scispace - formally typeset
X

Xuyu Xiang

Researcher at Central South University Forestry and Technology

Publications -  28
Citations -  548

Xuyu Xiang is an academic researcher from Central South University Forestry and Technology. The author has contributed to research in topics: Steganalysis & Steganography. The author has an hindex of 8, co-authored 28 publications receiving 239 citations. Previous affiliations of Xuyu Xiang include College of Information Technology.

Papers
More filters
Journal ArticleDOI

An Encrypted Image Retrieval Method Based on Harris Corner Optimization and LSH in Cloud Computing

TL;DR: The experimental results show that compared with the existing encryption retrieval schemes, the proposed retrieval scheme not only reduces the time consumption but also improves the image retrieval accuracy.
Journal ArticleDOI

Coverless steganography based on image retrieval of DenseNet features and DWT sequence mapping

TL;DR: A novel coverless image steganography algorithm based on image retrieval of DenseNet features and DWT sequence mapping that has better robust and security performance resisting most image attacks compared with the state-of-the-art methods.
Journal ArticleDOI

A Robust Watermarking Scheme in YCbCr Color Space Based on Channel Coding

TL;DR: It is shown that the proposed channel coding-based schemes can achieve near exact watermark recovery against all kinds of attacks and the convolutional code-based additive embedding scheme is optimal, which can also achieve good performance for video watermarking after extension.
Journal ArticleDOI

Coverless Image Steganography: A Survey

TL;DR: This paper includes more than 50 key contributions to provide a comprehensive survey in coverless image steganography research: the fundamental frameworks, pre-processing, feature extraction, generation of hash sequence and mapping relationships.
Journal ArticleDOI

Coverless Image Steganography Based on Multi-Object Recognition

TL;DR: A coverless image steganography method based on multi-object recognition that can fundamentally resist steganalysis tools and avoid the attacker’s suspicions is proposed.