default search action
Chuan Qin 0001
Person information
- affiliation: University of Shanghai for Science and Technology, School of Optical-Electrical and Computer Engineering, Shanghai, China
- affiliation (PhD 2008): Shanghai University, China
Other persons with the same name
- Chuan Qin — disambiguation page
- Chuan Qin 0002 — Baidu Talent Intelligence Center, Beijing, China (and 1 more)
- Chuan Qin 0003 — Huawei Technologies, Shenzhen, China (and 2 more)
- Chuan Qin 0004 — Washington State University, School of Electrical Engineering and Computer Science, Pullman, WA, USA
- Chuan Qin 0005 — Hohai University, College of Energy and Electrical Engineering, Nanjing, China (and 1 more)
- Chuan Qin 0006 — Tsinghua University, Department of Electronic Engineering, Beijing, China
- Chuan Qin 0007 — University of Technology Sydney, Global Big Data Technologies Centre, Sydney, Australia
- Chuan Qin 0008 — Tsinghua University, Institute of Microelectronics, Beijing, China
- Chuan Qin 0009 — Chinese University of Hong Kong, Department of Computer Science and Engineering, Hong Kong
- Chuan Qin 0010 — University of California, Department of Electrical and Computer Engineering, Davis, CA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j141]Zixuan Bian, Heng Yao, Yanfen Le, Chuan Qin:
Two-dimensional histogram-based reversible contrast enhancement using bi-histogram equalization. Displays 81: 102580 (2024) - [j140]Fang Cao, Daidou Guo, Tianjun Wang, Heng Yao, Jian Li, Chuan Qin:
Universal screen-shooting robust image watermarking with channel-attention in DCT domain. Expert Syst. Appl. 238(Part F): 122062 (2024) - [j139]Heng Yao, Tong Liu, Guihao Li, Chuan Qin:
Screen-shot and Demoiréd image identification based on DenseNet and DeepViT. Expert Syst. Appl. 240: 122580 (2024) - [j138]Daidou Guo, Xuan Zhu, Fengyong Li, Heng Yao, Chuan Qin:
DoBMark: A double-branch network for screen-shooting resilient image watermarking. Expert Syst. Appl. 246: 123159 (2024) - [j137]Chuan Qin, Jun Chang, Wenting Tu, Changrui Yu:
FollowAKOInvestor: Stock recommendation by hearing voices from all kinds of investors with machine learning. Expert Syst. Appl. 249: 123522 (2024) - [j136]Ping Kong, Yongdong Zhang, Lin Huang, Liang Zhou, Lifan Chen, Chuan Qin:
Neural network-based reversible data hiding for medical image. Expert Syst. Appl. 256: 124903 (2024) - [j135]Fang Cao, Haowei Ye, Lin Huang, Chuan Qin:
Multi-image based self-embedding watermarking with lossless tampering recovery capability. Expert Syst. Appl. 258: 125176 (2024) - [j134]Xintao Duan, Chun Li, Bingxin Wei, Guoming Wu, Chuan Qin, Haewoon Nam:
DHU-Net: High-capacity binary data hiding network based on improved U-Net. Neurocomputing 576: 127314 (2024) - [j133]Xintao Duan, Guoming Wu, Chun Li, Zhuang Li, Chuan Qin:
DUIANet: A double layer U-Net image hiding method based on improved Inception module and attention mechanism. J. Vis. Commun. Image Represent. 98: 104035 (2024) - [j132]Jiayi Wu, Chuan Qin, Guorui Feng:
SMDC-Net: Saliency-Guided Multihead Distribution Calibration Network for Few-Shot Object Detection on Remote Sensing Images. IEEE Geosci. Remote. Sens. Lett. 21: 1-5 (2024) - [j131]Fang Cao, Shifei Yao, Yuanding Zhou, Heng Yao, Chuan Qin:
Perceptual authentication hashing for digital images based on multi-domain feature fusion. Signal Process. 223: 109576 (2024) - [j130]Lin Huang, Yitong Tao, Chuan Qin, Xinpeng Zhang:
Robust Hashing for Neural Network Models via Heterogeneous Graph Representation. IEEE Signal Process. Lett. 31: 2640-2644 (2024) - [j129]Yingying Xu, Yuanding Zhou, Xinran Li, Gejian Zhao, Chuan Qin:
An End-to-End Two-Branch Network Towards Robust Video Fingerprinting. IEEE Trans. Artif. Intell. 5(5): 2371-2384 (2024) - [j128]Tong Liu, Heng Yao, Xinran Li, Chuan Qin:
Robust Perceptual Image Hashing for Screen-Shooting Attack. IEEE Trans. Consumer Electron. 70(1): 4367-4378 (2024) - [j127]Fengyong Li, Zhen Qi, Xinpeng Zhang, Chuan Qin:
Progressive Histogram Modification for JPEG Reversible Data Hiding. IEEE Trans. Circuits Syst. Video Technol. 34(2): 1241-1254 (2024) - [j126]Ping Kong, An Li, Daidou Guo, Liang Zhou, Chuan Qin:
Joint Lossless Compression and Encryption for Medical Images. IEEE Trans. Circuits Syst. Video Technol. 34(6): 4786-4799 (2024) - [j125]Fengyong Li, Zongliang Yu, Kui Wu, Chuan Qin, Xinpeng Zhang:
Multi-Modality Ensemble Distortion for Spatial Steganography With Dynamic Cost Correction. IEEE Trans. Dependable Secur. Comput. 21(4): 1557-1571 (2024) - [j124]Xinran Li, Mengqi Guo, Zichi Wang, Jian Li, Chuan Qin:
Robust Image Hashing in Encrypted Domain. IEEE Trans. Emerg. Top. Comput. Intell. 8(1): 670-683 (2024) - [j123]Fengyong Li, Yang Sheng, Kui Wu, Chuan Qin, Xinpeng Zhang:
LiDiNet: A Lightweight Deep Invertible Network for Image-in-Image Steganography. IEEE Trans. Inf. Forensics Secur. 19: 8817-8831 (2024) - [j122]Xiaofeng Shen, Heng Yao, Shunquan Tan, Chuan Qin:
Hiding Face Into Background: A Proactive Countermeasure Against Malicious Face Swapping. IEEE Trans. Ind. Informatics 20(8): 10613-10623 (2024) - [j121]Fengyong Li, Huajun Zhai, Xinpeng Zhang, Chuan Qin:
Image Manipulation Localization Using Spatial-Channel Fusion Excitation and Fine-Grained Feature Enhancement. IEEE Trans. Instrum. Meas. 73: 1-14 (2024) - [j120]Yalan Qin, Chuan Qin, Xinpeng Zhang, Guorui Feng:
Dual Consensus Anchor Learning for Fast Multi-View Clustering. IEEE Trans. Image Process. 33: 5298-5311 (2024) - [j119]Chuan Qin, Xiaomeng Li, Zhenyi Zhang, Fengyong Li, Xinpeng Zhang, Guorui Feng:
Print-Camera Resistant Image Watermarking With Deep Noise Simulation and Constrained Learning. IEEE Trans. Multim. 26: 2164-2177 (2024) - [j118]Fengyong Li, Yang Sheng, Xinpeng Zhang, Chuan Qin:
iSCMIS:Spatial-Channel Attention Based Deep Invertible Network for Multi-Image Steganography. IEEE Trans. Multim. 26: 3137-3152 (2024) - [j117]Xinran Li, Zichi Wang, Guorui Feng, Xinpeng Zhang, Chuan Qin:
Perceptual Image Hashing Using Feature Fusion of Orthogonal Moments. IEEE Trans. Multim. 26: 10041-10054 (2024) - 2023
- [j116]Jian Li, Xiaobo Zhang, Bin Ma, Chuan Qin, Chunpeng Wang:
Reversible PRNU anonymity for device privacy protection based on data hiding. Expert Syst. Appl. 234: 121017 (2023) - [j115]Chuan Qin, Shengyan Gao, Xinpeng Zhang, Guorui Feng:
CADW: CGAN-Based Attack on Deep Robust Image Watermarking. IEEE Multim. 30(1): 28-35 (2023) - [j114]Guopeng Gao, Chuan Qin, Yaodong Fang, Yuanding Zhou:
Perceptual Authentication Hashing for Digital Images With Contrastive Unsupervised Learning. IEEE Multim. 30(3): 129-140 (2023) - [j113]Xiaofeng Shen, Heng Yao, Shunquan Tan, Chuan Qin:
VHNet: A Video Hiding Network with robustness to video coding. J. Inf. Secur. Appl. 75: 103515 (2023) - [j112]Zixuan Bian, Heng Yao, Yanfen Le, Chuan Qin:
Quality guided reversible data hiding with contrast enhancement. J. King Saud Univ. Comput. Inf. Sci. 35(10): 101808 (2023) - [j111]Guihao Li, Heng Yao, Yanfen Le, Chuan Qin:
Recaptured screen image identification based on vision transformer. J. Vis. Commun. Image Represent. 90: 103692 (2023) - [j110]Fang Cao, Tianjun Wang, Daidou Guo, Jian Li, Chuan Qin:
Screen-shooting resistant image watermarking based on lightweight neural network in frequency domain. J. Vis. Commun. Image Represent. 94: 103837 (2023) - [j109]Gejian Zhao, Fengyong Li, Heng Yao, Chuan Qin:
TASTNet: An end-to-end deep fingerprinting net with two-dimensional attention mechanism and spatio-temporal weighted fusion for video content authentication. J. Vis. Commun. Image Represent. 96: 103913 (2023) - [j108]Jiayi Wu, Chuan Qin, Yanli Ren, Guorui Feng:
EPFNet: Edge-Prototype Fusion Network Toward Few-Shot Semantic Segmentation for Aerial Remote-Sensing Images. IEEE Geosci. Remote. Sens. Lett. 20: 1-5 (2023) - [j107]Fengyong Li, Hengjie Zhu, Chuan Qin:
