当前位置: X-MOL首页全球导师 国内导师 › 李晓龙

个人简介

教学工作 研究生课程 秋季学期:机器学习(22002345,48学时) 秋季学期:智能信息处理数学基础(22002357,32学时) 春季学期:凸优化理论与应用(12002368,32学时) 本科生课程 小学期:计算思维综合训练(80S000Q,32学时) 教育背景 2002/9–2006/3,法国卡尚高等师范学校(ENS de Cachan,France),专业:数学,博士学位,导师:Yves Meyer 2001/9–2002/7,法国巴黎综合理工学校(Ecole Polytechnique,France),专业:数学、视觉和模式识别,硕士学位,导师:Yves Meyer 1999/7–2001/7,法国巴黎综合理工学校(Ecole Polytechnique,France),专业:数学,工程师学位 1995/9–1999/7,北京大学,专业:基础数学,学士学位 工作经历 2016/11-至今,北京交通大学,计算机与信息技术学院 2007/01-2016/10,北京大学,计算机科学技术研究所 2006/06-2006/12,北京北大方正电子有限公司 研究领域:基于人工智能技术的多媒体内容安全,主要包括可逆信息隐藏、隐写和隐写分析、数字水印、数字取证等。 发表学术论文百余篇,其中包含8篇ESI高被引。主持国家自然科学基金重点项目一项、面上项目两项。获得省部级二等奖一次(排名第三)、三等奖一次(排名第六)。据Google Citation统计,学术成果被国内外同行引用5500余次。

研究领域

电子与通信工程(专业学位) 软件工程(专业学位) 人工智能技术(专业学位) 数字媒体信息处理与智能分析 模式识别与智能系统 人工智能与智能融合 智能感知与云计算

专利 [1] 亓文法,李晓龙,张华,一种数字水印嵌入与提取方法及装置,2006.10.25,中国,ZL200610114048.0 [2] 亓文法,李晓龙,一种用于数字图像的数字水印方法及装置,2007.01.10,中国,ZL 200710063389.4 [3] 李晓龙,亓文法,程道放,基于数字图像变换域系数统计模型的水印嵌入及提取方法,2007.01.25,中国,ZL 200710063043.4 [4] 李晓龙,亓文法,杨斌,张华,程道放,二值图像中数字水印的嵌入、提取方法和装置,2007.09.11,中国,ZL 200710121642.7 [5] 李晓龙,亓文法,程道放,杨斌,一种数字图像的水印嵌入、提取方法及装置,2007.09.12,中国,ZL 200710121700.6 [6] 李晓龙,杨斌,程道放,亓文法,一种在数字图像中嵌入和提取水印的方法与装置,2007.12.27,中国,ZL 200710304442.5 [7] 李晓龙,亓文法,程道放,杨斌,二值文本图像中数字水印的嵌入和提取的方法及装置,2008.01.08,中国,ZL 200810055770.0 [8] 王祥,郭宗明,李晓龙,杨斌,一种数字水印嵌入和提取方法及装置,2009.10.19,中国,ZL 200910236058.5 [9] 王高阳,亓文法,李晓龙,杨斌,一种数字图像中水印嵌入和检测的方法及装置,2009.12.31,中国,ZL 200910217512.2 [10] 郭宗明,王祥,李晓龙,杨斌,可逆水印嵌入、提取方法及装置和图像恢复方法及装置,2010.03.15,中国,ZL 201010126034.7 [11] 王超,李晓龙,亓文法,杨斌,一种数字图像中可逆水印的嵌入方法及其提取方法,2010.04.23,中国,ZL 201010159959.1 [12] 李晓龙,王超,亓文法,杨斌,一种数字图像中的水印嵌入和提取方法,2010.06.22,中国,ZL 201010215767.8 科研项目 国家自然科学基金面上项目,61972031,基于多直方图的JPEG图像可逆信息隐藏,2020/01-2023/12,主持 国家自然科学基金通用技术基础研究联合基金重点项目,U1736213,适应多种信道的安全隐写:基础理论和关键技术研究,2018/01-2021/12,主持 国家自然科学基金面上项目,61572052,高保真可逆图像信息隐藏关键问题研究,2016/01-2019/12,主持

近期论文

查看导师新发文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

论文/期刊 期刊论文列表 [1] Wenfa Qi, Xiaolong Li, Tong Zhang, and Zongming Guo, “Optimal reversible data hiding scheme based on multiple histograms modification,” Accepted by IEEE Transactions on Circuits and Systems for Video Technology, to appear. [2] Xiang Wang, Xiaolong Li, and Qingqi Pei, “Independent embedding domain based two-stage robust reversible watermarking,” Accepted by IEEE Transactions on Circuits and Systems for Video Technology, to appear. [3] Haorui Wu, Xiaolong Li, Yao Zhao and Rongrong Ni, “Improved PPVO-based high-fidelity reversible data hiding”, Signal Processing, 167, 107264, 2020. [4] Zhipeng Chen, Benedetta Tondi, Xiaolong Li, Rongrong Ni, Yao Zhao, and Mauro Barni, “Secure detection of image manipulation by means of random feature selection,” IEEE Transactions on Information Forensics and Security, 14(9), pp. 2454-2469, 2019. [5] Bo Ou, Xiaolong Li, Weiming Zhang, and Yao Zhao, “Improving pairwise PEE via hybrid-dimensional histogram generation and adaptive mapping selection,” IEEE Transactions on Circuits and Systems for Video Technology, 29(7), pp. 2176-2190, 2019. [6] Yakun Niu, Xiaolong Li, Yao Zhao, and Rongrong Ni, “An enhanced approach for detecting double JPEG compression with the same quantization matrix,” Signal Processing: Image Communication, 76, pp. 89-96, 2019. [7] Xiaolong Li and Wei Li, “A case study of a two-stage image segmentation algorithm,” Multimedia Tools and Applications, 78(7), pp. 8197-8206, 2019. [8] Wenjie Li, Rongrong Ni, Xiaolong Li, and Yao Zhao, “Robust median filtering detection based on the difference of frequency residuals,” Multimedia Tools and Applications, 78(7), pp. 8363-8381, 2019. [9] Tong Zhang, Xiaolong Li, Wenfa Qi, Wei Li, and Zongming Guo, “Real-time reversible data hiding based on multiple histograms modification,” Journal of Real-Time Image Processing, 16(3), pp. 661-671, 2019. [10] Haorui Wu, Xiaolong Li, Yao Zhao, and Rongrong Ni, “Improved reversible data hiding based on PVO and adaptive pairwise embedding,” Journal of Real-Time Image Processing, 16(3), pp. 685-695, 2019. [11] Yuanyuan Ma, Xiangyang Luo, Xiaolong Li, Zhenkun Bao, and Yi Zhang, “Selection of rich model steganalysis features based on decision rough set α-positive region reduction,” IEEE Transactions on Circuits and Systems for Video Technology, 29(2), pp. 336-350, 2019. [12] Mengyao Xiao, Xiaolong Li, Yangyang Wang, Yao Zhao, and Rongrong Ni, “Reversible data hiding based on pairwise embedding and optimal expansion path,” Signal Processing, 158, pp. 210-218, 2019. [13] Guorong Xuan, Xiaolong Li, and Yun-Qing Shi, “Minimum entropy and histogram-pair based JPEG image reversible data hiding,” Journal of Information Security and Applications, 45, pp. 1-9, 2019. [14] Guorong Xuan, Xiaolong Li, and Yun-Qing Shi, “Histogram-pair based reversible data hiding via searching for optimal four thresholds,” Journal of Information Security and Applications, 39, pp. 58-67, 2018. [15] Hongshen Tang, Rongrong Ni, Yao Zhao, and Xiaolong Li, “Median filtering detection of small-size image based on CNN,” Journal of Visual Communication and Image Representation, 51, pp. 162-168, 2018. [16] Ran Hu, Xiaolong Li, and Zongming Guo, “Decorrelated local binary patterns for efficient texture classification,” Multimedia Tools and Applications, 77(6), pp. 6863-6882, 2018. [17] Guangyuan Yang, Xiaolong Li, Jinwei Wang, and Zongming Guo, “Efficient large payloads ternary matrix embedding,” Multimedia Tools and Applications, 77(2), pp. 1605-1622, 2018. [18] Bowen Xue, Xiaolong Li, Jinwei Wang, and Zongming Guo, “Improved reversible data hiding based on two-dimensional difference-histogram modification,” Multimedia Tools and Applications, 76(11), pp. 13473-13491, 2017. [19] Zhenkun Bao, Xiaolong Li, and Xiangyang Luo, “On the PDF moments and CF moments of image steganalysis in the log prediction error wavelet subband,” Journal of Electronic Imaging, 26(1), pp. 013025, 2017. [20] Bo Ou, Xiaolong Li, Jinwei Wang, and Fei Peng, “High-fidelity reversible data hiding based on geodesic path and pairwise prediction-error expansion,” Neurocomputing, 226, pp. 23-34, 2017. [21] Xiangyang Luo, Xiaofeng Song, Xiaolong Li, Weiming Zhang, Jicang Lu, Chunfang Yang, and Fenlin Liu, “Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes,” Multimedia Tools and Applications, 75(21), pp. 13557-13583, 2016. [22] Yun-Qing Shi, Xiaolong Li, Xinpeng Zhang, Hao-Tian Wu, and Bin Ma, “Reversible data hiding: Advances in the past two decades,” IEEE Access, 4, pp. 3210-3237, 2016. [23] Bo Ou, Xiaolong Li, and Jinwei Wang, “High-fidelity reversible data hiding based on pixel-value-ordering and pairwise prediction-error expansion,” Journal of Visual Communication and Image Representation, 39, pp. 12-23, 2016. [24] Bo Ou, Xiaolong Li, and Jinwei Wang, “Improved PVO-based reversible data hiding: A new implementation based on multiple histograms modification,” Journal of Visual Communication and Image Representation, 38, pp. 328-339, 2016. [25] Xiaolong Li, Weiming Zhang, Xinlu Gui, and Bin Yang, “Efficient reversible data hiding based on multiple histograms modification,” IEEE Transactions on Information Forensics and Security, 10(9), pp. 2016-2027, 2015. [26] Bin Li, Ming Wang, Xiaolong Li, Shunquan Tan, and Jiwu Huang, “A strategy of clustering modification directions in spatial image steganography,” IEEE Transactions on Information Forensics and Security, 10(9), pp. 1905-1917, 2015. [27] Xiaolong Li, Siren Cai, Weiming Zhang, and Bin Yang, “A further study of large payloads matrix embedding,” Information Sciences, 324, pp. 257-269, 2015. [28] Xiaolong Li, Siren Cai, Weiming Zhang, and Bin Yang, “Matrix embedding in finite abelian group,” Signal Processing, 113, pp. 250-258, 2015. [29] Bo Ou, Xiaolong Li, Yao Zhao, and Rongrong Ni, “Efficient color image reversible data hiding based on channel-dependent payload partition and adaptive embedding,” Signal Processing, 108, pp. 642-657, 2015. [30] Bin Li, Tian-Tsong Ng, Xiaolong Li, Shunquan Tan, and Jiwu Huang, “Statistical model of JPEG noises and its application in quantization step estimation,” IEEE Transactions on Image Processing, 24(5), pp. 1471-1484, 2015. [31] Jian Li, Xiaolong Li, Bin Yang, and Xingming Sun, “Segmentation-based image copy-move forgery detection scheme,” IEEE Transactions on Information Forensics and Security, 10(3), pp. 507-518, 2015. [32] Bin Li, Tian-Tsong Ng, Xiaolong Li, Shunquan Tan, and Jiwu Huang, “Revealing the trace of high-quality JPEG compression through quantization noise analysis,” IEEE Transactions on Information Forensics and Security, 10(3), pp. 558-573, 2015. [33] Xiaocheng Hu, Weiming Zhang, Xiaolong Li, and Nenghai Yu, “Minimum rate prediction and optimized histograms modification for reversible data hiding,” IEEE Transactions on Information Forensics and Security, 10(3), pp. 653-664, 2015. [34] Weiming Zhang, Xiaocheng Hu, Xiaolong Li, and Nenghai Yu, “Optimal transition probability of reversible data hiding for general distortion metrics and its applications,” IEEE Transactions on Image Processing, 24(1), pp. 294-304, 2015. [35] Bo Ou, Xiaolong Li, Yao Zhao, and Rongrong Ni, “Reversible data hiding using invariant pixel-value-ordering and prediction-error expansion,” Signal Processing: Image Communication, 29(7), pp. 760-772, 2014. [36] Xinlu Gui, Xiaolong Li, and Bin Yang, “A high capacity reversible data hiding scheme based on generalized prediction-error expansion and adaptive embedding,” Signal Processing, 98, pp. 370-380, 2014. [37] Fei Peng, Xiaolong Li, and Bin Yang, “Improved PVO-based reversible data hiding,” Digital Signal Processing, 25, pp. 255-265, 2014. [38] Bo Ou, Xiaolong Li, Yao Zhao, Rongrong Ni, and Y.-Q. Shi, “Pairwise prediction-error expansion for efficient reversible data hiding,” IEEE Transactions on Image Processing, 22(12), pp. 5010-5021, 2013. [39] Bo Ou, Xiaolong Li, Yao Zhao, and Rongrong Ni, “Reversible data hiding based on PDE predictor,” Journal of Systems and Software, 86(10), pp. 2700-2709, 2013. [40] Jian Li, Xiaolong Li, and Bin Yang, “Reversible data hiding scheme for color image based on prediction-error expansion and cross-channel correlation,” Signal Processing, 93(9), pp. 2748-2758, 2013. [41] Xiaolong Li, Bin Li, Xiangyang Luo, Bin Yang, and Ruihui Zhu, “Steganalysis of a PVD-based content adaptive image steganography,” Signal Processing, 93(9), pp. 2529-2538, 2013. [42] Xiaolong Li, Weiming Zhang, Xinlu Gui, and Bin Yang, “A novel reversible data hiding scheme based on two-dimensional difference-histogram modification,” IEEE Transactions on Information Forensics and Security, 8(7), pp. 1091-1100, 2013. [43] Weiming Zhang, Xiaocheng Hu, Xiaolong Li, and Nenghai Yu, “Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression,” IEEE Transactions on Image Processing, 22(7), pp. 2775-2785, 2013. [44] Xiaolong Li, Bin Li, Bin Yang, and Tieyong Zeng, “General framework to histogram-shifting-based reversible data hiding,” IEEE Transactions on Image Processing, 22(6), pp. 2181-2191, 2013. [45] Xiaolong Li, Jian Li, Bin Li, and Bin Yang, “High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion,” Signal Processing, 93(1), pp. 198-205, 2013. [46] Fei Peng, Xiaolong Li, and Bin Yang, “Adaptive reversible data hiding scheme based on integer transform,” Signal Processing, 92(1), pp. 54-62, 2012. [47] Xiaolong Li, Bin Yang, and Tieyong Zeng, “Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection,” IEEE Transactions on Image Processing, 20(12), pp. 3524-3533, 2011. [48] Tieyong Zeng, Xiaolong Li, and Michael Ng, “Alternating minimization method for total variation based wavelet shrinkage model,” Communications in Computational Physics, 8(5), pp. 976-994, 2010. [49] Xiang Wang, Xiaolong Li, Bin Yang, and Zongming Guo, “Efficient generalized integer transform for reversible watermarking,” IEEE Signal Processing Letters, 17(6), pp. 567-570, 2010. [50] Xiaolong Li, Bin Yang, Daofang Cheng, and Tieyong Zeng, “A generalization of LSB matching,” IEEE Signal Processing Letters, 16(2), pp. 69-72, 2009. 会议论文列表 [1] Tong Zhang, Xiaolong Li, Wenfa Qi, and Zongming Guo, “Prediction-error value ordering for high-fidelity reversible data hiding”, in Proc. MMM, pp. ???-???, 2020. [2] Liwen Qin, Xiaolong Li, and Yao Zhao, “A new JPEG image watermarking method exploiting spatial JND model”, in Proc. IWDW, pp. ???-???, 2019. [3] Qi Chang, Gene Cheung, Yao Zhao, Xiaolong Li, and Rongrong Ni, “Non-local graph-based prediction for reversible data hiding in images”, in Proc. IEEE ICIP, pp. 1693-1697, 2018. [4] Bo Ou, Xiaolong Li, Wei Li, and Yun-Qing Shi, “Pixel-value-ordering based reversible data hiding with adaptive texture classification and modification”, in Proc. IWDW, pp. 169-179, 2018. [5] Yanhong Wu, Xiaolong Li, Yao Zhao, and Rongrong Ni, “A new detector for JPEG decompressed bitmap identification”, in Proc. APSIPA ASC, pp. 842-845, 2017. [6] Hongshen Tang, Rongrong Ni, Yao Zhao, and Xiaolong Li, “Detection of various image operations based on CNN”, in Proc. APSIPA ASC, pp. 1479-1485, 2017. [7] Guangyuan Yang, Wenfa Qi, Xiaolong Li, and Zongming Guo, “Improved reversible visible watermarking based on adaptive block partition”, in Proc. IWDW, pp. 303-317, 2017. [8] Zhipeng Chen, Benedetta Tondi, Xiaolong Li, Rongrong Ni, Yao Zhao, and Mauro Barni, “A gradient-based pixel-domain attack against SVM detection of global image manipulations”, in Proc. IEEE WIFS pp. 1-6, 2017. [9] Xiaolong Li and Zongming Guo, “General expansion-shifting model for reversible data hiding”, in Proc. APSIPA ASC, pp. 1-4, 2016. [10] Siren Cai, Xiaolong Li, Jiaying Liu, and Zongming Guo, “A new reversible data hiding scheme exploiting high-dimensional prediction-error histogram”, in Proc. IEEE ICIP, pp. 2732-2736, 2016. [11] Siren Cai, Xiaolong Li, Bowen Xue, and Zongming Guo, “A new reversible data hiding scheme based on high-dimensional pixel-intensity-histogram modification”, in Proc. IEEE ICME Workshops, pp. 1-6, 2016. [12] Guangyuan Yang, Xiaolong Li, Bin Li, and Zongming Guo, “A new detector of LSB matching steganography based on likelihood ratio test for multivariate Gaussian covers”, in Proc. APSIPA ASC, pp. 757-760, 2015. [13] Bowen Xue, Xiaolong Li, and Zongming Guo, “A new SDCS-based content-adaptive steganography using iterative noise-level estimation”, in Proc. IIH-MSP, pp. 68-71, 2015. [14] Bo Ou, Xiaolong Li, and Weiming Zhang, “PVO-based reversible data hiding for encrypted images,” in Proc. IEEE ChinaSIP, pp. 831-835, 2015. [15] Bowen Xue, Xiaolong Li, Bin Li, and Zongming Guo, “Steganalysis of LSB replacement for multivariate Gaussian covers,” in Proc. IEEE ChinaSIP, pp. 836-840, 2015. [16] Fei Peng, Xiaolong Li, and Bin Yang, “An adaptive PEE-based reversible data hiding scheme exploiting referential prediction-errors,” in Proc. IEEE ICME, 2015. [17] Bin Li, Ming Wang, Jiwu Huang, and Xiaolong Li, “A new cost function for spatial image steganography,” in Proc. IEEE ICIP, pp. 4206-4210, 2014. [18] Xinlu Gui, Xiaolong Li, Wenfa Qi, and Bin Yang, “Blind median filtering detection based on histogram features,” in Proc. APSIPA ASC, 2014. [19] Xinlu Gui, Xiaolong Li, and Bin Yang, “High-dimensional histogram utilization for reversible data hiding,” in Proc. IWDW, pp. ?-?, 2014. [20] Xinlu Gui, Siren Cai, Xiaolong Li, and Bin Yang, “A novel reversible data hiding scheme based on reference pixels and adaptive block selection,” in Proc. IIH-MSP, pp. 276-280, 2014. [21] Xinlu Gui, Xiaolong Li, and Bin Yang, “Steganalysis of LSB matching based on local binary patterns,” in Proc. IIH-MSP, pp. 475-480, 2014. [22] Xiaolong Li, Weiming Zhang, Bo Ou, and Bin Yang, “A brief review on reversible data hiding: current techniques and future prospects,” in Proc. IEEE ChinaSIP, pp. 426-430, 2014. [23] Xinlu Gui, Xiaolong Li, and Bin Yang, “Efficient reversible data hiding based on two-dimensional pixel-intensity-histogram modification,” in Proc. IEEE ICASSP, pp. 7420-7424, 2014. [24] Ran Hu, Xiaolong Li, and Bin Yang, “A new lossy compression scheme for encrypted gray-scale images,” in Proc. IEEE ICASSP, pp. 7387-7390, 2014. [25] Jian Li, Xiaolong Li, and Xingming Sun, “A new reversible data hiding scheme based on efficient prediction,” in Proc. IWDW, pp. 326-336, 2013. [26] Fei Peng, Xiaolong Li, and Bin Yang, “Calibration based reliable detector for detecting LSB matching steganography,” in Proc. IWDW, pp. 44-53, 2012. [27] Yuanzhi Qi, Xiaolong Li, Bin Wang, and Bin Yang, “A study of optimal matrix for efficient matrix embedding in F3,” in Proc. IWDW, pp. 8-18, 2012. [28] Jie Yu, Guopu Zhu, Xiaolong Li, and Jianquan Yang, “An improved algorithm for reversible data hiding in encrypted image,” in Proc. IWDW, pp. 384-394, 2012. [29] Xinlu Gui, Xiaolong Li, and Bin Yang, “A novel integer transform for efficient reversible watermarking,” in Proc. ICPR, pp. 947-950, 2012. [30] Jian Li, Xiaolong Li, and Bin Yang, “A new PEE-based reversible watermarking algorithm for color image,” in Proc. IEEE ICIP, pp. 2181-2184, 2012. [31] Xinlu Gui, Xiaolong Li, and Bin Yang, “Improved payload location for LSB matching steganography,” in Proc. IEEE ICIP, pp. 1125-1128, 2012. [32] Xinlu Gui, Xiaolong Li, and Bin Yang, “A content-adaptive ±1-based steganography by minimizing the distortion of first order statistics,” in Proc. IEEE ICASSP, pp. 1781-1784, 2012. [33] Fei Peng, Xiaolong Li, and Bin Yang, “A content-adaptive image steganography based on SDCS,” in Proc. APSIPA ASC, 2011. [34] Xiaolong Li, Bin Yang, and Wenfa Qi, “Print-and-photocopy resilient text watermarking based on Hadamard transform,” in Proc. APSIPA ASC, 2011. [35] Ruoyu Wu, Xiaolong Li, and Bin Yang, “Identifying computer generated graphics via histogram features,” in Proc. IEEE ICIP, pp. 1933-1936, 2011. [36] Yi Luo, Xiaolong Li, and Bin Yang, “Locating steganographic payload for LSB matching embedding,” in Proc. IEEE ICME, 2011. [37] Yi Luo, Fei Peng, Xiaolong Li, and Bin Yang, “Reversible image watermarking based on prediction-error expansion and compensation,” in Proc. IEEE ICME, 2011. [38] Kaiwei Cai, Xiaolong Li, Bin Yang, and Xiaoqing Lu, “Blind tampering identification by incorporating EFR and calibration,” in Proc. MINES, pp. 379-383, 2010. [39] Liping Ji, Xiaolong Li, Bin Yang, and Zhihong Liu, “A further study on a PVD-based steganography,” in Proc. MINES, pp. 686-690, 2010. [40] Chao Wang, Xiaolong Li, and Bin Yang, “High capacity reversible image watermarking based on integer transform,” in Proc. IEEE ICIP, pp. 217-220, 2010. [41] Chao Wang, Xiaolong Li, and Bin Yang, “Efficient reversible image watermarking by using dynamical prediction-error expansion,” in Proc. IEEE ICIP, pp. 3673-3676, 2010. [42] Kaiwei Cai, Xiaolong Li, Tieyong Zeng, Bin Yang, and Xiaoqing Lu, “Reliable histogram features for detecting LSB matching,” in Proc. IEEE ICIP, pp. 1761-1764, 2010. [43] Chao Wang, Xiaolong Li, Bin Yang, Xiaoqing Lu, and Chengcheng Liu, “A content-adaptive approach for reducing embedding impact in steganography,” in Proc. IEEE ICASSP, pp. 1762-1765, 2010. [44] Xudong Chen, Xiaolong Li, Bin Yang, and Yingmin Tang, “Reversible image watermarking based on a generalized integer transform,” in Proc. IEEE ICASSP, pp. 2382-2385, 2010. [45] Xiang Wang, Xiaolong Li, Bin Yang, and Zongming Guo, “A reversible watermarking scheme for high-fidelity applications,” in Proc. PCM, pp. 613-624, 2009. [46] Gaoyang Wang, Xiaolong Li, and Bin Yang, “A high capacity reversible watermarking scheme based on an integer transform,” in Proc. PCM, pp. 1287-1292, 2009. [47] Yunkai Gao, Xiaolong Li, Tieyong Zeng, and Bin Yang, “Improving embedding efficiency via matrix embedding: A case study,” in Proc. IEEE ICIP, pp. 109-112, 2009. [48] Yifeng Lu, Xiaolong Li, and Bin Yang, “A ±1-based steganography by minimizing the distortion of first order statistics,” in Proc. IIH-MSP, pp. 754-758, 2009. (Best paper award) [49] Yifeng Lu, Xiaolong Li, and Bin Yang, “A secure steganography: noisy region embedding,” in Proc. IIH-MSP, pp. 1046-1051, 2009. [50] Yunkai Gao, Xiaolong Li, and Bin Yang, “Employing optimal matrix for efficient matrix embedding,” in Proc. IIH-MSP, pp. 161-165, 2009. [51] Wenfa Qi, Xiaolong Li, and Bin Yang, “Bilinear coons patch and its application in security pattern design,” in Proc. IIH-MSP, pp. 881-884, 2009. [52] Yunkai Gao, Xiaolong Li, and Bin Yang, “Constructing specific matrix for efficient matrix embedding,” in Proc. IEEE ICME, pp. 1006-1009, 2009. [53] Chengcheng Liu, Xiaolong Li, Xiaoqing Lu, and Bin Yang, “Improving embedding efficiency by incorporating SDCS and WPC,” in Proc. IEEE ICME, pp. 1018-1021, 2009. [54] Yunkai Gao, Xiaolong Li, Bin Yang, and Yifeng Lu, “Detecting LSB matching by characterizing the amplitude of histogram,” in Proc. IEEE ICASSP, pp. 1505-1508, 2009. [55] Wenfa Qi, Xiaolong Li, and Bin Yang, “A character segmentation method without character verification,” in Proc. IITAW, pp. 581-584, 2008. [56] Yifeng Lu, Xiaolong Li, Wenfa Qi, and Bin Yang, “A further study on an optical watermarking scheme,” in Proc. ICSP, pp. 2213-2216, 2008. [57] Xiaolong Li, Tieyong Zeng, and Bin Yang, “A further study on steganalysis of LSB matching by calibration,” in Proc. IEEE ICIP, pp. 2072-2075, 2008. [58] Xiaolong Li, Tieyong Zeng, and Bin Yang, “Detecting LSB matching by applying calibration technique for difference image,” in Proc. ACM MM&SEC, pp. 133-138, 2008. [59] Daofang Cheng, Xiaolong Li, Wenfa Qi, and Bin Yang, “A statistics-based watermarking scheme robust to print-and-scan,” in Proc. ISECS, pp. 894-898, 2008. [60] Xiaolong Li, Tieyong Zeng, and Bin Yang, “Improvement of the embedding efficiency of LSB matching by sum and difference covering set,” in Proc. IEEE ICME, pp. 209-212, 2008.

推荐链接
down
wechat
bug