default search action
Lizhi Xiong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Zhihua Xia, Qi Gu, Lizhi Xiong, Wenhao Zhou:
Privacy-preserving image retrieval based on additive secret sharing. Int. J. Auton. Adapt. Commun. Syst. 17(2): 99-126 (2024) - [j26]Ching-Nung Yang
, Peng Li
, Hsiang-Han Cheng, Hsin-Chuan Kuo, Ming-Chan Lu, Lizhi Xiong
:
A Security Model of Multihospital FHIR Database Authorization Based on Secret Sharing and Blockchain. IEEE Internet Things J. 11(6): 10325-10335 (2024) - [j25]Hao Chen, Lizhi Xiong, Ching-Nung Yang:
Progressive secret image sharing based on Boolean operations and polynomial interpolations. Multim. Syst. 30(4): 189 (2024) - [j24]Lizhi Xiong
, Mengtao Zhang, Ching-Nung Yang, Cheonshik Kim:
An enhanced AMBTC for color image compression using color palette. Multim. Tools Appl. 83(11): 31783-31803 (2024) - [j23]Zhihua Xia
, Qi Gu
, Wenhao Zhou, Lizhi Xiong
, Jian Weng
, Naixue Xiong
:
STR: Secure Computation on Additive Shares Using the Share-Transform-Reveal Strategy. IEEE Trans. Computers 73(2): 340-352 (2024) - [j22]Lizhi Xiong
, Xiao Han
, Ching-Nung Yang
, Yun-Qing Shi:
Reversible Data Hiding in Shared Images With Separate Cover Image Reconstruction and Secret Extraction. IEEE Trans. Cloud Comput. 12(1): 186-199 (2024) - [j21]Lizhi Xiong
, Jianhua Xu
, Ching-Nung Yang
, Xinpeng Zhang
:
CMCF-Net: An End-to-End Context Multiscale Cross-Fusion Network for Robust Copy-Move Forgery Detection. IEEE Trans. Multim. 26: 6090-6101 (2024) - 2023
- [j20]Lizhi Xiong
, Xiao Han, Xinwei Zhong, Ching-Nung Yang
, Neal N. Xiong
:
RSIS: A Secure and Reliable Secret Image Sharing System Based on Extended Hamming Codes in Industrial Internet of Things. IEEE Internet Things J. 10(3): 1933-1945 (2023) - [j19]Lizhi Xiong
, Yue Wu, Peipeng Yu, Yuhui Zheng:
A black-box reversible adversarial example for authorizable recognition to shared images. Pattern Recognit. 140: 109549 (2023) - [j18]Lizhi Xiong
, Xiao Han
, Ching-Nung Yang
, Xinpeng Zhang
:
Reversible Data Hiding in Shared Images Based on Syndrome Decoding and Homomorphism. IEEE Trans. Cloud Comput. 11(3): 3085-3098 (2023) - [j17]Lizhi Xiong, Xiao Han, Ching-Nung Yang, Zhihua Xia:
RDH-DES: Reversible Data Hiding over Distributed Encrypted-Image Servers Based on Secret Sharing. ACM Trans. Multim. Comput. Commun. Appl. 19(1): 5:1-5:19 (2023) - 2022
- [j16]Lizhi Xiong
, Xiao Han, Ching-Nung Yang
, Yun-Qing Shi:
Robust Reversible Watermarking in Encrypted Image With Secure Multi-Party Based on Lightweight Cryptography. IEEE Trans. Circuits Syst. Video Technol. 32(1): 75-91 (2022) - 2021
- [j15]Lizhi Xiong
, Xiao Han
, Ching-Nung Yang:
CP-PSIS: CRT and polynomial-based progressive secret image sharing. Signal Process. 185: 108064 (2021) - [j14]Lizhi Xiong
, Xinwei Zhong, Ching-Nung Yang
, Xiao Han:
Transform Domain-Based Invertible and Lossless Secret Image Sharing With Authentication. IEEE Trans. Inf. Forensics Secur. 16: 2912-2925 (2021) - [j13]Lizhi Xiong
, Xinwei Zhong, Neal N. Xiong
, Ryan Wen Liu
:
QR-3S: A High Payload QR Code Secret Sharing System for Industrial Internet of Things in 6G Networks. IEEE Trans. Ind. Informatics 17(10): 7213-7222 (2021) - 2020
- [j12]Lizhi Xiong
, Xinwei Zhong, Ching-Nung Yang:
DWT-SISA: a secure and effective discrete wavelet transform-based secret image sharing with authentication. Signal Process. 173: 107571 (2020) - [i4]Lizhi Xiong, Wenhao Zhou, Zhihua Xia, Qi Gu, Jian Weng:
Efficient Privacy-Preserving Computation Based on Additive Secret Sharing. CoRR abs/2009.05356 (2020) - [i3]Zhihua Xia, Qi Gu, Lizhi Xiong, Wenhao Zhou, Jian Weng:
Privacy-Preserving Image Retrieval Based on Additive Secret Sharing. CoRR abs/2009.06893 (2020) - [i2]Zhihua Xia, Qi Gu, Wenhao Zhou, Lizhi Xiong, Jian Weng:
Secure Computation on Additive Shares. CoRR abs/2009.13153 (2020)
2010 – 2019
- 2019
- [j11]Lizhi Xiong, Danping Dong:
Reversible data hiding in encrypted images with public key cryptography: a review of its benefits and open issues. Int. J. Arts Technol. 11(2): 178-191 (2019) - [j10]Lizhi Xiong, Danping Dong:
Reversible data hiding in encrypted images with somewhat homomorphic encryption based on sorting block-level prediction-error expansion. J. Inf. Secur. Appl. 47: 78-85 (2019) - [j9]Lizhi Xiong
, Zhihua Xia
, Xianyi Chen, Hiuk Jae Shim:
Secure multimedia distribution in cloud computing using re-encryption and fingerprinting. Multim. Tools Appl. 78(21): 30297-30313 (2019) - 2018
- [j8]Lizhi Xiong
, Danping Dong, Zhihua Xia
, Xianyi Chen:
High-Capacity Reversible Data Hiding for Encrypted Multimedia Data With Somewhat Homomorphic Encryption. IEEE Access 6: 60635-60644 (2018) - [j7]Lizhi Xiong, Zhengquan Xu, Yun-Qing Shi:
An integer wavelet transform based scheme for reversible data hiding in encrypted images. Multidimens. Syst. Signal Process. 29(3): 1191-1202 (2018) - [j6]Xianyi Chen
, Haidong Zhong, Lizhi Xiong, Zhihua Xia
:
Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion. Secur. Commun. Networks 2018: 1326235:1-1326235:9 (2018) - [i1]Hanzhou Wu
, Wei Wang, Jing Dong, Hongxia Wang, Lizhi Xiong:
The Cut and Dominating Set Problem in A Steganographer Network. CoRR abs/1802.09333 (2018) - 2017
- [j5]Yanyan Xu, Jiaying Gong, Lizhi Xiong, Zhengquan Xu, Jinwei Wang, Yun-Qing Shi:
A privacy-preserving content-based image retrieval method in cloud environment. J. Vis. Commun. Image Represent. 43: 164-172 (2017) - [c1]Hao Wang, Zhengquan Xu, Lizhi Xiong, Tao Wang:
Conducting Correlated Laplace Mechanism for Differential Privacy. ICCCS (2) 2017: 72-85 - 2016
- [j4]Lizhi Xiong, Zhengquan Xu, Yanyan Xu:
A multiple watermarking scheme based on orthogonal decomposition. Multim. Tools Appl. 75(10): 5377-5395 (2016) - 2015
- [j3]Lizhi Xiong, Zhengquan Xu, Yanyan Xu:
A secure re-encryption scheme for data services in a cloud computing environment. Concurr. Comput. Pract. Exp. 27(17): 4573-4585 (2015) - 2014
- [j2]Yanyan Xu, Lizhi Xiong, Zhengquan Xu, Shaoming Pan:
A content security protection scheme in JPEG compressed domain. J. Vis. Commun. Image Represent. 25(5): 805-813 (2014) - [j1]Zhengquan Xu, Lizhi Xiong, Yanyan Xu:
On the provably secure CEW based on orthogonal decomposition. Signal Process. Image Commun. 29(5): 607-617 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 01:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint