Follow
Xiaolong LI
Xiaolong LI
Institute of Information Science, Beijing Jiaotong University
Verified email at bjtu.edu.cn
Title
Cited by
Cited by
Year
Segmentation-based image copy-move forgery detection scheme
J Li, X Li, B Yang, X Sun
IEEE Transactions on Information Forensics and Security 10 (3), 507-518, 2015
9702015
Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection
X Li, B Yang, T Zeng
IEEE Transactions on Image Processing 20 (12), 3524-3533, 2011
7392011
A new cost function for spatial image steganography
B Li, M Wang, J Huang, X Li
2014 IEEE International Conference on Image Processing (ICIP), 4206-4210, 2014
6042014
Reversible Data Hiding: Advances in the Past Two Decades
YQ Shi, X Li, X Zhang, H Wu, B Ma
IEEE Access 4, 3210-3237, 2016
5392016
Pairwise prediction-error expansion for efficient reversible data hiding
B Ou, X Li, Y Zhao, R Ni, YQ Shi
IEEE Transactions on Image Processing 22 (12), 5010-5021, 2013
5212013
High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion
X Li, J Li, B Li, B Yang
Signal Processing 93 (1), 198-205, 2013
5122013
General framework to histogram-shifting-based reversible data hiding
X Li, B Li, B Yang, T Zeng
IEEE Transactions on Image Processing 22 (6), 2181-2191, 2013
4902013
Efficient reversible data hiding based on multiple histograms modification
X Li, W Zhang, X Gui, B Yang
IEEE Transactions on Information Forensics and Security 10 (9), 2016-2027, 2015
3752015
A novel reversible data hiding scheme based on two-dimensional difference-histogram modification
X Li, W Zhang, X Gui, B Yang
IEEE Transactions on Information Forensics and Security 8 (7), 1091-1100, 2013
3582013
Improved PVO-based reversible data hiding
F Peng, X Li, B Yang
Digital Signal Processing 25, 255–265, 2014
2892014
Adaptive reversible data hiding scheme based on integer transform
F Peng, X Li, B Yang
Signal Processing 92 (1), 54-62, 2012
2762012
A strategy of clustering modification directions in spatial image steganography
B Li, M Wang, X Li, S Tan, J Huang
IEEE Transactions on Information Forensics and Security 10 (9), 1905-1917, 2015
2662015
Recursive Histogram Modification: Establishing Equivalency between Reversible Data Hiding and Lossless Data Compression
W Zhang, X Hu, X Li, N Yu
IEEE Transactions on Image Processing 22 (7), 2775-2785, 2013
2602013
Efficient generalized integer transform for reversible watermarking
X Wang, X Li, B Yang, Z Guo
IEEE Signal Processing Letters 17 (6), 567-570, 2010
2312010
Reversible data hiding using invariant pixel-value-ordering and prediction-error expansion
B Ou, X Li, Y Zhao, R Ni
Signal Processing: Image Communication 29 (7), 760-772, 2014
1882014
Selection of Rich Model Steganalysis Features Based on Decision Rough Set -Positive Region Reduction
Y Ma, X Luo, X Li, Z Bao, Y Zhang
IEEE Transactions on Circuits and Systems for Video Technology 29 (2), 336-350, 2018
1822018
A generalization of LSB matching
X Li, B Yang, D Cheng, T Zeng
IEEE Signal Processing Letters 16 (2), 69-72, 2009
1742009
High-fidelity reversible data hiding based on pixel-value-ordering and pairwise prediction-error expansion
B Ou, X Li, J Wang
Journal of Visual Communication and Image Representation 39, 12-23, 2016
1162016
Reversible data hiding based on PDE predictor
B Ou, X Li, Y Zhao, R Ni
Journal of Systems and Software 86 (10), 2700-2709, 2013
1162013
Minimum rate prediction and optimized histograms modification for reversible data hiding
X Hu, W Zhang, X Li, N Yu
IEEE Transactions on Information Forensics and Security 10 (3), 653-664, 2015
1042015
The system can't perform the operation now. Try again later.
Articles 1–20