Dengpan Ye
Dengpan Ye
Verified email at
Cited by
Cited by
A novel image hashing scheme with perceptual robustness using block truncation coding
C Qin, X Chen, D Ye, J Wang, X Sun
Information Sciences 361, 84-99, 2016
Hierarchical recovery for tampered images based on watermark self-embedding
F Cao, B An, J Wang, D Ye, H Wang
Displays 46, 52-60, 2017
A new adaptive watermarking for real-time MPEG videos
D Ye, C Zou, Y Dai, Z Wang
Applied Mathematics and Computation 185 (2), 907-918, 2007
Next: a neural network framework for next poi recommendation
Z Zhang, C Li, Z Wu, A Sun, D Ye, X Luo
Frontiers of Computer Science 14 (2), 314-333, 2020
On improving distortion functions for JPEG steganography
Z Wang, Z Qian, X Zhang, M Yang, D Ye
IEEE Access 6, 74917-74930, 2018
Lossless data hiding algorithm for encrypted images with high capacity
S Zheng, D Li, D Hu, D Ye, L Wang, J Wang
Multimedia Tools and Applications 75 (21), 13765-13778, 2016
EveDroid: Event-aware Android malware detection against model degrading for IoT devices
T Lei, Z Qin, Z Wang, Q Li, D Ye
IEEE Internet of Things Journal 6 (4), 6668-6680, 2019
A JPEG-compression resistant adaptive steganography based on relative relationship between DCT coefficients
Y Zhang, X Luo, C Yang, D Ye, F Liu
2015 10th International Conference on Availability, Reliability and Security …, 2015
An image steganography algorithm based on quantization index modulation resisting scaling attacks and statistical detection
Y Zhang, D Ye, J Gan, Z Li, Q Cheng
Comput. Mater. Continua 56 (1), 151-167, 2018
A framework of adaptive steganography resisting JPEG compression and detection
Y Zhang, X Luo, C Yang, D Ye, F Liu
Security and Communication Networks 9 (15), 2957-2971, 2016
Secure fractal image coding based on fractal parameter encryption
S Lian, X Chen, D Ye
Fractals 17 (02), 149-160, 2009
Reversible data hiding with image enhancement using histogram shifting
Q Ying, Z Qian, X Zhang, D Ye
IEEE Access 7, 46506-46521, 2019
Image authentication based on perceptual hash using Gabor filters
L Wang, X Jiang, S Lian, D Hu, D Ye
Soft Computing 15 (3), 493-504, 2011
Real-time reversible data hiding with shifting block histogram of pixel differences in encrypted image
Z Tang, S Xu, D Ye, J Wang, X Zhang, C Yu
Journal of Real-Time Image Processing 16 (3), 709-724, 2019
SmartSteganogaphy: Light-weight generative audio steganography model for smart embedding application
S Jiang, D Ye, J Huang, Y Shang, Z Zheng
Journal of Network and Computer Applications 165, 102689, 2020
New zero-watermark copyright protection scheme based on binary bitmap [J]
YE Deng-pan
Application Research of Computers 8, 2007
Lightweight information hiding in H. 264/AVC video stream
K Liao, D Ye, S Lian, Z Guo, J Wang
2009 International Conference on Multimedia Information Networking and …, 2009
Information hiding technology and application [M]
W Lina, Z Huanguo
University of Wuhan Publishers, 2003
Heard more than heard: An audio steganography method based on gan
D Ye, S Jiang, J Huang
arXiv preprint arXiv:1907.04986, 2019
Mobile crowd-sensing context aware based fine-grained access control mode
D Ye, Y Mei, Y Shang, J Zhu, K Ouyang
Multimedia Tools and Applications 75 (21), 13977-13993, 2016
The system can't perform the operation now. Try again later.
Articles 1–20