default search action
Chunfang Yang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j58]Wangxin Feng, Xiangyang Luo, Tengyao Li, Chunfang Yang:
HSTW: A robust network flow watermarking method based on hybrid packet sequence-timing. Comput. Secur. 139: 103701 (2024) - [j57]Huiqing You, Lingyun Xiang, Chunfang Yang, Xiaobo Shen:
Linguistic steganalysis via multi-task with crossing generative-natural domain. Neurocomputing 603: 128260 (2024) - [j56]Jiangshan Li, Chunfang Yang, Baojun Qi, Ma Zhu, Nan Wu:
4SCIG: A Four-Branch Framework to Reduce the Interference of Sky Area in Cross-View Image Geo-Localization. IEEE Trans. Geosci. Remote. Sens. 62: 1-18 (2024) - 2023
- [j55]Rong Wang, Lingyun Xiang, Yangfan Liu, Chunfang Yang:
PNG-Stega: Progressive Non-Autoregressive Generative Linguistic Steganography. IEEE Signal Process. Lett. 30: 528-532 (2023) - [c18]Donger Mo, Peijia Zheng, Yufei Zhou, Jingyi Chen, Shan Huang, Weiqi Luo, Wei Lu, Chunfang Yang:
Privacy-Preserving Image Scaling Using Bicubic Interpolation and Homomorphic Encryption. IWDW 2023: 63-78 - [c17]Jingyu Liu, Chunfang Yang, Ma Zhu, Baojun Qi, Xueyuan Fu, Mengyang Zhou:
MTD-RTPE: A Malicious Traffic Detection Method Based on Relative Time-Delay Positional Encoding. TrustCom 2023: 694-703 - 2022
- [j54]Tengyao Li, Kaiyue Liu, Wangxin Feng, Chunfang Yang, Xiangyang Luo:
HeteroTiC: A robust network flow watermarking based on heterogeneous time channels. Comput. Networks 219: 109424 (2022) - [j53]Jialin Li, Xiangyang Luo, Yi Zhang, Pei Zhang, Chunfang Yang, Fenlin Liu:
Extracting embedded messages using adaptive steganography based on optimal syndrome-trellis decoding paths. Digit. Commun. Networks 8(4): 455-465 (2022) - [j52]Xiaofeng Song, Chunfang Yang, Kun Han, Shichang Ding:
Robust JPEG steganography based on DCT and SVD in nonsubsampled shearlet transform domain. Multim. Tools Appl. 81(25): 36453-36472 (2022) - [j51]Liyan Zhu, Xiangyang Luo, Yi Zhang, Chunfang Yang, Fenlin Liu:
Inverse Interpolation and Its Application in Robust Image Steganography. IEEE Trans. Circuits Syst. Video Technol. 32(6): 4052-4064 (2022) - [c16]Wei Xu, Yan Gao, Chunfang Yang, Huaping Chen:
An Improved Purdue Enterprise Reference Architecture to Enhance Cybersecurity. ICBTA 2022: 104-109 - 2021
- [j50]Jie Wang, Chunfang Yang, Ma Zhu, Xiaofeng Song, Yuan Liu, Yuemeng Lian:
JPEG image steganography payload location based on optimal estimation of cover co-frequency sub-image. EURASIP J. Image Video Process. 2021(1): 1 (2021) - [j49]Shunhao Jin, Fenlin Liu, Chunfang Yang, Yuanyuan Ma, Yuan Liu:
Feature Selection of the Rich Model Based on the Correlation of Feature Components. Secur. Commun. Networks 2021: 6680528:1-6680528:12 (2021) - [j48]Liyan Zhu, Jinwei Wang, Xiangyang Luo, Yi Zhang, Chunfang Yang, Fenlin Liu:
PRUDA: A Novel Measurement Attribute Set towards Robust Steganography in Social Networks. Secur. Commun. Networks 2021: 9864833:1-9864833:15 (2021) - [j47]Liyan Zhu, Xiangyang Luo, Chunfang Yang, Yi Zhang, Fenlin Liu:
Invariances of JPEG-quantized DCT coefficients and their application in robust image steganography. Signal Process. 183: 108015 (2021) - [j46]Hongqiang Cao, Gaochao Yu, Chunfang Yang, Jun Zhao:
Research on a Control Strategy of the Symmetrical Four-Roller Bending Process Based on Experiment and Numerical Simulation. Symmetry 13(6): 940 (2021) - [c15]Jingbo Mao, Ma Zhu, Chunfang Yang, Huayuan Lu:
Video steganography algorithm based on the relative relationship between DWT coefficients. ACM TUR-C 2021: 233-240 - 2020
- [j45]Jiu-fen Liu, Chunfang Yang, Junchao Wang, Yanan Shi:
Stego key recovery method for F5 steganography with matrix encoding. EURASIP J. Image Video Process. 2020(1): 40 (2020) - [j44]Jie Wang, Chunfang Yang, Ping Wang, Xiaofeng Song, Jicang Lu:
Payload location for JPEG image steganography based on co-frequency sub-image filtering. Int. J. Distributed Sens. Networks 16(1) (2020) - [j43]Chunfang Yang, Yuhan Kang, Fenlin Liu, Xiaofeng Song, Jie Wang, Xiangyang Luo:
Color image steganalysis based on embedding change probabilities in differential channels. Int. J. Distributed Sens. Networks 16(5) (2020) - [j42]Baojun Qi, Chunfang Yang, Lei Tan, Xiangyang Luo, Fenlin Liu:
A novel haze image steganography method via cover-source switching. J. Vis. Commun. Image Represent. 70: 102814 (2020) - [j41]Lei Tan, Chunfang Yang, Fenlin Liu, Xiangyang Luo, Baojun Qi, Zhenyu Li:
Steganalysis of homogeneous-representation based steganography for high dynamic range images. Multim. Tools Appl. 79(27-28): 20079-20105 (2020) - [j40]Ping Wang, Fenlin Liu, Chunfang Yang:
Towards feature representation for steganalysis of spatial steganography. Signal Process. 169: 107422 (2020) - [j39]Ping Wang, Fenlin Liu, Chunfang Yang:
Thresholding binary coding for image forensics of weak sharpening. Signal Process. Image Commun. 88: 115956 (2020) - [c14]Xianfeng Zhao, Chunfang Yang, Fenlin Liu:
On the Sharing-Based Model of Steganography. IWDW 2020: 94-105 - [c13]Jialin Li, Xiangyang Luo, Yi Zhang, Pei Zhang, Chunfang Yang, Fenlin Liu:
Steganalysis of Adaptive Steganography Under the Known Cover Image. SPDE 2020: 560-574
2010 – 2019
- 2019
- [j38]Jicang Lu, Gang Zhou, Chunfang Yang, Zhenyu Li, Mingjing Lan:
Steganalysis of Content-Adaptive Steganography Based on Massive Datasets Pre-Classification and Feature Selection. IEEE Access 7: 21702-21711 (2019) - [j37]Yuhan Kang, Fenlin Liu, Chunfang Yang, Lingyun Xiang, Xiangyang Luo, Ping Wang:
Color image steganalysis based on channel gradient correlation. Int. J. Distributed Sens. Networks 15(5) (2019) - [j36]Ping Wang, Fenlin Liu, Chunfang Yang, Xiangyang Luo:
Steganalysis aided by fragile detection of image manipulations. Multim. Tools Appl. 78(16): 23309-23328 (2019) - [c12]Fei Xiang, Daofu Gong, Chunfang Yang, Fenlin Liu:
Enhanced branch obfuscation based on exception handling and encrypted mapping table. ACM TUR-C 2019: 140:1-140:9 - [c11]Lin Chen, Chunfang Yang, Fenlin Liu, Daofu Gong, Shichang Ding:
A Security-Sensitive Function Mining Framework for Source Code. ICAIS (4) 2019: 421-432 - 2018
- [j35]Lingyun Xiang, Jingmin Yu, Chunfang Yang, Daojian Zeng, Xiaobo Shen:
A Word-Embedding-Based Steganalysis Method for Linguistic Steganography via Synonym Substitution. IEEE Access 6: 64131-64141 (2018) - [j34]Chunfang Yang, Xiangyang Luo, Jicang Lu, Fenlin Liu:
Extracting hidden messages of MLSB steganography based on optimal stego subset. Sci. China Inf. Sci. 61(11): 119103:1-119103:3 (2018) - [j33]Jicang Lu, Chunfang Yang, Fenlin Liu, Xiangyang Luo:
Quantitative steganalysis of JPEG additive steganography based on boundary effect. J. Electronic Imaging 27(2): 023004 (2018) - [j32]Xiaoyan Xu, Xiaofeng Song, Chunfang Yang, Weiwei Zhao, Rongcai Zhao:
Steganalysis of content-adaptive JPEG steganography based on scale co-occurrence matrix with diverse quantization. J. Electronic Imaging 27(06): 063004 (2018) - [j31]Ping Wang, Fenlin Liu, Chunfang Yang, Xiangyang Luo:
Blind forensics of image gamma transformation and its application in splicing detection. J. Vis. Commun. Image Represent. 55: 80-90 (2018) - [j30]Yi Zhang, Xiaodong Zhu, Chuan Qin, Chunfang Yang, Xiangyang Luo:
Dither modulation based adaptive steganography resisting jpeg compression and statistic detection. Multim. Tools Appl. 77(14): 17913-17935 (2018) - [j29]Junjun Gan, Jiu-fen Liu, Xiangyang Luo, Chunfang Yang, Fenlin Liu:
Reliable steganalysis of HUGO steganography based on partially known plaintext. Multim. Tools Appl. 77(14): 18007-18027 (2018) - [j28]Lingyun Xiang, Wenshuai Wu, Xu Li, Chunfang Yang:
A linguistic steganography based on word indexing compression and candidate selection. Multim. Tools Appl. 77(21): 28969-28989 (2018) - [j27]Ping Wang, Fenlin Liu, Chunfang Yang, Xiangyang Luo:
Parameter estimation of image gamma transformation based on zero-value histogram bin locations. Signal Process. Image Commun. 64: 33-45 (2018) - [c10]Yiqin Zhang, Fenlin Liu, Hongyan Jia, Jicang Lu, Chunfang Yang:
Optimization of rich model based on fisher criterion for image steganalysis. ICACI 2018: 187-192 - 2017
- [j26]Lingyun Xiang, Xinhui Wang, Chunfang Yang, Peng Liu:
A Novel Linguistic Steganography Based on Synonym Run-Length Encoding. IEICE Trans. Inf. Syst. 100-D(2): 313-322 (2017) - [j25]Xiaofeng Song, Fenlin Liu, Liju Chen, Chunfang Yang, Xiangyang Luo:
Optimal Gabor Filters for Steganalysis of Content-Adaptive JPEG Steganography. KSII Trans. Internet Inf. Syst. 11(1): 552-569 (2017) - [j24]Yi Zhang, Fenlin Liu, Chunfang Yang, Xiangyang Luo, Xiaofeng Song, Jicang Lu:
Steganalysis of content-adaptive JPEG steganography based on Gauss partial derivative filter bank. J. Electronic Imaging 26(1): 13011 (2017) - [j23]Yi Zhang, Xiangyang Luo, Chunfang Yang, Fenlin Liu:
Joint JPEG compression and detection resistant performance enhancement for adaptive steganography using feature regions selection. Multim. Tools Appl. 76(3): 3649-3668 (2017) - [j22]Zhenkun Bao, Xiangyang Luo, Weiming Zhang, Chunfang Yang, Fenlin Liu:
Improving side-informed JPEG steganography using two-dimensional decomposition embedding method. Multim. Tools Appl. 76(12): 14345-14374 (2017) - [j21]Xiaofeng Song, Fenlin Liu, Zhengui Zhang, Chunfang Yang, Xiangyang Luo, Liju Chen:
2D Gabor filters-based steganalysis of content-adaptive JPEG steganography. Multim. Tools Appl. 76(24): 26391-26419 (2017) - [c9]Chunfang Yang, Yi Zhang, Ping Wang, Xiangyang Luo, Fenlin Liu, Jicang Lu:
Steganalysis Feature Subspace Selection Based on Fisher Criterion. DSAA 2017: 514-521 - 2016
- [j20]Ping Wang, Xiangyang Luo, Chunfang Yang, Fenlin Liu:
Improving Scanned Binary Image Watermarking Based On Additive Model and Sampling. Int. J. Digit. Crime Forensics 8(2): 36-47 (2016) - [j19]Xiangyang Luo, Xiaofeng Song, Xiaolong Li, Weiming Zhang, Jicang Lu, Chunfang Yang, Fenlin Liu:
Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes. Multim. Tools Appl. 75(21): 13557-13583 (2016) - [j18]Yi Zhang, Xiangyang Luo, Chunfang Yang, Dengpan Ye, Fenlin Liu:
A framework of adaptive steganography resisting JPEG compression and detection. Secur. Commun. Networks 9(15): 2957-2971 (2016) - 2015
- [j17]Jiu-fen Liu, Yu-guo Tian, Tao Han, Chunfang Yang, Wen-bin Liu:
LSB steganographic payload location for JPEG-decompressed images. Digit. Signal Process. 38: 66-76 (2015) - [j16]Xiaofeng Song, Fenlin Liu, Chunfang Yang, Xiangyang Luo, Zhenyu Li:
Steganalysis of Adaptive JPEG Steganography by Selecting DCT Coefficients According to Embedding Distortion. KSII Trans. Internet Inf. Syst. 9(12): 5209-5228 (2015) - [j15]Yi Zhang, Fenlin Liu, Chunfang Yang, Xiangyang Luo, Xiaofeng Song:
Detection of perturbed quantization class stego images based on possible change modes. J. Electronic Imaging 24(6): 063005 (2015) - [c8]Yi Zhang, Xiangyang Luo, Chunfang Yang, Dengpan Ye, Fenlin Liu:
A JPEG-Compression Resistant Adaptive Steganography Based on Relative Relationship between DCT Coefficients. ARES 2015: 461-466 - [c7]Xiaofeng Song, Fenlin Liu, Chunfang Yang, Xiangyang Luo, Yi Zhang:
Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters. IH&MMSec 2015: 15-23 - 2013
- [j14]Chunfang Yang, Fenlin Liu, Xiangyang Luo, Ying Zeng:
Fusion of Two Typical Quantitative Steganalysis Based on SVR. J. Softw. 8(3): 731-736 (2013) - [j13]Chunfang Yang, Fenlin Liu, Xiangyang Luo, Ying Zeng:
Pixel Group Trace Model-Based Quantitative Steganalysis for Multiple Least-Significant Bits Steganography. IEEE Trans. Inf. Forensics Secur. 8(1): 216-228 (2013) - 2012
- [j12]Xiangyang Luo, Fenlin Liu, Chunfang Yang, Shiguo Lian, Daoshun Wang:
On F5 Steganography in Images. Comput. J. 55(4): 447-456 (2012) - [j11]Chunfang Yang, Fenlin Liu, Shiguo Lian, Xiangyang Luo, Daoshun Wang:
Weighted Stego-Image Steganalysis of Messages Hidden into Each Bit Plane. Comput. J. 55(6): 717-727 (2012) - [j10]Jicang Lu, Fenlin Liu, Xiangyang Luo, Chunfang Yang:
Parameter-estimation and algorithm-selection based United-Judgment for image steganalysis. Multim. Tools Appl. 57(1): 91-107 (2012) - [j9]Xiangyang Luo, Fenlin Liu, Chunfang Yang, Shiguo Lian, Ying Zeng:
Steganalysis of adaptive image steganography in multiple gray code bit-planes. Multim. Tools Appl. 57(3): 651-667 (2012) - 2011
- [j8]Dongning Zheng, Fenlin Liu, Chunfang Yang, Qian Zhang, Xiangyang Luo:
Identification of steganography software based on register dependence. Int. J. Multim. Intell. Secur. 2(3/4): 339-350 (2011) - [j7]Ying Zeng, Fenlin Liu, Xiangyang Luo, Chunfang Yang:
Software Watermarking Through Obfuscated Interpretation: Implementation and Analysis. J. Multim. 6(4): 329-340 (2011) - [j6]Xiangyang Luo, Fenlin Liu, Shiguo Lian, Chunfang Yang, Stefanos Gritzalis:
On the Typical Statistic Features for Image Blind Steganalysis. IEEE J. Sel. Areas Commun. 29(7): 1404-1422 (2011) - [c6]Chunfang Yang, Tao Zhao, Hanning Li, Fenlin Liu:
Embedding Ratio Estimation based on Weighted Stego Image for Embedding in 2LSB. SECRYPT 2011: 97-104 - 2010
- [j5]Xiangyang Luo, Fenlin Liu, Chunfang Yang, Daoshun Wang:
Image universal steganalysis based on best wavelet packet decomposition. Sci. China Inf. Sci. 53(3): 634-647 (2010) - [j4]Xiangyang Luo, Fenlin Liu, Chunfang Yang, Shiguo Lian:
Modification ratio estimation for a category of adaptive steganography. Sci. China Inf. Sci. 53(12): 2472-2484 (2010)
2000 – 2009
- 2009
- [c5]Chunfang Yang, Xiangyang Luo, Fenlin Liu:
Embedding Ratio Estimating for Each Bit Plane of Image. Information Hiding 2009: 59-72 - [c4]Mao Ye, Fenlin Liu, Chunfang Yang, Xiongfei He:
Steganalysis Based on Weighted Stego-Image for 2LSB Replacement Steganography. IIH-MSP 2009: 945-948 - [c3]Xiongfei He, Fenlin Liu, Xiangyang Luo, Chunfang Yang:
Classification between PS and Stego Images Based on Noise Model. MUE 2009: 31-36 - 2008
- [j3]Bin Liu, Fenlin Liu, Chunfang Yang:
Stepwise inter-frame correlation-based steganalysis system for video streams. Secur. Commun. Networks 1(6): 487-494 (2008) - [j2]Chunfang Yang, Fenlin Liu, Xiangyang Luo, Bin Liu:
Steganalysis Frameworks of Embedding in Multiple Least-Significant Bits. IEEE Trans. Inf. Forensics Secur. 3(4): 662-672 (2008) - [c2]Bin Liu, Fenlin Liu, Chunfang Yang, Yifeng Sun:
Secure Steganography in Compressed Video Bitstreams. ARES 2008: 1382-1387 - 2007
- [j1]Xiangyang Luo, Chunfang Yang, Daoshun Wang, Fenlin Liu:
LTSB Steganalysis Based on Quartic Equation. Trans. Data Hiding Multim. Secur. 2: 68-90 (2007) - 2006
- [c1]Xiangyang Luo, Chunfang Yang, Fenlin Liu:
Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods. Communications and Multimedia Security 2006: 161-172
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 19:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint