Search Results - "Xia, Zhihua"
-
1
A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
Published in IEEE transactions on parallel and distributed systems (01-02-2016)“…Due to the increasing popularity of cloud computing, more and more data owners are motivated to outsource their data to cloud servers for great convenience and…”
Get full text
Journal Article -
2
A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing
Published in IEEE transactions on information forensics and security (01-11-2016)“…With the increasing importance of images in people's daily life, content-based image retrieval (CBIR) has been widely studied. Compared with text documents,…”
Get full text
Journal Article -
3
Steganalysis of LSB matching using differences between nonadjacent pixels
Published in Multimedia tools and applications (01-02-2016)“…This paper models the messages embedded by spatial least significant bit (LSB) matching as independent noises to the cover image, and reveals that the…”
Get full text
Journal Article -
4
EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing
Published in Information sciences (01-05-2017)“…The content-based image retrieval (CBIR) has been widely studied along with the increasing importance of images in our daily life. Compared with the text…”
Get full text
Journal Article -
5
Steganalysis of least significant bit matching using multi-order differences
Published in Security and communication networks (01-08-2014)“…ABSTRACT This paper presents a learning‐based steganalysis/detection method to attack spatial domain least significant bit (LSB) matching steganography in…”
Get full text
Journal Article -
6
A Survey on Deepfake Video Detection
Published in IET biometrics (01-11-2021)“…Recently, deepfake videos, generated by deep learning algorithms, have attracted widespread attention. Deepfake technology can be used to perform face…”
Get full text
Journal Article -
7
Exposing AI-generated videos with motion magnification
Published in Multimedia tools and applications (01-08-2021)“…Recent progress of artificial intelligence makes it easier to edit facial movements in videos or create face substitutions, bringing new challenges to…”
Get full text
Journal Article -
8
Recent advances in solar‐driven CO2 reduction over g‐C3N4‐based photocatalysts
Published in Carbon energy (01-02-2023)“…The persistent increase of CO2 levels in the atmosphere, already exceeding 400 ppm, urges the exploration of CO2 emission reduction and recycling technologies…”
Get full text
Journal Article -
9
Adversarial attacks on fingerprint liveness detection
Published in EURASIP journal on image and video processing (13-01-2020)“…Deep neural networks are vulnerable to adversarial samples, posing potential threats to the applications deployed with deep learning models in practical…”
Get full text
Journal Article -
10
An AES-Based Secure Image Retrieval Scheme Using Random Mapping and BOW in Cloud Computing
Published in IEEE access (2020)“…With the rapid growth of the number of images, many content-based image retrieval methods have been extensively used in our daily life. In general, image…”
Get full text
Journal Article -
11
Fingerprint Liveness Detection Using an Improved CNN With Image Scale Equalization
Published in IEEE access (2019)“…Due to the lack of pre-judgment of fingerprints, fingerprint authentication systems are frequently vulnerable to artificial replicas. Anonymous people can…”
Get full text
Journal Article -
12
A screen‐shooting resilient document image watermarking scheme using deep neural network
Published in IET image processing (01-02-2023)“…With the advent of the screen‐reading era, the confidential documents displayed on the screen can be easily captured by a camera without leaving any traces…”
Get full text
Journal Article -
13
High-Capacity Reversible Data Hiding for Encrypted Multimedia Data With Somewhat Homomorphic Encryption
Published in IEEE access (2018)“…This paper proposes a high-capacity reversible data hiding scheme for encrypted multimedia data by using Somewhat Homomorphic Encryption. In an image, three…”
Get full text
Journal Article -
14
Secure multimedia distribution in cloud computing using re-encryption and fingerprinting
Published in Multimedia tools and applications (01-11-2019)“…Recently, cloud computing becomes a main platform for the distribution of multimedia content. The paradigm of multimedia distribution has been shifted from the…”
Get full text
Journal Article -
15
A Content-Based Image Retrieval Scheme Using an Encrypted Difference Histogram in Cloud Computing
Published in Information (Basel) (07-08-2017)“…Content-based image retrieval (CBIR) has been widely used in many applications. Large storage and computation overheads have made the outsourcing of CBIR…”
Get full text
Journal Article -
16
Secure Image LBP Feature Extraction in Cloud-Based Smart Campus
Published in IEEE access (2018)“…The smart campus can monitor students in real time by analyzing students' images, but a large number of images bring an unbearable burden to the smart campus…”
Get full text
Journal Article -
17
Attribute-Based Access Control Scheme with Efficient Revocation in Cloud Computing
Published in China communications (01-07-2016)“…Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted data.In some common designs,attributes are managed by an attribute authority…”
Get full text
Journal Article -
18
A vehicular ad hoc network privacy protection scheme without a trusted third party
Published in International journal of distributed sensor networks (01-12-2017)“…Vehicular ad hoc networks are traffic applications of the Internet of Things, which are composed of vehicle nodes, roadside units, service providers, and other…”
Get full text
Journal Article -
19
Steganalysis of LSB Matching Using Characteristic Function Moment of Pixel Differences
Published in China communications (01-07-2016)“…Nowadays,many steganographic tools have been developed,and secret messages can be imperceptibly transmitted through public networks.This paper concentrates on…”
Get full text
Journal Article -
20
A Privacy-Preserving Handwritten Signature Verification Method Using Combinational Features and Secure KNN
Published in IEEE access (01-01-2018)“…The handwritten signature is a widely accepted biometric trait for the individual authentication. This paper proposes a secure and dynamic signature…”
Get full text
Journal Article