What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Hong Zhang
Google Scholar
ORCID:
0000-0003-3480-0244
10
publications in security and cryptology related venues
Year
Venue
Title
2022
journals/tifs
Adaptive QIM With Minimum Embedding Cost for Robust Video Steganography on Social Networks.
Pingan Fan
Hong Zhang
Xianfeng Zhao
2021
journals/tifs
Steganalysis of H.264/AVC Videos Exploiting Subtractive Prediction Error Blocks.
Yun Cao
Hong Zhang
Xianfeng Zhao
Xiaolei He
2021
journals/tifs
A Siamese CNN for Image Steganalysis.
Weike You
Hong Zhang
Xianfeng Zhao
2020
conf/ih
A Robust Video Steganographic Method against Social Networking Transcoding Based on Steganographic Side Channel.
Pingan Fan
Hong Zhang
Yifan Cai
Pei Xie
Xianfeng Zhao
2019
journals/tifs
Improving the Robustness of Adaptive Steganographic Algorithms Based on Transport Channel Matching.
Zengzhen Zhao
Qingxiao Guan
Hong Zhang
Xianfeng Zhao
2019
conf/ih
Adaptive VP8 Steganography Based on Deblocking Filtering.
Pei Xie
Hong Zhang
Weike You
Xianfeng Zhao
Jianchang Yu
Yi Ma
2017
journals/tifs
A Steganalytic Approach to Detect Motion Vector Modification Using Near-Perfect Estimation for Local Optimality.
Hong Zhang
Yun Cao
Xianfeng Zhao
2016
conf/ih
A Novel Embedding Distortion for Motion Vector-Based Steganography Considering Motion Characteristic, Local Optimality and Statistical Distribution.
Peipei Wang
Hong Zhang
Yun Cao
Xianfeng Zhao
2015
conf/ih
Video Steganography Based on Optimized Motion Estimation Perturbation.
Yun Cao
Hong Zhang
Xianfeng Zhao
Haibo Yu
2014
conf/ih
Video steganography with perturbed macroblock partition.
Hong Zhang
Yun Cao
Xianfeng Zhao
Weiming Zhang
Nenghai Yu
Coauthors
Haibo Yu
(1)
Hong Zhang
(10)
Jianchang Yu
(1)
Nenghai Yu
(1)
Pei Xie
(2)
Peipei Wang
(1)
Pingan Fan
(2)
Qingxiao Guan
(1)
Weike You
(2)
Weiming Zhang
(1)
Xianfeng Zhao
(10)
Xiaolei He
(1)
Yi Ma
(1)
Yifan Cai
(1)
Yun Cao
(5)
Zengzhen Zhao
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to