学术论文
- Qianwen Li, Xiang Wang, Qingqi Pei, "Database Watermarking Algorithm based on Decision Tree Shift Correction," in IEEE Internet of Things Journal, 2022.
- Qianwen Li, Xiang Wang, Qingqi Pei, "Compression Domain Reversible Robust Watermarking Based on Multilayer Embedding", Security and Communication Networks, vol. 2022, Article ID 4542705, 13 pages, 2022.
- Li, Q., Wang, X. & Pei, Q. A robust reversible watermarking scheme overcomes the misalignment problem of generalized histogram shifting. Multimedia Tools Appl (2022).
- Li Q., Wang X., Pei Q. A Reversible Watermarking Scheme Based on Adaptive Block Sized Integer Transform. Artificial Intelligence and Security. ICAIS 2020. Communications in Computer and Information Science, vol 1254. Springer, Singapore.
- Xiang, W., Yang, C., Jiao, L., Pei, Q. (2020). Image Content Location Privacy Preserving in Social Network Travel Image Sharing. In: Sun, X., Wang, J., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2020. Lecture Notes in Computer Science, vol 12240. Springer, Cham.
- X. Wang, X. Li, and Q. Pei, “Independent Embedding Domain based Two-stage Robust Reversible Watermarking,” IEEE Transactions on Circuits and Systems for Video Technology, pp. 1–1, 2019.
- X. Wang, H. Xue, X. Liu, and Q. Pei, “A Privacy-Preserving Edge Computation-Based Face Verification System for User Authentication,” IEEE Access, vol. 7, pp. 14186–14197, 2019.
- W. Su, X. Wang, F. Li, Y. Shen, and Q. Pei, “Reversible data hiding using the dynamic block-partition strategy and pixel-value-ordering,” Multimedia Tools and Applications, Aug. 2018.
- X. Wang, T. Shu, M. Xie, and Q. Pei, “Adaptive Robust Reversible Watermarking Scheme,” in Cloud Computing and Security, 2018, pp. 221–230.
- X. Yu, X. Wang, and Q. Pei, “Reversible watermarking based on multi-dimensional prediction-error expansion,” Multimed Tools Appl, pp. 1–20, May 2018.
- Y. Yan, Q. Pei, X. Wang, and Y. Wang, “Probability-based prediction query algorithm,” Ad Hoc Networks, vol. 60, pp. 52–65, May 2017.
- X. Wang, J. Ding, and Q. Pei, “A novel reversible image data hiding scheme based on pixel value ordering and dynamic pixel block partition,” Information Sciences, vol. 310, pp. 16–35, 2015.
- X. Wang, Q. Pei, and H. Li, “A Lossless Tagged Visual Cryptography Scheme,” IEEE Signal Processing Letters, vol. 21, no. 7, pp. 853–856, Jul. 2014.
- W. Xiang, P. Qingqi, Y. Peimin, L. Hui, and W. Yong, “A Novel Visual Multi-Secret Sharing Scheme Based on Folding-up Operation,” Chinese Journal of Electronics, vol. 22, no. CJE-4, pp. 795–798, 2013.
- X. Wang, Q. Pei, X. Gao, and Z. Guo, “Reversible Image Watermarking Using Hybrid Prediction,” in The Era of Interactive Media, New York, NY: Springer New York, 2013, pp. 545–555.
- X. Wang, Q. Pei, X. Gao, and H. Li, “Reversible Data Hiding By Combining Local And Global Search,” International Journal of Innovative Computing, Information and Control, vol. 9, no. 2, pp. 693–703, 2013.
- X. Wang, Y. Li, and Q. Pei, “Reversible watermarking based on histogram shift and adaptive embedding,” ICIC Express Letters, vol. 7, no. 4, pp. 1273–1278, 2013.
- Q. Pei, X. Wang, Y. Li, and H. Li, “Adaptive reversible watermarking with improved embedding capacity,” Journal of Systems and Software, vol. 86, no. 11, pp. 2841–2848, 2013.
- X. Wang and Z. Guo, “A novel reversible watermarking method using pre-selection strategy,” International Journal of Innovative Computing, Information and Control, vol. 7, no. 11, pp. 6187–6201, 2011.
- X. Wang, X. Li, B. Yang, and Z. Guo, “Efficient Generalized Integer Transform for Reversible Watermarking,” IEEE Signal Processing Letters, vol. 17, no. 6, pp. 567–570, Jun. 2010.
- X. Wang, X. Li, B. Yang, and Z. Guo, “A Reversible Watermarking Scheme for High-Fidelity Applications,” in Advances in Multimedia Information Processing-PCM 2009, Springer, 2009, pp. 613–624.
- X. Wang and Z. Guo, “A robust content-based watermarking scheme,” in Multimedia Signal Processing, 2009. MMSP’09. IEEE International Workshop on, 2009, pp. 1–6.
- Xiang Wang and Zongming Guo, “A Novel Real-Time Commercial Detection Scheme,” in Innovative Computing Information and Control, 2008. ICICIC’08. 3rd International Conference on, 2008, pp. 536–536.