Reversible data hiding in encrypted images using median prediction and bit plane cycling-XOR. Multim. Tools Appl. 82(4): 6013-6032 (2023) - [j106]Wei Tang, Heng Yao, Yanfen Le, Chuan Qin:
Reversible data hiding for JPEG images based on block difference model and Laplacian distribution estimation. Signal Process. 212: 109130 (2023) - [j105]Xinran Li, Daidou Guo, Chuan Qin:
Diversified Cover Selection for Image Steganography. Symmetry 15(11): 2024 (2023) - [j104]Mingji Yu, Heng Yao, Chuan Qin, Xinpeng Zhang:
Reversible Data Hiding in Palette Images. IEEE Trans. Circuits Syst. Video Technol. 33(2): 648-660 (2023) - [j103]Chunqiang Yu, Xianquan Zhang, Chuan Qin, Zhenjun Tang:
Reversible Data Hiding in Encrypted Images With Secret Sharing and Hybrid Coding. IEEE Trans. Circuits Syst. Video Technol. 33(11): 6443-6458 (2023) - [j102]Yalan Qin, Chuan Qin, Xinpeng Zhang, Donglian Qi, Guorui Feng:
NIM-Nets: Noise-Aware Incomplete Multi-View Learning Networks. IEEE Trans. Image Process. 32: 175-189 (2023) - [j101]Chuan Qin, Jinchuan Hu, Fengyong Li, Zhenxing Qian, Xinpeng Zhang:
JPEG Image Encryption With Adaptive DC Coefficient Prediction and RS Pair Permutation. IEEE Trans. Multim. 25: 2528-2542 (2023) - [j100]Fengyong Li, Zhenjia Pei, Xinpeng Zhang, Chuan Qin:
Image Manipulation Localization Using Multi-Scale Feature Fusion and Adaptive Edge Supervision. IEEE Trans. Multim. 25: 7851-7866 (2023) - [c24]Gejian Zhao, Chuan Qin:
Black-box Lossless Fragile Watermarking Based on Hidden Space Search for DNN Integrity Authentication. APSIPA ASC 2023: 450-455 - [c23]Yaodong Fang, Yuanding Zhou, Xinran Li, Ping Kong, Chuan Qin:
TMCIH: Perceptual Robust Image Hashing with Transformer-based Multi-layer Constraints. IH&MMSec 2023: 7-12 - [c22]Gejian Zhao, Chuan Qin, Xiangyang Luo, Xinpeng Zhang, Chin-Chen Chang:
Perceptual Robust Hashing for Video Copy Detection with Unsupervised Learning. IH&MMSec 2023: 13-18 - [c21]Xiaoling He, Yuanding Zhou, Chuan Qin, Zhenxing Qian, Xinpeng Zhang:
PDMTT: A Plagiarism Detection Model Towards Multi-turn Text Back-Translation. IWDW 2023: 79-94 - [c20]Cheng Xiong, Chuan Qin, Guorui Feng, Xinpeng Zhang:
Flexible and Secure Watermarking for Latent Diffusion Model. ACM Multimedia 2023: 1668-1676 - [c19]Yuanding Zhou, Xinran Li, Yaodong Fang, Chuan Qin:
When Perceptual Authentication Hashing Meets Neural Architecture Search. ACM Multimedia 2023: 8975-8983 - [c18]Lin Huang, Gejian Zhao, Chuan Qin:
Recoverable Active Protection Framework for Neural Network Models. WIFS 2023: 1-6 - 2022
- [j99]Fengyong Li, Lianming Zhang, Chuan Qin, Kui Wu:
Reversible data hiding for JPEG images with minimum additive distortion. Inf. Sci. 595: 142-158 (2022) - [j98]Lianming Zhang, Fengyong Li, Chuan Qin:
Efficient reversible data hiding in encrypted binary image with Huffman encoding and weight prediction. Multim. Tools Appl. 81(20): 29347-29365 (2022) - [j97]Gejian Zhao, Chuan Qin, Heng Yao, Yanfang Han:
DNN self-embedding watermarking: Towards tampering detection and parameter recovery for deep neural network. Pattern Recognit. Lett. 164: 16-22 (2022) - [j96]Fengyong Li, Zongliang Yu, Chuan Qin:
GAN-based spatial image steganography with cross feedback mechanism. Signal Process. 190: 108341 (2022) - [j95]Mingji Yu, Heng Yao, Chuan Qin:
Reversible data hiding in encrypted images without additional information transmission. Signal Process. Image Commun. 105: 116696 (2022) - [j94]Fengyong Li, Yishu Zeng, Xinpeng Zhang, Chuan Qin:
Ensemble Stego Selection for Enhancing Image Steganography. IEEE Signal Process. Lett. 29: 702-706 (2022) - [j93]Chuan Qin, Chanyu Jiang, Qun Mo, Heng Yao, Chin-Chen Chang:
Reversible Data Hiding in Encrypted Image via Secret Sharing Based on GF(p) and GF(2⁸). IEEE Trans. Circuits Syst. Video Technol. 32(4): 1928-1941 (2022) - [j92]Mingji Yu, Heng Yao, Chuan Qin, Xinpeng Zhang:
A Comprehensive Analysis Method for Reversible Data Hiding in Stream-Cipher-Encrypted Images. IEEE Trans. Circuits Syst. Video Technol. 32(10): 7241-7254 (2022) - [j91]Fengyong Li, Zhen Qi, Xinpeng Zhang, Chuan Qin:
