近期论文
查看导师新发文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
论文/期刊
期刊论文列表
[1] Wenfa Qi, Xiaolong Li, Tong Zhang, and Zongming Guo, “Optimal reversible data hiding scheme based on multiple histograms modification,” Accepted by IEEE Transactions on Circuits and Systems for Video Technology, to appear.
[2] Xiang Wang, Xiaolong Li, and Qingqi Pei, “Independent embedding domain based two-stage robust reversible watermarking,” Accepted by IEEE Transactions on Circuits and Systems for Video Technology, to appear.
[3] Haorui Wu, Xiaolong Li, Yao Zhao and Rongrong Ni, “Improved PPVO-based high-fidelity reversible data hiding”, Signal Processing, 167, 107264, 2020.
[4] Zhipeng Chen, Benedetta Tondi, Xiaolong Li, Rongrong Ni, Yao Zhao, and Mauro Barni, “Secure detection of image manipulation by means of random feature selection,” IEEE Transactions on Information Forensics and Security, 14(9), pp. 2454-2469, 2019.
[5] Bo Ou, Xiaolong Li, Weiming Zhang, and Yao Zhao, “Improving pairwise PEE via hybrid-dimensional histogram generation and adaptive mapping selection,” IEEE Transactions on Circuits and Systems for Video Technology, 29(7), pp. 2176-2190, 2019.
[6] Yakun Niu, Xiaolong Li, Yao Zhao, and Rongrong Ni, “An enhanced approach for detecting double JPEG compression with the same quantization matrix,” Signal Processing: Image Communication, 76, pp. 89-96, 2019.
[7] Xiaolong Li and Wei Li, “A case study of a two-stage image segmentation algorithm,” Multimedia Tools and Applications, 78(7), pp. 8197-8206, 2019.
[8] Wenjie Li, Rongrong Ni, Xiaolong Li, and Yao Zhao, “Robust median filtering detection based on the difference of frequency residuals,” Multimedia Tools and Applications, 78(7), pp. 8363-8381, 2019.
[9] Tong Zhang, Xiaolong Li, Wenfa Qi, Wei Li, and Zongming Guo, “Real-time reversible data hiding based on multiple histograms modification,” Journal of Real-Time Image Processing, 16(3), pp. 661-671, 2019.
[10] Haorui Wu, Xiaolong Li, Yao Zhao, and Rongrong Ni, “Improved reversible data hiding based on PVO and adaptive pairwise embedding,” Journal of Real-Time Image Processing, 16(3), pp. 685-695, 2019.
[11] Yuanyuan Ma, Xiangyang Luo, Xiaolong Li, Zhenkun Bao, and Yi Zhang, “Selection of rich model steganalysis features based on decision rough set α-positive region reduction,” IEEE Transactions on Circuits and Systems for Video Technology, 29(2), pp. 336-350, 2019.
[12] Mengyao Xiao, Xiaolong Li, Yangyang Wang, Yao Zhao, and Rongrong Ni, “Reversible data hiding based on pairwise embedding and optimal expansion path,” Signal Processing, 158, pp. 210-218, 2019.
[13] Guorong Xuan, Xiaolong Li, and Yun-Qing Shi, “Minimum entropy and histogram-pair based JPEG image reversible data hiding,” Journal of Information Security and Applications, 45, pp. 1-9, 2019.
[14] Guorong Xuan, Xiaolong Li, and Yun-Qing Shi, “Histogram-pair based reversible data hiding via searching for optimal four thresholds,” Journal of Information Security and Applications, 39, pp. 58-67, 2018.
[15] Hongshen Tang, Rongrong Ni, Yao Zhao, and Xiaolong Li, “Median filtering detection of small-size image based on CNN,” Journal of Visual Communication and Image Representation, 51, pp. 162-168, 2018.
[16] Ran Hu, Xiaolong Li, and Zongming Guo, “Decorrelated local binary patterns for efficient texture classification,” Multimedia Tools and Applications, 77(6), pp. 6863-6882, 2018.
[17] Guangyuan Yang, Xiaolong Li, Jinwei Wang, and Zongming Guo, “Efficient large payloads ternary matrix embedding,” Multimedia Tools and Applications, 77(2), pp. 1605-1622, 2018.
[18] Bowen Xue, Xiaolong Li, Jinwei Wang, and Zongming Guo, “Improved reversible data hiding based on two-dimensional difference-histogram modification,” Multimedia Tools and Applications, 76(11), pp. 13473-13491, 2017.
[19] Zhenkun Bao, Xiaolong Li, and Xiangyang Luo, “On the PDF moments and CF moments of image steganalysis in the log prediction error wavelet subband,” Journal of Electronic Imaging, 26(1), pp. 013025, 2017.
[20] Bo Ou, Xiaolong Li, Jinwei Wang, and Fei Peng, “High-fidelity reversible data hiding based on geodesic path and pairwise prediction-error expansion,” Neurocomputing, 226, pp. 23-34, 2017.
[21] Xiangyang Luo, Xiaofeng Song, Xiaolong Li, Weiming Zhang, Jicang Lu, Chunfang Yang, and Fenlin Liu, “Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes,” Multimedia Tools and Applications, 75(21), pp. 13557-13583, 2016.
[22] Yun-Qing Shi, Xiaolong Li, Xinpeng Zhang, Hao-Tian Wu, and Bin Ma, “Reversible data hiding: Advances in the past two decades,” IEEE Access, 4, pp. 3210-3237, 2016.
[23] Bo Ou, Xiaolong Li, and Jinwei Wang, “High-fidelity reversible data hiding based on pixel-value-ordering and pairwise prediction-error expansion,” Journal of Visual Communication and Image Representation, 39, pp. 12-23, 2016.
[24] Bo Ou, Xiaolong Li, and Jinwei Wang, “Improved PVO-based reversible data hiding: A new implementation based on multiple histograms modification,” Journal of Visual Communication and Image Representation, 38, pp. 328-339, 2016.
[25] Xiaolong Li, Weiming Zhang, Xinlu Gui, and Bin Yang, “Efficient reversible data hiding based on multiple histograms modification,” IEEE Transactions on Information Forensics and Security, 10(9), pp. 2016-2027, 2015.
[26] Bin Li, Ming Wang, Xiaolong Li, Shunquan Tan, and Jiwu Huang, “A strategy of clustering modification directions in spatial image steganography,” IEEE Transactions on Information Forensics and Security, 10(9), pp. 1905-1917, 2015.
[27] Xiaolong Li, Siren Cai, Weiming Zhang, and Bin Yang, “A further study of large payloads matrix embedding,” Information Sciences, 324, pp. 257-269, 2015.
[28] Xiaolong Li, Siren Cai, Weiming Zhang, and Bin Yang, “Matrix embedding in finite abelian group,” Signal Processing, 113, pp. 250-258, 2015.
[29] Bo Ou, Xiaolong Li, Yao Zhao, and Rongrong Ni, “Efficient color image reversible data hiding based on channel-dependent payload partition and adaptive embedding,” Signal Processing, 108, pp. 642-657, 2015.
[30] Bin Li, Tian-Tsong Ng, Xiaolong Li, Shunquan Tan, and Jiwu Huang, “Statistical model of JPEG noises and its application in quantization step estimation,” IEEE Transactions on Image Processing, 24(5), pp. 1471-1484, 2015.
[31] Jian Li, Xiaolong Li, Bin Yang, and Xingming Sun, “Segmentation-based image copy-move forgery detection scheme,” IEEE Transactions on Information Forensics and Security, 10(3), pp. 507-518, 2015.
[32] Bin Li, Tian-Tsong Ng, Xiaolong Li, Shunquan Tan, and Jiwu Huang, “Revealing the trace of high-quality JPEG compression through quantization noise analysis,” IEEE Transactions on Information Forensics and Security, 10(3), pp. 558-573, 2015.
[33] Xiaocheng Hu, Weiming Zhang, Xiaolong Li, and Nenghai Yu, “Minimum rate prediction and optimized histograms modification for reversible data hiding,” IEEE Transactions on Information Forensics and Security, 10(3), pp. 653-664, 2015.
