• Publications
  • Influence
Reversible data hiding in encrypted images using cross division and additive homomorphism
We solve all of the problems in the existing reversible data hiding (RDH) algorithms in encrypted images using additive homomorphism. Expand
  • 70
  • 7
Histogram shifting in encrypted images with public key cryptosystem for reversible data hiding
  • Ming Li, Yang Li
  • Mathematics, Computer Science
  • Signal Process.
  • 2017
The data embedding rate is up to 1 or even 1016bpp regardless of the different pixel distributions of natural images.No data expansion occurred during the process of RDH. Expand
  • 49
  • 4
A Two-Phase Meta-Heuristic for Multiobjective Flexible Job Shop Scheduling Problem With Total Energy Consumption Threshold
Flexible job shop scheduling problem (FJSP) has been extensively considered; however, multiobjective FJSP with energy consumption threshold is seldom investigated, the goal of which is to minimize makespan and total tardiness under the constraint that total energy consumption does not exceed a given threshold. Expand
  • 46
  • 1
Incremental Nonnegative Matrix Factorization for Face Recognition
Nonnegative matrix factorization (NMF) is a promising approach for local feature extraction in face recognition tasks. However, there are two major drawbacks in almost all existing NMF-based methods.Expand
  • 33
  • 1
  • PDF
Cryptanalyzing a novel image cipher based on mixed transformed logistic maps
This paper evaluates the security of an image cipher based on mixed transformed logistic maps based on chaos. Expand
  • 23
  • 1
Cryptanalysis of a chaotic image encryption scheme based on permutation-diffusion structure
In this study, the security problems of PDS are investigated. Expand
  • 40
Meaningful Image Encryption Based on Reversible Data Hiding in Compressive Sensing Domain
A novel method of meaningful image encryption is proposed in this paper. Expand
  • 9
  • PDF
Attack and improvement of the joint fingerprinting and decryption method for vector quantization images
The first joint fingerprinting and decryption (JFD) scheme proposed by Lin et al in 2012 aims to protect the distribution of vector quantization (VQ) images. Expand
  • 14
Commutative fragile zero-watermarking and encryption for image integrity protection
We propose a novel commutative zero-watermarking and encryption scheme, in which the commutativity is equipped in both the phases of watermarking, image encryption and image decryption. Expand
  • 3