Search Results - "Xia, Zhihua"

Refine Results
  1. 1

    A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data by Xia, Zhihua, Wang, Xinhui, Sun, Xingming, Wang, Qian

    “…Due to the increasing popularity of cloud computing, more and more data owners are motivated to outsource their data to cloud servers for great convenience and…”
    Get full text
    Journal Article
  2. 2

    A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing by Xia, Zhihua, Wang, Xinhui, Zhang, Liangao, Qin, Zhan, Sun, Xingming, Ren, Kui

    “…With the increasing importance of images in people's daily life, content-based image retrieval (CBIR) has been widely studied. Compared with text documents,…”
    Get full text
    Journal Article
  3. 3

    Steganalysis of LSB matching using differences between nonadjacent pixels by Xia, Zhihua, Wang, Xinhui, Sun, Xingming, Liu, Quansheng, Xiong, Naixue

    Published in Multimedia tools and applications (01-02-2016)
    “…This paper models the messages embedded by spatial least significant bit (LSB) matching as independent noises to the cover image, and reveals that the…”
    Get full text
    Journal Article
  4. 4

    EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing by Xia, Zhihua, Xiong, Neal N., Vasilakos, Athanasios V., Sun, Xingming

    Published in Information sciences (01-05-2017)
    “…The content-based image retrieval (CBIR) has been widely studied along with the increasing importance of images in our daily life. Compared with the text…”
    Get full text
    Journal Article
  5. 5

    Steganalysis of least significant bit matching using multi-order differences by Xia, Zhihua, Wang, Xinhui, Sun, Xingming, Wang, Baowei

    Published in Security and communication networks (01-08-2014)
    “…ABSTRACT This paper presents a learning‐based steganalysis/detection method to attack spatial domain least significant bit (LSB) matching steganography in…”
    Get full text
    Journal Article
  6. 6

    A Survey on Deepfake Video Detection by Yu, Peipeng, Xia, Zhihua, Fei, Jianwei, Lu, Yujiang

    Published in IET biometrics (01-11-2021)
    “…Recently, deepfake videos, generated by deep learning algorithms, have attracted widespread attention. Deepfake technology can be used to perform face…”
    Get full text
    Journal Article
  7. 7

    Exposing AI-generated videos with motion magnification by Fei, Jianwei, Xia, Zhihua, Yu, Peipeng, Xiao, Fengjun

    Published in Multimedia tools and applications (01-08-2021)
    “…Recent progress of artificial intelligence makes it easier to edit facial movements in videos or create face substitutions, bringing new challenges to…”
    Get full text
    Journal Article
  8. 8

    Recent advances in solar‐driven CO2 reduction over g‐C3N4‐based photocatalysts by Xu, Quanlong, Xia, Zhihua, Zhang, Jingmei, Wei, Zhiyi, Guo, Qin, Jin, Huile, Tang, Hua, Li, Shouzhu, Pan, Xuecong, Su, Zhi, Wang, Shun

    Published in Carbon energy (01-02-2023)
    “…The persistent increase of CO2 levels in the atmosphere, already exceeding 400 ppm, urges the exploration of CO2 emission reduction and recycling technologies…”
    Get full text
    Journal Article
  9. 9

    Adversarial attacks on fingerprint liveness detection by Fei, Jianwei, Xia, Zhihua, Yu, Peipeng, Xiao, Fengjun

    “…Deep neural networks are vulnerable to adversarial samples, posing potential threats to the applications deployed with deep learning models in practical…”
    Get full text
    Journal Article
  10. 10

    An AES-Based Secure Image Retrieval Scheme Using Random Mapping and BOW in Cloud Computing by Wang, Hua, Xia, Zhihua, Fei, Jianwei, Xiao, Fengjun

    Published in IEEE access (2020)
    “…With the rapid growth of the number of images, many content-based image retrieval methods have been extensively used in our daily life. In general, image…”
    Get full text
    Journal Article
  11. 11

    Fingerprint Liveness Detection Using an Improved CNN With Image Scale Equalization by Yuan, Chengsheng, Xia, Zhihua, Jiang, Leqi, Cao, Yi, Jonathan Wu, Q. M., Sun, Xingming

    Published in IEEE access (2019)
    “…Due to the lack of pre-judgment of fingerprints, fingerprint authentication systems are frequently vulnerable to artificial replicas. Anonymous people can…”
    Get full text
    Journal Article
  12. 12

    A screen‐shooting resilient document image watermarking scheme using deep neural network by Ge, Sulong, Fei, Jianwei, Xia, Zhihua, Tong, Yao, Weng, Jian, Liu, Jianan

    Published in IET image processing (01-02-2023)
    “…With the advent of the screen‐reading era, the confidential documents displayed on the screen can be easily captured by a camera without leaving any traces…”
    Get full text
    Journal Article
  13. 13

    High-Capacity Reversible Data Hiding for Encrypted Multimedia Data With Somewhat Homomorphic Encryption by Xiong, Lizhi, Dong, Danping, Xia, Zhihua, Chen, Xianyi

    Published in IEEE access (2018)
    “…This paper proposes a high-capacity reversible data hiding scheme for encrypted multimedia data by using Somewhat Homomorphic Encryption. In an image, three…”
    Get full text
    Journal Article
  14. 14

    Secure multimedia distribution in cloud computing using re-encryption and fingerprinting by Xiong, Lizhi, Xia, Zhihua, Chen, Xianyi, Shim, Hiuk Jae

    Published in Multimedia tools and applications (01-11-2019)
    “…Recently, cloud computing becomes a main platform for the distribution of multimedia content. The paradigm of multimedia distribution has been shifted from the…”
    Get full text
    Journal Article
  15. 15

    A Content-Based Image Retrieval Scheme Using an Encrypted Difference Histogram in Cloud Computing by Liu, Dandan, Shen, Jian, Xia, Zhihua, Sun, Xingming

    Published in Information (Basel) (07-08-2017)
    “…Content-based image retrieval (CBIR) has been widely used in many applications. Large storage and computation overheads have made the outsourcing of CBIR…”
    Get full text
    Journal Article
  16. 16

    Secure Image LBP Feature Extraction in Cloud-Based Smart Campus by Xia, Zhihua, Ma, Xiaohe, Shen, Zixuan, Sun, Xingming, Xiong, Neal N., Jeon, Byeungwoo

    Published in IEEE access (2018)
    “…The smart campus can monitor students in real time by analyzing students' images, but a large number of images bring an unbearable burden to the smart campus…”
    Get full text
    Journal Article
  17. 17

    Attribute-Based Access Control Scheme with Efficient Revocation in Cloud Computing by Zhihua Xia Liangao Zhang Dandan Liu

    Published in China communications (01-07-2016)
    “…Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted data.In some common designs,attributes are managed by an attribute authority…”
    Get full text
    Journal Article
  18. 18

    A vehicular ad hoc network privacy protection scheme without a trusted third party by Wang, Xiaoliang, Li, Shuifan, Zhao, Shujing, Xia, Zhihua, Bai, Liang

    “…Vehicular ad hoc networks are traffic applications of the Internet of Things, which are composed of vehicle nodes, roadside units, service providers, and other…”
    Get full text
    Journal Article
  19. 19

    Steganalysis of LSB Matching Using Characteristic Function Moment of Pixel Differences by Xianyi Chen Guangyong Gao Dandan Liu Zhihua Xia

    Published in China communications (01-07-2016)
    “…Nowadays,many steganographic tools have been developed,and secret messages can be imperceptibly transmitted through public networks.This paper concentrates on…”
    Get full text
    Journal Article
  20. 20

    A Privacy-Preserving Handwritten Signature Verification Method Using Combinational Features and Secure KNN by Xia, Zhihua, Shi, Tianjiao, Xiong, Neal N., Sun, Xingming, Jeon, Byeungwoo

    Published in IEEE access (01-01-2018)
    “…The handwritten signature is a widely accepted biometric trait for the individual authentication. This paper proposes a secure and dynamic signature…”
    Get full text
    Journal Article