Heng Yao
Cited by
Cited by
Robust hashing for image authentication using Zernike moments and local features
Y Zhao, S Wang, X Zhang, H Yao
IEEE transactions on information forensics and security 8 (1), 55-63, 2012
Effective reversible data hiding in encrypted image with adaptive encoding strategy
Y Fu, P Kong, H Yao, Z Tang, C Qin
Information Sciences 494, 21-36, 2019
Improved dual-image reversible data hiding method using the selection strategy of shiftable pixels' coordinates with minimum distortion
H Yao, C Qin, Z Tang, Y Tian
Signal Processing 135, 26-35, 2017
Detecting image splicing based on noise level inconsistency
H Yao, S Wang, X Zhang, C Qin, J Wang
Multimedia Tools and Applications 76, 12457-12479, 2017
Detecting image forgery using perspective constraints
H Yao, S Wang, Y Zhao, X Zhang
IEEE Signal Processing Letters 19 (3), 123-126, 2011
Reversible data hiding with differential compression in encrypted image
Z Tang, S Xu, H Yao, C Qin, X Zhang
Multimedia Tools and Applications 78, 9691-9715, 2019
Visible watermark removal scheme based on reversible data hiding and image inpainting
C Qin, Z He, H Yao, F Cao, L Gao
Signal Processing: Image Communication 60, 160-172, 2018
Guided filtering based color image reversible data hiding
H Yao, C Qin, Z Tang, Y Tian
Journal of Visual Communication and Image Representation 43, 152-163, 2017
High-fidelity dual-image reversible data hiding via prediction-error shift
H Yao, F Mao, Z Tang, C Qin
Signal Processing 170, 107447, 2020
Perceptual image hashing based on weber local binary pattern and color angle representation
C Qin, Y Hu, H Yao, X Duan, L Gao
IEEE Access 7, 45460-45471, 2019
Perceptual Image Hashing with Weighted DWT Features for Reduced-Reference Image Quality Assessment
Z Tang, Z Huang, H Yao, X Zhang, L Chen, C Yu
The Computer Journal, 2018
Detecting copy-move forgery using non-negative matrix factorization
H Yao, T Qiao, Z Tang, Y Zhao, H Mao
2011 Third International Conference on Multimedia Information Networking and …, 2011
Reversible Data Hiding in Encrypted Image via Secret Sharing Based on GF(p) and GF(2⁸)
C Qin, C Jiang, Q Mo, H Yao, CC Chang
IEEE Transactions on Circuits and Systems for Video Technology 32 (4), 1928-1941, 2021
Dual-JPEG-image reversible data hiding
H Yao, F Mao, C Qin, Z Tang
Information Sciences 563, 130-149, 2021
Robust Image Hashing via Random Gabor Filtering and DWT.
Z Tang, M Ling, H Yao, Z Qian, X Zhang, J Zhang, S Xu
Computers, Materials & Continua 55 (2), 2018
Robust image hashing with singular values of quaternion SVD
Z Tang, M Yu, H Yao, H Zhang, C Yu, X Zhang
The Computer Journal 64 (11), 1656-1671, 2021
Detection of double-compressed H. 264/AVC video incorporating the features of the string of data bits and skip macroblocks
H Yao, S Song, C Qin, Z Tang, X Liu
Symmetry 9 (12), 313, 2017
An improved first quantization matrix estimation for nonaligned double compressed JPEG images
H Yao, H Wei, C Qin, X Zhang
Signal Processing 170, 107430, 2020
Plant-wide process monitoring by using weighted copula–correlation based multiblock principal component analysis approach and online-horizon Bayesian method
Y Tian, H Yao, Z Li
ISA transactions 96, 24-36, 2020
JPEG quantization step estimation with coefficient histogram and spectrum analyses
H Yao, H Wei, T Qiao, C Qin
Journal of Visual Communication and Image Representation 69, 102795, 2020
The system can't perform the operation now. Try again later.
Articles 1–20