JPEG Reversible Data Hiding Using Dynamic Distortion Optimizing With Frequency Priority Reassignment. IEEE Trans. Circuits Syst. Video Technol. 32(12): 8849-8863 (2022) - [j90]Xinran Li, Chuan Qin, Zichi Wang, Zhenxing Qian, Xinpeng Zhang:
Unified Performance Evaluation Method for Perceptual Image Hashing. IEEE Trans. Inf. Forensics Secur. 17: 1404-1419 (2022) - [j89]Heng Yao, Mian Zou, Chuan Qin, Xinpeng Zhang:
Signal-Dependent Noise Estimation for a Real-Camera Model via Weight and Shape Constraints. IEEE Trans. Multim. 24: 640-654 (2022) - [c17]Xuan Zhu, Qun Mo, Fengyong Li, Lei Zhang, Chuan Qin:
Behavior Steganography in Social Network via Secret Sharing. ICAIS (3) 2022: 299-308 - [c16]Cheng Xiong, Guorui Feng, Xinran Li, Xinpeng Zhang, Chuan Qin:
Neural Network Model Protection with Piracy Identification and Tampering Localization Capability. ACM Multimedia 2022: 2881-2889 - [c15]Xinran Li, Zichi Wang, Guorui Feng, Xinpeng Zhang, Chuan Qin:
Perceptual Model Hashing: Towards Neural Network Model Authentication. MMSP 2022: 1-5 - [c14]Lecong Wang, Zichi Wang, Xinran Li, Chuan Qin:
Robust Watermarking for Neural Network Models Using Residual Network. MMSP 2022: 1-6 - [c13]Yitong Tao, Chuan Qin:
Graph-based Robust Model Hashing. WIFS 2022: 1-6 - 2021
- [j88]Xintao Duan, Baoxia Li, Daidou Guo, Kai Jia, En Zhang, Chuan Qin:
Coverless Information Hiding Based on WGAN-GP Model. Int. J. Digit. Crime Forensics 13(4): 57-70 (2021) - [j87]Fang Cao, Jiayi Sun, Xiangyang Luo, Chuan Qin, Ching-Chun Chang:
Privacy-preserving inpainting for outsourced image. Int. J. Distributed Sens. Networks 17(11): 155014772110590 (2021) - [j86]Heng Yao, Fanyu Mao, Chuan Qin, Zhenjun Tang:
Dual-JPEG-image reversible data hiding. Inf. Sci. 563: 130-149 (2021) - [j85]Xinran Li, Chuan Qin, Heng Yao, Jian Li:
Perceptual hashing for color images. J. Electronic Imaging 30(6) (2021) - [j84]Ping Kong, Di Fu, Xinran Li, Chuan Qin:
Reversible data hiding in encrypted medical DICOM image. Multim. Syst. 27(3): 303-315 (2021) - [j83]Fengyong Li, Hengjie Zhu, Jiang Yu, Chuan Qin:
Double linear regression prediction based reversible data hiding in encrypted images. Multim. Tools Appl. 80(2): 2141-2159 (2021) - [j82]Chuan Qin, Liang Wu, Xinpeng Zhang, Guorui Feng:
Efficient Non-Targeted Attack for Deep Hashing Based Image Retrieval. IEEE Signal Process. Lett. 28: 1893-1897 (2021) - [j81]Chuan Qin, Enli Liu, Guorui Feng, Xinpeng Zhang:
Perceptual Image Hashing for Content Authentication Based on Convolutional Neural Network With Multiple Constraints. IEEE Trans. Circuits Syst. Video Technol. 31(11): 4523-4537 (2021) - [c12]Chuan Qin, Shengyan Gao, Chanyu Jiang, Heng Yao, Ching-Chun Chang:
Reversible Data Hiding in Encrypted Images Based on Chinese Remainder Theorem and Secret Sharing Mechanism. BDSIC 2021: 23-32 - 2020
- [j80]Xintao Duan, Daidou Guo, Nao Liu, Baoxia Li, Mengxiao Gou, Chuan Qin:
A New High Capacity Image Steganography Method Combined With Image Elliptic Curve Cryptography and Deep Neural Network. IEEE Access 8: 25777-25788 (2020) - [j79]Xintao Duan, Nao Liu, Mengxiao Gou, Dongli Yue, Zimei Xie, Yuanyuan Ma, Chuan Qin:
High-Capacity Image Steganography Based on Improved FC-DenseNet. IEEE Access 8: 170174-170182 (2020) - [j78]Xintao Duan, Wenxin Wang, Nao Liu, Dongli Yue, Zimei Xie, Chuan Qin:
StegoPNet: Image Steganography With Generalization Ability Based on Pyramid Pooling Module. IEEE Access 8: 195253-195262 (2020) - [j77]Xintao Duan, Nao Liu, Mengxiao Gou, Wenxin Wang, Chuan Qin:
SteganoCNN: Image Steganography with Generalization Ability Based on Convolutional Neural Network. Entropy 22(10): 1140 (2020) - [j76]Ben Ma, Jincao Yao, Yanfen Le, Chuan Qin, Heng Yao:
Efficient image noise estimation based on skewness invariance and adaptive noise injection. IET Image Process. 14(7): 1393-1401 (2020) - [j75]Liyun Dou, Zhenxing Qian, Chuan Qin, Guorui Feng, Xinpeng Zhang:
Anti-forensics of diffusion-based image inpainting. J. Electronic Imaging 29(4): 043026 (2020) - [j74]Heng Yao, Hongbin Wei, Chuan Qin, Zhenjun Tang:
A real-time reversible image authentication method using uniform embedding strategy. J. Real Time Image Process. 17(1): 41-54 (2020) - [j73]Heng Yao, Hongbin Wei, Tong Qiao, Chuan Qin:
JPEG quantization step estimation with coefficient histogram and spectrum analyses. J. Vis. Commun. Image Represent. 69: 102795 (2020) - [j72]Xintao Duan, Mengxiao Gou, Nao Liu, Wenxin Wang, Chuan Qin:
High-Capacity Image Steganography Based on Improved Xception. Sensors 20(24): 7253 (2020) - [j71]Heng Yao, Hongbin Wei, Chuan Qin, Xinpeng Zhang:
An improved first quantization matrix estimation for nonaligned double compressed JPEG images. Signal Process. 170: 107430 (2020) - [j70]Heng Yao, Fanyu Mao, Zhenjun Tang, Chuan Qin:
High-fidelity dual-image reversible data hiding via prediction-error shift. Signal Process. 170: 107447 (2020) - [j69]Fengyong Li, Kui Wu, Chuan Qin, Jingsheng Lei:
Anti-compression JPEG steganography over repetitive compression networks. Signal Process. 170: 107454 (2020) - [j68]Yi Zhang, Xiangyang Luo, Yanqing Guo, Chuan Qin, Fenlin Liu:
Multiple Robustness Enhancements for Image Adaptive Steganography in Lossy Channels. IEEE Trans. Circuits Syst. Video Technol. 30(8): 2750-2764 (2020) - [i1]Xinran Li, Chuan Qin, Zhenxing Qian, Heng Yao, Xinpeng Zhang:
Perceptual Robust Hashing for Color Images with Canonical Correlation Analysis. CoRR abs/2012.04312 (2020)
2010 – 2019
- 2019
- [j67]Xintao Duan, Kai Jia, Baoxia Li, Daidou Guo, En Zhang, Chuan Qin:
Reversible Image Steganography Scheme Based on a U-Net Structure. IEEE Access 7: 9314-9323 (2019) - [j66]Yue Zhang, Xiangyang Luo, Yanqing Guo, Chuan Qin, Fenlin Liu:
Zernike Moment-Based Spatial Image Steganography Resisting Scaling Attack and Statistic Detection. IEEE Access 7: 24282-24289 (2019) - [j65]Chuan Qin, Yecen Hu, Heng Yao, Xintao Duan, Liping Gao:
Perceptual Image Hashing Based on Weber Local Binary Pattern and Color Angle Representation. IEEE Access 7: 45460-45471 (2019) - [j64]Chuan Qin, Xiaokang Qian, Wien Hong, Xinpeng Zhang:
An efficient coding scheme for reversible data hiding in encrypted image with redundancy transfer. Inf. Sci. 487: 176-192 (2019) - [j63]Yujie Fu, Ping Kong, Heng Yao, Zhenjun Tang, Chuan Qin:
Effective reversible data hiding in encrypted image with adaptive encoding strategy. Inf. Sci. 494: 21-36 (2019) - [j62]Chuan Qin, Zhenxing Qian, Guorui Feng, Xinpeng Zhang:
Special issue on real-time image watermarking and forensics in cloud computing. J. Real Time Image Process. 16(3): 559-563 (2019) - [j61]Chuan Qin, Zhenxing Qian, Guorui Feng, Xinpeng Zhang:
Additional articles of special issue on Real-time image watermarking and forensics in cloud computing. J. Real Time Image Process. 16(4): 811-812 (2019) - [j60]Zhaoyang Xiang, Yu-Chen Hu, Heng Yao, Chuan Qin:
Adaptive and dynamic multi-grouping scheme for absolute moment block truncation coding. Multim. Tools Appl. 78(7): 7895-7909 (2019) - [j59]Heng Yao, Xiaokai Liu, Zhenjun Tang, Chuan Qin, Ying Tian:
Adaptive image camouflage using human visual system model. Multim. Tools Appl. 78(7): 8311-8334 (2019) - [j58]Heng Yao, Xiaokai Liu, Zhenjun Tang, Chuan Qin, Ying Tian:
Correction to: Adaptive image camouflage using human visual system model. Multim. Tools Appl. 78(7): 8335 (2019) - [j57]Zhenjun Tang, Shijie Xu, Heng Yao, Chuan Qin, Xianquan Zhang:
Reversible data hiding with differential compression in encrypted image. Multim. Tools Appl. 78(8): 9691-9715 (2019) - [j56]Haibin Wu, Fengyong Li, Chuan Qin, Weimin Wei:
Separable reversible data hiding in encrypted images based on scalable blocks. Multim. Tools Appl. 78(18): 25349-25372 (2019) - [j55]Chuan Qin, Qing Zhou, Fang Cao, Jing Dong, Xinpeng Zhang:
Flexible Lossy Compression for Selective Encrypted Image With Image Inpainting. IEEE Trans. Circuits Syst. Video Technol. 29(11): 3341-3355 (2019) - [c11]Yujie Fu, Dongsheng Peng, Heng Yao, Chuan Qin:
A Novel Reversible Data Hiding Scheme for Encrypted VQ-Compressed Image. ICAIS (3) 2019: 150-160 - [c10]Fang Cao, Tianwei Wu, Chuan Qin, Zhenxing Qian, Xinpeng Zhang:
New Paradigm for Self-embedding Image Watermarking with Poisson Equation. IWDW 2019: 184-191 - 2018
- [j54]Heng Yao, Xiaokai Liu, Zhenjun Tang, Yu-Chen Hu, Chuan Qin:
An Improved Image Camouflage Technique Using Color Difference Channel Transformation and Optimal Prediction-Error Expansion. IEEE Access 6: 40569-40584 (2018) - [j53]Heng Yao, Chuan Qin, Zhenjun Tang, Xinpeng Zhang:
A general framework for shiftable position-based dual-image reversible data hiding. EURASIP J. Image Video Process. 2018: 41 (2018) - [j52]Chuan Qin, Ping Ji, Chin-Chen Chang, Jing Dong, Xingming Sun:
Non-uniform Watermark Sharing Based on Optimal Iterative BTC for Image Tampering Recovery. IEEE Multim. 25(3): 36-48 (2018) - [j51]Chuan Qin, Xueqin Chen, Xiangyang Luo, Xinpeng Zhang, Xingming Sun:
Perceptual image hashing via dual-cross pattern encoding and salient structure detection. Inf. Sci. 423: 284-302 (2018) - [j50]Chuan Qin, Zhihong He, Xiangyang Luo, Jing Dong:
Reversible data hiding in encrypted image with separable capability and high embedding capacity. Inf. Sci. 465: 285-304 (2018) - [j49]Chuan Qin, Weiming Zhang, Xinpeng Zhang:
Guest Editorial: Multimedia Information Security and Its Applications in Cloud Computing. Multim. Tools Appl. 77(14): 17853-17859 (2018) - [j48]Yi Zhang, Xiaodong Zhu, Chuan Qin, Chunfang Yang, Xiangyang Luo:
Dither modulation based adaptive steganography resisting jpeg compression and statistic detection. Multim. Tools Appl. 77(14): 17913-17935 (2018) - [j47]Chuan Qin, Meihui Sun, Chin-Chen Chang:
Perceptual hashing for color images based on hybrid extraction of structural features. Signal Process. 142: 194-205 (2018) - [j46]Yi Zhang, Chuan Qin, Weiming Zhang, Fenlin Liu, Xiangyang Luo:
On the fault-tolerant performance for a class of robust image steganography. Signal Process. 146: 99-111 (2018) - [j45]Chuan Qin, Wei Zhang, Fang Cao, Xinpeng Zhang, Chin-Chen Chang:
Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection. Signal Process. 153: 109-122 (2018) - [j44]Chuan Qin, Zhihong He, Heng Yao, Fang Cao, Liping Gao:
Visible watermark removal scheme based on reversible data hiding and image inpainting. Signal Process. Image Commun. 60: 160-172 (2018) - 2017
- [j43]Min Yuan, Heng Yao, Chuan Qin, Ying Tian:
A Dynamic Hand Gesture Recognition System Incorporating Orientation-based Linear Extrapolation Predictor and Velocity-assisted Longest Common Subsequence Algorithm. KSII Trans. Internet Inf. Syst. 11(9): 4491-4509 (2017) - [j42]Heng Yao, Chuan Qin, Zhenjun Tang, Ying Tian:
Guided filtering based color image reversible data hiding. J. Vis. Commun. Image Represent. 43: 152-163 (2017) - [j41]Chuan Qin, Ping Ji, Jinwei Wang, Chin-Chen Chang:
Fragile image watermarking scheme based on VQ index sharing and self-embedding. Multim. Tools Appl. 76(2): 2267-2287 (2017) - [j40]Heng Yao, Shuozhong Wang, Xinpeng Zhang, Chuan Qin, Jinwei Wang:
Detecting Image Splicing Based on Noise Level Inconsistency. Multim. Tools Appl. 76(10): 12457-12479 (2017) - [j39]Heng Yao, Chuan Qin, Zhenjun Tang, Ying Tian:
Improved dual-image reversible data hiding method using the selection strategy of shiftable pixels' coordinates with minimum distortion. Signal Process. 135: 26-35 (2017) - [j38]Chuan Qin, Ping Ji, Xinpeng Zhang, Jing Dong, Jinwei Wang:
Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process. 138: 280-293 (2017) - [j37]Heng Yao, Saihua Song, Chuan Qin, Zhenjun Tang, Xiaokai Liu:
Detection of Double-Compressed H.264/AVC Video Incorporating the Features of the String of Data Bits and Skip Macroblocks. Symmetry 9(12): 313 (2017) - 2016
