default search action
Zhaohong Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Laijin Meng, Xinghao Jiang, Zhenzhen Zhang, Zhaohong Li, Tanfeng Sun:
A robust coverless video steganography based on maximum DC coefficients against video attacks. Multim. Tools Appl. 83(5): 13427-13461 (2024) - 2023
- [j19]Minghui Li, Zhaohong Li, Zhenzhen Zhang:
A VVC Video Steganography Based on Coding Units in Chroma Components with a Deep Learning Network. Symmetry 15(1): 116 (2023) - [j18]Laijin Meng, Xinghao Jiang, Zhenzhen Zhang, Zhaohong Li, Tanfeng Sun:
A Robust Coverless Image Steganography Based on an End-to-End Hash Generation Model. IEEE Trans. Circuits Syst. Video Technol. 33(7): 3542-3558 (2023) - [j17]Yi Dong, Xinghao Jiang, Zhaohong Li, Tanfeng Sun, Peisong He:
Adaptive HEVC Steganography Based on Steganographic Compression Efficiency Degradation Model. IEEE Trans. Dependable Secur. Comput. 20(1): 769-783 (2023) - [j16]Yi Dong, Xinghao Jiang, Zhaohong Li, Tanfeng Sun, Zhenzhen Zhang:
Multi-Channel HEVC Steganography by Minimizing IPM Steganographic Distortions. IEEE Trans. Multim. 25: 2698-2709 (2023) - 2022
- [j15]Jindou Liu, Zhaohong Li, Xinghao Jiang, Zhenzhen Zhang:
A High-Performance CNN-Applied HEVC Steganography Based on Diamond-Coded PU Partition Modes. IEEE Trans. Multim. 24: 2084-2097 (2022) - 2021
- [j14]Zhenzhen Zhang, Zhaohong Li, Jindou Liu, Huanma Yan, Lifang Yu:
Steganography algorithm based on modified EMD-coded PU partition modes for HEVC videos. EURASIP J. Image Video Process. 2021(1): 7 (2021) - [j13]Huaping Xu, Zhaohong Li, Shuo Li, Wei Liu, Jingwen Li, Aifang Liu, Wei Li:
A Nonlocal Noise Reduction Method Based on Fringe Frequency Compensation for SAR Interferogram. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 14: 9756-9767 (2021) - [c10]Aijun Zhou, Xinghao Jiang, Tanfeng Sun, Zhaohong Li, Yi Dong:
A HEVC Steganography Algorithm Based on DCT/DST Coefficients with BLB Distortion Model. CISP-BMEI 2021: 1-9 - [c9]Zhenzhen Zhang, Henan Shi, Xinghao Jiang, Zhaohong Li, Jindou Liu:
A CNN-Based HEVC Video Steganalysis Against DCT/DST-Based Steganography. ICDF2C 2021: 265-276 - [c8]Henan Shi, Tanfeng Sun, Zhaohong Li:
A HEVC Steganalysis Algorithm Based on Relationship of Adjacent Intra Prediction Modes. IWDW 2021: 227-242 - [c7]Aijun Zhou, Xinghao Jiang, Zhaohong Li, Zhenzhen Zhang:
A HEVC Video Steganography Algorithm Based on DCT/DST Coefficients with Improved VRCNN. TrustCom 2021: 967-975 - 2020
- [i1]Laijin Meng, Xinghao Jiang, Zhenzhen Zhang, Zhaohong Li, Tanfeng Sun:
Coverless Video Steganography based on Maximum DC Coefficients. CoRR abs/2012.06809 (2020)
2010 – 2019
- 2019
- [j12]Lifang Yu, Yiyuan Yang, Zhaohong Li, Zhenzhen Zhang, Gang Cao:
HEVC double compression detection under different bitrates based on TU partition type. EURASIP J. Image Video Process. 2019: 67 (2019) - [j11]Yiyuan Yang, Zhaohong Li, Wenchao Xie, Zhenzhen Zhang:
High capacity and multilevel information hiding algorithm based on pu partition modes for HEVC videos. Multim. Tools Appl. 78(7): 8423-8446 (2019) - [j10]Huaping Xu, Yao Luo, Bo Yang, Zhaohong Li, Wei Liu:
Tropospheric Delay Correction Based on a Three-Dimensional Joint Model for InSAR. Remote. Sens. 11(21): 2542 (2019) - [j9]Xiaoyun Liang, Zhaohong Li, Zhonghao Li, Zhenzhen Zhang:
Fake Bitrate Detection of HEVC Videos Based on Prediction Process. Symmetry 11(7): 918 (2019) - [j8]Zhonghao Li, Laijin Meng, Xinghao Jiang, Zhaohong Li:
High Capacity HEVC Video Hiding Algorithm Based on EMD Coded PU Partition Modes. Symmetry 11(8): 1015 (2019) - [j7]Zhenzhen Zhang, Changbo Liu, Zhaohong Li, Lifang Yu, Huanma Yan:
Detection of Transcoding from H.264/AVC to HEVC Based on CU and PU Partition Types. Symmetry 11(11): 1343 (2019) - [c6]Jiawei Zhang, Huaping Xu, Zhaohong Li, Jingwen Li:
Information Acquisition Ability of LFMW for SAR. IGARSS 2019: 2623-2626 - 2018
- [j6]Xiaoyun Liang, Zhaohong Li, Yiyuan Yang, Zhenzhen Zhang, Yu Zhang:
Detection of Double Compression for HEVC Videos With Fake Bitrate. IEEE Access 6: 53243-53253 (2018) - [j5]Zhaohong Li, Hongchan Zheng, Huifen Lian, Mingya Jin:
可再生混合高阶指数多项式的插值细分法 (Interpolatory Subdivision Schemes for Mixed Higher-order Exponential Polynomials Reproduction). 计算机科学 45(3): 51-57 (2018) - [c5]Wen-chao Xie, Yi-yuan Yang, Zhaohong Li, Jin-wei Wang, Min Zhang:
An Information Hiding Algorithm for HEVC Videos Based on PU Partitioning Modes. ICCCS (4) 2018: 252-264 - 2017
- [j4]Shuang Bai, Zhaohong Li, Jianjun Hou:
Learning two-pathway convolutional neural networks for categorizing scene images. Multim. Tools Appl. 76(15): 16145-16162 (2017) - [c4]Yanjia Zhao, Tianming Pang, Xiaoyun Liang, Zhaohong Li:
Frame-Deletion Detection for Static-Background Video Based on Multi-scale Mutual Information. ICCCS (2) 2017: 371-384 - 2016
- [j3]Zhaohong Li, Zhenzhen Zhang, Sheng Guo, Jinwei Wang:
Video inter-frame forgery identification based on the consistency of quotient of MSSIM. Secur. Commun. Networks 9(17): 4548-4556 (2016) - 2015
- [j2]Zhenzhen Zhang, Jianjun Hou, Qinglong Ma, Zhaohong Li:
Efficient video frame insertion and deletion detection based on inconsistency of correlations between local binary pattern coded frames. Secur. Commun. Networks 8(2): 311-320 (2015) - [c3]Zhenzhen Zhang, Jianjun Hou, Zhaohong Li, Dongdong Li:
Inter-frame Forgery Detection for Static-Background Video Based on MVP Consistency. IWDW 2015: 94-106 - 2014
- [j1]Zhaohong Li, Zhenzhen Zhang, Yunqing Shi:
Distinguishing computer graphics from photographic images using a multiresolution approach based on local binary patterns. Secur. Commun. Networks 7(11): 2153-2159 (2014) - 2012
- [c2]Zhaohong Li, Jingyu Ye, Yun-Qing Shi:
Distinguishing Computer Graphics from Photographic Images Using Local Binary Patterns. IWDW 2012: 228-241
2000 – 2009
- 2009
- [c1]Shewen Sun, Zhaohong Li:
Distributed Block-Dependent Watermarking Method for JPEG2000 Image Authentication. DBTA 2009: 119-122
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-12 22:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint