Follow
Bingwen Feng
Bingwen Feng
Verified email at jnu.edu.cn
Title
Cited by
Cited by
Year
Secure binary image steganography based on minimizing the distortion on the texture
B Feng, W Lu, W Sun
IEEE transactions on Information Forensics and Security 10 (2), 243-255, 2014
1392014
TCEMD: A trust cascading-based emergency message dissemination model in VANETs
Z Liu, J Weng, J Ma, J Guo, B Feng, Z Jiang, K Wei
IEEE Internet of Things Journal 7 (5), 4028-4048, 2019
542019
Secure binary image steganography based on fused distortion measurement
W Lu, L He, Y Yeung, Y Xue, H Liu, B Feng
IEEE Transactions on Circuits and Systems for Video Technology 29 (6), 1608-1618, 2018
512018
Defining Embedding Distortion for Intra Prediction Mode-Based Video Steganography.
Q Nie, X Xu, B Feng, L Yu Zhang
Computers, Materials & Continua 55 (1), 2018
422018
Steganalysis of content-adaptive binary image data hiding
B Feng, J Weng, W Lu, B Pei
Journal of Visual Communication and Image Representation 46, 119-127, 2017
392017
Binary image steganalysis based on pixel mesh Markov transition matrix
B Feng, W Lu, W Sun
Journal of Visual Communication and Image Representation 26, 284-295, 2015
362015
Robust image watermarking based on tucker decomposition and adaptive-lattice quantization index modulation
B Feng, W Lu, W Sun, J Huang, YQ Shi
Signal Processing: Image Communication 41, 1-14, 2016
262016
Steganalysis with CNN using multi-channels filtered residuals
Y Yuan, W Lu, B Feng, J Weng
Cloud Computing and Security: Third International Conference, ICCCS 2017 …, 2017
222017
High capacity data hiding scheme for binary images based on minimizing flipping distortion
B Feng, W Lu, W Sun
Digital-Forensics and Watermarking: 12th International Workshop, IWDW 2013 …, 2014
172014
Lattice-based minimum-distortion data hiding
J Lin, J Qin, S Lyu, B Feng, J Wang
IEEE Communications Letters 25 (9), 2839-2843, 2021
102021
Improved algorithms for robust histogram shape-based image watermarking
B Feng, J Weng, W Lu
Digital Forensics and Watermarking: 16th International Workshop, IWDW 2017 …, 2017
102017
Novel steganographic method based on generalized K-distance N-dimensional pixel matching
B Feng, W Lu, W Sun
Multimedia Tools and Applications 74, 9623-9646, 2015
102015
High-capacity coverless image steganographic scheme based on image synthesis
G Li, B Feng, M He, J Weng, W Lu
Signal Processing: Image Communication 111, 116894, 2023
82023
Android malware detection based on APK signature information feedback
XY Liu, J Weng, Y Zhang, B Feng, J Weng
Journal on Communications 38 (5), 190-198, 2017
72017
Multiple watermarking using multilevel quantization index modulation
B Feng, J Weng, W Lu, B Pei
Digital Forensics and Watermarking: 15th International Workshop, IWDW 2016 …, 2017
72017
小型无人机安全研究综述
刘炜, 冯丙文, 翁健
网络与信息安全学报 2 (3), 39-45, 2016
72016
Survey on research of mini-drones security
W Liu, BW Feng, J WEN
Chinese Journal of Network and Information Security 2 (3), 39-45, 2016
62016
Content-adaptive residual for steganalysis
X Lin, B Feng, W Lu, W Sun
Digital-Forensics and Watermarking: 13th International Workshop, IWDW 2014 …, 2015
62015
Secure transmission over multiple access wiretap channel by cross-time interference injection
H He, S Lyu, B Feng
IEEE Transactions on Communications 71 (1), 370-380, 2022
52022
A vulnerability detection system based on fusion of assembly code and source code
X Li, B Feng, G Li, T Li, M He
Security and Communication Networks 2021, 1-11, 2021
52021
The system can't perform the operation now. Try again later.
Articles 1–20