- [j36]Chuan Qin, Xueqin Chen, Jing Dong, Xinpeng Zhang:
Perceptual image hashing with selective sampling for salient structure features. Displays 45: 26-37 (2016) - [j35]Zhi-Hui Wang, Xu Zhuang, Chin-Chen Chang, Chuan Qin, Yan Zhu:
Reversible Data Hiding Based on Geometric Structure of Pixel Groups. Int. J. Netw. Secur. 18(1): 52-59 (2016) - [j34]Chuan Qin, Xueqin Chen, Dengpan Ye, Jinwei Wang, Xingming Sun:
A novel image hashing scheme with perceptual robustness using block truncation coding. Inf. Sci. 361-362: 84-99 (2016) - [j33]Chuan Qin, Huili Wang, Xinpeng Zhang, Xingming Sun:
Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode. Inf. Sci. 373: 233-250 (2016) - [j32]Chuan Qin, Haoran Ren, Chin-Chen Chang, Qingkui Chen:
Novel Occlusion Object Removal with Inter-frame Editing and Texture Synthesis. J. Inf. Hiding Multim. Signal Process. 7(2): 386-398 (2016) - [j31]Chuan Qin, Dengpan Ye, Xiangyang Luo:
Guest Editorial: Information Hiding and Forensics for Multimedia Security. Multim. Tools Appl. 75(21): 13421-13429 (2016) - [j30]Chuan Qin, Yu-Chen Hu:
Reversible data hiding in VQ index table with lossless coding and adaptive switching mechanism. Signal Process. 129: 48-55 (2016) - [c9]Ping Ji, Chuan Qin, Zhenjun Tang:
Fragile Watermarking with Self-recovery Capability via Absolute Moment Block Truncation Coding. ICCCS (1) 2016: 104-113 - [c8]Saihua Song, Heng Yao, Chuan Qin, Ying Tian:
A Forgery Video Detection Algorithm for Resolution Promotion Manipulations Using Frequency Spectrum Analysis. ICNCC 2016: 22-26 - 2015
- [j29]Zhenjun Tang, Linlin Ruan, Chuan Qin, Xianquan Zhang, Chunqiang Yu:
Robust image hashing with embedding vector variance of LLE. Digit. Signal Process. 43: 17-27 (2015) - [j28]Boqing Xu, Qun Xiao, Zhenxing Qian, Chuan Qin:
Unequal Protection Mechanism for Digital Speech Transmission Based on Turbo Codes. Int. J. Netw. Secur. 17(1): 85-93 (2015) - [j27]Zhi-Hui Wang, Kuo-Nan Chen, Chin-Chen Chang, Chuan Qin:
Sharing a Large Secret Image Using Meaningful Shadows Based on VQ and Inpainting. KSII Trans. Internet Inf. Syst. 9(12): 5170-5188 (2015) - [j26]Chuan Qin, Xinpeng Zhang:
Effective reversible data hiding in encrypted image with privacy protection for image content. J. Vis. Commun. Image Represent. 31: 154-164 (2015) - [j25]Chuan Qin, Chin-Chen Chang, Chia-Chun Lin:
An adaptive reversible steganographic scheme based on the just noticeable distortion. Multim. Tools Appl. 74(6): 1983-1995 (2015) - [j24]Chuan Qin, Chin-Chen Chang, Tai-Jung Hsu:
Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multim. Tools Appl. 74(15): 5861-5872 (2015) - [j23]Chuan Qin, Chin-Chen Chang, Gwoboa Horng, Ying-Hsuan Huang, Yen-Chang Chen:
Reversible data embedding for vector quantization compressed images using search-order coding and index parity matching. Secur. Commun. Networks 8(6): 899-906 (2015) - [c7]Xueqin Chen, Chuan Qin, Ping Ji:
Perceptual image hashing using block truncation coding and local binary pattern. APSIPA 2015: 856-859 - [c6]Yuan Zhang, Xinpeng Zhang, Chuan Qin, Jiang Yu:
Multiple Description Coding for Encrypted Images. IIH-MSP 2015: 85-88 - 2014
- [j22]Xinpeng Zhang, Chuan Qin, Liquan Shen:
Efficient wet paper embedding for steganography with multilayer construction. Ann. des Télécommunications 69(7-8): 441-447 (2014) - [j21]Chuan Qin, Chin-Chen Chang, Szu-Ting Wang:
A Novel Lossless Steganographic Scheme for Data Hiding in Traditional Chinese Text Files. J. Inf. Hiding Multim. Signal Process. 5(3): 534-545 (2014) - [j20]Xinpeng Zhang, Guangling Sun, Liquan Shen, Chuan Qin:
Compression of encrypted images with multi-layer decomposition. Multim. Tools Appl. 72(1): 489-502 (2014) - [j19]Cheng Guo, Chin-Chen Chang, Chuan Qin:
A novel (n, t, n) secret image sharing scheme without a trusted third party. Multim. Tools Appl. 72(3): 2195-2209 (2014) - [j18]Chuan Qin, Chin-Chen Chang, Yi-Ping Chiu:
A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting. IEEE Trans. Image Process. 23(3): 969-978 (2014) - [c5]Shanshan Yang, Chuan Qin, Zhenxing Qian, Boqing Xu:
Tampering Detection and Content Recovery for Digital Images Using Halftone Mechanism. IIH-MSP 2014: 130-133 - 2013
- [j17]Chuan Qin, Chin-Chen Chang, Pei-Ling Tsou:
Robust image hashing using non-uniform sampling in discrete Fourier domain. Digit. Signal Process. 23(2): 578-585 (2013) - [j16]Qian Mao, Chuan Qin:
A Novel Turbo Unequal Error Protection Scheme for Image Steganography. Informatica 24(4): 561-576 (2013) - [j15]Chuan Qin, Chin-Chen Chang, Yen-Chang Chen:
A Novel Reversible Data Hiding Scheme for VQ-Compressed Images Using Index Set Construction Strategy. KSII Trans. Internet Inf. Syst. 7(8): 2027-2041 (2013) - [j14]Chuan Qin, Chin-Chen Chang, Tai-Jung Hsu:
Effective Fragile Watermarking for Image Authentication with High-quality Recovery Capability. KSII Trans. Internet Inf. Syst. 7(11): 2941-2956 (2013) - [j13]Chuan Qin, Chin-Chen Chang, Kuo-Nan Chen:
Adaptive self-recovery for tampered images based on VQ indexing and inpainting. Signal Process. 93(4): 933-946 (2013) - [j12]Chuan Qin, Chin-Chen Chang, Yen-Chang Chen:
Efficient reversible data hiding for VQ-compressed images based on index mapping mechanism. Signal Process. 93(9): 2687-2695 (2013) - [j11]Chuan Qin, Chin-Chen Chang, Ying-Hsuan Huang, Li-Ting Liao:
An Inpainting-Assisted Reversible Steganographic Scheme Using a Histogram Shifting Mechanism. IEEE Trans. Circuits Syst. Video Technol. 23(7): 1109-1118 (2013) - 2012
- [j10]Chuan Qin, Zhi-Hui Wang, Chin-Chen Chang, Kuo-Nan Chen:
Reversible Data Hiding Scheme Based on Image Inpainting. Fundam. Informaticae 120(1): 59-70 (2012) - [j9]Qian Mao, Chuan Qin:
A Novel Turbo-Based Encryption Scheme Using Dynamic Puncture Mechanism. J. Networks 7(2): 236-242 (2012) - [j8]Chuan Qin, Shuozhong Wang, Xinpeng Zhang:
Simultaneous inpainting for image structure and texture using anisotropic heat transfer model. Multim. Tools Appl. 56(3): 469-483 (2012) - [j7]Cheng Guo, Chin-Chen Chang, Chuan Qin:
A hierarchical threshold secret image sharing. Pattern Recognit. Lett. 33(1): 83-91 (2012) - [j6]Cheng Guo, Chin-Chen Chang, Chuan Qin:
A multi-threshold secret image sharing scheme based on MSP. Pattern Recognit. Lett. 33(12): 1594-1600 (2012) - [j5]Chuan Qin, Chin-Chen Chang, Li-Ting Liao:
An adaptive prediction-error expansion oriented reversible information hiding scheme. Pattern Recognit. Lett. 33(16): 2166-2172 (2012) - [j4]Chuan Qin, Chin-Chen Chang, Pei-Yu Chen:
Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. Signal Process. 92(4): 1137-1150 (2012) - [c4]Xinpeng Zhang, Chuan Qin, Guangling Sun:
Reversible Data Hiding in Encrypted Images Using Pseudorandom Sequence Modulation. IWDW 2012: 358-367 - 2011
- [j3]Jia-Hong Li, Wei-Bin Lee, Dengpan Ye, Tzong-Jye Liu, Chuan Qin:
Adaptive Secret Sharing for Color Images. Int. J. Comput. Intell. Syst. 4(5): 797-805 (2011) - [j2]Cheng Guo, Zhi-Hui Wang, Chin-Chen Chang, Chuan Qin:
A Secret Image Sharing Scheme with High Quality Shadows Based on Exploiting Modification Direction. J. Multim. 6(4): 341-348 (2011) - 2010
- [j1]Chuan Qin, Qian Mao, Xinpeng Zhang:
Image Watermarking Scheme With Unequal Protection Capability Based on Error Correcting Codes. J. Multim. 5(5): 427-433 (2010)
2000 – 2009
- 2009
- [c3]Fang Cao, Bowen An, Chuan Qin:
Fast Texture Synthesis Based on Dynamic Space Partitioning. ICNC (5) 2009: 279-283 - 2008
- [c2]Chuan Qin, Shuozhong Wang, Xinpeng Zhang:
Image Editing without Color Inconsistency Using Modified Poisson Equation. IIH-MSP 2008: 397-401 - 2006
- [c1]Chuan Qin, Wei-Bin Lee, Xinpeng Zhang, Shuozhong Wang:
Copyright Management Using Progressive Image Delivery, Visible Watermarking and Robust Fingerprinting. ICARCV 2006: 1-4
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:37 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint