Zhaoxia Yin

ORCID: 0000-0003-0387-4806
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Steganography and Watermarking Techniques
  • Digital Media Forensic Detection
  • Chaos-based Image/Signal Encryption
  • Adversarial Robustness in Machine Learning
  • Anomaly Detection Techniques and Applications
  • Generative Adversarial Networks and Image Synthesis
  • Advanced Neural Network Applications
  • Diabetes, Cardiovascular Risks, and Lipoproteins
  • Obesity, Physical Activity, Diet
  • Biometric Identification and Security
  • Integrated Circuits and Semiconductor Failure Analysis
  • Blood Pressure and Hypertension Studies
  • RNA Interference and Gene Delivery
  • Computer Graphics and Visualization Techniques
  • Digital Rights Management and Security
  • Bacillus and Francisella bacterial research
  • Advanced Malware Detection Techniques
  • Liver Disease Diagnosis and Treatment
  • Advanced biosensing and bioanalysis techniques
  • Advanced Data Compression Techniques
  • Vehicle License Plate Recognition
  • MicroRNA in disease regulation
  • Nutritional Studies and Diet
  • Face recognition and analysis
  • Acute Myocardial Infarction Research

East China Normal University
2022-2025

Shenzhen University Health Science Center
2018-2024

Zhejiang Chinese Medical University
2023

Shanghai University
2016-2022

Anhui University
2009-2021

Shenzhen University
2018-2020

Shenzhen Luohu People's Hospital
2018-2020

John Wiley & Sons (United States)
2020

Hudson Institute
2020

Shaanxi University of Science and Technology
2019

With the development of cloud storage and privacy protection, reversible data hiding in encrypted images (RDHEI) has attracted increasing attention as a technology that can embed additional encryption domain. In general, an RDHEI method embeds secret image while ensuring embedded be extracted error-free original restored lossless. this paper, A high-capacity algorithm is proposed. At first, Most Significant Bits (MSB) each pixel was predicted adaptively marked by Huffman coding image. Then,...

10.1109/tmm.2019.2936314 article EN IEEE Transactions on Multimedia 2019-08-22

This work proposes an improved reversible data hiding scheme in encrypted images using parametric binary tree labeling(IPBTL-RDHEI), which takes advantage of the spatial correlation entire original image but not small blocks to reserve room for data. Then is with encryption key and used label pixels into two different categories. Finally, one categories can embed secret information by bit replacement. According experimental results, compared several state-of-the-art methods, proposed...

10.1109/tmm.2019.2952979 article EN IEEE Transactions on Multimedia 2019-11-11

Metastatic relapse is a leading cause of cancer‐associated death and one the major obstacles for effective therapy against triple‐negative breast cancer. To address this problem, miRNA‐delivering nanocapsule technology based on hyaluronic acid (HA)/protamine sulfate (PS) interpolyelectrolyte complexes (HP‐IPECs) developed efficient encapsulation intracellular delivery microRNA‐34a (miR‐34a), which potent endogenous tumor suppressor The nanocapsules are successfully generated through...

10.1002/adhm.201400222 article EN Advanced Healthcare Materials 2014-07-09

Reversible data hiding in encrypted images (RDHEI) receives growing attention because it protects the content of original image while embedded can be accurately extracted and reconstructed losslessly. To make full use correlation adjacent pixels, this article proposes an RDHEI scheme based on pixel prediction bit-plane compression. First, are divided into blocks equal size error is calculated. Then, 8 bit-planes executed rearrangement bit-stream compression, respectively. Finally, after...

10.1109/tdsc.2020.3019490 article EN IEEE Transactions on Dependable and Secure Computing 2020-01-01

In recent years, reversible data hiding in encrypted images (RDHEI) that embeds additional into the image content has received more and attention. previous RDHEI methods, there is no one considering correlation between neighboring pixels. this paper, to better explore neighbor pixels, a novel method with two-MSB (MSB second MSB) prediction proposed. After analyzing original detecting all possible errors, we encrypt using bitwise exclusive-or (XOR) operation highlight error based on location...

10.1109/wifs.2018.8630785 article EN 2018-12-01

This paper proposes a separable reversible data-hiding scheme in encrypted image which offers high payload and error-free data extraction. The cover is partitioned into nonoverlapping blocks multigranularity encryption applied to obtain the image. hider preprocesses randomly selects two basic pixels each block estimate smoothness indicate peak points. Additional are embedded sorted order of by using local histogram shifting under guidance At receiver side, decryption extraction can be free...

10.1155/2014/604876 article EN cc-by The Scientific World JOURNAL 2014-01-01

This letter proposes a batch steganographic method, which combines cover-selection and payload-allocation by distortion optimization. We first proved that with the value of payload increasing, first-order derivative single cover is monotonically increasing. Then, we deduced covers selected from given set should be equal if total corresponding minimal. Finally, an algorithm was designed to combine payload-allocation, so optimal stego-covers can obtained. Experiment results show...

10.1109/lsp.2018.2865888 article EN IEEE Signal Processing Letters 2018-08-17

As a branch of reversible data hiding (RDH), lossless (LDH) technique is important especially. Because LDH can not only reconstruct the cover image losslessly but also keep visual quality marked no degradation. This article proposes new scheme for JPEG images by general variable length code (VLC) mapping. In this scheme, run size values are first reordered. Then feasible solution space generated. A simulated embedding model established to find optimal from space. The mapping relationship...

10.1109/tdsc.2020.3013326 article EN IEEE Transactions on Dependable and Secure Computing 2020-01-01

A hybrid distortion function for JPEG steganography exploiting block fluctuation and quantization steps is proposed. To resist multidomain steganalysis, both spatial domain discrete cosine transformation (DCT) are involved in the proposed function. In domain, a value allotted each 8×8 according to fluctuation. DCT employed allot values coefficients block. The two elements, steps, combined together measure embedding risk. By employing syndrome trellis coding embed secret data, changes...

10.1117/1.jei.25.5.050501 article EN Journal of Electronic Imaging 2016-09-06

Abstract Replacement of downregulated tumor‐suppressive microRNA (Ts‐miRNA) is recognized as an alternative approach for tumor gene therapy. However, in situ monitoring miRNA replacement efficacy a real‐time manner via noninvasive imaging continually challenging. Here, glutathione (GSH)‐activated light‐up peptide‐polysaccharide‐inter‐polyelectrolyte nanocomplexes are established through self‐assembly carboxymethyl dextran with disulfide‐bridged (“SS”) oligoarginine peptide (S‐Arg 4 ), which...

10.1002/advs.201700542 article EN cc-by Advanced Science 2018-01-19
Coming Soon ...