0%

Publication List

If you have any questions about our work and codes, please let me know: zxyin@cee.ecnu.edu.cn

2024

  • Xiaoyi Zhou, Kaiyue Hou, Yujian Zhuang, Zhaoxia Yin, Wenbao Han*. General Pairwise Modification Framework for Reversible Data Hiding in JPEG Images. IEEE Trans. Circuits Syst. Video Technol. TCSVT 34(1): 153-167 (2024). [DOI:10.1109/TCSVT.2023.3286393]

  • Zihan Yuan, Xinpeng Zhang*, Zichi Wang, Zhaoxia Yin*. Semi-fragile Neural Network Watermarking Based on Adversarial Examples. IEEE Transactions on Emerging Topics in Computational Intelligence, TETCI 2024. [DOI:10.1109/TETCI.2024.3372373]

  • Zihan Yuan, Xinpeng Zhang*, Zichi Wang, Zhaoxia Yin. Semi-fragile neural network watermarking for content authentication and tampering localization. Expert Systems with Applications, 236 (2024): 121315. [DOI:10.1016/j.eswa.2023.121315]

  • Lichun Tang, Zhaoxia Yin, Hang Su, Wanli Lyu, Bin Luo*. WFSS: Weighted fusion of spectral Transformer and spatial self-attention for robust hyperspectral image classification against adversarial attacks. Visual Intelligence, 2, no.1 (2024): 1-16. [DOI:10.1007/s44267-024-00038-x]

  • ZhenZhe Gao, Zhenjun Tang, Zhaoxia Yin*, Baoyuan Wu, Yue Lu. Fragile Model Watermark for Integrity Protection: leveraging boundary volatility and sensitive sample-pairing. IEEE International Conference on Multimedia and Expo, ICME 2024.

  • ZhenZhe Gao, Zhaoxia Yin, Hongjian Zhan, Heng Yin, Yue Lu*. Adaptive watermarking with self-mutual check parameters in deep neural networks. Pattern Recognition Letters, PRL 2024.

  • Heng Yin, Zhaoxia Yin*, Zhenzhe Gao, Hang Su, Xinpeng Zhang, Bin Luo. FTG: Score-based black-box watermarking by fragile trigger generation for deep model integrity verification. Journal of Information and Intelligence, 2, no.1 (2024): 28-41. [DOI:10.1016/j.jiixd.2023.10.006]

  • Li Chen, Shaowei Zhu, Abel Andrew, Zhaoxia Yin*. Reversible attack based on local visible adversarial perturbation. Multimedia Tools and Applications, 83, no.4 (2024): 11215-11227. [DOI:10.1007/s11042-023-15383-0]

2023

  • Tong Zhu, Zhaoxia Yin*, Wanli Lyu, Jiefei Zhang, Bin Luo. Imperceptible Adversarial Attack on S Channel of HSV Colorspace. International Joint Conference on Neural Networks, pp. 1-7. IEEE, 2023. [DOI:10.1109/IJCNN54540.2023.10191049][Codes]

  • Jiawei Chen, Xiao Yang, Heng Yin, Mingzhi Ma, Bihui Ma, Jianteng Peng, Yandong Guo, Zhaoxia Yin, Hang Su*. AdvFAS: a robust face anti-spoofing framework against adversarial examples. Computer Vision and Image Understanding, (2023): 103779. [DOI:10.1016/j.cviu.2023.103779]

  • Jiefei Zhang, Jie Wang, Wanli Lyu, Zhaoxia Yin*. Local Texture Complexity Guided Adversarial Attack. IEEE International Conference on lmage Processing, pp. 2065-2069. IEEE, 2023. [DOI:10.1109/ICIP49359.2023.10222176]

  • Mingzhi Ma, Weijie Zheng, Wanli Lv, Lu Ren, Hang Su, Zhaoxia Yin*. Multi-Label Adversarial Attack Based on Label Correlation. IEEE International Conference on lmage Processing, pp. 2050-2054. IEEE, 2023. [DOI:10.1109/ICIP49359.2023.10222512]

  • Xiaolong Duan, Bin li, Zhaoxia Yin*, Xinpeng Zhang and Bin Luo. Robust image steganography against lossy JPEG compression Based on embedding domain selection and adaptive error correction. Expert Systems With Applications, (2023): 120416. [DOI:10.1016/j.eswa.2023.120416][Codes]

  • Hanzhou Wu, Jie Zhang, Yue Li, Zhaoxia Yin, Xinpeng Zhang*, Hui Tian, Bin Li, Weiming Zhang and Nenghai Yu. Overview of artificial intelligence model watermarking. Journal of Image and Graphics, Number 2, 2023. (in Chinese). [DOI:10.11834/jig.230010]
    (吴汉舟,张杰,李越,殷赵霞,张新鹏*,田晖,李斌,张卫明,俞能海. 人工智能模型水印研究进展. 中国图象图形学报 , Number 2, 2023.

  • WanLi Lyu, YaJie Yue and Zhaoxia Yin*. Reversible Data Hiding Based on Automatic Contrast Enhancement Using Histogram Expansion. Journal of Visual Communication and Image Representation, 103798, 2023. [DOI:10.1016/j.jvcir.2023.103798][Codes]

  • Zhaoxia Yin, Li Chen, Wanli Lyu and Bin Luo*. Reversible Attack based on Adversarial Perturbation and Reversible Data Hiding in YUV Colorspace. Pattern Recognition Letters, 166, 1-7, 2023. [DOI:10.1016/j.patrec.2022.12.018][Codes]

  • Yun Tang, Lulu Cheng, Wanli Lyu and Zhaoxia Yin*. High Capacity Reversible Data Hiding for Encrypted 3D Mesh Models Based on Topology. Digital Forensics and Watermarking: 21st International Workshop, IWDW 2022, Guilin, China, November 18-19, 2022, Revised Selected Papers. Cham: Springer Nature Switzerland, 2023: 205-218. [DOI:10.48550/arXiv.2211.02801][Codes]

  • Wen Yin, Zhaoxia Yin*, Xinpeng Zhang and Bin Luo. On the Robustness of "Robust Reversible Data Hiding Scheme Based on Two-Layer Embedding Strategy". Digital Multimedia Communications. IFTC 2022. Communications in Computer and Information Science, vol 1766, pp 512–524, 2023. Springer, Singapore.[DOI:10.1007/978-981-99-0856-1_38][Codes]

  • Shaowei Zhu, Wanli Lyu, Bin Li, Zhaoxia Yin* and Bin Luo. Adversarial Example Defense via Perturbation Grading Strategy. Digital Multimedia Communications. IFTC 2022. Communications in Computer and Information Science, vol 1766, pp 407–420, 2023. Springer, Singapore.[DOI:10.1007/978-981-99-0856-1_30][Codes]

2022

  • Yang Du, Zhaoxia Yin*, and Xinpeng Zhang. High Capacity Lossless Data Hiding in JPEG Bitstream Based on General VLC Mapping. IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 2, pp. 1420-1433, 1 March-April 2022. [DOI:10.1109/TDSC.2020.3013326][Codes]

  • Zhaoxia Yin*, Yinyin Peng, and Youzhi Xiang. Reversible Data Hiding in Encrypted Images Based on Pixel Prediction and Bit-plane Compression. IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 2, pp. 992-1002, 1 March-April 2022. [DOI:10.1109/TDSC.2020.3019490][Codes]

  • Yang Du, and Zhaoxia Yin*. New framework for code-mapping-based reversible data hiding in JPEG images. Information Sciences, vol. 609, pp. 319-338, 2022. [DOI:10.1016/j.ins.2022.07.071][Codes]

  • Jie Wang, Zhaoxia Yin*, Jing Jiang and Yang Du. Attention-guided black-box adversarial attacks with large-scale multiobjective evolutionary optimization. International Journal of Intelligent Systems, Vol. 37, pp. 7526-7547, 2022. [DOI:10.1002/int.22892][Codes]

  • Wan-Li Lyu, Lulu Cheng, and Zhaoxia Yin*. High-capacity reversible data hiding in encrypted 3D mesh models based on multi-MSB prediction. Signal Processing, 2022: December, Volume 201, 108686. [DOI:10.1016/j.sigpro.2022.108686][Codes]

  • Na Xu, Jin Tang, Bin Luo, and Zhaoxia Yin*. Separable Reversible Data Hiding Based on Integer Mapping and MSB Prediction for Encrypted 3D Mesh Models. Cognitive Computation 14, 1172–1181, 2022. [DOI:10.1007/s12559-021-09919-5][Codes]

  • Jie Wang, Zhaoxia Yin*, JingJiang, JinTang and BinLuo. PISA: Pixel Skipping-based Attentional Black-box Adversarial Attack. Computers & Security, 2022: December, Volume 123, 102947. [DOI:10.1016/j.cose.2022.102947][Codes]

  • Zhaoxia Yin*, Heng Yin, and Xinpeng Zhang. Neural network fragile watermarking with no model performance degradation. IEEE ICIP, 16-19 October 2022. [DOI:10.1109/ICIP46576.2022.9897413][Codes]

  • Zhaoxia Yin, Hongnian Guo, Yang Du, Wenjing Ma, Wanli Lv, and Xinpeng Zhang*. Multi-Domain Reversible Data Hiding in JPEG lmages and Payload Distribution Algorithm. Journal of Computer Research and Development, 2022,59(08), (TP309.7)(in Chinese). [DOI:10.7544/issn1000-1239.20210411]
    (殷赵霞, 郭红念, 杜洋, 马文静, 吕皖丽, 张新鹏*. JPEG多域可逆信息隐藏及载荷分配算法[J/OL]. 计算机研究与发展, 2022,59(08)(TP309.7).)

  • Xiaomeng She, Yang Du, Wenjing Ma, and Zhaoxia Yin*. Reversible Data Hiding in Encrypted lmages Based on Pixel Prediction and Block Labeling. Journal of Computer Research and Development, 2022,59(09)(TP309.7).(in Chinese). [DOI:10.7544/issn1000-1239.20210495]
    (佘晓萌, 杜洋, 马文静, 殷赵霞*. 基于像素预测和块标记的图像密文可逆信息隐藏[J/OL]. 计算机研究与发展, 2022,59(09)(TP309.7).)

  • Wenjing Ma, Youqing Wu and Zhaoxia Yin*. High-capacity Reversible Data Hiding in Encrypted Images using Adaptive Encoding. Journal of Software, (in Chinese). [DOI:10.13328/j.cnki.jos.006350]
    (马文静, 吴友情, 殷赵霞*. 自适应编码的高容量密文可逆信息隐藏算法[J/OL]. 软件学报,) 2022, 33(12): 4746–4757.

  • Wu Youqing, Ma Wenjing, Yin Zhaoxia*, Peng Yinyin, Zhang Xinpeng. Reversible data hiding in encrypted images based on bit-plane com-pression of prediction error,[J] Journal on Communications, 2022,43(08):219-230. (in Chinese) [DOI:10.11959/j.issn.1000-436x.2022149]
    (吴友情,马文静,殷赵霞*,彭银银,张新鹏. 基于预测误差位平面压缩的密文可逆信息隐藏[J]. 通信学报 , 2022, 43(08):219-230.)

  • Bo Ou*, Zhaoxia Yin, and Shijun Xiang. Brief overview of plaintext image reversible data hiding[J]. Journal of Image and Graphics, 2022,27(01):111-124. (in Chinese). [DOI:10.11834/jig.210384]
    (欧博*, 殷赵霞, 项世军. 明文图像可逆信息隐藏综述[J]. 中国图象图形学报 , 2022, 27(01):111-124.

  • Youqing Wu, Ruiling Zhang, Jin Tang, and Zhaoxia Yin*. Reversible data hiding in encrypted images based on joint fixed-length coding and Huffman coding[J]. Journal of Image and Graphics, 2022, 27(01):277-288. ( in Chinese). [DOI:10.11834/jig.200363]
    (吴友情, 张睿灵, 汤进, 殷赵霞*. 定长编码和哈夫曼编码的密文域可逆信息隐藏[J]. 中国图象图形学报 , 2022, 27(01):277-288.)

2021

  • Zhaoxia Yin, Xiaomeng She, Jin Tang*, and Bin Luo. Reversible data hiding in encrypted images based on pixel prediction and multi-MSB planes rearrangement. Signal Processing. Volume 187, October 2021, 108146. [DOI:10.1016/j.sigpro.2021.108146][Codes]

  • Mengte Shi, Sheng Li, Zhaoxia Yin, Xinpeng Zhang*, Zhenxing Qian. On Generating JPEG Adversarial Images. In 2021 IEEE International Conference on Multimedia and Expo (ICME) (pp. 1-6). IEEE. [DOI:10.1109/ICME51207.2021.9428243]

  • Wanli Lv, Hongnian Guo, Yang Du, Jinmin Hu, and Zhaoxia Yin*. Multi-domain Reversible Data Hiding in JPEG Images. ACM TURC 2021: ACM Turing Award Celebration Conference - China. July 2021, Pages 241–247 . [DOI:10.1145/3472634.3474078][Codes]

  • Renjie Zhu, Ping Wei, Sheng Li, Zhaoxia Yin, Xinpeng Zhang* and Zhenxing Qian. Fragile Neural Network Watermarking with Trigger Image Set.[J]. International Conference on Knowledge Science, Engineering and Management. vol. 12815, pp. 280–293, 2021. Springer, Cham. [DOI:10.1007/978-3-030-82136-4_23]

  • Zhaoxia Yin* and Longfei Ke. Robust Adaptive Steganography Based on Dither Modulation and Modification With Re-Compression. IEEE Transactions on Signal and Information Processing over Networks, vol. 7, pp. 336-345, 2021. [DOI:10.1109/TSIPN.2021.3081373][Codes]

  • Zhaoxia Yin*, Hua Wang, Chen Li, Jie Wang, and Weiming Zhang. Reversible Adversarial Attack Based on Reversible Image Transformation. IJCAI 2021 Workshop on Safety & Secruity of Deep Learning (SSDL 2021). EI Accession number: 20221311867172. [PDF][Codes]

  • Longfei Ke, and Zhaoxia Yin*. On the security and robustness of "Keyless dynamic optimal multi-bit image steganography using energetic pixels". Multimedia Tools and Applications, 2021, 80: 3997–4005. [DOI:10.1007/s11042-020-09807-4][Codes]

  • Zhaoxia Yin*, Na Xu, Feng Wang, Lulu Cheng, and Bin Luo. Separable Reversible Data Hiding for Encrypted 3D Mesh Models based on Integer Mapping and Multi-MSB Prediction. PRCV2021, the 4th Chinese Conference on Pattern Recognition and Computer Vision, Oct. 29-Nov.1, 2021, (pp 336-348), Beijing, China. [DOI:10.1007/978-3-030-88007-1_28]

  • Youqing Wu, Yutang Guo, Jin Tang, Bin Luo, and Zhaoxia Yin*. Reversible Data Hiding in Encrypted Images Using Adaptive Huffman Encoding Strategy. Chinese Journal of Computers, 2021, 44(04):846-858( in Chinese).[DOI]
    (吴友情, 郭玉堂, 汤进, 罗斌, 殷赵霞*. 基于自适应哈夫曼编码的密文可逆信息隐藏算法. 计算机学报 , 2021, 44(04):846-858)

2020

  • Zhaoxia Yin, Yuan Ji, and Bin Luo*. Reversible Data Hiding in JPEG Images with Multi-objective Optimization. IEEE Transactions on Circuits and Systems for Video Technology, vol. 30, no. 8, pp. 2343-2352, 2020.  [DOI:10.1109/TCSVT.2020.2969463][Codes]

  • Zhaoxia Yin, Youzhi Xiang, and Xinpeng Zhang*. Reversible Data Hiding in Encrypted Images Based on multi-MSB Prediction and Huffman Coding. IEEE Transactions on Multimedia, vol. 22, no. 4, pp. 874-884, April 2020. [DOI:10.1109/TMM.2019.2936314][Codes]

  • Youqing Wu, Youzhi Xiang, Yutang Guo, Jin Tang, and Zhaoxia Yin*. An Improved Reversible Data Hiding in Encrypted Images using Parametric Binary Tree Labeling. IEEE Transactions on Multimedia, vol. 22, no. 8, pp. 1929-1938, Aug. 2020. [DOI:10.1109/TMM.2019.2952979][Code]

  • Zhaoxia Yin, Hua Wang, Jie Wang, Jin Tang, and Wenzhong Wang*. Defense against Adversarial Attacks by Low-level Image Transformations. International Journal of Intelligent Systems, vol. 35, no. 10, pp. 1453-1466, 2020. [DOI:10.1002/int.22258][Codes]

  • Tengfei Dong, Zhigao Hong, and Zhaoxia Yin*. High-Fidelity Reversible Data Hiding in JPEG Images Based on Two-Dimensional Histogram. International Conference on Security with Intelligent Computing and Big-data Services, Springer, Cham. 2020, 895: 116-128. [DOI:10.1007/978-3-030-16946-6_10]

2019

  • Yujie Jia, Zhaoxia Yin*, Xinpeng Zhang, and Yonglong Luo. Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting. Signal Processing, 2019, 163: 238-246. [DOI][Codes]

  • Yinyin Peng and Zhaoxia Yin*. A Strategy of Distinguishing Texture Feature for Reversible Data Hiding Based on Histogram Shifting. International Workshop on Digital Watermarking, Springer, Cham, 2019: 206-215. [DOI:10.1007/978-3-030-11389-6_16]

2018

  • Yi Puyang, Zhaoxia Yin*, and Zhenxing Qian. Reversible data hiding in encrypted images with two-msb prediction. 2018 IEEE International Workshop on Information Forensics and Security (WIFS), IEEE, 2018: 1-7. (WOS:000461290400027, EI: 20191106635522) [DOI:10.1109/WIFS.2018.8630785]
  • Yi Puyang, Zhenxing Qian, Zhaoxia Yin*, and Xinpeng Zhang. Style Transferring Based Data Hiding for Color Images. The 4th International Conference on Cloud Computing and Security (ICCCS 2018), 8-10, June 2018. (WOS: 000478560600038, EI: 20184005884261) [DOI:10.1007/978-3-030-00015-8_38]

  • Yi Puyang, Zhaoxia Yin*, and Xinpeng Zhang. Reversible Data Embedding and Scrambling Method Based on JPEG Images. The 4th International Conference on Cloud Computing and Security (ICCCS 2018), 8-10, June 2018. (WOS:000478560600032, EI: 20184005884255) [DOI:10.1007/978-3-030-00015-8_32]

  • Zhaoxia Yin*, Youzhi Xiang, Zhenxing Qian, and Xinpeng Zhang. Unified Data Hiding and Scrambling Method for JPEG Images. 19th Pacific-Rim Conference on Multimedia (PCM), 2018, 11166: 373-383. (WOS:000477701700034, EI: 20184105924418) [DOI:10.1007/978-3-030-00764-5_34]

  • Yang Du, Zhaoxia Yin*, and Xinpeng Zhang. Improved lossless data hiding for JPEG images based on histogram modification.Computers, Materials & Continua, 2018, 55(3): 495-507. (WOS: 000438476000009, EI: 20182705395606) [DOI:10.3970/cmc.2018.02440]

  • Zhigao Hong, Zhaoxia Yin*, and Bin Luo. Improved reversible data hiding in jpeg images based on interval correlation.International Conference on Brain Inspired Cognitive Systems, Springer, Cham, 2018: 687-696. (EI: 20184305979039) [DOI:10.1007/978-3-030-00563-4_67]

  • Lei Fu, Zhaoxia Yin*, Yi Liu, and Jun Zhang. Convolution Neural Network with Active Learning for Information Extraction of Enterprise Announcements. CCF International Conference on Natural Language Processing and Chinese Computing, Springer, Cham, 2018. (EI: 20183705797552) [DOI:10.1007/978-3-319-99501-4_29]

  • Yinyin Peng, Xuejing Niu, Lei Fu, and Zhaoxia Yin*. Image Authentication Scheme Based on Reversible Fragile Watermarking with Two Images. Journal of Information Security and Applications, 2018, 40:236-246. (WOS:000434992100021, EI: 20182205262108) [DOI:10.1016/j.jisa.2018.04.007]

  • Zhiheng Lv, Lei Liu, Si Chen, and Zhaoxia Yin*. Reversible data hiding scheme based on asymmetric histogram modification. Chinese Journal of Network and Information Security, 2018,4(05):69-75. [DOI]
    (吕志恒, 刘磊, 陈思, 殷赵霞*.基于非对称直方图修改的可逆信息隐藏方案[J].网络与信息安全学报,2018,4(05):69-75.)

  • Yu Dai, and Zhaoxia Yin*. Synchronized Data Embedding and Scrambling Scheme in JPEG Images. Journal of Applied Sciences, 2018(02):255-266. (in Chinese). [DOI]
    (戴禹, 殷赵霞*.JPEG图像同步嵌入与加扰方案[J].应用科学学报,2018(02):255-266.)

2017

  • Zhaoxia Yin*, Andrew Abel, Jin Tang, Xinpeng Zhang, and Bin Luo. Reversible data hiding in encrypted images based on multi-level encryption and block histogram modification. Multimedia Tools & Applications, 2017, 76(3):3899-3920. (WOS:000396051200035, EI: 20164302942074) [DOI:10.1007/s11042-016-4049-z]

  • Yang Du, Zhaoxia Yin*, and Xinpeng Zhang. An improved lossless data hiding scheme in JPEG bitstream by VLCmapping. International Conference on Mobile Ad-Hoc and Sensor Networks, Springer, Singapore, 2017. (EI: 20181605021046) [DOI:10.1007/978-981-10-8890-2_7]

  • Yi Puyang, ZhaoxiaYin*, Guorui Feng, and Andrew K Abel. An improved reversible information hiding scheme based on AMBTC compressed images.International Conference on Cloud Computing and Security (ICCCS 2017), Nanjing, 2017, 6.16-6.18. (WOS:000440848100005, EI: 20174604410166) [DOI:10.1007/978-3-319-68505-2_5

  • Shan Sun, Zhaoxia Yin*, Jin Tang, and Bin Luo. Improved Reversible Data Hiding Scheme Based on AMBTC CompressionTechnique. International Conference on Industrial IoT Technologies and Applications, Wuhu, 2017,3.25-3.26. (WOS:000433214900012, EI: 20173604119933) [DOI:10.1007/978-3-319-60753-5_12

  • Zhaoxia Yin*, Xuejing Niu, Xinpeng Zhang, Jin Tang, Bin Luo. Reversible data hiding in encrypted AMBTC images. MultimediaTools and Applications, 2017(12): 1-17. (WOS:000440050900027, EI:20173404058346) [DOI:10.1007/s11042-017-4957-6
  • Xinpeng Zhang, and Zhaoxia Yin*. Data hiding in multimedia. Chinese Journal of Nature, 2017, 39(2): 87-95. (in Chinese).[DOI:10.3969/j.issn.0253-9608.2017.02.002]
    (张新鹏, 殷赵霞. 多媒体信息隐藏技术[J]. 自然杂志, 2017, 39(2): 87-95.)

2016

  • Hao Zhang, Zhaoxia Yin*, Xinpeng Zhang, Jianpeng Chen, Ruonan Wang, and Bin Luo. Adaptive Algorithm Based on Reversible Data Hiding Method for JPEG Images. Cloud Computing, Security, Privacy in New Computing Environments, Springer, Cham, 2016: 196-203. (EI: 20174704440518) [DOI:10.1007/978-3-319-69605-8_18]

  • Xuejing Niu, Zhaoxia Yin*, Xinpeng Zhang, Jin Tang, and Bin Luo. Reversible data hiding in encrypted AMBTC compressed images. International Workshop on Digital Watermarking. Springer, Cham, 2016: 436-445. (EI: 20170803381632) [DOI:10.1007/978-3-319-53465-7_32]

  • Zhaoxia Yin, Wien Hong, Tang Jin, Bin Luo*. High capacity reversible steganography in encrypted images based on feature mining in plaintext domain. International Journal of Embedded Systems, 2016, 8(2/3): 249-257. (EI: 20162102424006) [DOI:10.1504/IJES.2016.076118]

  • Zhaoxia Yin, Andrew Abel, Xinpeng Zhang*, and Bin Luo. Reversible Data Hiding in Encrypted Images Based on Block Histogram Shifting. the 41st IEEE International Conference on acoustics, Speech and Signal Processing (ICASSP 2016), Shanghai, P.R. China, 2016.3.20-3.25. (WOS:000388373402054, EI: 20162402488956) [DOI:10.1109/ICASSP.2016.7472053]

  • Zhaoxia Yin, Andrew Abel, Jin Tang, Xinpeng Zhang*, and Bin Luo. Reversible Data Hiding in Encrypted Images Based on Multi-level Encryption and Block Histogram Modification. Multimedia Tools and Applications, Volume 76, Issuse 3, First Online:19 October 2016. (WOS:000396051200035EI:20164302942074) [DOI:10.1007/S11043-016-4049-z]
  • Zhaoxia Yin*, Xuejing Niu, Zhili Zhou, Jin Tang, and Bin Luo. Improved Reversible Image Authentication Scheme. Cognitive Computation. [DOI:10.1007/s12559-016-9408-6]

  • Jing Long*, Zhaoxia Yin, Jinpeng Lv, and Xinpeng Zhang. Rotation Based Reversible Data Hiding for JPEG Images. IETE Technical Review, 2016. [DOI:10.1080/02564602.2015.1132014]

2015

  • Zhaoxia Yin, Huabin Wang, Haifeng Zhao, Bin Luo* and XinpengZhang. Complete Separable Reversible Data Hiding in Encrypted Image. International Conference on Cloud Computing and Security, Nanjing, P.R. China, 2015.8.13-8.15 Volume 9483 of the series Lecture Notes in Computer Science, pp.101-110, Date: 05January 2016. (EI: 20160501857260) [DOI:10.1007/978-3-319-27051-7_9]

  • Zhaoxia Yin and Bin Luo*. MDE based Image Steganography with Large Embedding Capacity. Security and Communication Networks, 2015. (EI: 20152600979601) [DOI:10.1002/sec.1275]  

  • Xia Yan, Zhaoxia Yin*, and Liangmin Wang. Image data payload based on reference matrix. the 10th Chinese Conference IGTA 2015, Beijing, P.R.China, 2015.6. 19-6. 20. (WOS: 000368406500007, EI: 20154601543932) [DOI:10.1007/978-3-662-47791-5_7]  

  • Xuejing Niu, Meng Ma, Rui Tang, and Zhaoxia Yin*. Image Steganography via Fully Exploiting Modification Direction. International Journal of Security and Its Applications, 9(5), 243-254. (EI: 20152500946951) [DOI:10.14257/ijsia.2015.9.5.24]

  • Zeke Cao, Zhaoxia Yin*, Honghe Hu, Xiangping Gao, Liangmin Wang. High Capacity Data Hiding Scheme Based on (7, 4) Hamming Code. Springer Plus, 2015. [DOI:10.1186/s40064-016-1818-0]  

  • Xuejing Niu, Zhaoxia Yin*, and Meng Ma. Adaptive Reversible Steganography with High Capacity Using Double Stego Images. the 12th China Information Hiding Workshop, CIHW, 2015, (in Chinese).
    (牛雪静, 殷赵霞*, 马猛, 2015, 双伪装图像自适应高容量可逆隐写算法, 第十二届信息隐藏暨多媒体信息安全学术大会(CIHW2015).)

  • Zekun Cao, Zhaoxia Yin*, Honghe Hu and Lingmin Wang. A high capacity data hiding scheme based on (7,4) hamming code. the 12th China Information Hiding Workshop, CIHW, 2015, (in Chinese).
    (曹泽坤, 殷赵霞* , 胡洪河, 王良民, 2015, 基于(7, 4)汉明码的大容量信息隐藏算法, 第十二届信息隐藏暨多媒体信息安全学术大会(CIHW2015).)

2014

  • Zhaoxia Yin, Bin Luo*, and Wien Hong. Separable and Error-Free Reversible Data Hiding in Encrypted Image with High Payload. The Science World Journal, 2014. [DOI]