B
Bin Ma
Researcher at Qilu University of Technology
Publications - 56
Citations - 1140
Bin Ma is an academic researcher from Qilu University of Technology. The author has contributed to research in topics: Computer science & Information hiding. The author has an hindex of 8, co-authored 36 publications receiving 463 citations.
Papers
More filters
Journal ArticleDOI
Reversible Data Hiding: Advances in the Past Two Decades
TL;DR: In this paper, the various RDH algorithms and researches have been classified into the following six categories: 1) RDH into image spatial domain; 2) RD h into image compressed domain (e.g., JPEG); 3) RDh suitable for image semi-fragile authentication; 4)RDH with image contrast enhancement; 5) RD H into encrypted images, which is expected to have wide application in the cloud computation; and 6) RDD into video and into audio.
Journal ArticleDOI
Image Description With Polar Harmonic Fourier Moments
TL;DR: It is theoretically and experimentally demonstrated that PHFMs outperform the above moments in reconstructing images and recognizing rotationally invariant objects considering noise and various attacks.
Journal ArticleDOI
Concealed Attack for Robust Watermarking Based on Generative Model and Perceptual Loss
TL;DR: Experimental and analysis results demonstrate that the proposed concealed attack method has better imperceptibility and attack ability in comparison to the existing watermarking attack methods.
Journal ArticleDOI
High Precision Error Prediction Algorithm Based on Ridge Regression Predictor for Reversible Data Hiding
TL;DR: In this article, a ridge regression-based high precision error prediction algorithm for reversible data hiding is proposed, which minimizes the residual sum of squares between predicted and target pixels subject to the constraint expressed in terms of the L2-norm.
Journal ArticleDOI
An encrypted coverless information hiding method based on generative models
TL;DR: The experimental results indicate that the proposed encrypted coverless information hiding method is not only able to generate quality encrypted images compared with current popular image-to-image translation methods but also possesses greater security, robustness and reconstruction ability.