[34] Weiming Zhang, Xiaocheng Hu, Xiaolong Li, and Nenghai Yu, “Optimal transition probability of reversible data hiding for general distortion metrics and its applications,” IEEE Transactions on Image Processing, 24(1), pp. 294-304, 2015.
[35] Bo Ou, Xiaolong Li, Yao Zhao, and Rongrong Ni, “Reversible data hiding using invariant pixel-value-ordering and prediction-error expansion,” Signal Processing: Image Communication, 29(7), pp. 760-772, 2014.
[36] Xinlu Gui, Xiaolong Li, and Bin Yang, “A high capacity reversible data hiding scheme based on generalized prediction-error expansion and adaptive embedding,” Signal Processing, 98, pp. 370-380, 2014.
[37] Fei Peng, Xiaolong Li, and Bin Yang, “Improved PVO-based reversible data hiding,” Digital Signal Processing, 25, pp. 255-265, 2014.
[38] Bo Ou, Xiaolong Li, Yao Zhao, Rongrong Ni, and Y.-Q. Shi, “Pairwise prediction-error expansion for efficient reversible data hiding,” IEEE Transactions on Image Processing, 22(12), pp. 5010-5021, 2013.
[39] Bo Ou, Xiaolong Li, Yao Zhao, and Rongrong Ni, “Reversible data hiding based on PDE predictor,” Journal of Systems and Software, 86(10), pp. 2700-2709, 2013.
[40] Jian Li, Xiaolong Li, and Bin Yang, “Reversible data hiding scheme for color image based on prediction-error expansion and cross-channel correlation,” Signal Processing, 93(9), pp. 2748-2758, 2013.
[41] Xiaolong Li, Bin Li, Xiangyang Luo, Bin Yang, and Ruihui Zhu, “Steganalysis of a PVD-based content adaptive image steganography,” Signal Processing, 93(9), pp. 2529-2538, 2013.
[42] Xiaolong Li, Weiming Zhang, Xinlu Gui, and Bin Yang, “A novel reversible data hiding scheme based on two-dimensional difference-histogram modification,” IEEE Transactions on Information Forensics and Security, 8(7), pp. 1091-1100, 2013.
[43] Weiming Zhang, Xiaocheng Hu, Xiaolong Li, and Nenghai Yu, “Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression,” IEEE Transactions on Image Processing, 22(7), pp. 2775-2785, 2013.
[44] Xiaolong Li, Bin Li, Bin Yang, and Tieyong Zeng, “General framework to histogram-shifting-based reversible data hiding,” IEEE Transactions on Image Processing, 22(6), pp. 2181-2191, 2013.
[45] Xiaolong Li, Jian Li, Bin Li, and Bin Yang, “High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion,” Signal Processing, 93(1), pp. 198-205, 2013.
[46] Fei Peng, Xiaolong Li, and Bin Yang, “Adaptive reversible data hiding scheme based on integer transform,” Signal Processing, 92(1), pp. 54-62, 2012.
[47] Xiaolong Li, Bin Yang, and Tieyong Zeng, “Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection,” IEEE Transactions on Image Processing, 20(12), pp. 3524-3533, 2011.
[48] Tieyong Zeng, Xiaolong Li, and Michael Ng, “Alternating minimization method for total variation based wavelet shrinkage model,” Communications in Computational Physics, 8(5), pp. 976-994, 2010.
[49] Xiang Wang, Xiaolong Li, Bin Yang, and Zongming Guo, “Efficient generalized integer transform for reversible watermarking,” IEEE Signal Processing Letters, 17(6), pp. 567-570, 2010.
[50] Xiaolong Li, Bin Yang, Daofang Cheng, and Tieyong Zeng, “A generalization of LSB matching,” IEEE Signal Processing Letters, 16(2), pp. 69-72, 2009.
会议论文列表
[1] Tong Zhang, Xiaolong Li, Wenfa Qi, and Zongming Guo, “Prediction-error value ordering for high-fidelity reversible data hiding”, in Proc. MMM, pp. ???-???, 2020.
[2] Liwen Qin, Xiaolong Li, and Yao Zhao, “A new JPEG image watermarking method exploiting spatial JND model”, in Proc. IWDW, pp. ???-???, 2019.
[3] Qi Chang, Gene Cheung, Yao Zhao, Xiaolong Li, and Rongrong Ni, “Non-local graph-based prediction for reversible data hiding in images”, in Proc. IEEE ICIP, pp. 1693-1697, 2018.
[4] Bo Ou, Xiaolong Li, Wei Li, and Yun-Qing Shi, “Pixel-value-ordering based reversible data hiding with adaptive texture classification and modification”, in Proc. IWDW, pp. 169-179, 2018.
[5] Yanhong Wu, Xiaolong Li, Yao Zhao, and Rongrong Ni, “A new detector for JPEG decompressed bitmap identification”, in Proc. APSIPA ASC, pp. 842-845, 2017.
[6] Hongshen Tang, Rongrong Ni, Yao Zhao, and Xiaolong Li, “Detection of various image operations based on CNN”, in Proc. APSIPA ASC, pp. 1479-1485, 2017.
[7] Guangyuan Yang, Wenfa Qi, Xiaolong Li, and Zongming Guo, “Improved reversible visible watermarking based on adaptive block partition”, in Proc. IWDW, pp. 303-317, 2017.
[8] Zhipeng Chen, Benedetta Tondi, Xiaolong Li, Rongrong Ni, Yao Zhao, and Mauro Barni, “A gradient-based pixel-domain attack against SVM detection of global image manipulations”, in Proc. IEEE WIFS pp. 1-6, 2017.
[9] Xiaolong Li and Zongming Guo, “General expansion-shifting model for reversible data hiding”, in Proc. APSIPA ASC, pp. 1-4, 2016.
[10] Siren Cai, Xiaolong Li, Jiaying Liu, and Zongming Guo, “A new reversible data hiding scheme exploiting high-dimensional prediction-error histogram”, in Proc. IEEE ICIP, pp. 2732-2736, 2016.
[11] Siren Cai, Xiaolong Li, Bowen Xue, and Zongming Guo, “A new reversible data hiding scheme based on high-dimensional pixel-intensity-histogram modification”, in Proc. IEEE ICME Workshops, pp. 1-6, 2016.
[12] Guangyuan Yang, Xiaolong Li, Bin Li, and Zongming Guo, “A new detector of LSB matching steganography based on likelihood ratio test for multivariate Gaussian covers”, in Proc. APSIPA ASC, pp. 757-760, 2015.
[13] Bowen Xue, Xiaolong Li, and Zongming Guo, “A new SDCS-based content-adaptive steganography using iterative noise-level estimation”, in Proc. IIH-MSP, pp. 68-71, 2015.
[14] Bo Ou, Xiaolong Li, and Weiming Zhang, “PVO-based reversible data hiding for encrypted images,” in Proc. IEEE ChinaSIP, pp. 831-835, 2015.
[15] Bowen Xue, Xiaolong Li, Bin Li, and Zongming Guo, “Steganalysis of LSB replacement for multivariate Gaussian covers,” in Proc. IEEE ChinaSIP, pp. 836-840, 2015.
[16] Fei Peng, Xiaolong Li, and Bin Yang, “An adaptive PEE-based reversible data hiding scheme exploiting referential prediction-errors,” in Proc. IEEE ICME, 2015.
[17] Bin Li, Ming Wang, Jiwu Huang, and Xiaolong Li, “A new cost function for spatial image steganography,” in Proc. IEEE ICIP, pp. 4206-4210, 2014.
[18] Xinlu Gui, Xiaolong Li, Wenfa Qi, and Bin Yang, “Blind median filtering detection based on histogram features,” in Proc. APSIPA ASC, 2014.
[19] Xinlu Gui, Xiaolong Li, and Bin Yang, “High-dimensional histogram utilization for reversible data hiding,” in Proc. IWDW, pp. ?-?, 2014.
[20] Xinlu Gui, Siren Cai, Xiaolong Li, and Bin Yang, “A novel reversible data hiding scheme based on reference pixels and adaptive block selection,” in Proc. IIH-MSP, pp. 276-280, 2014.
[21] Xinlu Gui, Xiaolong Li, and Bin Yang, “Steganalysis of LSB matching based on local binary patterns,” in Proc. IIH-MSP, pp. 475-480, 2014.
[22] Xiaolong Li, Weiming Zhang, Bo Ou, and Bin Yang, “A brief review on reversible data hiding: current techniques and future prospects,” in Proc. IEEE ChinaSIP, pp. 426-430, 2014.
[23] Xinlu Gui, Xiaolong Li, and Bin Yang, “Efficient reversible data hiding based on two-dimensional pixel-intensity-histogram modification,” in Proc. IEEE ICASSP, pp. 7420-7424, 2014.
[24] Ran Hu, Xiaolong Li, and Bin Yang, “A new lossy compression scheme for encrypted gray-scale images,” in Proc. IEEE ICASSP, pp. 7387-7390, 2014.
[25] Jian Li, Xiaolong Li, and Xingming Sun, “A new reversible data hiding scheme based on efficient prediction,” in Proc. IWDW, pp. 326-336, 2013.
[26] Fei Peng, Xiaolong Li, and Bin Yang, “Calibration based reliable detector for detecting LSB matching steganography,” in Proc. IWDW, pp. 44-53, 2012.
[27] Yuanzhi Qi, Xiaolong Li, Bin Wang, and Bin Yang, “A study of optimal matrix for efficient matrix embedding in F3,” in Proc. IWDW, pp. 8-18, 2012.
[28] Jie Yu, Guopu Zhu, Xiaolong Li, and Jianquan Yang, “An improved algorithm for reversible data hiding in encrypted image,” in Proc. IWDW, pp. 384-394, 2012.
[29] Xinlu Gui, Xiaolong Li, and Bin Yang, “A novel integer transform for efficient reversible watermarking,” in Proc. ICPR, pp. 947-950, 2012.
[30] Jian Li, Xiaolong Li, and Bin Yang, “A new PEE-based reversible watermarking algorithm for color image,” in Proc. IEEE ICIP, pp. 2181-2184, 2012.
[31] Xinlu Gui, Xiaolong Li, and Bin Yang, “Improved payload location for LSB matching steganography,” in Proc. IEEE ICIP, pp. 1125-1128, 2012.
[32] Xinlu Gui, Xiaolong Li, and Bin Yang, “A content-adaptive ±1-based steganography by minimizing the distortion of first order statistics,” in Proc. IEEE ICASSP, pp. 1781-1784, 2012.
[33] Fei Peng, Xiaolong Li, and Bin Yang, “A content-adaptive image steganography based on SDCS,” in Proc. APSIPA ASC, 2011.
[34] Xiaolong Li, Bin Yang, and Wenfa Qi, “Print-and-photocopy resilient text watermarking based on Hadamard transform,” in Proc. APSIPA ASC, 2011.
[35] Ruoyu Wu, Xiaolong Li, and Bin Yang, “Identifying computer generated graphics via histogram features,” in Proc. IEEE ICIP, pp. 1933-1936, 2011.
[36] Yi Luo, Xiaolong Li, and Bin Yang, “Locating steganographic payload for LSB matching embedding,” in Proc. IEEE ICME, 2011.
[37] Yi Luo, Fei Peng, Xiaolong Li, and Bin Yang, “Reversible image watermarking based on prediction-error expansion and compensation,” in Proc. IEEE ICME, 2011.
[38] Kaiwei Cai, Xiaolong Li, Bin Yang, and Xiaoqing Lu, “Blind tampering identification by incorporating EFR and calibration,” in Proc. MINES, pp. 379-383, 2010.
[39] Liping Ji, Xiaolong Li, Bin Yang, and Zhihong Liu, “A further study on a PVD-based steganography,” in Proc. MINES, pp. 686-690, 2010.
[40] Chao Wang, Xiaolong Li, and Bin Yang, “High capacity reversible image watermarking based on integer transform,” in Proc. IEEE ICIP, pp. 217-220, 2010.
[41] Chao Wang, Xiaolong Li, and Bin Yang, “Efficient reversible image watermarking by using dynamical prediction-error expansion,” in Proc. IEEE ICIP, pp. 3673-3676, 2010.
[42] Kaiwei Cai, Xiaolong Li, Tieyong Zeng, Bin Yang, and Xiaoqing Lu, “Reliable histogram features for detecting LSB matching,” in Proc. IEEE ICIP, pp. 1761-1764, 2010.
[43] Chao Wang, Xiaolong Li, Bin Yang, Xiaoqing Lu, and Chengcheng Liu, “A content-adaptive approach for reducing embedding impact in steganography,” in Proc. IEEE ICASSP, pp. 1762-1765, 2010.
[44] Xudong Chen, Xiaolong Li, Bin Yang, and Yingmin Tang, “Reversible image watermarking based on a generalized integer transform,” in Proc. IEEE ICASSP, pp. 2382-2385, 2010.
[45] Xiang Wang, Xiaolong Li, Bin Yang, and Zongming Guo, “A reversible watermarking scheme for high-fidelity applications,” in Proc. PCM, pp. 613-624, 2009.
[46] Gaoyang Wang, Xiaolong Li, and Bin Yang, “A high capacity reversible watermarking scheme based on an integer transform,” in Proc. PCM, pp. 1287-1292, 2009.
[47] Yunkai Gao, Xiaolong Li, Tieyong Zeng, and Bin Yang, “Improving embedding efficiency via matrix embedding: A case study,” in Proc. IEEE ICIP, pp. 109-112, 2009.
[48] Yifeng Lu, Xiaolong Li, and Bin Yang, “A ±1-based steganography by minimizing the distortion of first order statistics,” in Proc. IIH-MSP, pp. 754-758, 2009. (Best paper award)
[49] Yifeng Lu, Xiaolong Li, and Bin Yang, “A secure steganography: noisy region embedding,” in Proc. IIH-MSP, pp. 1046-1051, 2009.
[50] Yunkai Gao, Xiaolong Li, and Bin Yang, “Employing optimal matrix for efficient matrix embedding,” in Proc. IIH-MSP, pp. 161-165, 2009.
[51] Wenfa Qi, Xiaolong Li, and Bin Yang, “Bilinear coons patch and its application in security pattern design,” in Proc. IIH-MSP, pp. 881-884, 2009.
[52] Yunkai Gao, Xiaolong Li, and Bin Yang, “Constructing specific matrix for efficient matrix embedding,” in Proc. IEEE ICME, pp. 1006-1009, 2009.
[53] Chengcheng Liu, Xiaolong Li, Xiaoqing Lu, and Bin Yang, “Improving embedding efficiency by incorporating SDCS and WPC,” in Proc. IEEE ICME, pp. 1018-1021, 2009.
[54] Yunkai Gao, Xiaolong Li, Bin Yang, and Yifeng Lu, “Detecting LSB matching by characterizing the amplitude of histogram,” in Proc. IEEE ICASSP, pp. 1505-1508, 2009.
[55] Wenfa Qi, Xiaolong Li, and Bin Yang, “A character segmentation method without character verification,” in Proc. IITAW, pp. 581-584, 2008.
[56] Yifeng Lu, Xiaolong Li, Wenfa Qi, and Bin Yang, “A further study on an optical watermarking scheme,” in Proc. ICSP, pp. 2213-2216, 2008.
[57] Xiaolong Li, Tieyong Zeng, and Bin Yang, “A further study on steganalysis of LSB matching by calibration,” in Proc. IEEE ICIP, pp. 2072-2075, 2008.
[58] Xiaolong Li, Tieyong Zeng, and Bin Yang, “Detecting LSB matching by applying calibration technique for difference image,” in Proc. ACM MM&SEC, pp. 133-138, 2008.
[59] Daofang Cheng, Xiaolong Li, Wenfa Qi, and Bin Yang, “A statistics-based watermarking scheme robust to print-and-scan,” in Proc. ISECS, pp. 894-898, 2008.
[60] Xiaolong Li, Tieyong Zeng, and Bin Yang, “Improvement of the embedding efficiency of LSB matching by sum and difference covering set,” in Proc. IEEE ICME, pp. 209-212, 2008.