- Digital Media Forensic Detection
- Advanced Steganography and Watermarking Techniques
- Chaos-based Image/Signal Encryption
- Speech Recognition and Synthesis
- Music and Audio Processing
- Image and Video Stabilization
- Speech and Audio Processing
- Cooperative Communication and Network Coding
- Advanced Algorithms and Applications
- Opportunistic and Delay-Tolerant Networks
- Computational Physics and Python Applications
- Biometric Identification and Security
- Mobile Ad Hoc Networks
- Smart Grid and Power Systems
Huaqiao University
2007-2025
Guangdong Institute of Intelligent Manufacturing
2020
Ministry of Public Security of the People's Republic of China
2020
Fuzhou University
2015
While the existing reserving room before encryption (RRBE) based reversible data hiding in encrypted image (RDHEI) schemes can achieve decent embedding capacity, capacity of vacating by (VRBE) is relatively low. To address this issue, paper proposes a generalized framework for high-capacity RDHEI both RRBE and VRBE cases. First, an efficient generation algorithm (ERGA) designed to produce large using pixel prediction entropy encoding. Then, we propose two schemes, one RRBE, another VRBE. In...
This letter proposes a novel reversible data hiding (RDH) method with an adaptive embedding capability by extending the generalized integer transformation (GIT). We modify GIT algorithm to further form, and accordingly we propose algorithm. When into original image, parameters of extended can be identified according content each block. Along multi-level location map, better efficiency net payload achieved. On decoding side, image losslessly recovered after extracting hidden message....
This paper proposes a reversible data hiding (RDH) scheme for images with an improved convolutional neural network (CNN) predictor (ICNNP) that consists of three modules feature extraction, pixel prediction, and complexity respectively. Due to predicting the each ICNNP during embedding process, proposed can achieve superior performance compared CNNP-based scheme. Specifically, input image is first split into two sub-images, i.e., “Circle” sub-image “Square” sub-image. Meanwhile, applied...
This paper proposes a new framework of lossless data hiding (LDH) in JPEG images. The proposed contains two algorithms, i.e., the optimized basic LDH and relay transfer based extension. In algorithm, we aim to preserve filesize after embedding. process is by variable-length-code (VLC) mapping, combination permutation. extended focus on embedding more bits into bitstream with condition that increment allowed. To decrease increment, propose algorithm preprocess bitstream. Subsequently, embed...
Typical reversible data hiding in encrypted image (RDH-EI) methods merely embed the domain, ignoring requirement of owner for embedding. To address this issue, paper proposes a novel RDH-EI method with dual embedding based on generalized integer transformation (GIT). The first vacates room, and performs before encryption. After encryption, remote server utilizes vacated room to further additional into image. embedded by can be extracted exactly, original recovered losslessly. experimental...
Ad hoc network is particularly vulnerable due to the lack of any centralized infrastructure. However, typical on-demand routing protocols for ad networks such as AODV and DSR have no security considerations trust all participants correctly forward data traffic. In this paper, foundational conception attacks in them are introduced. A secure solution based on watchdog mechanism credence value proposed over AODV. The defined judge whether a node has abnormal behavior process forwarding...
Precious reversible data hiding in encrypted image (RDH-EI) methods vacate room for embedding version. However, the requirement of content owner is ignored. This paper proposes a new framework RDH-EI using generalized contrast mapping (GRCM), which vacates image. Meanwhile, some secret also embedded before encryption by owner. After and update, it easy remote server to reversibly embed into The proposed method guarantees reversibility, i.e., can be exactly extracted original perfectly...
Detecting the presence of electric network frequency (ENF) signal in audio recordings is a prerequisite applying ENF criterion that plays an essential role numerous forensic applications. However, existing detection methods are powerless to handle short-duration have attracted considerable attention due popularity voice messaging apps. This paper proposes novel deep learning-based approach for short recordings, reducing minimum operating range duration 1/10 state-of-the-art methods....
This letter proposes an improved CNN predictor (ICNNP) for reversible data hiding (RDH) in images, which consists of a feature extraction module, pixel prediction and complexity module. Due to predicting the each with ICNNP during embedding process, proposed method can achieve superior performance than predictor-based method. Specifically, input image does be first split into two different sub-images, i.e., "Dot" "Cross" image. Meanwhile, sub-image is applied predict another one. Then,...
A novel VQ-based data hiding scheme using nearest neighbor labeling method and Ι / Ῑ matrix as embed/extract is presented in this paper. According to the relationship between codebook codewords, labeled value of every codeword by nearest-neighbor was different from its codeword, based on which, matrix, many m bits can be embedded 2m VQ coded indexes where at most ⌊m/2⌋ aren't optimum. The simulated results computer showed that information has larger capacity better imperceptibility.
Aiming at avoiding the leakage of image contour and that embedding capacity can be adjusted by data hider, this paper improves an interpolation-based reversible hiding scheme in encrypted images (RDH-EI). Before encryption, we create space for interpolation-errors non-sample pixels, using interpolation techniques. The generated auxiliary is embedded into sample pixels with classical difference expansion (DE) technique. Then, a stream cipher utilized to encrypt scrambling encryption preserve...
While the existing vacating room before encryption (VRBE) based schemes can achieve decent embedding rate, payloads of after (VRAE) are relatively low. To address this issue, paper proposes a generalized framework for high-capacity RDHEI both VRBE and VRAE cases. First, an efficient generation algorithm (ERGA) is designed to produce large by using pixel prediction entropy encoding. Then, we propose two schemes, one VRBE, another VRAE. In scenario, image owner generates with ERGA encrypts...