Yingqiang Qiu

ORCID: 0000-0001-5352-1318
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Digital Media Forensic Detection
  • Advanced Steganography and Watermarking Techniques
  • Chaos-based Image/Signal Encryption
  • Speech Recognition and Synthesis
  • Music and Audio Processing
  • Image and Video Stabilization
  • Speech and Audio Processing
  • Cooperative Communication and Network Coding
  • Advanced Algorithms and Applications
  • Opportunistic and Delay-Tolerant Networks
  • Computational Physics and Python Applications
  • Biometric Identification and Security
  • Mobile Ad Hoc Networks
  • Smart Grid and Power Systems

Huaqiao University
2007-2025

Guangdong Institute of Intelligent Manufacturing
2020

Ministry of Public Security of the People's Republic of China
2020

Fuzhou University
2015

While the existing reserving room before encryption (RRBE) based reversible data hiding in encrypted image (RDHEI) schemes can achieve decent embedding capacity, capacity of vacating by (VRBE) is relatively low. To address this issue, paper proposes a generalized framework for high-capacity RDHEI both RRBE and VRBE cases. First, an efficient generation algorithm (ERGA) designed to produce large using pixel prediction entropy encoding. Then, we propose two schemes, one RRBE, another VRBE. In...

10.1109/tcsvt.2022.3163905 article EN IEEE Transactions on Circuits and Systems for Video Technology 2022-03-31

This letter proposes a novel reversible data hiding (RDH) method with an adaptive embedding capability by extending the generalized integer transformation (GIT). We modify GIT algorithm to further form, and accordingly we propose algorithm. When into original image, parameters of extended can be identified according content each block. Along multi-level location map, better efficiency net payload achieved. On decoding side, image losslessly recovered after extracting hidden message....

10.1109/lsp.2015.2504464 article EN IEEE Signal Processing Letters 2015-12-01

This paper proposes a reversible data hiding (RDH) scheme for images with an improved convolutional neural network (CNN) predictor (ICNNP) that consists of three modules feature extraction, pixel prediction, and complexity respectively. Due to predicting the each ICNNP during embedding process, proposed can achieve superior performance compared CNNP-based scheme. Specifically, input image is first split into two sub-images, i.e., “Circle” sub-image “Square” sub-image. Meanwhile, applied...

10.3390/e27020159 article EN cc-by Entropy 2025-02-03

This paper proposes a new framework of lossless data hiding (LDH) in JPEG images. The proposed contains two algorithms, i.e., the optimized basic LDH and relay transfer based extension. In algorithm, we aim to preserve filesize after embedding. process is by variable-length-code (VLC) mapping, combination permutation. extended focus on embedding more bits into bitstream with condition that increment allowed. To decrease increment, propose algorithm preprocess bitstream. Subsequently, embed...

10.1109/tcsvt.2020.3006494 article EN IEEE Transactions on Circuits and Systems for Video Technology 2020-07-02

10.1016/j.jvcir.2018.02.005 article EN Journal of Visual Communication and Image Representation 2018-02-10

Typical reversible data hiding in encrypted image (RDH-EI) methods merely embed the domain, ignoring requirement of owner for embedding. To address this issue, paper proposes a novel RDH-EI method with dual embedding based on generalized integer transformation (GIT). The first vacates room, and performs before encryption. After encryption, remote server utilizes vacated room to further additional into image. embedded by can be extracted exactly, original recovered losslessly. experimental...

10.1109/access.2020.2969252 article EN cc-by IEEE Access 2020-01-01

Ad hoc network is particularly vulnerable due to the lack of any centralized infrastructure. However, typical on-demand routing protocols for ad networks such as AODV and DSR have no security considerations trust all participants correctly forward data traffic. In this paper, foundational conception attacks in them are introduced. A secure solution based on watchdog mechanism credence value proposed over AODV. The defined judge whether a node has abnormal behavior process forwarding...

10.1109/ispacs.2007.4445917 article EN International Symposium on Intelligent Signal Processing and Communication Systems 2007-01-01

Precious reversible data hiding in encrypted image (RDH-EI) methods vacate room for embedding version. However, the requirement of content owner is ignored. This paper proposes a new framework RDH-EI using generalized contrast mapping (GRCM), which vacates image. Meanwhile, some secret also embedded before encryption by owner. After and update, it easy remote server to reversibly embed into The proposed method guarantees reversibility, i.e., can be exactly extracted original perfectly...

10.1109/wifs.2018.8630793 article EN 2018-12-01

Detecting the presence of electric network frequency (ENF) signal in audio recordings is a prerequisite applying ENF criterion that plays an essential role numerous forensic applications. However, existing detection methods are powerless to handle short-duration have attracted considerable attention due popularity voice messaging apps. This paper proposes novel deep learning-based approach for short recordings, reducing minimum operating range duration 1/10 state-of-the-art methods....

10.1109/mmsp55362.2022.9948842 article EN 2022 IEEE 24th International Workshop on Multimedia Signal Processing (MMSP) 2022-09-26

This letter proposes an improved CNN predictor (ICNNP) for reversible data hiding (RDH) in images, which consists of a feature extraction module, pixel prediction and complexity module. Due to predicting the each with ICNNP during embedding process, proposed method can achieve superior performance than predictor-based method. Specifically, input image does be first split into two different sub-images, i.e., "Dot" "Cross" image. Meanwhile, sub-image is applied predict another one. Then,...

10.48550/arxiv.2301.01420 preprint EN other-oa arXiv (Cornell University) 2023-01-01

A novel VQ-based data hiding scheme using nearest neighbor labeling method and Ι / Ῑ matrix as embed/extract is presented in this paper. According to the relationship between codebook codewords, labeled value of every codeword by nearest-neighbor was different from its codeword, based on which, matrix, many m bits can be embedded 2m VQ coded indexes where at most ⌊m/2⌋ aren't optimum. The simulated results computer showed that information has larger capacity better imperceptibility.

10.1109/ispacs.2007.4445946 article EN International Symposium on Intelligent Signal Processing and Communication Systems 2007-01-01

Aiming at avoiding the leakage of image contour and that embedding capacity can be adjusted by data hider, this paper improves an interpolation-based reversible hiding scheme in encrypted images (RDH-EI). Before encryption, we create space for interpolation-errors non-sample pixels, using interpolation techniques. The generated auxiliary is embedded into sample pixels with classical difference expansion (DE) technique. Then, a stream cipher utilized to encrypt scrambling encryption preserve...

10.1109/icsidp47821.2019.9173225 article EN 2019 IEEE International Conference on Signal, Information and Data Processing (ICSIDP) 2019-12-01

While the existing vacating room before encryption (VRBE) based schemes can achieve decent embedding rate, payloads of after (VRAE) are relatively low. To address this issue, paper proposes a generalized framework for high-capacity RDHEI both VRBE and VRAE cases. First, an efficient generation algorithm (ERGA) is designed to produce large by using pixel prediction entropy encoding. Then, we propose two schemes, one VRBE, another VRAE. In scenario, image owner generates with ERGA encrypts...

10.48550/arxiv.2102.12613 preprint EN other-oa arXiv (Cornell University) 2021-01-01
Coming Soon ...