Follow
Xiaolong LI
Xiaolong LI
Institute of Information Science, Beijing Jiaotong University
Verified email at bjtu.edu.cn
Title
Cited by
Cited by
Year
Segmentation-based image copy-move forgery detection scheme
J Li, X Li, B Yang, X Sun
IEEE Transactions on Information Forensics and Security 10 (3), 507-518, 2015
9882015
Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection
X Li, B Yang, T Zeng
IEEE Transactions on Image Processing 20 (12), 3524-3533, 2011
7602011
A new cost function for spatial image steganography
B Li, M Wang, J Huang, X Li
2014 IEEE International Conference on Image Processing (ICIP), 4206-4210, 2014
6642014
Reversible Data Hiding: Advances in the Past Two Decades
YQ Shi, X Li, X Zhang, H Wu, B Ma
IEEE Access 4, 3210-3237, 2016
5862016
Pairwise prediction-error expansion for efficient reversible data hiding
B Ou, X Li, Y Zhao, R Ni, YQ Shi
IEEE Transactions on Image Processing 22 (12), 5010-5021, 2013
5482013
High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion
X Li, J Li, B Li, B Yang
Signal Processing 93 (1), 198-205, 2013
5452013
General framework to histogram-shifting-based reversible data hiding
X Li, B Li, B Yang, T Zeng
IEEE Transactions on Image Processing 22 (6), 2181-2191, 2013
5172013
Efficient reversible data hiding based on multiple histograms modification
X Li, W Zhang, X Gui, B Yang
IEEE Transactions on Information Forensics and Security 10 (9), 2016-2027, 2015
4042015
A novel reversible data hiding scheme based on two-dimensional difference-histogram modification
X Li, W Zhang, X Gui, B Yang
IEEE Transactions on Information Forensics and Security 8 (7), 1091-1100, 2013
3692013
Improved PVO-based reversible data hiding
F Peng, X Li, B Yang
Digital Signal Processing 25, 255–265, 2014
3132014
Adaptive reversible data hiding scheme based on integer transform
F Peng, X Li, B Yang
Signal Processing 92 (1), 54-62, 2012
2852012
A strategy of clustering modification directions in spatial image steganography
B Li, M Wang, X Li, S Tan, J Huang
IEEE Transactions on Information Forensics and Security 10 (9), 1905-1917, 2015
2762015
Recursive Histogram Modification: Establishing Equivalency between Reversible Data Hiding and Lossless Data Compression
W Zhang, X Hu, X Li, N Yu
IEEE Transactions on Image Processing 22 (7), 2775-2785, 2013
2722013
Efficient generalized integer transform for reversible watermarking
X Wang, X Li, B Yang, Z Guo
IEEE Signal Processing Letters 17 (6), 567-570, 2010
2342010
Reversible data hiding using invariant pixel-value-ordering and prediction-error expansion
B Ou, X Li, Y Zhao, R Ni
Signal Processing: Image Communication 29 (7), 760-772, 2014
2032014
Selection of Rich Model Steganalysis Features Based on Decision Rough Set -Positive Region Reduction
Y Ma, X Luo, X Li, Z Bao, Y Zhang
IEEE Transactions on Circuits and Systems for Video Technology 29 (2), 336-350, 2018
1882018
A generalization of LSB matching
X Li, B Yang, D Cheng, T Zeng
IEEE Signal Processing Letters 16 (2), 69-72, 2009
1802009
High-fidelity reversible data hiding based on pixel-value-ordering and pairwise prediction-error expansion
B Ou, X Li, J Wang
Journal of Visual Communication and Image Representation 39, 12-23, 2016
1242016
Reversible data hiding based on PDE predictor
B Ou, X Li, Y Zhao, R Ni
Journal of Systems and Software 86 (10), 2700-2709, 2013
1162013
Improving pairwise PEE via hybrid-dimensional histogram generation and adaptive mapping selection
B Ou, X Li, W Zhang, Y Zhao
IEEE Transactions on Circuits and Systems for Video Technology 29 (7), 2176-2190, 2018
1102018
The system can't perform the operation now. Try again later.
Articles 1–20