Zhaoxia YIN 殷赵霞
Zhaoxia YIN 殷赵霞
Associate Professor, Anhui University
Verified email at ahu.edu.cn - Homepage
Cited by
Cited by
Separable and error-free reversible data hiding in encrypted image with high payload
Z Yin, B Luo, W Hong
The scientific world journal 2014, 2014
Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting
Y Jia, Z Yin, X Zhang, Y Luo
Signal Processing 163, 238-246, 2019
Reversible data hiding in encrypted images based on multi-MSB prediction and Huffman coding
Z Yin, Y Xiang, X Zhang
IEEE Transactions on Multimedia 22 (4), 874-884, 2019
Reversible data hiding in encrypted images with two-MSB prediction
Y Puyang, Z Yin, Z Qian
2018 IEEE International Workshop on Information Forensics and Security (WIFS …, 2018
Hybrid distortion function for JPEG steganography
Z Wang, X Zhang, Z Yin
Journal of Electronic Imaging 25 (5), 050501, 2016
Reversible data hiding in encrypted images based on multi-level encryption and block histogram modification
Z Yin, A Abel, J Tang, X Zhang, B Luo
Multimedia Tools and Applications 76 (3), 3899-3920, 2017
Joint cover-selection and payload-allocation by steganographic distortion optimization
Z Wang, X Zhang, Z Yin
IEEE Signal Processing Letters 25 (10), 1530-1534, 2018
An improved reversible data hiding in encrypted images using parametric binary tree labeling
Y Wu, Y Xiang, Y Guo, J Tang, Z Yin
IEEE Transactions on Multimedia 22 (8), 1929-1938, 2019
Distortion function based on residual blocks for JPEG steganography
Q Wei, Z Yin, Z Wang, X Zhang
Multimedia Tools and Applications 77 (14), 17875-17888, 2018
Reversible data hiding in encrypted AMBTC images
Z Yin, X Niu, X Zhang, J Tang, B Luo
Multimedia tools and applications 77 (14), 18067-18083, 2018
Image authentication scheme based on reversible fragile watermarking with two images
Y Peng, X Niu, L Fu, Z Yin
Journal of information security and applications 40, 236-246, 2018
High capacity data hiding scheme based on (7, 4) Hamming code
Z Cao, Z Yin, H Hu, X Gao, L Wang
SpringerPlus 5 (1), 1-13, 2016
Data hiding in AMBTC images using quantization level modification and perturbation technique
W Hong, TS Chen, Z Yin, B Luo, Y Ma
Multimedia tools and applications 76 (3), 3761-3782, 2017
Improved reversible image authentication scheme
Z Yin, X Niu, Z Zhou, J Tang, B Luo
Cognitive Computation 8 (5), 890-899, 2016
Improved lossless data hiding for jpeg images based on histogram modification
Y Du, Z Yin, X Zhang
Comput. Mater. Cont 55 (3), 495-507, 2018
Reversible data hiding in encrypted image based on block histogram shifting
Z Yin, A Abel, X Zhang, B Luo
2016 IEEE International Conference on Acoustics, Speech and Signal …, 2016
High capacity reversible steganography in encrypted images based on feature mining in plaintext domain
Z Yin, W Hong, J Tang, B Luo
International Journal of Embedded Systems 8 (2-3), 249-257, 2016
Image steganography via fully exploiting modification direction
X Niu, M Ma, R Tang, Z Yin
International Journal of Security and Its Applications 9 (5), 243-254, 2015
An information hiding scheme based on (7, 4) hamming code oriented wet paper codes
Z Yin, C Chang, Y Zhang
International Journal of Innovative Computing, Information and Control 6 (7 …, 2010
Reversible data hiding in JPEG images with multi-objective optimization
Z Yin, Y Ji, B Luo
IEEE Transactions on Circuits and Systems for Video Technology 30 (8), 2343-2352, 2020
The system can't perform the operation now. Try again later.
Articles 1–20