


default search action
Xuehu Yan
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j91]Rui Wang
, Longlong Li, Xuehu Yan, Wei Yan, Yali Liu, Guozheng Yang:
Meaningful secret image sharing with improved visual quality. Signal Process. 230: 109861 (2025) - 2024
- [j90]Shengyang Luo
, Yaqi Liu, Xuehu Yan, Yuyuan Sun:
Robust secret color image sharing anti-cropping and tampering in shares. J. Inf. Secur. Appl. 85: 103869 (2024) - [j89]Rui Wang
, Guozheng Yang, Xuehu Yan, Shengyang Luo, Qiang Han:
Secret image sharing in the encrypted domain. J. Vis. Commun. Image Represent. 98: 104013 (2024) - [j88]Yuyuan Sun, Yuliang Lu, Xuehu Yan, Xuan Wang:
Invisible backdoor learning in regional transform domain. Neural Comput. Appl. 36(14): 8097-8108 (2024) - [j87]Longlong Li
, Yuliang Lu, Guozheng Yang, Xuehu Yan:
End-to-End Network Intrusion Detection Based on Contrastive Learning. Sensors 24(7): 2122 (2024) - [j86]Shengyang Luo
, Yaqi Liu, Xuehu Yan
, Yuyuan Sun:
Robust secret image sharing scheme with improved anti-noise capability. Signal Process. 219: 109423 (2024) - [j85]Rui Wang
, Longlong Li, Guozheng Yang, Xuehu Yan
, Wei Yan
:
Secret Cracking and Security Enhancement for the Image Application of CRT-Based Secret Sharing. IEEE Trans. Inf. Forensics Secur. 19: 9819-9834 (2024) - [j84]Yue Jiang
, Kejiang Chen
, Wei Yan
, Xuehu Yan
, Guozheng Yang
, Kai Zeng
:
Robust Secret Image Sharing Resistant to JPEG Recompression Based on Stable Block Condition. IEEE Trans. Multim. 26: 10446-10461 (2024) - [c36]Zeshan Pang, Shasha Guo, Xuehu Yan, Yuliang Lu:
Destruction and Reconstruction Chain: An Adaptive Adversarial Purification Framework. TrustCom 2024: 2336-2341 - [i1]Xuan Wang, Zeshan Pang, Yuliang Lu, Xuehu Yan:
MGE: A Training-Free and Efficient Model Generation and Enhancement Scheme. CoRR abs/2402.17486 (2024) - 2023
- [j83]Xuehu Yan
, Longlong Li, Jia Chen, Lei Sun:
Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing. Frontiers Inf. Technol. Electron. Eng. 24(1): 88-103 (2023) - [j82]Shengyang Luo
, Yaqi Liu, Xuehu Yan
, Yongqiang Yu:
Secret image sharing scheme with lossless recovery and high efficiency. Signal Process. 206: 108931 (2023) - [j81]Xuehu Yan
, Longlong Li
, Lei Sun
, Jia Chen
, Shudong Wang
:
Fake and Dishonest Participant Immune Secret Image Sharing. ACM Trans. Multim. Comput. Commun. Appl. 19(4): 139:1-139:26 (2023) - [c35]Shengyang Luo, Yaqi Liu, Xuehu Yan, Chao Huang:
Cropping Resilient Secret Image Sharing Scheme with Lossless Recovery. TrustCom 2023: 1103-1110 - 2022
- [j80]Fengyue Xing
, Xuehu Yan
, Long Yu
, Longlong Li
:
A Novel General (n, n)-Threshold Multiple Secret Images Sharing Scheme Based on Information Hiding in the Sharing Domain. Entropy 24(3): 318 (2022) - [j79]Jingwen Cheng
, Xuehu Yan
, Lintao Liu, Yue Jiang, Xuan Wang:
Meaningful Secret Image Sharing with Saliency Detection. Entropy 24(3): 340 (2022) - [j78]Zhenyu Du, Fangzheng Liu, Xuehu Yan:
Minimum Adversarial Examples. Entropy 24(3): 396 (2022) - [j77]Long Yu
, Yuliang Lu
, Xuehu Yan
, Yongqiang Yu
:
MTS-Stega: Linguistic Steganography Based on Multi-Time-Step. Entropy 24(5): 585 (2022) - [j76]Feng Chen
, Qinghua Xing, Bing Sun
, Xuehu Yan
, Jingwen Cheng:
An Enhanced Steganography Network for Concealing and Protecting Secret Image Data. Entropy 24(9): 1203 (2022) - [j75]Yongqiang Yu
, Xuehu Yan
, Longlong Li, Jiayu Wang:
Renewal of secret and shadows in secret image sharing. IET Inf. Secur. 16(6): 432-441 (2022) - [j74]Jingwen Cheng
, Xuehu Yan, Lintao Liu, Yuyuan Sun, Fengyue Xing:
Comprehensive reversible secret image sharing with palette cover images. J. Inf. Secur. Appl. 68: 103233 (2022) - [j73]Jia Chen
, Yongjie Wang
, Xuehu Yan, Jiayu Wang, Longlong Li
:
Visual secret sharing scheme with (n, n) threshold based on WeChat Mini Program codes. J. Vis. Commun. Image Represent. 82: 103409 (2022) - [j72]Fengyue Xing, Xuehu Yan, Long Yu
, Yuyuan Sun:
Information hiding in the sharing domain. J. Vis. Commun. Image Represent. 86: 103520 (2022) - [j71]Yue Jiang
, Xuehu Yan, Jianqing Qi, Longlong Li
, Yiming Liu:
Meaningful secret image sharing resist to typical image processing of shadows. Multim. Tools Appl. 81(11): 16097-16115 (2022) - [j70]Xuan Wang, Yuliang Lu
, Xuehu Yan, Long Yu
:
Wet Paper Coding-Based Deep Neural Network Watermarking. Sensors 22(9): 3489 (2022) - [j69]Zhenyu Du, Fangzheng Liu, Xuehu Yan:
Sparse Adversarial Video Attacks via Superpixel-Based Jacobian Computation. Sensors 22(10): 3686 (2022) - [j68]Jiayu Wang
, Xuehu Yan
, Lintao Liu, Longlong Li
, Yongqiang Yu
:
CTTGAN: Traffic Data Synthesizing Scheme Based on Conditional GAN. Sensors 22(14): 5243 (2022) - [c34]Jia Chen
, Kunlin Chen, Yongjie Wang
, Xuehu Yan, Longlong Li
:
A General Steganalysis Method of QR Codes. ICDF2C 2022: 472-483 - [c33]Long Yu
, Yuliang Lu, Xuehu Yan, Xianhui Wang:
Generative Text Steganography via Multiple Social Network Channels Based on Transformers. NLPCC (1) 2022: 606-617 - 2021
- [j67]Yuyuan Sun
, Yuliang Lu
, Xuehu Yan
, Lintao Liu
, Longlong Li
:
Robust Secret Image Sharing Scheme Against Noise in Shadow Images. IEEE Access 9: 23284-23300 (2021) - [j66]Hanlin Liu, Jingju Liu, Xuehu Yan
, Pengfei Xue, Dingwei Tan:
An Audio Steganography Based on Run Length Encoding and Integer Wavelet Transform. Int. J. Digit. Crime Forensics 13(2): 16-34 (2021) - [j65]Xuemei Zhao, Tongtong Zhang, Jun Liu, Canju Lu, Huan Lu, Xuehu Yan
:
Applying Secret Image Sharing to Economics. Int. J. Digit. Crime Forensics 13(4): 16-25 (2021) - [j64]Xuehu Yan
, Junhao Li, Zulie Pan, Xiaofeng Zhong, Guozheng Yang:
Multiparty verification in image secret sharing. Inf. Sci. 562: 475-490 (2021) - [j63]Lintao Liu, Yuliang Lu, Xuehu Yan:
A novel (k1, k2, n)-threshold two-in-one secret image sharing scheme for multiple secrets. J. Vis. Commun. Image Represent. 74: 102971 (2021) - [j62]Dingwei Tan, Yuliang Lu, Xuehu Yan
, Longlong Li
:
BAT: real-time inaudible sound capture with smartphones. Multim. Tools Appl. 80(24): 33313-33327 (2021) - [j61]Jia Chen
, Quankai Qi
, Yongjie Wang
, Xuehu Yan
, Longlong Li
:
Data Hiding Based on Mini Program Code. Secur. Commun. Networks 2021: 5546344:1-5546344:12 (2021) - [j60]Yongjie Wang
, Jia Chen
, Qinghong Gong
, Xuehu Yan
, Yuyuan Sun
:
Weighted Polynomial-Based Secret Image Sharing Scheme with Lossless Recovery. Secur. Commun. Networks 2021: 5597592:1-5597592:11 (2021) - [j59]Jiayu Wang
, Xuehu Yan
, Jia Chen
, Yongqiang Yu
:
An Intragroup and Intergroup Multiple Secret Images' Sharing Scheme with Each Participant Holding One Shadow Image. Secur. Commun. Networks 2021: 9960998:1-9960998:14 (2021) - [j58]Xuehu Yan
, Yuliang Lu, Ching-Nung Yang
, Xinpeng Zhang
, Shudong Wang:
A Common Method of Share Authentication in Image Secret Sharing. IEEE Trans. Circuits Syst. Video Technol. 31(7): 2896-2908 (2021) - [j57]Xuehu Yan
, Lintao Liu, Longlong Li
, Yuliang Lu:
Robust Secret Image Sharing Resistant to Noise in Shares. ACM Trans. Multim. Comput. Commun. Appl. 17(1): 24:1-24:22 (2021) - [c32]Jiayu Wang, Lintao Liu, Jia Chen, Xuehu Yan:
Comparison and analysis of secret image sharing principles. CCCI 2021: 1-5 - [c31]Jia Chen
, Jiayu Wang
, Yongjie Wang
, Xuehu Yan
:
Data Hiding Based on Redundant Space of WeChat Mini Program Codes. IWDW 2021: 243-257 - 2020
- [j56]Feng Liu
, Xuehu Yan, Yuliang Lu
:
Feature Selection for Image Steganalysis Using Binary Bat Algorithm. IEEE Access 8: 4244-4249 (2020) - [j55]Xuehu Yan
, Yuliang Lu, Lintao Liu, Xia Li, Jingju Liu, Guozheng Yang:
Application of random elements in ISS. IET Image Process. 14(3): 530-535 (2020) - [j54]Xuehu Yan
, Yuliang Lu, Lintao Liu:
A Common General Access Structure Construction Approach in Secret Image Sharing. Int. J. Digit. Crime Forensics 12(3): 96-110 (2020) - [j53]Song Wan, Lanlan Qi, Guozheng Yang, Yuliang Lu, Xuehu Yan, Longlong Li
:
Visual secret sharing scheme with (n, n) threshold for selective secret content based on QR codes. Multim. Tools Appl. 79(3-4): 2789-2811 (2020) - [j52]Longdan Tan, Yuliang Lu, Xuehu Yan
, Lintao Liu, Xuan Zhou:
XOR-ed visual secret sharing scheme with robust and meaningful shadows based on QR codes. Multim. Tools Appl. 79(9-10): 5719-5741 (2020) - [j51]Xuehu Yan
, Feng Liu, Wei Qi Yan, Guozheng Yang, Yuliang Lu:
Weighted visual cryptographic scheme with improved image quality. Multim. Tools Appl. 79(29-30): 21345-21360 (2020) - [j50]Xuehu Yan
, Wei Qi Yan, Lintao Liu, Yuliang Lu:
Penrose tiling for visual secret sharing. Multim. Tools Appl. 79(43-44): 32693-32710 (2020) - [j49]Yongqiang Yu
, Longlong Li
, Yuliang Lu, Xuehu Yan
:
On the Value of Order Number and Power in Secret Image Sharing. Secur. Commun. Networks 2020: 6627178:1-6627178:13 (2020) - [j48]Xuehu Yan
, Qinghong Gong, Longlong Li
, Guozheng Yang, Yuliang Lu, Jingju Liu:
Secret image sharing with separate shadow authentication ability. Signal Process. Image Commun. 82: 115721 (2020) - [j47]Xuehu Yan
, Lei Sun, Yuliang Lu
, Guozheng Yang:
Adaptive Partial Image Secret Sharing. Symmetry 12(5): 703 (2020) - [j46]Xuehu Yan
, Yuliang Lu
, Lintao Liu
, Xianhua Song
:
Reversible Image Secret Sharing. IEEE Trans. Inf. Forensics Secur. 15: 3848-3858 (2020) - [c30]Dingwei Tan, Yuliang Lu, Xuehu Yan, Longlong Li:
Improved wavelet domain centroid-based adaptive audio steganography. ICDSP 2020: 202-206
2010 – 2019
- 2019
- [j45]Longdan Tan
, Yuliang Lu, Xuehu Yan
, Lintao Liu, Longlong Li
:
Weighted Secret Image Sharing for a $(k, n)$ Threshold Based on the Chinese Remainder Theorem. IEEE Access 7: 59278-59286 (2019) - [j44]Longlong Li
, Yuliang Lu, Xuehu Yan
, Lintao Liu, Longdan Tan
:
Lossless $(k, n)$ -Threshold Image Secret Sharing Based on the Chinese Remainder Theorem Without Auxiliary Encryption. IEEE Access 7: 75113-75121 (2019) - [j43]Qinghong Gong
, Yongjie Wang, Xuehu Yan
, Lintao Liu:
Efficient and Lossless Polynomial-Based Secret Image Sharing for Color Images. IEEE Access 7: 113216-113222 (2019) - [j42]Hanlin Liu, Jingju Liu, Xuehu Yan
, Lintao Liu, Wanmeng Ding, Yue Jiang:
A Novel Behavior Steganography Model Based on Secret Sharing. Int. J. Digit. Crime Forensics 11(4): 97-117 (2019) - [j41]Xuehu Yan
, Lintao Liu
, Yuliang Lu, Qinghong Gong:
Security analysis and classification of image secret sharing. J. Inf. Secur. Appl. 47: 208-216 (2019) - [j40]Xuehu Yan
, Yuliang Lu:
Generalized general access structure in secret image sharing. J. Vis. Commun. Image Represent. 58: 89-101 (2019) - [j39]Lintao Liu
, Yuliang Lu
, Xuehu Yan
:
Polynomial-based extended secret image sharing scheme with reversible and unexpanded covers. Multim. Tools Appl. 78(2): 1265-1287 (2019) - [j38]Xuehu Yan
, Yuliang Lu, Lintao Liu
:
A general progressive secret image sharing construction method. Signal Process. Image Commun. 71: 66-75 (2019) - [c29]Feng Liu, Xuehu Yan, Yuliang Lu:
Destructive Method with High Quality and Speed to Counter Information Hiding. ICPCSEE (1) 2019: 312-322 - 2018
- [j37]Xuehu Yan
, Yuliang Lu, Lintao Liu:
General Meaningful Shadow Construction in Secret Image Sharing. IEEE Access 6: 45246-45255 (2018) - [j36]Xuehu Yan, Yuliang Lu
, Lintao Liu, Jingju Liu, Guozheng Yang:
Chinese remainder theorem-based two-in-one image secret sharing with three decoding options. Digit. Signal Process. 82: 80-90 (2018) - [j35]Wanmeng Ding, Kesheng Liu, Xuehu Yan
, Lintao Liu:
Polynomial-Based Secret Image Sharing Scheme with Fully Lossless Recovery. Int. J. Digit. Crime Forensics 10(2): 120-136 (2018) - [j34]Xuehu Yan
, Yuliang Lu
, Lintao Liu, Duohe Ma:
Image Secret Sharing Construction for General Access Structure with Meaningful Share. Int. J. Digit. Crime Forensics 10(3): 66-77 (2018) - [j33]Hanlin Liu, Jingju Liu, Xuehu Yan, Pengfei Xue, Song Wan, Li Li:
Centroid-Based Audio Steganography Scheme in Wavelet Domain. J. Inf. Hiding Multim. Signal Process. 9(5): 1222-1232 (2018) - [j32]Xuehu Yan
, Yuliang Lu
:
Participants increasing for threshold random grids-based visual secret sharing. J. Real Time Image Process. 14(1): 13-24 (2018) - [j31]Song Wan, Yuliang Lu
, Xuehu Yan
, Yongjie Wang, Chao Chang:
Visual secret sharing scheme for (k, n) threshold based on QR code with multiple decryptions. J. Real Time Image Process. 14(1): 25-40 (2018) - [j30]Xuehu Yan
, Xin Liu, Ching-Nung Yang
:
An enhanced threshold visual secret sharing based on random grids. J. Real Time Image Process. 14(1): 61-73 (2018) - [j29]Xuehu Yan
, Yuliang Lu
, Lintao Liu, Shen Wang:
Partial secret image sharing for (k, n) threshold based on image inpainting. J. Vis. Commun. Image Represent. 50: 135-144 (2018) - [j28]Xuehu Yan
, Yuliang Lu
:
Progressive visual secret sharing for general access structure with multiple decryptions. Multim. Tools Appl. 77(2): 2653-2672 (2018) - [j27]Lintao Liu
, Yuliang Lu, Xuehu Yan, Huaixi Wang:
Greyscale-images-oriented progressive secret sharing based on the linear congruence equation. Multim. Tools Appl. 77(16): 20569-20596 (2018) - [j26]Xin Liu, Shen Wang, Xuehu Yan, Weizhe Zhang:
Random grid-based threshold visual secret sharing with improved visual quality and lossless recovery ability. Multim. Tools Appl. 77(16): 20673-20696 (2018) - [j25]Longdan Tan, Kesheng Liu, Xuehu Yan
, Lintao Liu, Tianqi Lu, Jinrui Chen, Feng Liu
, Yuliang Lu:
Robust Visual Secret Sharing Scheme Applying to QR Code. Secur. Commun. Networks 2018: 4036815:1-4036815:12 (2018) - [j24]Xuan Zhou
, Yuliang Lu
, Xuehu Yan
, Yongjie Wang, Lintao Liu:
Lossless and Efficient Polynomial-Based Secret Image Sharing with Reduced Shadow Size. Symmetry 10(7): 249 (2018) - [j23]Jinrui Chen
, Kesheng Liu, Xuehu Yan, Lintao Liu, Xuan Zhou
, Longdan Tan:
Chinese Remainder Theorem-Based Secret Image Sharing with Small-Sized Shadow Images. Symmetry 10(8): 340 (2018) - [j22]Wanmeng Ding, Kesheng Liu, Xuehu Yan
, Huaixi Wang, Lintao Liu, Qinghong Gong:
An Image Secret Sharing Method Based on Matrix Theory. Symmetry 10(10): 530 (2018) - 2017
- [j21]Xuehu Yan
, Yuliang Lu
:
Contrast-improved visual secret sharing based on random grid for general access structure. Digit. Signal Process. 71: 36-45 (2017) - [j20]Xuehu Yan
, Yuliang Lu
, Lintao Liu, Song Wan, Wanmeng Ding, Hanlin Liu:
Exploiting the Homomorphic Property of Visual Cryptography. Int. J. Digit. Crime Forensics 9(2): 45-56 (2017) - [j19]Lintao Liu, Yuliang Lu, Xuehu Yan
, Song Wan:
A Novel Progressive Secret Image Sharing Scheme Based on Arithmetic Mean. Int. J. Digit. Crime Forensics 9(3): 28-37 (2017) - [j18]Song Wan, Yuliang Lu, Xuehu Yan
, Lintao Liu:
A Novel Visual Secret Sharing Scheme Based on QR Codes. Int. J. Digit. Crime Forensics 9(3): 38-48 (2017) - [j17]Xin Liu, Shen Wang, Xuehu Yan, Weizhe Zhang:
Homomorphic Visual Cryptography. J. Inf. Hiding Multim. Signal Process. 8(3): 744-756 (2017) - [c28]Hanlin Liu, Jingju Liu, RongGui Hu, Xuehu Yan
, Song Wan:
Adaptive Audio Steganography Scheme Based on Wavelet Packet Energy. BigDataSecurity/HPSC/IDS 2017: 26-31 - [c27]Wanmeng Ding, Kesheng Liu, Lintao Liu, Xuehu Yan
:
Participants Increasing for Shamir's Polynomial-Based Secret Image Sharing Scheme. BigDataSecurity/HPSC/IDS 2017: 32-36 - [c26]Xuehu Yan
, Yuliang Lu
, Yuxin Chen, Canju Lu, Benmu Zhu, Qinglei Liao:
Secret Image Sharing Based on Error-Correcting Codes. BigDataSecurity/HPSC/IDS 2017: 86-89 - [c25]Xuehu Yan
, Yuliang Lu
, Lintao Liu, Song Wan, Wanmeng Ding, Hanlin Liu:
Chinese Remainder Theorem-Based Secret Image Sharing for (k, n) Threshold. ICCCS (2) 2017: 433-440 - [c24]Xuehu Yan
, Yuliang Lu
, Lintao Liu, Shen Wang, Song Wan, Wanmeng Ding, Hanlin Liu:
Partial Secret Image Sharing for (n, n) Threshold Based on Image Inpainting. ICIG (3) 2017: 527-538 - [c23]Song Wan, Yuliang Lu
, Xuehu Yan
, Hanlin Liu, Longdan Tan:
Secret Data-Driven Carrier-Free Secret Sharing Scheme Based on Error Correction Blocks of QR Codes. ICPCSEE (1) 2017: 231-241 - [c22]Xuehu Yan
, Yuliang Lu
, Lintao Liu, Song Wan, Wanmeng Ding, Hanlin Liu:
Security Analysis of Secret Image Sharing. ICPCSEE (1) 2017: 305-316 - [c21]Wanmeng Ding, Kesheng Liu, Xuehu Yan
, Lintao Liu:
A General (k, n) Threshold Secret Image Sharing Construction Based on Matrix Theory. ICPCSEE (1) 2017: 331-340 - [c20]Lintao Liu, Yuliang Lu
, Xuehu Yan
, Wanmeng Ding:
A Novel Progressive Secret Image Sharing Method with Better Robustness. ICPCSEE (2) 2017: 539-550 - [c19]Xuehu Yan
, Yuliang Lu, Lintao Liu, Song Wan, Wanmeng Ding, Hanlin Liu:
Secret Image Sharing for (k, k) Threshold Based on Chinese Remainder Theorem and Image Characteristics. PSIVT 2017: 174-181 - 2016
- [j16]Ching-Nung Yang
, Li-Zhe Sun, Xuehu Yan
, Cheonshik Kim
:
Design a new visual cryptography for human-verifiable authentication in accessing a database. J. Real Time Image Process. 12(2): 483-494 (2016) - [j15]Shen Wang, Xuehu Yan, Jianzhi Sang, Xiamu Niu:
Meaningful visual secret sharing based on error diffusion and random grids. Multim. Tools Appl. 75(6): 3353-3373 (2016) - [j14]Xuehu Yan
, Shen Wang, Xiamu Niu:
Threshold progressive visual cryptography construction with unexpanded shares. Multim. Tools Appl. 75(14): 8657-8674 (2016) - [c18]Xuehu Yan
, Yuliang Lu
, Hui Huang, Lintao Liu, Song Wan:
Clarity Corresponding to Contrast in Visual Cryptography. ICYCSEE (1) 2016: 249-257 - [c17]Xuehu Yan
, Yuliang Lu
, Lintao Liu, Song Wan, Wanmeng Ding, Hanlin Liu:
Contrast-Improved Visual Cryptography for General Access Structure. iThings/GreenCom/CPSCom/SmartData 2016: 578-583 - [c16]Xuehu Yan
, Yuliang Lu
, Lintao Liu, Song Wan:
Random Grids-Based Threshold Visual Secret Sharing with Improved Visual Quality. IWDW 2016: 209-222 - [c15]Song Wan, Yuliang Lu
, Xuehu Yan
, Lintao Liu:
Visual Secret Sharing Scheme with (k, n) Threshold Based on QR Codes. MSN 2016: 374-379 - [c14]Lintao Liu, Yuliang Lu, Xuehu Yan, Song Wan:
A Progressive Threshold Secret Image Sharing with Meaningful Shares for Gray-Scale Image. MSN 2016: 380-385 - [c13]Song Wan, Yuliang Lu, Xuehu Yan, Wanmeng Ding, Hanlin Liu:
High Capacity Embedding Methods of QR Code Error Correction. WICON 2016: 70-79 - [c12]Xuehu Yan, Yuliang Lu, Lintao Liu, Song Wan, Wanmeng Ding, Hanlin Liu:
Perceptual Secret Sharing Scheme Based on Boolean Operations and Random Grids. WICON 2016: 80-90 - 2015
- [j13]Xuehu Yan
, Shen Wang, Xiamu Niu, Ching-Nung Yang
:
Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality. Digit. Signal Process. 38: 53-65 (2015) - [j12]Jianzhi Sang, Shen Wang, Xianhua Song, Xuehu Yan, Xiamu Niu:
A novel representation for Multi-Channel log-polar quantum images. J. Inf. Hiding Multim. Signal Process. 6(2): 340-350 (2015) - [j11]Xuehu Yan
, Shen Wang, Xiamu Niu, Ching-Nung Yang
:
Random grid-based visual secret sharing with multiple decryptions. J. Vis. Commun. Image Represent. 26: 94-104 (2015) - [j10]Xuehu Yan, Shen Wang, Ahmed A. Abd El-Latif
, Xiamu Niu:
Visual secret sharing based on random grids with abilities of AND and XOR lossless recovery. Multim. Tools Appl. 74(9): 3231-3252 (2015) - [j9]Xuehu Yan, Shen Wang, Ahmed A. Abd El-Latif
, Xiamu Niu:
Random grids-based visual secret sharing with improved visual quality via error diffusion. Multim. Tools Appl. 74(21): 9279-9296 (2015) - [j8]Xuehu Yan
, Shen Wang, Xiamu Niu, Ching-Nung Yang
:
Generalized random grids-based threshold visual cryptography with meaningful shares. Signal Process. 109: 317-333 (2015) - [j7]Xuehu Yan, Shen Wang, Ahmed A. Abd El-Latif
, Xiamu Niu:
New approaches for efficient information hiding-based secret image sharing schemes. Signal Image Video Process. 9(3): 499-510 (2015) - [j6]Xuehu Yan, Shen Wang, Ahmed A. Abd El-Latif
, Xiamu Niu:
Threshold visual secret sharing with comprehensive properties based on random grids. Signal Image Video Process. 9(7): 1659-1668 (2015) - [j5]Ning Wang, Qiong Li, Ahmed A. Abd El-Latif
, Jialiang Peng, Xuehu Yan, Xiamu Niu:
A novel template protection scheme for multibiometrics based on fuzzy commitment and chaotic system. Signal Image Video Process. 9(Supplement-1): 99-109 (2015) - 2014
- [j4]Xuehu Yan, Shen Wang, Xiamu Niu:
Threshold construction from specific cases in visual cryptography without the pixel expansion. Signal Process. 105: 389-398 (2014) - [j3]Xuehu Yan, Shen Wang, Ahmed A. Abd El-Latif
, Jianzhi Sang, Xiamu Niu:
A Novel Perceptual Secret Sharing Scheme. Trans. Data Hiding Multim. Secur. 9: 68-90 (2014) - [c11]Shen Wang, Xuehu Yan, Jianzhi Sang, Xiamu Niu:
Equivalence Proof of Traditional and Random Grid-Based (2, 2) Visual Secret Sharing. ECC (2) 2014: 137-146 - [c10]Xuehu Yan, Shen Wang, Xiamu Niu:
Threshold Visual Secret Sharing Based on Boolean Operations and Random Grids. ICONIP (3) 2014: 620-627 - [c9]Xuehu Yan
, Shen Wang, Xiamu Niu, Ching-Nung Yang:
Essential Visual Cryptographic Scheme with Different Importance of Shares. ICONIP (3) 2014: 636-643 - [c8]Xianhua Song, Shen Wang, Jianzhi Sang, Xuehu Yan, Xiamu Niu:
Flexible Quantum Image Secret Sharing Based on Measurement and Strip. IIH-MSP 2014: 215-218 - [c7]Xuehu Yan, Shen Wang, Xiamu Niu:
Equivalence Proof of Two (2, n) Progressive Visual Secret Sharing. IIH-MSP 2014: 223-226 - [c6]Xuehu Yan, Guohui Chen, Ching-Nung Yang
, Song-Ruei Cai:
Random Girds-Based Threshold Visual Secret Sharing with Improved Contrast by Boolean Operations. IWDW 2014: 319-332 - [c5]Guohui Chen, Chunying Wang, Xuehu Yan
, Peng Li:
Progressive Visual Secret Sharing with Multiple Decryptions and Unexpanded Shares. IWDW 2014: 376-386 - 2013
- [j2]Xuehu Yan, Shen Wang, Li Li, Ahmed A. Abd El-Latif, Zhiqiang Wei, Xiamu Niu:
A New Assessment Measure of Shadow Image Quality Based on Error Diffusion Techniques. J. Inf. Hiding Multim. Signal Process. 4(2): 119-127 (2013) - [j1]Xuehu Yan, Shen Wang, Ahmed A. Abd El-Latif
, Jianzhi Sang, Xiamu Niu:
Corrigendum to "T. Chen, K. Tsao, Threshold visual secret sharing by random grids" [J. Syst. Softw. 84(2011) 1197-1208]. J. Syst. Softw. 86(5): 1462-1463 (2013) - [c4]Ning Wang, Qiong Li, Ahmed A. Abd El-Latif
, Xuehu Yan, Xiamu Niu:
A Novel Hybrid Multibiometrics Based on the Fusion of Dual Iris, Visible and Thermal Face Images. ISBAST 2013: 217-223 - 2012
- [c3]Xiamu Niu, Zhongwei Shuai, Yongqiang Lin, Xuehu Yan:
A Novel Coding Method for Multiple System Barcode Based on QR Code. ACIIDS (2) 2012: 99-108
2000 – 2009
- 2008
- [c2]Xuehu Yan, Shuai Guan, Xiamu Niu:
Research on the Capacity of Error-Correcting Codes-Based Information Hiding. IIH-MSP 2008: 1158-1161 - 2007
- [c1]Xuehu Yan, Shenghong Chen, Xiamu Niu:
An Improved Algorithm for Iris Location. CIS 2007: 964-967
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-25 17:51 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint