- Advanced Steganography and Watermarking Techniques
- Digital Media Forensic Detection
- Chaos-based Image/Signal Encryption
- Generative Adversarial Networks and Image Synthesis
- Advanced Image Processing Techniques
- Advanced Image and Video Retrieval Techniques
- Face recognition and analysis
- Internet Traffic Analysis and Secure E-voting
- Image Processing Techniques and Applications
- Photopolymerization techniques and applications
- Advanced biosensing and bioanalysis techniques
- Adversarial Robustness in Machine Learning
- DNA and Nucleic Acid Chemistry
- Cryptography and Data Security
- Advanced Polymer Synthesis and Characterization
- Biometric Identification and Security
- Image and Signal Denoising Methods
- Photochromic and Fluorescence Chemistry
- Image Retrieval and Classification Techniques
- Video Analysis and Summarization
- Gut microbiota and health
- Privacy-Preserving Technologies in Data
- Image and Video Quality Assessment
- Topic Modeling
- RNA Interference and Gene Delivery
Fudan University
2017-2025
Beijing Institute of Technology
2013-2025
Shanxi Agricultural University
2025
Liaocheng University
2022-2024
Shanghai University
2002-2024
University of Nebraska–Lincoln
2022-2024
Chengdu Third People's Hospital
2023-2024
Chongqing Medical University
2023-2024
Southwest Jiaotong University
2023-2024
Shandong University
2008-2024
In the past two decades, reversible data hiding (RDH), also referred to as lossless or invertible hiding, has gradually become a very active research area in field of hiding. This been verified by more and papers on increasingly wide-spread subjects RDH that have published these days. this paper, various algorithms researches classified into following six categories: 1) image spatial domain; 2) compressed domain (e.g., JPEG); 3) suitable for semi-fragile authentication; 4) with contrast...
Carbohydrate active enzymes (CAZymes) are made by various organisms for complex carbohydrate metabolism. Genome mining of CAZymes has become a routine data analysis in (meta-)genome projects, owing to the importance bioenergy, microbiome, nutrition, agriculture, and global carbon recycling. In 2012, dbCAN was provided as an online web server automated CAZyme annotation. dbCAN2 (https://bcb.unl.edu/dbCAN2) further developed 2018 meta combine multiple tools improved also included CGC-Finder,...
With the development of cloud storage and privacy protection, reversible data hiding in encrypted images (RDHEI) has attracted increasing attention as a technology that can embed additional encryption domain. In general, an RDHEI method embeds secret image while ensuring embedded be extracted error-free original restored lossless. this paper, A high-capacity algorithm is proposed. At first, Most Significant Bits (MSB) each pixel was predicted adaptively marked by Huffman coding image. Then,...
Generating falsified faces by artificial intelligence, widely known as DeepFake, has attracted attention worldwide since 2017. Given the potential threat brought this novel technique, forensics researchers dedicated themselves to detect video forgery. Except for exposing faces, there could be extended research directions DeepFake such anti-forensics. It can disclose vulnerability of current methods. Besides, it also enable videos tactical weapons if are more subtle detected. In paper, we...
Reversible data hiding in encrypted images (RDHEI) is an effective technique of security. Most state-of-the-art RDHEI methods do not achieve desirable payload yet. To address this problem, we propose a new method with hierarchical embedding. Our contributions are twofold. (1) A novel label map generation proposed for the bit-planes plaintext image. The calculated by using prediction technique, and it compressed embedded into (2) Hierarchical embedding designed to high payload. This...
With the popularity of cloud storage services, people are increasingly accustomed to storing images in cloud. However, services raise privacy concerns, e.g., leakage unauthorized third parties and service providers may exploit image detection technologies portrait users without permission. Although concerns can be solved by encrypting before they uploaded cloud, traditional encryption methods significantly affect usability user experience, for example, cannot preview Recently, Marohn <i>et...
Video watermarking on the dual tree-complex wavelet (DT CWT) domain is shown to be effective offer high robustness. Existing DT CWT video schemes tend use all coefficients high-pass sub-bands of for watermark embedding and detection, which lack investigating correlations among different fail explore stable robust watermarking. In this paper, we propose a novel scheme by exploring joint sub-bands. We first extract set candidate applying block singular value decomposition (SVD) domain. Then,...
Abstract Carbohydrate Active EnZymes (CAZymes) are significantly important for microbial communities to thrive in carbohydrate rich environments such as animal guts, agricultural soils, forest floors, and ocean sediments. Since 2017, microbiome sequencing assembly have produced numerous metagenome assembled genomes (MAGs). We updated our dbCAN-seq database (https://bcb.unl.edu/dbCAN_seq) include the following new data features: (i) ∼498 000 CAZymes ∼169 CAZyme gene clusters (CGCs) from 9421...
Fake news detection (FND) has attracted much research interests in social forensics. Many existing approaches introduce tailored attention mechanisms to fuse unimodal features. However, they ignore the impact of cross-modal similarity between modalities. Meanwhile, potential pretrained multimodal feature learning models FND not been well exploited. This paper proposes an FND-CLIP framework, i.e., a News Detection network based on Contrastive Language-Image Pretraining (CLIP). extracts deep...
Ostwald ripening, the dominant mechanism of droplet size growth for an O/W nanoemulsion at high surfactant concentrations, depends on micelles in water phase and aqueous solubility oil, especially spontaneously formed nanoemulsions. In our study, nanoemulsions were by mixing a with oil containing fatty alcohol polyoxypropylene polyoxyethylene ether (APE). By monitoring periodically via dynamic light scattering, we demonstrated that are stable against i.e., growth. contrast, droplets grew...
An efficient visible-light-sensitive photobase generator for thiol-Michael addition reactions was synthesized and evaluated. This highly reactive catalyst designed by protecting a strong base (tetramethyl guanidine, TMG) with visible-light-responsive group which coumarin derivative. The coumarin-coupled TMG shown to exhibit extraordinary catalytic activity toward initiation of the reaction, including addition-based polymerization, upon visible-light irradiation, leading stoichiometric...
We report a wavelength-selective polymerization process controlled by visible/UV light, whereby base is generated for anion-mediated thiol–Michael reaction upon exposure at one wavelength (400–500 nm), while radicals are subsequently second stage radical second, independent (365 nm). Dual wavelength, light sequential not only provides relatively soft intermediate polymer that facilitates optimum processing and modification under visible but also enables highly cross-linked, rigid final...
In this paper, a novel lossy compression scheme for encrypted image based on inpainting is proposed. order to maintain confidentiality, the content owner encrypts original through modulo-256 addition encryption and block permutation mask content. Then, third party, such as cloud server, can compress selective before transmitting receiver. During compression, blocks are categorized into four sets corresponding different complexity degrees in plaintext domain without loss of security. By...
Most current reversible data hiding (RDH) techniques are designed for uncompressed images. However, JPEG images more commonly used in our daily lives. Up to now, several RDH methods have been proposed, yet few of them investigated the adaptive embedding as lack accurate measurement distortion. To realize and optimize performance, this article, a novel scheme based on multiple histogram modification (MHM) rate-distortion optimization is proposed. Firstly, with selected coefficients,...
Image quality assessment (IQA) is an important task of image processing and has diverse applications, such as super-resolution reconstruction, transmission monitoring systems. This paper proposes a perceptual hashing algorithm with complementary color wavelet transform (CCWT) compressed sensing (CS) for reduced-reference (RR) IQA. The CCWT exploited to decompose input into different sub-bands. Since the calculation uses all channels without discarding any information, distortions introduced...
People are accustomed to utilizing mobile phones capture images and uploading them the cloud due various incomparable advantages such as saving storage space on device. In this context, privacy concerns raised since may contain some sensitive information. Encrypting by traditional schemes can alleviate leak, but usability is often deprived it tough browse cloud. Recently, Tajik et al. proposed an ideal <italic xmlns:mml="http://www.w3.org/1998/Math/MathML"...
Steganography usually modifies cover media to embed secret data. A new steganographic approach called generative steganography (GS) has emerged recently, in which stego images (images containing data) are generated from data directly without media. However, existing GS schemes often criticized for their poor performances. In this paper, we propose an advanced network (GSN) that can generate realistic using images. We firstly introduce the mutual information mechanism GS, helps achieve high...
JPEG image encryption aims at effectively converting the original into a noise-like that does not contain any useful information of image. Existing schemes for encryption, however, may attain good balance in terms file size increment and security. To address problem, we design novel scheme. Different from existing schemes, first predict DC coefficients by an adaptive prediction method. Subsequently, histogram coefficient errors is encrypted combining random integers to reduce encoded length,...