Yi Zhang

ORCID: 0000-0003-1832-1235
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Steganography and Watermarking Techniques
  • Digital Media Forensic Detection
  • Chaos-based Image/Signal Encryption
  • Internet Traffic Analysis and Secure E-voting
  • Vehicle License Plate Recognition
  • Advanced Image and Video Retrieval Techniques
  • Biometric Identification and Security
  • Image and Video Stabilization
  • Image and Signal Denoising Methods
  • User Authentication and Security Systems
  • Ferroelectric and Piezoelectric Materials
  • Acoustic Wave Resonator Technologies
  • Generative Adversarial Networks and Image Synthesis
  • Microwave Dielectric Ceramics Synthesis
  • IoT and Edge/Fog Computing
  • Metamaterials and Metasurfaces Applications
  • Advanced Antenna and Metasurface Technologies
  • Advanced Data Compression Techniques
  • Caching and Content Delivery
  • Video Surveillance and Tracking Methods
  • Wood and Agarwood Research
  • Image Enhancement Techniques
  • Advanced Wireless Communication Technologies
  • Visual Attention and Saliency Detection
  • Cloud Data Security Solutions

Sichuan University
2015-2025

Chengdu University
2025

PLA Information Engineering University
2021-2025

Northeastern University
2024

Institute of Software
2024

China University of Petroleum, East China
2024

Chongqing University of Posts and Telecommunications
2024

Zhengzhou University of Science and Technology
2017-2023

Zhejiang Science and Technology Information Institute
2023

Jinan University
2023

Adaptive JPEG steganographic schemes are difficult to preserve the image texture features in all scales and orientations when embedding changes constrained complicated regions, then a steganalysis feature extraction method is proposed based on 2 dimensional (2D) Gabor filters. The 2D filters have certain optimal joint localization properties spatial domain frequency domain. They can describe from different orientations, therefore of statistical characteristics caused by steganography be...

10.1145/2756601.2756608 article EN 2015-06-02

Steganography detection based on Rich Model features is a hot research direction in steganalysis. However, rich model usually result large computation cost. To reduce the dimension of steganalysis and improve efficiency algorithm, differing from previous works that normally proposed new feature extraction this paper proposes general selection method decision rough set α-positive region reduction. First, it pointed out reduction suitable for selection. Second, quantization attribute...

10.1109/tcsvt.2018.2799243 article EN IEEE Transactions on Circuits and Systems for Video Technology 2018-01-29

Considering that traditional image steganography technologies suffer from the potential risk of failure under lossy channels, an enhanced adaptive with multiple robustness against processing attacks is proposed, while maintaining good detection resistance. First, a robust domain constructing method proposed utilizing element extraction and optimal modification, which can be applied to both spatial JPEG images. Then, based on "Robust Domain Constructing + RS-STC Codes," combined cover...

10.1109/tcsvt.2019.2923980 article EN IEEE Transactions on Circuits and Systems for Video Technology 2019-06-20

In order to safeguard image copyrights, zero-watermarking technology extracts robust features and generates watermarks without altering the original image. Traditional methods rely on handcrafted feature descriptors enhance their performance. With advancement of deep learning, this paper introduces “ZWNet”, an end-to-end scheme that obviates necessity for specialized knowledge in is exclusively composed artificial neural networks. The architecture ZWNet synergistically incorporates ConvNeXt...

10.3390/app14010435 article EN cc-by Applied Sciences 2024-01-03

Current typical adaptive Steganography algorithms cannot extract the embedded secret messages correctly after compression. In order to solve this problem, a JPEG-compression resistant steganography algorithm is proposed. Utilizing relationship between DCT coefficients, domain of embedding determined. The modifying magnitude different coefficients can be determined according quality factors JPEG To ensure completely correct extraction compression, RS codes used encode embedded. Besides, based...

10.1109/ares.2015.53 article EN 2015-08-01

The CAPTCHA has become an important issue in multimedia security. Aimed at a commonly used text-based CAPTCHA, this paper outlines some typical methods and summarizes the technological progress breaking. First, presents comprehensive review of recent developments breaking field. Second, framework technique is proposed. And mainly consists preprocessing, segmentation, combination, recognition, postprocessing, other modules. Third, research involved each module introduced, segmentation...

10.1155/2017/6898617 article EN cc-by Security and Communication Networks 2017-01-01

A robust audio watermarking method based on the time‐spread (TS) echo hiding scheme is proposed. Compared with existing TS methods, approach more as it exploits characteristics of host signals in encoding stage. Theoretical analysis and simulation examples demonstrate effectiveness advantages method.

10.1049/el.2015.1508 article EN Electronics Letters 2015-11-23

Steganalysis feature selection shows excellent effectiveness on elevating the detection efficiency and decreasing time-space cost. However, single evaluation criterion for features subjective basis always lead to valuable neglect, which restricts improvement of accuracy. To alleviate this predicament, paper proposes a steganalysis method based multidimensional dynamic threshold allocation (MEDTA method). Firstly, measure components' contribution degree detection, concept partial entropy...

10.1109/tcsvt.2023.3295364 article EN IEEE Transactions on Circuits and Systems for Video Technology 2023-07-14

Traditional steganography methods are usually designed on a lossless channel; thus, messages often not extracted correctly from an image transmitted over lossy channel that includes attacks such as scaling. To address this issue, in recent years, the field of robust has emerged. In paper, process scaling by interpolation is first observed and serves basis for proposing idea inverse interpolation. Subsequently, constructing equation set proposed to solve problem intersectional blocks during...

10.1109/tcsvt.2021.3107342 article EN IEEE Transactions on Circuits and Systems for Video Technology 2021-08-24

With the rapid proliferation of urbanization, massive data in social networks are collected and aggregated real time, making it possible for criminals to use images as a cover spread secret information on Internet. How determine whether these contain is huge challenge multimedia computing security. The steganalysis method based deep learning can effectively judge pictures transmitted Internet urban scenes information, which great significance safeguarding national Image has powerful ability...

10.1145/3579166 article EN ACM Transactions on Multimedia Computing Communications and Applications 2023-01-11

With the dimension of steganalysis feature increases rapidly, ensemble has become trend, and its performance is greatly influenced by selection subspaces. In order to select subspaces more effectively improve steganalysis, a subspace algorithm based on Fisher criterion proposed. The proposed computes weight for each component according value base probability value, then selects components with probabilities in proportion their weights. When it used appropriate searched steps. Experimental...

10.1109/dsaa.2017.53 article EN 2017-10-01

Besides vehicle both pedestrian and bicycle are two primary components in urban traffic flow. Video object tracking is an important method of information detection ITS. This system implements approach for detecting pedestrians bicycles scenes by means feature-based reason on visual data. In the video monitoring system, matching often used to find position moving image sequence. paper tried propose improved algorithm corner feature extraction, using motion a classification. Experiment results...

10.1109/itsc.2003.1251974 article EN 2004-04-23

10.1016/j.neucom.2006.08.006 article EN Neurocomputing 2006-10-20
Coming Soon ...