Youzhi Xiang and
               Yutang Guo and
               Jin Tang and
               Zhaoxia Yin},
  title     = {An Improved Reversible Data Hiding in Encrypted Images using Parametric
               Binary Tree Labeling},
  journal   = {CoRR},
  volume    = {abs/1905.09625},
  year      = {2019},
  url       = {http://arxiv.org/abs/1905.09625},
  archivePrefix = {arXiv},
  eprint    = {1905.09625},
  timestamp = {Wed, 29 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/abs-1905-09625.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-03175,
  author    = {Xiaoqing Liu and
               Yinyin Peng and
               Jie Wang and
               Zhaoxia Yin},
  title     = {Image Encryption Algorithm Based on Facebook Social Network},
  journal   = {CoRR},
  volume    = {abs/1906.03175},
  year      = {2019},
  url       = {http://arxiv.org/abs/1906.03175},
  archivePrefix = {arXiv},
  eprint    = {1906.03175},
  timestamp = {Fri, 14 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/abs-1906-03175.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1908-02473,
  author    = {Na Xu and
               Zhaoxia Yin},
  title     = {Separable Reversible Data Hiding Based on {MSB} Prediction for Encrypted
               3D Mesh Models},
  journal   = {CoRR},
  volume    = {abs/1908.02473},
  year      = {2019},
  url       = {http://arxiv.org/abs/1908.02473},
  archivePrefix = {arXiv},
  eprint    = {1908.02473},
  timestamp = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/abs-1908-02473.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-01699,
  author    = {Zhaoxia Yin and
               Yinyin Peng and
               Youzhi Xiang},
  title     = {Reversible Data Hiding in Encrypted Images based on Pixel Prediction
               and Bit-plane Compression},
  journal   = {CoRR},
  volume    = {abs/1911.01699},
  year      = {2019},
  url       = {http://arxiv.org/abs/1911.01699},
  archivePrefix = {arXiv},
  eprint    = {1911.01699},
  timestamp = {Mon, 11 Nov 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/corr/abs-1911-01699.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-02360,
  author    = {Hua Wang and
               Zhaoxia Yin},
  title     = {Reversible Adversarial Examples based on Reversible Image Transformation},
  journal   = {CoRR},
  volume    = {abs/1911.02360},
  year      = {2019},
  url       = {http://arxiv.org/abs/1911.02360},
  archivePrefix = {arXiv},
  eprint    = {1911.02360},
  timestamp = {Mon, 11 Nov 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/corr/abs-1911-02360.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PengNFY18,
  author    = {Yinyin Peng and
               Xuejing Niu and
               Lei Fu and
               Zhao{-}Xia Yin},
  title     = {Image authentication scheme based on reversible fragile watermarking
               with two images},
  journal   = {J. Inf. Sec. Appl.},
  volume    = {40},
  pages     = {236--246},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.jisa.2018.04.007},
  doi       = {10.1016/j.jisa.2018.04.007},
  timestamp = {Mon, 25 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/istr/PengNFY18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/WeiYWZ18,
  author    = {Qingde Wei and
               Zhaoxia Yin and
               Zichi Wang and
               Xinpeng Zhang},
  title     = {Distortion function based on residual blocks for {JPEG} steganography},
  journal   = {Multimedia Tools Appl.},
  volume    = {77},
  number    = {14},
  pages     = {17875--17888},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11042-017-5053-7},
  doi       = {10.1007/s11042-017-5053-7},
  timestamp = {Wed, 25 Jul 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/mta/WeiYWZ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/YinNZTL18,
  author    = {Zhao{-}Xia Yin and
               Xuejing Niu and
               Xinpeng Zhang and
               Jin Tang and
               Bin Luo},
  title     = {Reversible data hiding in encrypted {AMBTC} images},
  journal   = {Multimedia Tools Appl.},
  volume    = {77},
  number    = {14},
  pages     = {18067--18083},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11042-017-4957-6},
  doi       = {10.1007/s11042-017-4957-6},
  timestamp = {Thu, 25 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/mta/YinNZTL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spl/WangZY18,
  author    = {Zichi Wang and
               Xinpeng Zhang and
               Zhaoxia Yin},
  title     = {Joint Cover-Selection and Payload-Allocation by Steganographic Distortion
               Optimization},
  journal   = {{IEEE} Signal Process. Lett.},
  volume    = {25},
  number    = {10},
  pages     = {1530--1534},
  year      = {2018},
  url       = {https://doi.org/10.1109/LSP.2018.2865888},
  doi       = {10.1109/LSP.2018.2865888},
  timestamp = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/spl/WangZY18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bics/HongYL18,
  author    = {Zhigao Hong and
               Zhao{-}Xia Yin and
               Bin Luo},
  editor    = {Jinchang Ren and
               Amir Hussain and
               Jiangbin Zheng and
               Cheng{-}Lin Liu and
               Bin Luo and
               Huimin Zhao and
               Xinbo Zhao},
  title     = {Improved Reversible Data Hiding in {JPEG} Images Based on Interval
               Correlation},
  booktitle = {Advances in Brain Inspired Cognitive Systems - 9th International Conference,
               {BICS} 2018, Xi'an, China, July 7-8, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10989},
  pages     = {687--696},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-00563-4\_67},
  doi       = {10.1007/978-3-030-00563-4\_67},
  timestamp = {Tue, 04 Feb 2020 18:30:40 +0100},
  biburl    = {https://dblp.org/rec/conf/bics/HongYL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ialp/FuYWL18,
  author    = {Lei Fu and
               Zhaoxia Yin and
               Xin Wang and
               Yi Liu},
  editor    = {Minghui Dong and
               Moch Arif Bijaksana and
               Herry Sujaini and
               Ade Romadhony and
               Fariska Z. Ruskanda and
               Elvira Nurfadhilah and
               Lyla Ruslana Aini},
  title     = {A Hybrid Algorithm for Text Classification Based on {CNN-BLSTM} with
               Attention},
  booktitle = {2018 International Conference on Asian Language Processing, {IALP}
               2018, Bandung, Indonesia, November 15-17, 2018},
  pages     = {31--34},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {https://doi.org/10.1109/IALP.2018.8629219},
  doi       = {10.1109/IALP.2018.8629219},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/conf/ialp/FuYWL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/PuyangYZ18,
  author    = {Yi Puyang and
               Zhaoxia Yin and
               Xinpeng Zhang},
  editor    = {Xingming Sun and
               Zhaoqing Pan and
               Elisa Bertino},
  title     = {Reversible Data Embedding and Scrambling Method Based on {JPEG} Images},
  booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS}
               2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
               {IV}},
  series    = {Lecture Notes in Computer Science},
  volume    = {11066},
  pages     = {372--381},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-00015-8\_32},
  doi       = {10.1007/978-3-030-00015-8\_32},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/conf/icccsec/PuyangYZ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/PuyangQYZ18,
  author    = {Yi Puyang and
               Zhenxing Qian and
               Zhaoxia Yin and
               Xinpeng Zhang},
  editor    = {Xingming Sun and
               Zhaoqing Pan and
               Elisa Bertino},
  title     = {Style Transferring Based Data Hiding for Color Images},
  booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS}
               2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
               {IV}},
  series    = {Lecture Notes in Computer Science},
  volume    = {11066},
  pages     = {440--449},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-00015-8\_38},
  doi       = {10.1007/978-3-030-00015-8\_38},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/conf/icccsec/PuyangQYZ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/PengY18,
  author    = {Yinyin Peng and
               Zhao{-}Xia Yin},
  editor    = {Chang D. Yoo and
               Yun Qing Shi and
               Hyoung{-}Joong Kim and
               Alessandro Piva and
               Gwangsu Kim},
  title     = {A Strategy of Distinguishing Texture Feature for Reversible Data Hiding
               Based on Histogram Shifting},
  booktitle = {Digital Forensics and Watermarking - 17th International Workshop,
               {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11378},
  pages     = {206--215},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-11389-6\_16},
  doi       = {10.1007/978-3-030-11389-6\_16},
  timestamp = {Tue, 14 May 2019 10:00:45 +0200},
  biburl    = {https://dblp.org/rec/conf/iwdw/PengY18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nlpcc/FuYLZ18,
  author    = {Lei Fu and
               Zhaoxia Yin and
               Yi Liu and
               Jun Zhang},
  editor    = {Min Zhang and
               Vincent Ng and
               Dongyan Zhao and
               Sujian Li and
               Hongying Zan},
  title     = {Convolution Neural Network with Active Learning for Information Extraction
               of Enterprise Announcements},
  booktitle = {Natural Language Processing and Chinese Computing - 7th {CCF} International
               Conference, {NLPCC} 2018, Hohhot, China, August 26-30, 2018, Proceedings,
               Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {11109},
  pages     = {330--339},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-99501-4\_29},
  doi       = {10.1007/978-3-319-99501-4\_29},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/conf/nlpcc/FuYLZ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pcm/YinXQZ18,
  author    = {Zhaoxia Yin and
               Youzhi Xiang and
               Zhenxing Qian and
               Xinpeng Zhang},
  editor    = {Richang Hong and
               Wen{-}Huang Cheng and
               Toshihiko Yamasaki and
               Meng Wang and
               Chong{-}Wah Ngo},
  title     = {Unified Data Hiding and Scrambling Method for {JPEG} Images},
  booktitle = {Advances in Multimedia Information Processing - {PCM} 2018 - 19th
               Pacific-Rim Conference on Multimedia, Hefei, China, September 21-22,
               2018, Proceedings, Part {III}},
  series    = {Lecture Notes in Computer Science},
  volume    = {11166},
  pages     = {373--383},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-00764-5\_34},
  doi       = {10.1007/978-3-030-00764-5\_34},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/conf/pcm/YinXQZ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/PuyangYQ18,
  author    = {Yi Puyang and
               Zhaoxia Yin and
               Zhenxing Qian},
  title     = {Reversible Data Hiding in Encrypted Images with Two-MSB Prediction},
  booktitle = {2018 {IEEE} International Workshop on Information Forensics and Security,
               {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages     = {1--7},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {https://doi.org/10.1109/WIFS.2018.8630785},
  doi       = {10.1109/WIFS.2018.8630785},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/conf/wifs/PuyangYQ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1812-09499,
  author    = {Youzhi Xiang and
               Zhaoxia Yin and
               Xinpeng Zhang},
  title     = {Reversible Data Hiding in Encrypted Images based on {MSB} Prediction
               and Huffman Coding},
  journal   = {CoRR},
  volume    = {abs/1812.09499},
  year      = {2018},
  url       = {http://arxiv.org/abs/1812.09499},
  archivePrefix = {arXiv},
  eprint    = {1812.09499},
  timestamp = {Wed, 02 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/corr/abs-1812-09499.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/CaoFYF17,
  author    = {Bing Cao and
               Guorui Feng and
               Zhaoxia Yin and
               Lingyan Fan},
  title     = {Unsupervised Image Steganalysis Method Using Self-Learning Ensemble
               Discriminant Clustering},
  journal   = {{IEICE} Transactions},
  volume    = {100-D},
  number    = {5},
  pages     = {1144--1147},
  year      = {2017},
  url       = {https://doi.org/10.1587/transinf.2017EDL8011},
  doi       = {10.1587/transinf.2017EDL8011},
  timestamp = {Thu, 27 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ieicet/CaoFYF17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/HongCYLM17,
  author    = {Wien Hong and
               Tung{-}Shou Chen and
               Zhao{-}Xia Yin and
               Bin Luo and
               Yuanbo Ma},
  title     = {Data hiding in {AMBTC} images using quantization level modification
               and perturbation technique},
  journal   = {Multimedia Tools Appl.},
  volume    = {76},
  number    = {3},
  pages     = {3761--3782},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11042-016-3977-y},
  doi       = {10.1007/s11042-016-3977-y},
  timestamp = {Wed, 24 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/mta/HongCYLM17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/YinATZL17,
  author    = {Zhao{-}Xia Yin and
               Andrew Abel and
               Jin Tang and
               Xinpeng Zhang and
               Bin Luo},
  title     = {Reversible data hiding in encrypted images based on multi-level encryption
               and block histogram modification},
  journal   = {Multimedia Tools Appl.},
  volume    = {76},
  number    = {3},
  pages     = {3899--3920},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11042-016-4049-z},
  doi       = {10.1007/s11042-016-4049-z},
  timestamp = {Wed, 24 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/mta/YinATZL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/PuyangYFA17,
  author    = {Yi Puyang and
               Zhaoxia Yin and
               Guorui Feng and
               Andrew K. Abel},
  editor    = {Xingming Sun and
               Han{-}Chieh Chao and
               Xingang You and
               Elisa Bertino},
  title     = {An Improved Reversible Information Hiding Scheme Based on {AMBTC}
               Compressed Images},
  booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS}
               2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
               {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10602},
  pages     = {49--60},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-68505-2\_5},
  doi       = {10.1007/978-3-319-68505-2\_5},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/conf/icccsec/PuyangYFA17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/msn/DuYZ17,
  author    = {Yang Du and
               Zhaoxia Yin and
               Xinpeng Zhang},
  editor    = {Liehuang Zhu and
               Sheng Zhong},
  title     = {An Improved Lossless Data Hiding Scheme in {JPEG} Bitstream by {VLC}
               Mapping},
  booktitle = {Mobile Ad-hoc and Sensor Networks - 13th International Conference,
               {MSN} 2017, Beijing, China, December 17-20, 2017, Revised Selected
               Papers},
  series    = {Communications in Computer and Information Science},
  volume    = {747},
  pages     = {84--98},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-981-10-8890-2\_7},
  doi       = {10.1007/978-981-10-8890-2\_7},
  timestamp = {Mon, 25 Jun 2018 09:43:37 +0200},
  biburl    = {https://dblp.org/rec/conf/msn/DuYZ17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cogcom/YinNZTL16,
  author    = {Zhao{-}Xia Yin and
               Xuejing Niu and
               Zhili Zhou and
               Jin Tang and
               Bin Luo},
  title     = {Improved Reversible Image Authentication Scheme},
  journal   = {Cognitive Computation},
  volume    = {8},
  number    = {5},
  pages     = {890--899},
  year      = {2016},
  url       = {https://doi.org/10.1007/s12559-016-9408-6},
  doi       = {10.1007/s12559-016-9408-6},
  timestamp = {Wed, 24 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/cogcom/YinNZTL16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/YinHTL16,
  author    = {Zhao{-}Xia Yin and
               Wien Hong and
               Jin Tang and
               Bin Luo},
  title     = {High capacity reversible steganography in encrypted images based on
               feature mining in plaintext domain},
  journal   = {{IJES}},
  volume    = {8},
  number    = {2/3},
  pages     = {249--257},
  year      = {2016},
  url       = {https://doi.org/10.1504/IJES.2016.076118},
  doi       = {10.1504/IJES.2016.076118},
  timestamp = {Wed, 24 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijes/YinHTL16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jei/WangZY16,
  author    = {Zichi Wang and
               Xinpeng Zhang and
               Zhaoxia Yin},
  title     = {Hybrid distortion function for {JPEG} steganography},
  journal   = {J. Electronic Imaging},
  volume    = {25},
  number    = {5},
  pages     = {050501},
  year      = {2016},
  url       = {https://doi.org/10.1117/1.JEI.25.5.050501},
  doi       = {10.1117/1.JEI.25.5.050501},
  timestamp = {Tue, 14 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jei/WangZY16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YinL16,
  author    = {Zhao{-}Xia Yin and
               Bin Luo},
  title     = {MDE-based image steganography with large embedding capacity},
  journal   = {Security and Communication Networks},
  volume    = {9},
  number    = {8},
  pages     = {721--728},
  year      = {2016},
  url       = {https://doi.org/10.1002/sec.1275},
  doi       = {10.1002/sec.1275},
  timestamp = {Wed, 24 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/scn/YinL16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcomp/ZhangYZCW016,
  author    = {Hao Zhang and
               Zhaoxia Yin and
               Xinpeng Zhang and
               Jianpeng Chen and
               Ruonan Wang and
               Bin Luo},
  editor    = {Jiafu Wan and
               Kai Lin and
               Delu Zeng and
               Jin Li and
               Yang Xiang and
               Xiaofeng Liao and
               Jiwu Huang and
               Zheli Liu},
  title     = {Adaptive Algorithm Based on Reversible Data Hiding Method for {JPEG}
               Images},
  booktitle = {Cloud Computing, Security, Privacy in New Computing Environments -
               7th International Conference, CloudComp 2016, and First International
               Conference, {SPNCE} 2016, Guangzhou, China, November 25-26, and December
               15-16, 2016, Proceedings},
  series    = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
               and Telecommunications Engineering},
  volume    = {197},
  pages     = {196--203},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-69605-8\_18},
  doi       = {10.1007/978-3-319-69605-8\_18},
  timestamp = {Thu, 31 Jan 2019 11:00:36 +0100},
  biburl    = {https://dblp.org/rec/conf/cloudcomp/ZhangYZCW016.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/YinAZL16,
  author    = {Zhao{-}Xia Yin and
               Andrew Abel and
               Xinpeng Zhang and
               Bin Luo},
  title     = {Reversible data hiding in encrypted image based on block histogram
               shifting},
  booktitle = {2016 {IEEE} International Conference on Acoustics, Speech and Signal
               Processing, {ICASSP} 2016, Shanghai, China, March 20-25, 2016},
  pages     = {2129--2133},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {https://doi.org/10.1109/ICASSP.2016.7472053},
  doi       = {10.1109/ICASSP.2016.7472053},
  timestamp = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl    = {https://dblp.org/rec/conf/icassp/YinAZL16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/CaoFY16,
  author    = {Bing Cao and
               Guorui Feng and
               Zhaoxia Yin},
  editor    = {Xingming Sun and
               Alex X. Liu and
               Han{-}Chieh Chao and
               Elisa Bertino},
  title     = {Optimizing Feature for {JPEG} Steganalysis via Gabor Filter and Co-occurrences
               Matrices},
  booktitle = {Cloud Computing and Security - Second International Conference, {ICCCS}
               2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part
               {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10039},
  pages     = {84--93},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-48671-0\_8},
  doi       = {10.1007/978-3-319-48671-0\_8},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/conf/icccsec/CaoFY16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/NiuYZTL16,
  author    = {Xuejing Niu and
               Zhao{-}Xia Yin and
               Xinpeng Zhang and
               Jin Tang and
               Bin Luo},
  editor    = {Yun{-}Qing Shi and
               Hyoung{-}Joong Kim and
               Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
               Feng Liu},
  title     = {Reversible Data Hiding in Encrypted {AMBTC} Compressed Images},
  booktitle = {Digital Forensics and Watermarking - 15th International Workshop,
               {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {10082},
  pages     = {436--445},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-53465-7\_32},
  doi       = {10.1007/978-3-319-53465-7\_32},
  timestamp = {Tue, 14 May 2019 10:00:45 +0200},
  biburl    = {https://dblp.org/rec/conf/iwdw/NiuYZTL16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ipr/YinCXL15,
  author    = {Zhao{-}Xia Yin and
               Chin{-}Chen Chang and
               Qin Xu and
               Bin Luo},
  title     = {Second-order steganographic method based on adaptive reference matrix},
  journal   = {{IET} Image Processing},
  volume    = {9},
  number    = {4},
  pages     = {300--305},
  year      = {2015},
  url       = {https://doi.org/10.1049/iet-ipr.2014.0159},
  doi       = {10.1049/iet-ipr.2014.0159},
  timestamp = {Wed, 24 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iet-ipr/YinCXL15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/YinWZLZ15,
  author    = {Zhao{-}Xia Yin and
               Huabin Wang and
               Haifeng Zhao and
               Bin Luo and
               Xinpeng Zhang},
  editor    = {Zhiqiu Huang and
               Xingming Sun and
               Junzhou Luo and
               Jian Wang},
  title     = {Complete Separable Reversible Data Hiding in Encrypted Image},
  booktitle = {Cloud Computing and Security - First International Conference, {ICCCS}
               2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9483},
  pages     = {101--110},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-27051-7\_9},
  doi       = {10.1007/978-3-319-27051-7\_9},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/conf/icccsec/YinWZLZ15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/igta/XiaYW15,
  author    = {Yan Xia and
               Zhaoxia Yin and
               Liangmin Wang},
  editor    = {Tieniu Tan and
               Qiuqi Ruan and
               Shengjin Wang and
               Huimin Ma and
               Kaichang Di},
  title     = {Image Data Embedding with Large Payload Based on Reference-Matrix},
  booktitle = {Advances in Image and Graphics Technologies - 10th Chinese Conference,
               {IGTA} 2015, Beijing, China, June 19-20, 2015, Proceedings},
  series    = {Communications in Computer and Information Science},
  volume    = {525},
  pages     = {55--62},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-47791-5\_7},
  doi       = {10.1007/978-3-662-47791-5\_7},
  timestamp = {Fri, 29 Jun 2018 13:31:35 +0200},
  biburl    = {https://dblp.org/rec/conf/igta/XiaYW15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/YinCZ09,
  author    = {Zhao{-}Xia Yin and
               Chin{-}Chen Chang and
               Yan{-}Ping Zhang},
  title     = {A High Embedding Efficiency Steganography Scheme for Wet Paper Codes},
  booktitle = {Proceedings of the Fifth International Conference on Information Assurance
               and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages     = {611--614},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {https://doi.org/10.1109/IAS.2009.93},
  doi       = {10.1109/IAS.2009.93},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/conf/IEEEias/YinCZ09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics