X
Xuyu Xiang
Researcher at Central South University Forestry and Technology
Publications - 28
Citations - 548
Xuyu Xiang is an academic researcher from Central South University Forestry and Technology. The author has contributed to research in topics: Steganalysis & Steganography. The author has an hindex of 8, co-authored 28 publications receiving 239 citations. Previous affiliations of Xuyu Xiang include College of Information Technology.
Papers
More filters
Journal ArticleDOI
An Encrypted Image Retrieval Method Based on Harris Corner Optimization and LSH in Cloud Computing
TL;DR: The experimental results show that compared with the existing encryption retrieval schemes, the proposed retrieval scheme not only reduces the time consumption but also improves the image retrieval accuracy.
Journal ArticleDOI
Coverless steganography based on image retrieval of DenseNet features and DWT sequence mapping
TL;DR: A novel coverless image steganography algorithm based on image retrieval of DenseNet features and DWT sequence mapping that has better robust and security performance resisting most image attacks compared with the state-of-the-art methods.
Journal ArticleDOI
A Robust Watermarking Scheme in YCbCr Color Space Based on Channel Coding
TL;DR: It is shown that the proposed channel coding-based schemes can achieve near exact watermark recovery against all kinds of attacks and the convolutional code-based additive embedding scheme is optimal, which can also achieve good performance for video watermarking after extension.
Journal ArticleDOI
Coverless Image Steganography: A Survey
TL;DR: This paper includes more than 50 key contributions to provide a comprehensive survey in coverless image steganography research: the fundamental frameworks, pre-processing, feature extraction, generation of hash sequence and mapping relationships.
Journal ArticleDOI
Coverless Image Steganography Based on Multi-Object Recognition
TL;DR: A coverless image steganography method based on multi-object recognition that can fundamentally resist steganalysis tools and avoid the attacker’s suspicions is proposed.