edu-yinzhaoxia's repositories
Reversible-Data-Hiding-in-Encrypted-Images-Based-on-multi-MSB-Prediction-and-Huffman-Coding
This code is the implementation of the paper "Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding".
An-Improved-Reversible-Data-Hiding-in-Encrypted-Images-using-Parametric-Binary-Tree-Labeling
This code is the implementation of the paper "An Improved Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling".
Reversible-Data-Hiding-in-Encrypted-Images-Based-on-Pixel-Prediction-and-Bit-plane-Compression
This code is the implementation of the paper "Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding".
Reversible-Data-Hiding-in-JPEG-Images-with-Multi-objective-Optimization
This code is the implementation of the paper "Reversible Data Hiding in JPEG Images with Multi Objective Optimization".
RDH-EI-based-on-pixel-prediction-and-multi-MSB-planes-rearrangement
This code is the implementation of the paper "Reversible data hiding in encrypted images based on pixel prediction and multi-MSB planes rearrangement".
High-Capacity-Reversible-Data-Hiding-in-Encrypted-Images-using-Adaptive-Encoding
This code is the implementation of the paper "High-Capacity-Reversible-Data-Hiding-in-Encrypted-Images-using-Adaptive-Encoding".
Reversible-data-hiding-based-on-reducing-invalid-shifting-of-pixels-in-histogram-shifting
This code is the implementation of the paper "Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting". (DOI: 10.1016/j.sigpro.2019.05.020)
Defense-against-Adversarial-Attacks-by-Low-level-Image-Transformations
This code is the implementation of the adversarial defense method introduced in the paper "Defense against Adversarial Attacks by Low-level Image Transformations".
High-Capacity-Lossless-Data-Hiding-in-JPEG-Bitstream-Based-on-General-VLC-Mapping
This code is the implementation of the paper "High Capacity Lossless Data Hiding in JPEG Bitstream Based on General VLC Mapping".
Neural_network_fragile_watermarking_with_no_model_performance_degradation
DNN-fragile-watermarking-master
Robust-Adaptive-Steganography-Based-on-Dither-Modulation-and-Modification-With-Re-Compression
Robust Adaptive Steganography Based on Dither Modulation and Modification With Re-Compression
On-the-security-and-robustness-of-Keyless-dynamic-optimal-multi-bit-image-steganography-using-energ
On the security and robustness of "Keyless dynamic optimal multi-bit image steganography using energetic pixels"
UAP-related-experimental-code
UAP related experimental code