default search action
Bin Yan 0001
Person information
- affiliation: Shandong University of Science and Technology, College of Electronic and Information Engineering, Qingdao, China
- affiliation (2015 - 2016): Deakin University, Australia
- affiliation (PhD 2007): Harbin Institute of Technology, Department of Automatic Test and Control, China
Other persons with the same name
- Bin Yan — disambiguation page
- Bin Yan 0002 — PLA Strategy Support Force Information Engineering University, Henan Key Laboratory of Imaging and Intelligence Processing, Zhengzhou, China (and 1 more)
- Bin Yan 0003 — Northwest A&F University, College of Mechanical and Electronic Engineering, China (and 1 more)
- Bin Yan 0004 — Dalian University of Technology, School of Information and Communication Engineering, China (and 1 more)
- Bin Yan 0005 — University of Electronic Science and Technology of China, School of Automation Engineering, Chengdu, China
- Bin Yan 0006 — Chinese Academy of Sciences, Aerospace Information Research Institute, Beijing, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j38]Xiaotong Sun, Hongmei Yang, Bin Yan, Xianghao Yang, Haoming Dang:
Adaptive robust watermarking scheme based on RIME optimization with integer wavelet transform, singular value decomposition, and Hadamard transform. J. Electronic Imaging 33(5) (2024) - [j37]Zi-Ming Wu, Hao Kong, Bin Yan, Jeng-Shyang Pan, Hong-Mei Yang, Zhen-Zhen Ju:
FPGA implementation of secret sharing for textured 3D mesh model based on texture vertex correlation. J. Real Time Image Process. 21(3): 66 (2024) - [j36]Feng-Qing Liu, Tao Liu, Bin Yan, Jeng-Shyang Pan, Hong-Mei Yang:
Non-iterative reversible information hiding in the secret sharing domain. J. Vis. Commun. Image Represent. 100: 104096 (2024) - 2023
- [j35]Jeng-Shyang Pan, Si-Qi Zhang, Shu-Chuan Chu, Hong-Mei Yang, Bin Yan:
Willow Catkin Optimization Algorithm Applied in the TDOA-FDOA Joint Location Problem. Entropy 25(1): 171 (2023) - [j34]Jeng-Shyang Pan, Longkang Yue, Shu-Chuan Chu, Pei Hu, Bin Yan, Hong-Mei Yang:
Binary Bamboo Forest Growth Optimization Algorithm for Feature Selection Problem. Entropy 25(2): 314 (2023) - [j33]Jeng-Shyang Pan, Tao Liu, Bin Yan, Hong-Mei Yang, Shu-Chuan Chu:
A Lossless-Recovery Secret Distribution Scheme Based on QR Codes. Entropy 25(4): 653 (2023) - [j32]Zi-Ming Wu, Tao Liu, Bin Yan, Jeng-Shyang Pan, Hong-Mei Yang:
FPGA acceleration of secret sharing for 3D data cubes. J. Real Time Image Process. 20(4): 82 (2023) - [j31]Zi-Nan Liu, Tao Liu, Bin Yan, Jeng-Shyang Pan, Hong-Mei Yang:
Multitone reconstruction visual cryptography based on phase periodicity. J. Vis. Commun. Image Represent. 93: 103827 (2023) - [j30]Wen-Xin Yuan, Bin Yan, Wen Li, Liu-Yao Hao, Hong-Mei Yang:
Blockchain-based medical health record access control scheme with efficient protection mechanism and patient control. Multim. Tools Appl. 82(11): 16279-16300 (2023) - [j29]Meng-Yuan Zhao, Bin Yan, Jeng-Shyang Pan, Hong-Mei Yang:
Quantum meaningful visual cryptography. Quantum Inf. Process. 22(8): 312 (2023) - 2022
- [j28]Jeng-Shyang Pan, Tao Liu, Hong-Mei Yang, Bin Yan, Shu-Chuan Chu, Tongtong Zhu:
Visual cryptography scheme for secret color images with color QR codes. J. Vis. Commun. Image Represent. 82: 103405 (2022) - [j27]Jeng-Shyang Pan, Tao Liu, Bin Yan, Hong-Mei Yang, Shu-Chuan Chu:
Using color QR codes for QR code secret sharing. Multim. Tools Appl. 81(11): 15545-15563 (2022) - [j26]Tao Liu, Bin Yan, Hong-Mei Yang, Shu-Chuan Chu, Jeng-Shyang Pan:
A fake threshold visual cryptography of QR code. Multim. Tools Appl. 81(27): 39635-39653 (2022) - [j25]Shu-Mei Liu, Hong-Mei Yang, Jeng-Shyang Pan, Tao Liu, Bin Yan:
A novel perfect contrast XOR-based visual cryptography scheme for multiple secrets. Multim. Tools Appl. 81(30): 43125-43143 (2022) - [j24]Meng-Xi Wang, Hong-Mei Yang, Dong-Huan Jiang, Bin Yan, Jeng-Shyang Pan, Tao Liu:
A novel quantum color image steganography algorithm based on turtle shell and LSB. Quantum Inf. Process. 21(4): 148 (2022) - [j23]Meng-Xi Wang, Hong-Mei Yang, Dong-Huan Jiang, Bin Yan, Jeng-Shyang Pan, Tong Wang:
A novel quantum image watermarking scheme for tamper localization and self-recovery. Quantum Inf. Process. 21(8): 277 (2022) - 2021
- [j22]Jeng-Shyang Pan, Xiao-Xue Sun, Shu-Chuan Chu, Ajith Abraham, Bin Yan:
Digital watermarking with improved SMS applied for QR code. Eng. Appl. Artif. Intell. 97: 104049 (2021) - [j21]Lu Wang, Bin Yan, Hong-Mei Yang, Jeng-Shyang Pan:
Flip Extended Visual Cryptography for Gray-Scale and Color Cover Images. Symmetry 13(1): 65 (2021) - [c10]Shumei Liu, Hongmei Yang, Jeng-Shyang Pan, Tao Liu, Bin Yan, Yuying Gu:
An Image Compression Algorithm Based on Quantization and DWT-BP Neural Network. EITCE 2021: 579-585 - 2020
- [j20]Na Chen, Shuangshuang Shuai, Bin Yan, Ning Xu, Changxing Pei:
Multi-Hop Quantum Communication Based on Greenberger-Horne-Zeilinger States and Teleportation. IEEE Access 8: 52052-52061 (2020) - [j19]Yu-Xia Sun, Qi Li, Bin Yan, Jeng-Shyang Pan, Hong-Mei Yang:
Reversible data hiding in dual encrypted halftone images using matrix embedding. Multim. Tools Appl. 79(37-38): 27659-27682 (2020) - [j18]Moses A. Acquah, Na Chen, Jeng-Shyang Pan, Hong-Mei Yang, Bin Yan:
Securing Fingerprint Template Using Blockchain and Distributed Storage System. Symmetry 12(6): 951 (2020) - [j17]Yu-Song Yan, Huili Cai, Bin Yan:
Data Hiding in Symmetric Circular String Art. Symmetry 12(8): 1227 (2020)
2010 – 2019
- 2019
- [j16]Liu-Yao Hao, Bin Yan, Jeng-Shyang Pan, Na Chen, Hong-Mei Yang, Moses A. Acquah:
Adaptive Unified Data Embedding and Scrambling for Three-Dimensional Mesh Models. IEEE Access 7: 162366-162386 (2019) - [j15]Huili Cai, Bin Yan, Jeng-Shyang Pan, Jiong-Liang Ye:
Print-Scan Resistant Two-Level QR Code. J. Inf. Hiding Multim. Signal Process. 10(2): 300-312 (2019) - [j14]Yuying Gu, Hongmei Yang, Bin Yan, Xiaodong Wang, Zhongying Zhao:
Digital image self-recovery algorithm based on improved joint source-channel coding optimizer. Multim. Tools Appl. 78(15): 21041-21064 (2019) - [j13]Huili Cai, Bin Yan, Na Chen, Jeng-Shyang Pan, Hong-Mei Yang:
Beautified QR code with high storage capacity using sequential module modulation. Multim. Tools Appl. 78(16): 22575-22599 (2019) - [j12]Bin Yan, Yong Xiang, Guang Hua:
Improving the Visual Quality of Size-Invariant Visual Cryptography for Grayscale Images: An Analysis-by-Synthesis (AbS) Approach. IEEE Trans. Image Process. 28(2): 896-911 (2019) - [c9]Na Chen, Bin Yan, Shuangshuang Shuai, Changxing Pei:
Faithful Multi-Hop Qubit Transmission Based on GHZ States. PDCAT 2019: 179-183 - [c8]Huili Cai, Xiaofeng Liu, Bin Yan:
Beautified QR Code with Security Based on Data Hiding. UKCI 2019: 423-432 - 2018
- [j11]Bin Yan, Na Chen, Hong-Mei Yang, Jianjun Hao:
Local Blackness Preserving Visual Cryptography for Grayscale Secret Images. J. Inf. Hiding Multim. Signal Process. 9(2): 370-382 (2018) - [j10]Qi Li, Bin Yan, Hui Li, Na Chen:
Separable reversible data hiding in encrypted images with improved security and capacity. Multim. Tools Appl. 77(23): 30749-30768 (2018) - [c7]Huili Cai, Bin Yan, Jeng-Shyang Pan:
Visual QR Code with Beautication and Self-recovery Based on Data Hiding. ICGEC 2018: 123-130 - [c6]Qi Li, Bin Yan, Hui Li, Jeng-Shyang Pan:
Reversible Watermarking Based on Adaptive Prediction Error Expansion. ICGEC 2018: 243-251 - [c5]Li-Fang Shi, Bin Yan, Jeng-Shyang Pan, Xiao-Hong Sun:
Generalized Benford's Distribution for Data Defined on Irregular Grid. ICGEC 2018: 383-391 - 2017
- [j9]Xiaoqin Zhou, Xiaofeng Liu, Chenguang Yang, Aimin Jiang, Bin Yan:
Multi-Channel Features Spatio-Temporal Context Learning for Visual Tracking. IEEE Access 5: 12856-12864 (2017) - [j8]Xiaoqin Zhou, Xiaofeng Liu, Aimin Jiang, Bin Yan, Chenguang Yang:
Improving Video Segmentation by Fusing Depth Cues and the Visual Background Extractor (ViBe) Algorithm. Sensors 17(5): 1177 (2017) - 2016
- [j7]Bin Yan, Ya-Fei Wang, Lingyun Song, Hong-Mei Yang:
Size-invariant extended visual cryptography with embedded watermark based on error diffusion. Multim. Tools Appl. 75(18): 11157-11180 (2016) - [j6]Bin Yan, Xiaofeng Liu, Hong-Mei Yang:
Structure compliant local warping of images with applications to watermarking attack. Multim. Tools Appl. 75(21): 13451-13479 (2016) - [c4]Chaosheng Xiang, Xiaofeng Liu, Aimin Jiang, Bin Yan, Jing Xia:
Poster: A Bicycle-borne Sensor Network for Monitoring Urban Air Quality. MobiSys (Companion Volume) 2016: 88 - 2015
- [j5]Bin Yan, Ya-Fei Wang, Lingyun Song, Hong-Mei Yang:
Power Spectrum Compliant QIM Watermarking for Autoregressive Host Signals. J. Inf. Hiding Multim. Signal Process. 6(5): 882-888 (2015) - 2014
- [j4]Bin Yan, Yinjing Guo, Xiaofeng Liu:
Condition for energy efficient watermarking without WSS assumption. Multim. Tools Appl. 71(3): 1499-1528 (2014) - 2013
- [j3]Bin Yan, Yinjing Guo:
Speech authentication by semi-fragile speech watermarking utilizing analysis by synthesis and spectral distortion optimization. Multim. Tools Appl. 67(2): 383-405 (2013)
2000 – 2009
- 2009
- [i1]Bin Yan, Zhe-Ming Lu, Yinjing Guo:
Condition for Energy Efficient Watermarking with Random Vector Model without WSS Assumption. CoRR abs/0901.1407 (2009) - 2007
- [c3]Bin Yan, Zhe-Ming Lu, Sheng-He Sun:
Spectrum Shaped Dither Modulation Watermarking for Correlated Host Signal. ICME 2007: 1227-1230 - 2006
- [j2]Bin Yan, Zhe-Ming Lu, Sheng-He Sun:
Security of autoregressive speech watermarking model under guessing attack. IEEE Trans. Inf. Forensics Secur. 1(3): 386-390 (2006) - 2005
- [j1]Zhe-Ming Lu, Bin Yan, Sheng-He Sun:
Watermarking Combined with CELP Speech Coding for Authentication. IEICE Trans. Inf. Syst. 88-D(2): 330-334 (2005) - [c2]Bin Yan, Zhe-Ming Lu, Sheng-He Sun, Jeng-Shyang Pan:
Speech Authentication by Semi-fragile Watermarking. KES (3) 2005: 497-504 - [c1]Bin Yan, Zhe-Ming Lu, Jeng-Shyang Pan, Sheng-He Sun:
Statistical Analysis of Two Polarity Detection Schemes in Speech Watermarking. ROCLING 2005
Coauthor Index
aka: Hong-Mei Yang
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 20:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint