Skip to main content

New Advances on Intelligent Multimedia Hiding and Forensics

  1. Social media plays an increasingly important role in providing information and social support to users. Due to the easy dissemination of content, as well as difficulty to track on the social network, we are mo...

    Authors: Yanyang Guo, Hanzhou Wu and Xinpeng Zhang

    Citation: EURASIP Journal on Image and Video Processing 2021 2021:5

    Content type: Research

    Published on:

  2. Social e-commerce has been a hot topic in recent years, with the number of users increasing year by year and the transaction money exploding. Unlike traditional e-commerce, the main activities of social e-comm...

    Authors: Haoliang Cui, Shuai Shao, Shaozhang Niu, Chengjie Shi and Lingyu Zhou

    Citation: EURASIP Journal on Image and Video Processing 2021 2021:4

    Content type: Research

    Published on:

  3. The excellent cover estimation is very important to the payload location of JPEG image steganography. But it is still hard to exactly estimate the quantized DCT coefficients in cover JPEG image. Therefore, thi...

    Authors: Jie Wang, Chunfang Yang, Ma Zhu, Xiaofeng Song, Yuan Liu and Yuemeng Lian

    Citation: EURASIP Journal on Image and Video Processing 2021 2021:1

    Content type: Research

    Published on:

  4. Chinese named entity recognition (CNER) in the judicial domain is an important and fundamental task in the analysis of judgment documents. However, only a few researches have been devoted to this task so far. ...

    Authors: Wenming Huang, Dengrui Hu, Zhenrong Deng and Jianyun Nie

    Citation: EURASIP Journal on Image and Video Processing 2020 2020:52

    Content type: Research

    Published on:

  5. Artificial intelligence has been widely studied on solving intelligent surveillance analysis and security problems in recent years. Although many multimedia security approaches have been proposed by using deep...

    Authors: Xu Cheng, Chen Song, Yongxiang Gu and Beijing Chen

    Citation: EURASIP Journal on Image and Video Processing 2020 2020:51

    Content type: Research

    Published on:

  6. Steganography is one of the important methods in the field of information hiding, which is the technique of hiding secret data within an ordinary file or message in order to avoid the detection of steganalysis...

    Authors: Zhangjie Fu, Fan Wang and Xu Cheng

    Citation: EURASIP Journal on Image and Video Processing 2020 2020:46

    Content type: Research

    Published on:

  7. In (k,n) secret sharing scheme, one secret is encrypted into n shares in such a way that only k or more shares can decrypt the secret. Secret sharing scheme can be extended into the field of multimedia that provi...

    Authors: Zheng Ma, Yan Ma, Xiaohong Huang, Manjun Zhang and Yanxiao Liu

    Citation: EURASIP Journal on Image and Video Processing 2020 2020:42

    Content type: Research

    Published on:

  8. When embedding secret message into image by steganography with matrix encoding, there are still no effective methods to recover the stego key because it is difficult to statistically distinguish the stego coef...

    Authors: Jiufen Liu, Chunfang Yang, Junchao Wang and Yanan Shi

    Citation: EURASIP Journal on Image and Video Processing 2020 2020:40

    Content type: Research

    Published on:

  9. Since the concept of coverless information hiding was proposed, it has been greatly developed due to its effectiveness of resisting the steganographic tools. Most existing coverless image steganography (CIS) m...

    Authors: Qiang Liu, Xuyu Xiang, Jiaohua Qin, Yun Tan and Yao Qiu

    Citation: EURASIP Journal on Image and Video Processing 2020 2020:39

    Content type: Research

    Published on:

  10. In order to protect the intellectual property of neural network, an owner may select a set of trigger samples and their corresponding labels to train a network, and prove the ownership by the trigger set witho...

    Authors: Renjie Zhu, Xinpeng Zhang, Mengte Shi and Zhenjun Tang

    Citation: EURASIP Journal on Image and Video Processing 2020 2020:37

    Content type: Research

    Published on:

  11. To fundamentally resist the steganalysis, coverless information hiding has been proposed, and it has become a research hotspot in the field of covert communication. However, the current methods not only requir...

    Authors: Yi Cao, Zhili Zhou, Q. M. Jonathan Wu, Chengsheng Yuan and Xingming Sun

    Citation: EURASIP Journal on Image and Video Processing 2020 2020:36

    Content type: Research

    Published on:

  12. In this paper, a new reversible data hiding scheme in encrypted binary image is proposed by shared pixel prediction and halving compression. We first divide binary image into non-overlapping pure color blocks ...

    Authors: Fengyong Li, Lianming Zhang and Weimin Wei

    Citation: EURASIP Journal on Image and Video Processing 2020 2020:33

    Content type: Research

    Published on:

  13. As a large number of images are transmitted through social networks every moment, terrorists may hide data into images to convey secret data. Various types of images are mixed up in the social networks, and it...

    Authors: Huaqi Wang, Zhenxing Qian, Guorui Feng and Xinpeng Zhang

    Citation: EURASIP Journal on Image and Video Processing 2020 2020:30

    Content type: Research

    Published on:

  14. In recent years, researchers have been making great progress in the steganalysis technology based on convolution neural networks (CNN). However, experts ignore the contribution of nonlinear residual and joint ...

    Authors: Ze Wang, Mingzhi Chen, Yu Yang, Min Lei and Zhexuan Dong

    Citation: EURASIP Journal on Image and Video Processing 2020 2020:28

    Content type: Research

    Published on:

  15. Due to the fact that coverless information hiding can effectively resist the detection of steganalysis tools, it has attracted more attention in the field of information hiding. At present, most coverless info...

    Authors: Nan Pan, Jiaohua Qin, Yun Tan, Xuyu Xiang and Guimin Hou

    Citation: EURASIP Journal on Image and Video Processing 2020 2020:23

    Content type: Research

    Published on:

  16. Image hashing is an efficient technology for processing digital images and has been successfully used in image copy detection, image retrieval, image authentication, image quality assessment, and so on. In thi...

    Authors: Zhenjun Tang, Hanyun Zhang, Shenglian Lu, Heng Yao and Xianquan Zhang

    Citation: EURASIP Journal on Image and Video Processing 2020 2020:21

    Content type: Research

    Published on:

  17. The traditional information hiding is realized by embedding the secret information into the multimedia, but it will inevitably leave the modification mark in the carrier. This paper proposed a new method of co...

    Authors: Xintao Duan, Baoxia Li, Daidou Guo, Zhen Zhang and Yuanyuan Ma

    Citation: EURASIP Journal on Image and Video Processing 2020 2020:18

    Content type: Research

    Published on:

  18. Semi-structured data is a widely used text format for data interchange and storage. This paper proposes a robust watermarking scheme of data protection for semi-structured data, which uses JSON format as an ex...

    Authors: Jiahuan He, Qichao Ying, Zhenxing Qian, Guorui Feng and Xinpeng Zhang

    Citation: EURASIP Journal on Image and Video Processing 2020 2020:12

    Content type: Research

    Published on:

  19. Deep neural networks are vulnerable to adversarial samples, posing potential threats to the applications deployed with deep learning models in practical conditions. A typical example is the fingerprint livenes...

    Authors: Jianwei Fei, Zhihua Xia, Peipeng Yu and Fengjun Xiao

    Citation: EURASIP Journal on Image and Video Processing 2020 2020:1

    Content type: Research

    Published on: