default search action
Zhenjun Tang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j100]Jianzhong Yang, Xianquan Zhang, Chunqiang Yu, Guoxiang Li, Zhenjun Tang:
Secret image restoration with high-bit correction and symbiotic organisms search. Expert Syst. Appl. 259: 125324 (2025) - [j99]Jianzhong Yang, Xianquan Zhang, Chunqiang Yu, Xuemao Zhang, Guoxiang Li, Zhenjun Tang:
Secret image restoration with interpolation and social network search. Neurocomputing 611: 128643 (2025) - [j98]Runlin Cao, Zhixin Li, Zhenjun Tang, Canlong Zhang, Huifang Ma:
Enhancing robust VQA via contrastive and self-supervised learning. Pattern Recognit. 159: 111129 (2025) - 2024
- [j97]Mengzhu Yu, Zhenjun Tang, Hanyun Zhang, Xiaoping Liang, Xianquan Zhang:
Video Hashing with Tensor Robust PCA and Histogram of Optical Flow for Copy Detection. Comput. J. 67(6): 2162-2171 (2024) - [j96]Jiliang Ma, Yihua Chen, Lv Chen, Zhenjun Tang:
Dual-attention pyramid transformer network for No-Reference Image Quality Assessment. Expert Syst. Appl. 257: 125008 (2024) - [j95]Mengzhu Yu, Zhenjun Tang, Xiaoping Liang, Xianquan Zhang, Xinpeng Zhang:
Perceptual Hashing With Deep and Texture Features. IEEE Multim. 31(1): 65-75 (2024) - [j94]Hanyun Zhang, Zhenjun Tang, Mengzhu Yu, Xiaoping Liang, Xianquan Zhang:
Robust Color Image Hashing With Nonnegative Matrix Factorization and Saliency Map for Copy Detection. IEEE Multim. 31(3): 44-52 (2024) - [j93]Xuemao Zhang, Xianquan Zhang, Chunqiang Yu, Jianzhong Yang, Zhenjun Tang:
Multidirectional Gradient Predictor for Region-Based Reversible Data Hiding in Encrypted Images. IEEE Internet Things J. 11(21): 35596-35609 (2024) - [j92]Mengzhu Yu, Zhenjun Tang, Xiaoping Liang, Zixuan Yu, Chunqiang Yu, Xianquan Zhang:
Robust video hashing based on deep feature and quaternion generic Fourier descriptor for copy detection. Adv. Math. Commun. 33(1) (2024) - [j91]Zhenjun Tang, Huijiang Zhuang, Mengzhu Yu, Lv Chen, Xiaoping Liang, Xianquan Zhang:
Robust video hashing with canonical polyadic decomposition and Hahn moments. J. Electronic Imaging 33(4) (2024) - [j90]Zhenjun Tang, Yihua Chen, Zhiyuan Chen, Xiaoping Liang, Xianquan Zhang:
Lightweight transformer and multi-head prediction network for no-reference image quality assessment. Neural Comput. Appl. 36(4): 1931-1946 (2024) - [j89]Junbo Hu, Zhixin Li, Qiang Su, Zhenjun Tang, Huifang Ma:
Exploring refined dual visual features cross-combination for image captioning. Neural Networks 180: 106710 (2024) - [j88]Liang Chen, Xianquan Zhang, Chunqiang Yu, Zhenjun Tang:
Image Hiding Based on Compressive Autoencoders and Normalizing Flow. IEEE Signal Process. Lett. 31: 2810-2814 (2024) - [j87]Xiaoping Liang, Zhenjun Tang, Xianquan Zhang, Mengzhu Yu, Xinpeng Zhang:
Robust Hashing With Local Tangent Space Alignment for Image Copy Detection. IEEE Trans. Dependable Secur. Comput. 21(4): 2448-2460 (2024) - [j86]Yalan Qin, Zhenjun Tang, Hanzhou Wu, Guorui Feng:
Flexible Tensor Learning for Multi-View Clustering With Markov Chain. IEEE Trans. Knowl. Data Eng. 36(4): 1552-1565 (2024) - [j85]TianYu Ning, Bineng Zhong, Qihua Liang, Zhenjun Tang, Xianxian Li:
Robust Tracking via Bidirectional Transduction With Mask Information. IEEE Trans. Multim. 26: 4308-4319 (2024) - [j84]Xianquan Zhang, Feiyi He, Chunqiang Yu, Xinpeng Zhang, Ching-Nung Yang, Zhenjun Tang:
Reversible Data Hiding in Encrypted Images With Asymmetric Coding and Bit-Plane Block Compression. IEEE Trans. Multim. 26: 10174-10188 (2024) - [j83]Xiaoping Liang, Zhenjun Tang, Zhixin Li, Mengzhu Yu, Hanyun Zhang, Xianquan Zhang:
Robust Hashing via Global and Local Invariant Features for Image Copy Detection. ACM Trans. Multim. Comput. Commun. Appl. 20(1): 2:1-2:22 (2024) - [j82]Xiaoping Liang, Wanting Liu, Xianquan Zhang, Zhenjun Tang:
Robust Image Hashing via CP Decomposition and DCT for Copy Detection. ACM Trans. Multim. Comput. Commun. Appl. 20(7): 201:1-201:22 (2024) - [c19]Zhenbin Chen, Zhixin Li, Ying Huang, Zhenjun Tang:
Adaptive Prompt Construction Method for Relation Extraction. ICASSP 2024: 10031-10035 - [c18]Zhenzhe Gao, Zhenjun Tang, Zhaoxia Yin, Baoyuan Wu, Yue Lu:
Fragile Model Watermark for integrity protection: leveraging boundary volatility and sensitive sample-pairing. ICME 2024: 1-6 - [c17]Haiyong Tang, Yihua Chen, Hanyun Zhang, Lv Chen, Ronghai Sun, Zhenjun Tang:
Integrating Subjective and Objective Features for Image Aesthetics Assessment. IJCNN 2024: 1-8 - [c16]Mengzhu Yu, Zhenjun Tang, Huijiang Zhuang, Xiaoping Liang, Zhixin Li, Xianquan Zhang:
Robust Video Hashing with Non-negative Tensor Factorization for Copy Detection. ICMR 2024: 1094-1098 - [c15]Yihua Chen, Xiaoping Liang, Mengzhu Yu, Zhenjun Tang:
Unifying Pictorial and Textual Features for Screen Content Image Quality Evaluation. ICMR 2024: 1099-1103 - [i3]Zhenzhe Gao, Zhenjun Tang, Zhaoxia Yin, Baoyuan Wu, Yue Lu:
Fragile Model Watermark for integrity protection: leveraging boundary volatility and sensitive sample-pairing. CoRR abs/2404.07572 (2024) - 2023
- [j81]Mengzhu Yu, Zhenjun Tang, Zhixin Li, Xiaoping Liang, Xianquan Zhang:
Robust Image Hashing With Saliency Map And Sparse Model. Comput. J. 66(5): 1241-1255 (2023) - [j80]Yufei Zeng, Zhixin Li, Zhenjun Tang, Zhenbin Chen, Huifang Ma:
Heterogeneous graph convolution based on In-domain Self-supervision for Multimodal Sentiment Analysis. Expert Syst. Appl. 213(Part): 119240 (2023) - [j79]Xiumin Xie, Zhixin Li, Zhenjun Tang, Dan Yao, Huifang Ma:
Unifying knowledge iterative dissemination and relational reconstruction network for image-text matching. Inf. Process. Manag. 60(1): 103154 (2023) - [j78]Ke Wu, Zichi Wang, Xinpeng Zhang, Zhenjun Tang:
Defending against adversarial examples using perceptual image hashing. J. Electronic Imaging 32(2) (2023) - [j77]Guoxiang Li, Xianquan Zhang, Chunqiang Yu, Luyun Zhang, Zhenjun Tang:
Reversible data hiding with prediction error histogram decomposition and hybrid dimensional histogram modification. J. Electronic Imaging 32(4) (2023) - [j76]Guoxiong Xie, Zhenjun Tang, Xiaoping Liang, Chunqiang Yu, Xianquan Zhang:
Image encryption based on chaotic maps and random scan patterns. J. Electronic Imaging 32(5) (2023) - [j75]Ping Feng, Zhenjun Tang:
A survey of visual neural networks: current trends, challenges and opportunities. Multim. Syst. 29(2): 693-724 (2023) - [j74]Zedu Chen, Bineng Zhong, Guorong Li, Shengping Zhang, Rongrong Ji, Zhenjun Tang, Xianxian Li:
SiamBAN: Target-Aware Tracking With Siamese Box Adaptive Network. IEEE Trans. Pattern Anal. Mach. Intell. 45(4): 5158-5173 (2023) - [j73]Yu Dong, Xianquan Zhang, Chunqiang Yu, Zhenjun Tang:
Secret Image Restoration With Convex Hull and Elite Opposition-Based Learning Strategy. IEEE Signal Process. Lett. 30: 195-199 (2023) - [j72]Yaozong Zheng, Bineng Zhong, Qihua Liang, Zhenjun Tang, Rongrong Ji, Xianxian Li:
Leveraging Local and Global Cues for Visual Tracking via Parallel Interaction Network. IEEE Trans. Circuits Syst. Video Technol. 33(4): 1671-1683 (2023) - [j71]Jie Ma, Xiangyuan Lan, Bineng Zhong, Guorong Li, Zhenjun Tang, Xianxian Li, Rongrong Ji:
Robust Tracking via Uncertainty-Aware Semantic Consistency. IEEE Trans. Circuits Syst. Video Technol. 33(4): 1740-1751 (2023) - [j70]Chunqiang Yu, Xianquan Zhang, Chuan Qin, Zhenjun Tang:
Reversible Data Hiding in Encrypted Images With Secret Sharing and Hybrid Coding. IEEE Trans. Circuits Syst. Video Technol. 33(11): 6443-6458 (2023) - [j69]Ziqing Huang, Zhenjun Tang, Xianquan Zhang, Linlin Ruan, Xinpeng Zhang:
Perceptual Image Hashing With Locality Preserving Projection for Copy Detection. IEEE Trans. Dependable Secur. Comput. 20(1): 463-477 (2023) - [j68]Xiaoping Liang, Zhenjun Tang, Ziqing Huang, Xianquan Zhang, Shichao Zhang:
Efficient Hashing Method Using 2D-2D PCA for Image Copy Detection. IEEE Trans. Knowl. Data Eng. 35(4): 3765-3778 (2023) - [j67]Xiaoping Liang, Zhenjun Tang, Jingli Wu, Zhixin Li, Xinpeng Zhang:
Robust Image Hashing With Isomap and Saliency Map for Copy Detection. IEEE Trans. Multim. 25: 1085-1097 (2023) - [j66]Binfei Chu, Yiting Lin, Bineng Zhong, Zhenjun Tang, Xianxian Li, Jing Wang:
Robust Long-Term Tracking via Localizing Occluders. ACM Trans. Multim. Comput. Commun. Appl. 19(2s): 89:1-89:15 (2023) - [c14]Yihua Chen, Zhiyuan Chen, Mengzhu Yu, Zhenjun Tang:
Dual-Feature Aggregation Network for No-Reference Image Quality Assessment. MMM (1) 2023: 149-161 - [c13]Ping Feng, Hanyun Zhang, Yingying Sun, Zhenjun Tang:
Lightweight Image Hashing Based on Knowledge Distillation and Optimal Transport for Face Retrieval. MMM (2) 2023: 423-434 - [e1]Xianfeng Zhao, Zhenjun Tang, Pedro Comesaña Alfaro, Alessandro Piva:
Digital Forensics and Watermarking - 21st International Workshop, IWDW 2022, Guilin, China, November 18-19, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13825, Springer 2023, ISBN 978-3-031-25114-6 [contents] - 2022
- [j65]Zhenhai Chen, Zhenjun Tang, Xinpeng Zhang, Ronghai Sun, Xianquan Zhang:
Efficient video hashing based on low-rank frames. IET Image Process. 16(2): 344-355 (2022) - [j64]Xiaoping Liang, Zhenjun Tang, Sheng Li, Chunqiang Yu, Xianquan Zhang:
A novel hashing scheme via image feature map and 2D PCA. IET Image Process. 16(12): 3225-3236 (2022) - [j63]Chunqiang Yu, Xianquan Zhang, Guoxiang Li, Shanhua Zhan, Zhenjun Tang:
Reversible data hiding with adaptive difference recovery for encrypted images. Inf. Sci. 584: 89-110 (2022) - [j62]Chuanwen Hou, Zhixin Li, Zhenjun Tang, Xiumin Xie, Huifang Ma:
Multiple instance relation graph reasoning for cross-modal hash retrieval. Knowl. Based Syst. 256: 109891 (2022) - [j61]Chunqiang Yu, Xianquan Zhang, Dewang Wang, Zhenjun Tang:
Reversible data hiding with pairwise PEE and 2D-PEH decomposition. Signal Process. 196: 108527 (2022) - [j60]Chunqiang Yu, Xianquan Zhang, Xinpeng Zhang, Guoxiang Li, Zhenjun Tang:
Reversible Data Hiding With Hierarchical Embedding for Encrypted Images. IEEE Trans. Circuits Syst. Video Technol. 32(2): 451-466 (2022) - [j59]Tiantao Xian, Zhixin Li, Zhenjun Tang, Huifang Ma:
Adaptive Path Selection for Dynamic Image Captioning. IEEE Trans. Circuits Syst. Video Technol. 32(9): 5762-5775 (2022) - [j58]Mengzhu Yu, Zhenjun Tang, Xianquan Zhang, Bineng Zhong, Xinpeng Zhang:
Perceptual Hashing With Complementary Color Wavelet Transform and Compressed Sensing for Reduced-Reference Image Quality Assessment. IEEE Trans. Circuits Syst. Video Technol. 32(11): 7559-7574 (2022) - [j57]Xianquan Zhang, Xuelong Li, Zhenjun Tang, Shichao Zhang, Shaomin Xie:
Noise Removal in Embedded Image With Bit Approximation. IEEE Trans. Knowl. Data Eng. 34(3): 1359-1369 (2022) - [c12]Zhiyuan Chen, Yihua Chen, Xiaoping Liang, Zhenjun Tang:
Multi-Level Feature Aggregation Network for Full-Reference Image Quality Assessment. ICTAI 2022: 861-866 - [c11]Yingying Sun, Guoxiong Xie, Guijin Fan, Chunqiang Yu, Zhenjun Tang:
Reversible Data Hiding via Arranging Blocks of Bit-Planes in Encrypted Images. IWDW 2022: 190-204 - [c10]Ziyun Yang, Zichi Wang, Xinpeng Zhang, Zhenjun Tang:
Multi-source Data Hiding in Neural Networks. MMSP 2022: 1-6 - 2021
- [j56]Zhenjun Tang, Mengzhu Yu, Heng Yao, Hanyun Zhang, Chunqiang Yu, Xianquan Zhang:
Robust Image Hashing With Singular Values Of Quaternion SVD. Comput. J. 64(11): 1656-1671 (2021) - [j55]Zhenjun Tang, Mingyuan Pang, Chunqiang Yu, Guijin Fan, Xianquan Zhang:
Reversible data hiding for encrypted image based on adaptive prediction error coding. IET Image Process. 15(11): 2643-2655 (2021) - [j54]Heng Yao, Fanyu Mao, Chuan Qin, Zhenjun Tang:
Dual-JPEG-image reversible data hiding. Inf. Sci. 563: 130-149 (2021) - [j53]Yu Dong, Xianquan Zhang, Chunqiang Yu, Zhenjun Tang, Guoen Xia:
Robust image data hiding method based on multiple backups and pixel bit weight. J. Intell. Fuzzy Syst. 41(6): 6935-6948 (2021) - [j52]Zhenjun Tang, Shaopeng Zhang, Xianquan Zhang, Zhixin Li, Zhenhai Chen, Chunqiang Yu:
Video hashing with secondary frames and invariant moments. J. Vis. Commun. Image Represent. 79: 103209 (2021) - [j51]Xiaoping Liang, Zhenjun Tang, Xiaolan Xie, Jingli Wu, Xianquan Zhang:
Robust and fast image hashing with two-dimensional PCA. Multim. Syst. 27(3): 389-401 (2021) - [j50]Zhenjun Tang, Shaopeng Zhang, Zhenhai Chen, Xianquan Zhang:
Robust Video Hashing Based on Multidimensional Scaling and Ordinal Measures. Secur. Commun. Networks 2021: 9930673:1-9930673:11 (2021) - [c9]Zikai Zhang, Bineng Zhong, Shengping Zhang, Zhenjun Tang, Xin Liu, Zhaoxiang Zhang:
Distractor-Aware Fast Tracking via Dynamic Convolutions and MOT Philosophy. CVPR 2021: 1024-1033 - [c8]Siyuan Cheng, Bineng Zhong, Guorong Li, Xin Liu, Zhenjun Tang, Xianxian Li, Jing Wang:
Learning To Filter: Siamese Relation Network for Robust Tracking. CVPR 2021: 4421-4431 - [i2]Siyuan Cheng, Bineng Zhong, Guorong Li, Xin Liu, Zhenjun Tang, Xianxian Li, Jing Wang:
Learning to Filter: Siamese Relation Network for Robust Tracking. CoRR abs/2104.00829 (2021) - [i1]Zikai Zhang, Bineng Zhong, Shengping Zhang, Zhenjun Tang, Xin Liu, Zhaoxiang Zhang:
Distractor-Aware Fast Tracking via Dynamic Convolutions and MOT Philosophy. CoRR abs/2104.12041 (2021) - 2020
- [j49]Zhenjun Tang, Hewang Nie, Chi-Man Pun, Heng Yao, Chunqiang Yu, Xianquan Zhang:
Color Image Reversible Data Hiding With Double-Layer Embedding. IEEE Access 8: 6915-6926 (2020) - [j48]Zhenjun Tang, Lv Chen, Heng Yao, Xianquan Zhang, Chunqiang Yu, Fionn Murtagh:
Video Hashing with DCT and NMF. Comput. J. 63(7): 1017-1030 (2020) - [j47]Zhenjun Tang, Hanyun Zhang, Shenglian Lu, Heng Yao, Xianquan Zhang:
Robust image hashing with compressed sensing and ordinal measures. EURASIP J. Image Video Process. 2020(1): 21 (2020) - [j46]Renjie Zhu, Xinpeng Zhang, Mengte Shi, Zhenjun Tang:
Secure neural network watermarking protocol against forging attack. EURASIP J. Image Video Process. 2020(1): 37 (2020) - [j45]Zhenjun Tang, Hanyun Zhang, Chi-Man Pun, Mengzhu Yu, Chunqiang Yu, Xianquan Zhang:
Robust image hashing with visual attention model and invariant moments. IET Image Process. 14(5): 901-908 (2020) - [j44]Xianquan Zhang, Ju Yang, Yu Dong, Chunqiang Yu, Zhenjun Tang:
Robust data hiding with multiple backups and optimized reference matrix. J. Intell. Fuzzy Syst. 39(5): 6965-6977 (2020) - [j43]Heng Yao, Hongbin Wei, Chuan Qin, Zhenjun Tang:
A real-time reversible image authentication method using uniform embedding strategy. J. Real Time Image Process. 17(1): 41-54 (2020) - [j42]Heng Yao, Fanyu Mao, Zhenjun Tang, Chuan Qin:
High-fidelity dual-image reversible data hiding via prediction-error shift. Signal Process. 170: 107447 (2020) - [j41]Shengjia Chen, Zhixin Li, Zhenjun Tang:
Relation R-CNN: A Graph Based Relation-Aware Network for Object Detection. IEEE Signal Process. Lett. 27: 1680-1684 (2020) - [j40]Zhenjun Tang, Zixuan Yu, Zhixin Li, Chunqiang Yu, Xianquan Zhang:
Robust Image Hashing with Low-Rank Representation and Ring Partition. Wirel. Commun. Mob. Comput. 2020: 8870467:1-8870467:12 (2020)
2010 – 2019
- 2019
- [j39]Yujie Fu, Ping Kong, Heng Yao, Zhenjun Tang, Chuan Qin:
Effective reversible data hiding in encrypted image with adaptive encoding strategy. Inf. Sci. 494: 21-36 (2019) - [j38]Zhenjun Tang, Shijie Xu, Dengpan Ye, Jinyan Wang, Xianquan Zhang, Chuanqiang Yu:
Real-time reversible data hiding with shifting block histogram of pixel differences in encrypted image. J. Real Time Image Process. 16(3): 709-724 (2019) - [j37]Fang Cao, Bowen An, Heng Yao, Zhenjun Tang:
Local complexity based adaptive embedding mechanism for reversible data hiding in digital images. Multim. Tools Appl. 78(7): 7911-7926 (2019) - [j36]Heng Yao, Xiaokai Liu, Zhenjun Tang, Chuan Qin, Ying Tian:
Adaptive image camouflage using human visual system model. Multim. Tools Appl. 78(7): 8311-8334 (2019) - [j35]Heng Yao, Xiaokai Liu, Zhenjun Tang, Chuan Qin, Ying Tian:
Correction to: Adaptive image camouflage using human visual system model. Multim. Tools Appl. 78(7): 8335 (2019) - [j34]Zhenjun Tang, Shijie Xu, Heng Yao, Chuan Qin, Xianquan Zhang:
Reversible data hiding with differential compression in encrypted image. Multim. Tools Appl. 78(8): 9691-9715 (2019) - [j33]Zhenjun Tang, Ye Yang, Shijie Xu, Chunqiang Yu, Xianquan Zhang:
Image Encryption with Double Spiral Scans and Chaotic Maps. Secur. Commun. Networks 2019: 8694678:1-8694678:15 (2019) - [j32]Dewang Wang, Xianquan Zhang, Chunqiang Yu, Zhenjun Tang:
Reversible Data Hiding by Using Adaptive Pixel Value Prediction and Adaptive Embedding Bin Selection. IEEE Signal Process. Lett. 26(11): 1713-1717 (2019) - [j31]Zhenjun Tang, Lv Chen, Xianquan Zhang, Shichao Zhang:
Robust Image Hashing with Tensor Decomposition. IEEE Trans. Knowl. Data Eng. 31(3): 549-560 (2019) - 2018
- [j30]Heng Yao, Xiaokai Liu, Zhenjun Tang, Yu-Chen Hu, Chuan Qin:
An Improved Image Camouflage Technique Using Color Difference Channel Transformation and Optimal Prediction-Error Expansion. IEEE Access 6: 40569-40584 (2018) - [j29]Chunqiang Yu, Xianquan Zhang, Zhenjun Tang, Xiaojun Xie:
Separable and Error-Free Reversible Data Hiding in Encrypted Image Based on Two-Layer Pixel Errors. IEEE Access 6: 76956-76969 (2018) - [j28]Zhenjun Tang, Ziqing Huang, Heng Yao, Xianquan Zhang, Lv Chen, Chunqiang Yu:
Perceptual Image Hashing with Weighted DWT Features for Reduced-Reference Image Quality Assessment. Comput. J. 61(11): 1695-1709 (2018) - [j27]Heng Yao, Chuan Qin, Zhenjun Tang, Xinpeng Zhang:
A general framework for shiftable position-based dual-image reversible data hiding. EURASIP J. Image Video Process. 2018: 41 (2018) - [j26]Zhenjun Tang, Xuelong Li, Xianquan Zhang, Shichao Zhang, Yumin Dai:
Image hashing with color vector angle. Neurocomputing 308: 147-158 (2018) - [j25]Heng Yao, Fang Cao, Zhenjun Tang, Jinwei Wang, Tong Qiao:
Expose noise level inconsistency incorporating the inhomogeneity scoring strategy. Multim. Tools Appl. 77(14): 18139-18161 (2018) - [j24]Chunqiang Yu, Xianquan Zhang, Zhenjun Tang, Yan Chen, Jingyu Huang:
Reversible Data Hiding with Pixel Prediction and Additive Homomorphism for Encrypted Image. Secur. Commun. Networks 2018: 9103418:1-9103418:13 (2018) - [j23]Jin Liu, Jianxin Wang, Zhenjun Tang, Bin Hu, Fang-Xiang Wu, Yi Pan:
Improving Alzheimer's Disease Classification by Combining Multiple Measures. IEEE ACM Trans. Comput. Biol. Bioinform. 15(5): 1649-1659 (2018) - [c7]Fang Cao, Yalei Zhang, Bowen An, Heng Yao, Zhenjun Tang:
An Improved Reversible Data Hiding Scheme with Large Payload Based on Image Local-Complexity. ICCCS (4) 2018: 231-241 - 2017
- [j22]Heng Yao, Chuan Qin, Zhenjun Tang, Ying Tian:
Guided filtering based color image reversible data hiding. J. Vis. Commun. Image Represent. 43: 152-163 (2017) - [j21]Zhenjun Tang, Fei Wang, Xianquan Zhang:
Image encryption based on random projection partition and chaotic system. Multim. Tools Appl. 76(6): 8257-8283 (2017) - [j20]Xianquan Zhang, Zerui Sun, Zhenjun Tang, Chunqiang Yu, Xiaoyun Wang:
High capacity data hiding based on interpolated image. Multim. Tools Appl. 76(7): 9195-9218 (2017) - [j19]Heng Yao, Chuan Qin, Zhenjun Tang, Ying Tian:
Improved dual-image reversible data hiding method using the selection strategy of shiftable pixels' coordinates with minimum distortion. Signal Process. 135: 26-35 (2017) - [j18]Zhenjun Tang, Ziqing Huang, Xianquan Zhang, Huan Lao:
Robust image hashing with multidimensional scaling. Signal Process. 137: 240-250 (2017) - [j17]Heng Yao, Saihua Song, Chuan Qin, Zhenjun Tang, Xiaokai Liu:
Detection of Double-Compressed H.264/AVC Video Incorporating the Features of the String of Data Bits and Skip Macroblocks. Symmetry 9(12): 313 (2017) - 2016
- [j16]Zhenjun Tang, Huan Lao, Xianquan Zhang, Kai Liu:
Robust image hashing via DCT and LLE. Comput. Secur. 62: 133-148 (2016) - [j15]Zhenjun Tang, Xianquan Zhang, Xianxian Li, Shichao Zhang:
Robust Image Hashing With Ring Partition and Invariant Vector Distance. IEEE Trans. Inf. Forensics Secur. 11(1): 200-214 (2016) - [c6]Ping Ji, Chuan Qin, Zhenjun Tang:
Fragile Watermarking with Self-recovery Capability via Absolute Moment Block Truncation Coding. ICCCS (1) 2016: 104-113 - 2015
- [j14]Zhenjun Tang, Linlin Ruan, Chuan Qin, Xianquan Zhang, Chunqiang Yu:
Robust image hashing with embedding vector variance of LLE. Digit. Signal Process. 43: 17-27 (2015) - [j13]Zhenjun Tang, Xianquan Zhang, Weiwei Lan:
Efficient image encryption with block shuffling and chaotic map. Multim. Tools Appl. 74(15): 5429-5448 (2015) - 2014
- [j12]Zhenjun Tang, Xianquan Zhang, Chunqiang Yu, Dan He:
Efficient point pattern matching algorithm for planar point sets under transform of translation, rotation and scale. Appl. Math. Comput. 232: 624-631 (2014) - [j11]Zhenjun Tang, Yumin Dai, Xianquan Zhang, Liyan Huang, Fan Yang:
Robust image hashing via colour vector angles and discrete wavelet transform. IET Image Process. 8(3): 142-149 (2014) - [j10]Zhenjun Tang, Xianquan Zhang, Shichao Zhang:
Robust Perceptual Image Hashing Based on Ring Partition and NMF. IEEE Trans. Knowl. Data Eng. 26(3): 711-724 (2014) - [c5]Zhenjun Tang, Junwei Yu, Xianquan Zhang, Shichao Zhang:
Discovery of Tampered Image with Robust Hashing. ADMA 2014: 112-122 - [c4]Yongqiang Chen, Zhenjun Tang, Xiaozhao Zhao, Dawei Song, Peng Zhang:
A New Approach to Contextual Suggestions Based on Word2Vec. TREC 2014 - 2013
- [j9]Zhixin Li, Zhongzhi Shi, Weizhong Zhao, Zhiqing Li, Zhenjun Tang:
Learning semantic concepts from image database with hybrid generative/discriminative approach. Eng. Appl. Artif. Intell. 26(9): 2143-2152 (2013) - [j8]Zhenjun Tang, Xianquan Zhang, Liyan Huang, Yumin Dai:
Robust image hashing using ring-based entropies. Signal Process. 93(7): 2061-2069 (2013) - 2012
- [j7]Xianquan Zhang, Tao Liang, Zhenjun Tang, Xuan Dai:
Restoration of embedded image from corrupted stego image. Signal Process. 92(7): 1691-1698 (2012) - [c3]Zhenjun Tang, Yumin Dai, Xianquan Zhang, Shichao Zhang:
Perceptual Image Hashing with Histogram of Color Vector Angles. AMT 2012: 237-246 - [c2]Xianquan Zhang, Zhenjun Tang, Tao Liang, Shichao Zhang, Yingjun Zhu, Yonghai Sun:
Data Hiding Method Based on Local Image Features. AMT 2012: 247-256 - 2011
- [j6]Zhenjun Tang, Shuozhong Wang, Xinpeng Zhang, Weimin Wei:
Structural Feature-Based Image Hashing and Similarity Metric for Tampering Detection. Fundam. Informaticae 106(1): 75-91 (2011) - [j5]Zhenjun Tang, Xianquan Zhang:
Secure Image Encryption without Size Limitation Using Arnold Transform and Random Strategies. J. Multim. 6(2): 202-206 (2011) - [j4]Zhenjun Tang, Shuozhong Wang, Xinpeng Zhang, Weimin Wei, Yan Zhao:
Lexicographical framework for image hashing with implementation based on DCT and NMF. Multim. Tools Appl. 52(2-3): 325-345 (2011) - 2010
- [j3]Xianquan Zhang, Zhenjun Tang, Jinhui Yu, Mingming Guo, Lianyuan Jiang:
Convex hull properties and algorithms. Appl. Math. Comput. 216(11): 3209-3218 (2010) - [j2]Xianquan Zhang, Zhenjun Tang, Jinhui Yu, Mingming Guo:
A Fast Convex Hull Algorithm for Binary Image. Informatica (Slovenia) 34(3): 369-376 (2010) - [j1]Weimin Wei, Shuozhong Wang, Xinpeng Zhang, Zhenjun Tang:
Estimation of image rotation angle using interpolation-related spectral signatures with application to blind detection of image forgery. IEEE Trans. Inf. Forensics Secur. 5(3): 507-517 (2010)
2000 – 2009
- 2009
- [c1]Zhenjun Tang, Shuozhong Wang, Xinpeng Zhang, Weimin Wei:
Perceptual Similarity Metric Resilient to Rotation for Application in Robust Image Hashing. MUE 2009: 183-188
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint