Skip to main content

Showing 1–45 of 45 results for author: Zhaoxia

  1. arXiv:2406.04809  [pdf, other

    cs.CR cs.AI

    A Survey of Fragile Model Watermarking

    Authors: Zhenzhe Gao, Yu Cheng, Zhaoxia Yin

    Abstract: Model fragile watermarking, inspired by both the field of adversarial attacks on neural networks and traditional multimedia fragile watermarking, has gradually emerged as a potent tool for detecting tampering, and has witnessed rapid development in recent years. Unlike robust watermarks, which are widely used for identifying model copyrights, fragile watermarks for models are designed to identify… ▽ More

    Submitted 8 July, 2024; v1 submitted 7 June, 2024; originally announced June 2024.

    Comments: Submitted Signal Processing

  2. arXiv:2405.19802  [pdf, other

    cs.MM

    Exploring the Robustness of Decision-Level Through Adversarial Attacks on LLM-Based Embodied Models

    Authors: Shuyuan Liu, Jiawei Chen, Shouwei Ruan, Hang Su, Zhaoxia Yin

    Abstract: Embodied intelligence empowers agents with a profound sense of perception, enabling them to respond in a manner closely aligned with real-world situations. Large Language Models (LLMs) delve into language instructions with depth, serving a crucial role in generating plans for intricate tasks. Thus, LLM-based embodied models further enhance the agent's capacity to comprehend and process information… ▽ More

    Submitted 16 July, 2024; v1 submitted 30 May, 2024; originally announced May 2024.

  3. arXiv:2405.19668  [pdf, other

    cs.CV

    AutoBreach: Universal and Adaptive Jailbreaking with Efficient Wordplay-Guided Optimization

    Authors: Jiawei Chen, Xiao Yang, Zhengwei Fang, Yu Tian, Yinpeng Dong, Zhaoxia Yin, Hang Su

    Abstract: Despite the widespread application of large language models (LLMs) across various tasks, recent studies indicate that they are susceptible to jailbreak attacks, which can render their defense mechanisms ineffective. However, previous jailbreak research has frequently been constrained by limited universality, suboptimal efficiency, and a reliance on manual crafting. In response, we rethink the appr… ▽ More

    Submitted 29 May, 2024; originally announced May 2024.

    Comments: Under review

  4. arXiv:2405.04295  [pdf, other

    eess.IV cs.CV

    Semi-Supervised Disease Classification based on Limited Medical Image Data

    Authors: Yan Zhang, Chun Li, Zhaoxia Liu, Ming Li

    Abstract: In recent years, significant progress has been made in the field of learning from positive and unlabeled examples (PU learning), particularly in the context of advancing image and text classification tasks. However, applying PU learning to semi-supervised disease classification remains a formidable challenge, primarily due to the limited availability of labeled medical images. In the realm of medi… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

  5. arXiv:2404.09193  [pdf, other

    cs.CV

    FaceCat: Enhancing Face Recognition Security with a Unified Generative Model Framework

    Authors: Jiawei Chen, Xiao Yang, Yinpeng Dong, Hang Su, Jianteng Peng, Zhaoxia Yin

    Abstract: Face anti-spoofing (FAS) and adversarial detection (FAD) have been regarded as critical technologies to ensure the safety of face recognition systems. As a consequence of their limited practicality and generalization, some existing methods aim to devise a framework capable of concurrently detecting both threats to address the challenge. Nevertheless, these methods still encounter challenges of ins… ▽ More

    Submitted 14 April, 2024; originally announced April 2024.

    Comments: Under review

  6. arXiv:2404.07572  [pdf, other

    cs.CR cs.AI

    Fragile Model Watermark for integrity protection: leveraging boundary volatility and sensitive sample-pairing

    Authors: ZhenZhe Gao, Zhenjun Tang, Zhaoxia Yin, Baoyuan Wu, Yue Lu

    Abstract: Neural networks have increasingly influenced people's lives. Ensuring the faithful deployment of neural networks as designed by their model owners is crucial, as they may be susceptible to various malicious or unintentional modifications, such as backdooring and poisoning attacks. Fragile model watermarks aim to prevent unexpected tampering that could lead DNN models to make incorrect decisions. T… ▽ More

    Submitted 12 June, 2024; v1 submitted 11 April, 2024; originally announced April 2024.

    Comments: The article has been accepted by IEEE International Conference on Multimedia and Expo 2024

  7. arXiv:2308.11235  [pdf, other

    cs.CR cs.AI

    Adaptive White-Box Watermarking with Self-Mutual Check Parameters in Deep Neural Networks

    Authors: Zhenzhe Gao, Zhaoxia Yin, Hongjian Zhan, Heng Yin, Yue Lu

    Abstract: Artificial Intelligence (AI) has found wide application, but also poses risks due to unintentional or malicious tampering during deployment. Regular checks are therefore necessary to detect and prevent such risks. Fragile watermarking is a technique used to identify tampering in AI models. However, previous methods have faced challenges including risks of omission, additional information transmiss… ▽ More

    Submitted 22 August, 2023; originally announced August 2023.

    Journal ref: The paper is under consideration at Pattern Recognition Letters, Elsevier, 2023

  8. AdvFAS: A robust face anti-spoofing framework against adversarial examples

    Authors: Jiawei Chen, Xiao Yang, Heng Yin, Mingzhi Ma, Bihui Chen, Jianteng Peng, Yandong Guo, Zhaoxia Yin, Hang Su

    Abstract: Ensuring the reliability of face recognition systems against presentation attacks necessitates the deployment of face anti-spoofing techniques. Despite considerable advancements in this domain, the ability of even the most state-of-the-art methods to defend against adversarial examples remains elusive. While several adversarial defense strategies have been proposed, they typically suffer from cons… ▽ More

    Submitted 3 August, 2023; originally announced August 2023.

  9. arXiv:2305.09684  [pdf, other

    cs.CR cs.AI

    Decision-based iterative fragile watermarking for model integrity verification

    Authors: Zhaoxia Yin, Heng Yin, Hang Su, Xinpeng Zhang, Zhenzhe Gao

    Abstract: Typically, foundation models are hosted on cloud servers to meet the high demand for their services. However, this exposes them to security risks, as attackers can modify them after uploading to the cloud or transferring from a local system. To address this issue, we propose an iterative decision-based fragile watermarking algorithm that transforms normal training samples into fragile samples that… ▽ More

    Submitted 13 May, 2023; originally announced May 2023.

  10. arXiv:2305.08473  [pdf, other

    cs.CL cs.CV

    Shared and Private Information Learning in Multimodal Sentiment Analysis with Deep Modal Alignment and Self-supervised Multi-Task Learning

    Authors: Songning Lai, Jiakang Li, Guinan Guo, Xifeng Hu, Yulong Li, Yuan Tan, Zichen Song, Yutong Liu, Zhaoxia Ren, Chun Wan, Danmin Miao, Zhi Liu

    Abstract: Designing an effective representation learning method for multimodal sentiment analysis tasks is a crucial research direction. The challenge lies in learning both shared and private information in a complete modal representation, which is difficult with uniform multimodal labels and a raw feature fusion approach. In this work, we propose a deep modal shared information learning module based on the… ▽ More

    Submitted 19 March, 2024; v1 submitted 15 May, 2023; originally announced May 2023.

    Journal ref: International Joint Conference on Neural Networks (IJCNN) 2024

  11. arXiv:2305.07611  [pdf, other

    cs.CL cs.CV

    Multimodal Sentiment Analysis: A Survey

    Authors: Songning Lai, Xifeng Hu, Haoxuan Xu, Zhaoxia Ren, Zhi Liu

    Abstract: Multimodal sentiment analysis has become an important research area in the field of artificial intelligence. With the latest advances in deep learning, this technology has reached new heights. It has great potential for both application and research, making it a popular research topic. This review provides an overview of the definition, background, and development of multimodal sentiment analysis.… ▽ More

    Submitted 3 July, 2023; v1 submitted 12 May, 2023; originally announced May 2023.

    Comments: It needs to be returned for major modifications

  12. arXiv:2305.04436  [pdf, other

    cs.CV

    Adversarial Examples Detection with Enhanced Image Difference Features based on Local Histogram Equalization

    Authors: Zhaoxia Yin, Shaowei Zhu, Hang Su, Jianteng Peng, Wanli Lyu, Bin Luo

    Abstract: Deep Neural Networks (DNNs) have recently made significant progress in many fields. However, studies have shown that DNNs are vulnerable to adversarial examples, where imperceptible perturbations can greatly mislead DNNs even if the full underlying model parameters are not accessible. Various defense methods have been proposed, such as feature compression and gradient masking. However, numerous st… ▽ More

    Submitted 7 May, 2023; originally announced May 2023.

  13. arXiv:2304.13297  [pdf, other

    cs.MM

    Robust image steganography against lossy JPEG compression based on embedding domain selection and adaptive error correction

    Authors: Xiaolong Duan, Bin Li, Zhaoxia Yin, Xinpeng Zhang, Bin Luo

    Abstract: Transmitting images for communication on social networks has become routine, which is helpful for covert communication. The traditional steganography algorithm is unable to successfully convey secret information since the social network channel will perform lossy operations on images, such as JPEG compression. Previous studies tried to solve this problem by enhancing the robustness or making the c… ▽ More

    Submitted 26 April, 2023; originally announced April 2023.

  14. arXiv:2302.08007  [pdf, other

    cs.LG cs.AI cs.AR

    With Shared Microexponents, A Little Shifting Goes a Long Way

    Authors: Bita Rouhani, Ritchie Zhao, Venmugil Elango, Rasoul Shafipour, Mathew Hall, Maral Mesmakhosroshahi, Ankit More, Levi Melnick, Maximilian Golub, Girish Varatkar, Lei Shao, Gaurav Kolhe, Dimitry Melts, Jasmine Klar, Renee L'Heureux, Matt Perry, Doug Burger, Eric Chung, Zhaoxia Deng, Sam Naghshineh, Jongsoo Park, Maxim Naumov

    Abstract: This paper introduces Block Data Representations (BDR), a framework for exploring and evaluating a wide spectrum of narrow-precision formats for deep learning. It enables comparison of popular quantization standards, and through BDR, new formats based on shared microexponents (MX) are identified, which outperform other state-of-the-art quantization approaches, including narrow-precision floating-p… ▽ More

    Submitted 12 April, 2023; v1 submitted 15 February, 2023; originally announced February 2023.

  15. arXiv:2212.08341  [pdf, ps, other

    cs.CV cs.LG

    Adversarial Example Defense via Perturbation Grading Strategy

    Authors: Shaowei Zhu, Wanli Lyu, Bin Li, Zhaoxia Yin, Bin Luo

    Abstract: Deep Neural Networks have been widely used in many fields. However, studies have shown that DNNs are easily attacked by adversarial examples, which have tiny perturbations and greatly mislead the correct judgment of DNNs. Furthermore, even if malicious attackers cannot obtain all the underlying model parameters, they can use adversarial examples to attack various DNN-based task systems. Researcher… ▽ More

    Submitted 16 December, 2022; originally announced December 2022.

  16. arXiv:2211.02801  [pdf, ps, other

    cs.MM

    High Capacity Reversible Data Hiding for Encrypted 3D Mesh Models Based on Topology

    Authors: Yun Tang, Lulu Cheng, Wanli Lyv, Zhaoxia Yin

    Abstract: Reversible data hiding in encrypted domain(RDH-ED) can not only protect the privacy of 3D mesh models and embed additional data, but also recover original models and extract additional data losslessly. However, due to the insufficient use of model topology, the existing methods have not achieved satisfactory results in terms of embedding capacity. To further improve the capacity, a RDH-ED method i… ▽ More

    Submitted 4 November, 2022; originally announced November 2022.

  17. arXiv:2210.08994  [pdf

    cs.AI

    Knowledge Representation for Conceptual, Motivational, and Affective Processes in Natural Language Communication

    Authors: Seng-Beng Ho, Zhaoxia Wang, Boon-Kiat Quek, Erik Cambria

    Abstract: Natural language communication is an intricate and complex process. The speaker usually begins with an intention and motivation of what is to be communicated, and what effects are expected from the communication, while taking into consideration the listener's mental model to concoct an appropriate sentence. The listener likewise has to interpret what the speaker means, and respond accordingly, als… ▽ More

    Submitted 20 October, 2022; v1 submitted 25 September, 2022; originally announced October 2022.

    Comments: 8 pages, 7 figures

  18. arXiv:2208.07585  [pdf, other

    cs.CV

    Neural network fragile watermarking with no model performance degradation

    Authors: Zhaoxia Yin, Heng Yin, Xinpeng Zhang

    Abstract: Deep neural networks are vulnerable to malicious fine-tuning attacks such as data poisoning and backdoor attacks. Therefore, in recent research, it is proposed how to detect malicious fine-tuning of neural network models. However, it usually negatively affects the performance of the protected model. Thus, we propose a novel neural network fragile watermarking with no model performance degradation.… ▽ More

    Submitted 16 August, 2022; originally announced August 2022.

    Comments: Published in 2022 IEEE International Conference on Image Processing (ICIP)

  19. arXiv:2203.12916  [pdf, ps, other

    math.CO cs.DM

    A novel view: edge isoperimetric methods and reliability evaluation of several kinds of conditional edge-connectivity of interconnection networks

    Authors: Mingzu Zhang, Zhaoxia Tian, Lianzhu Zhang

    Abstract: Reliability evaluation and fault tolerance of an interconnection network of some parallel and distributed systems are discussed separately under various link-faulty hypotheses in terms of different $\mathcal{P}$-conditional edge-connectivity. With the help of edge isoperimetric problem's method in combinatorics, this paper mainly offers a novel and unified view to investigate the $\mathcal{P}$-con… ▽ More

    Submitted 24 March, 2022; originally announced March 2022.

    Comments: 12 pages, 8 figures, 2021 IEEE 21st International Conference on Software Quality, Reliability and Security (QRS)

  20. arXiv:2202.10693  [pdf, other

    cs.CV

    Universal adversarial perturbation for remote sensing images

    Authors: Qingyu Wang, Guorui Feng, Zhaoxia Yin, Bin Luo

    Abstract: Recently, with the application of deep learning in the remote sensing image (RSI) field, the classification accuracy of the RSI has been dramatically improved compared with traditional technology. However, even the state-of-the-art object recognition convolutional neural networks are fooled by the universal adversarial perturbation (UAP). The research on UAP is mostly limited to ordinary images, a… ▽ More

    Submitted 3 January, 2023; v1 submitted 22 February, 2022; originally announced February 2022.

    Comments: Published in the Twenty-Fourth International Workshop on Multimedia Signal Processing, MMSP 2022

  21. arXiv:2202.10017  [pdf, other

    eess.AS cs.SD

    The PCG-AIID System for L3DAS22 Challenge: MIMO and MISO convolutional recurrent Network for Multi Channel Speech Enhancement and Speech Recognition

    Authors: Jingdong Li, Yuanyuan Zhu, Dawei Luo, Yun Liu, Guohui Cui, Zhaoxia Li

    Abstract: This paper described the PCG-AIID system for L3DAS22 challenge in Task 1: 3D speech enhancement in office reverberant environment. We proposed a two-stage framework to address multi-channel speech denoising and dereverberation. In the first stage, a multiple input and multiple output (MIMO) network is applied to remove background noise while maintaining the spatial characteristics of multi-channel… ▽ More

    Submitted 21 February, 2022; originally announced February 2022.

    Comments: To appear at ICASSP 2022 (Accepted)

  22. arXiv:2110.02700  [pdf, other

    cs.CV

    Reversible Attack based on Local Visual Adversarial Perturbation

    Authors: Li Chen, Shaowei Zhu, Zhaoxia Yin

    Abstract: Adding perturbations to images can mislead classification models to produce incorrect results. Recently, researchers exploited adversarial perturbations to protect image privacy from retrieval by intelligent models. However, adding adversarial perturbations to images destroys the original data, making images useless in digital forensics and other fields. To prevent illegal or unauthorized access t… ▽ More

    Submitted 2 January, 2023; v1 submitted 6 October, 2021; originally announced October 2021.

  23. High Capacity Reversible Data Hiding in Encrypted 3D Mesh Models Based on Multi-MSB Prediction

    Authors: Wanli Lv, Lulu Cheng, Zhaoxia Yin

    Abstract: As a new generation of digital media for covert transmission, three-dimension (3D) mesh models are frequently used and distributed on the network. Facing the huge massive of network data, it is urgent to study a method to protect and store this large amounts of data. In this paper, we proposed a high capacity reversible data hiding in encrypted 3D mesh models. This method divides the vertices of a… ▽ More

    Submitted 16 December, 2022; v1 submitted 3 October, 2021; originally announced October 2021.

    Comments: Published in Signal Processing

    Journal ref: Volume 201, December 2022, 108686

  24. arXiv:2109.11735  [pdf, other

    cs.MM

    On the Robustness of "Robust reversible data hiding scheme based on two-layer embedding strategy"

    Authors: Wen Yin, Longfei Ke, Zhaoxia Yin, Jin Tang, Bin Luo

    Abstract: In the paper "Robust reversible data hiding scheme based on two-layer embedding strategy" published in INS recently, Kumar et al. proposed a robust reversible data hiding (RRDH) scheme based on two-layer embedding. Secret data was embedded into the most significant bit (MSB) planes to increase robustness, and a sorting strategy based on local complexity was adopted to reduce distortion. However, K… ▽ More

    Submitted 22 January, 2022; v1 submitted 24 September, 2021; originally announced September 2021.

  25. arXiv:2105.12676  [pdf, other

    cs.LG cs.AR cs.IR cs.PF math.NA

    Low-Precision Hardware Architectures Meet Recommendation Model Inference at Scale

    Authors: Zhaoxia, Deng, Jongsoo Park, Ping Tak Peter Tang, Haixin Liu, Jie, Yang, Hector Yuen, Jianyu Huang, Daya Khudia, Xiaohan Wei, Ellie Wen, Dhruv Choudhary, Raghuraman Krishnamoorthi, Carole-Jean Wu, Satish Nadathur, Changkyu Kim, Maxim Naumov, Sam Naghshineh, Mikhail Smelyanskiy

    Abstract: Tremendous success of machine learning (ML) and the unabated growth in ML model complexity motivated many ML-specific designs in both CPU and accelerator architectures to speed up the model inference. While these architectures are diverse, highly optimized low-precision arithmetic is a component shared by most. Impressive compute throughputs are indeed often exhibited by these architectures on ben… ▽ More

    Submitted 26 May, 2021; originally announced May 2021.

  26. arXiv:2102.12620  [pdf

    cs.MM

    High-Capacity Reversible Data Hiding in Encrypted Images using Adaptive Encoding

    Authors: Wenjing Ma, Youqing Wu, Zhaoxia Yin

    Abstract: With the popularization of digital information technology, the reversible data hiding in encrypted images (RDHEI) has gradually become the research hotspot of privacy protection in cloud storage. As a technology which can embed additional information in encrypted domain, extract the embedded information correctly and recover the original image without loss, RDHEI has been widely paid attention by… ▽ More

    Submitted 8 October, 2021; v1 submitted 24 February, 2021; originally announced February 2021.

  27. arXiv:2101.07538  [pdf, other

    cs.CV

    PICA: A Pixel Correlation-based Attentional Black-box Adversarial Attack

    Authors: Jie Wang, Zhaoxia Yin, Jin Tang, Jing Jiang, Bin Luo

    Abstract: The studies on black-box adversarial attacks have become increasingly prevalent due to the intractable acquisition of the structural knowledge of deep neural networks (DNNs). However, the performance of emerging attacks is negatively impacted when fooling DNNs tailored for high-resolution images. One of the explanations is that these methods usually focus on attacking the entire image, regardless… ▽ More

    Submitted 19 January, 2021; originally announced January 2021.

  28. arXiv:2101.07512  [pdf, other

    cs.CV

    Attention-Guided Black-box Adversarial Attacks with Large-Scale Multiobjective Evolutionary Optimization

    Authors: Jie Wang, Zhaoxia Yin, Jing Jiang, Yang Du

    Abstract: Fooling deep neural networks (DNNs) with the black-box optimization has become a popular adversarial attack fashion, as the structural prior knowledge of DNNs is always unknown. Nevertheless, recent black-box adversarial attacks may struggle to balance their attack ability and visual quality of the generated adversarial examples (AEs) in tackling high-resolution images. In this paper, we propose a… ▽ More

    Submitted 13 January, 2022; v1 submitted 19 January, 2021; originally announced January 2021.

  29. arXiv:2011.04959  [pdf

    cs.MM

    Multi-domain Reversible Data Hiding in JPEG

    Authors: Zhaoxia Yin, Hongnian Guo, Yang Du

    Abstract: As a branch of reversible data hiding (RDH), reversible data hiding in JEPG is particularly important. Because JPEG images are widely used, it is great significance to study reversible data hiding algorithm for JEPG images. The existing JEPG reversible data methods can be divided into two categories, one is based on Discrete Cosine Transform (DCT) coefficients modification, the other is based on H… ▽ More

    Submitted 10 November, 2020; originally announced November 2020.

  30. Robust adaptive steganography based on dither modulation and modification with re-compression

    Authors: Zhaoxia Yin, Longfei Ke

    Abstract: Traditional adaptive steganography is a technique used for covert communication with high security, but it is invalid in the case of stego images are sent to legal receivers over networks which is lossy, such as JPEG compression of channels. To deal with such problem, robust adaptive steganography is proposed to enable the receiver to extract secret messages from the damaged stego images. Previous… ▽ More

    Submitted 20 March, 2021; v1 submitted 16 July, 2020; originally announced July 2020.

    Journal ref: IEEE Transactions on Signal and Information Processing over Networks, 2021, 7: 336-345

  31. arXiv:2007.04057  [pdf, other

    cs.MM

    Reversible Data Hiding in Encrypted Images Based on Bit-plane Compression of Prediction Error

    Authors: Youqing Wu, Wenjing Ma, Yinyin Peng, Ruiling Zhang, Zhaoxia Yin

    Abstract: As a technology that can prevent the information from being disclosed, the reversible data hiding in encrypted images (RDHEI) acts as an important role in privacy protection and information security. To make use of the image redundancy and further improve the embedding performance, a high-capacity RDHEI method based on bit-plane compression of prediction error is proposed in this paper. Firstly, t… ▽ More

    Submitted 24 September, 2021; v1 submitted 8 July, 2020; originally announced July 2020.

  32. Reversible data hiding in encrypted images based on pixel prediction and multi-MSB planes rearrangement

    Authors: Zhaoxia Yin, Xiaomeng She, Jin Tang, Bin Luo

    Abstract: Great concern has arisen in the field of reversible data hiding in encrypted images (RDHEI) due to the development of cloud storage and privacy protection. RDHEI is an effective technology that can embed additional data after image encryption, extract additional data error-free and reconstruct original images losslessly. In this paper, a high-capacity and fully reversible RDHEI method is proposed,… ▽ More

    Submitted 20 March, 2021; v1 submitted 8 July, 2020; originally announced July 2020.

    Journal ref: Signal Processing, 2021, 187: 1-11

  33. arXiv:2006.15984  [pdf, other

    cs.MM

    New Framework for Code-Mapping-based Reversible Data Hiding in JPEG Images

    Authors: Yang Du, Zhaoxia Yin

    Abstract: Code mapping (CM) is an efficient technique for reversible data hiding (RDH) in JPEG images, which embeds data by constructing a mapping relationship between the used and unused codes in the JPEG bitstream. This study presents a new framework for designing a CM-based RDH method. First, a new code mapping strategy is proposed to suppress file size expansion and improve applicability. Based on our p… ▽ More

    Submitted 16 July, 2022; v1 submitted 29 June, 2020; originally announced June 2020.

  34. arXiv:1911.02360  [pdf, other

    eess.IV cs.CV cs.MM

    Reversible Adversarial Attack based on Reversible Image Transformation

    Authors: Zhaoxia Yin, Hua Wang, Li Chen, Jie Wang, Weiming Zhang

    Abstract: In order to prevent illegal or unauthorized access of image data such as human faces and ensure legitimate users can use authorization-protected data, reversible adversarial attack technique is rise. Reversible adversarial examples (RAE) get both attack capability and reversibility at the same time. However, the existing technique can not meet application requirements because of serious distortion… ▽ More

    Submitted 25 May, 2021; v1 submitted 6 November, 2019; originally announced November 2019.

    Comments: 2021 International Workshop on Safety & Security of Deep Learning

  35. arXiv:1911.01774  [pdf, other

    cs.AI cs.RO

    Efficient Multi-robot Exploration via Multi-head Attention-based Cooperation Strategy

    Authors: Shuqi Liu, Zhaoxia Wu

    Abstract: The goal of coordinated multi-robot exploration tasks is to employ a team of autonomous robots to explore an unknown environment as quickly as possible. Compared with human-designed methods, which began with heuristic and rule-based approaches, learning-based methods enable individual robots to learn sophisticated and hard-to-design cooperation strategies through deep reinforcement learning techno… ▽ More

    Submitted 5 November, 2019; originally announced November 2019.

  36. Reversible Data Hiding in Encrypted Images based on Pixel Prediction and Bit-plane Compression

    Authors: Zhaoxia Yin, Yinyin Peng, Youzhi Xiang

    Abstract: Reversible data hiding in encrypted images (RDHEI) receives growing attention because it protects the content of the original image while the embedded data can be accurately extracted and the original image can be reconstructed lossless. To make full use of the correlation of the adjacent pixels, this paper proposes an RDHEI scheme based on pixel prediction and bit-plane compression. Firstly, to v… ▽ More

    Submitted 5 November, 2019; originally announced November 2019.

  37. arXiv:1908.02473  [pdf, other

    cs.MM

    Separable Reversible Data Hiding Based on Integer Mapping and Multi-MSB Prediction for Encrypted 3D Mesh Models

    Authors: Zhaoxia Yin, Na Xu, Feng Wang

    Abstract: Reversible data hiding in encrypted domain (RDH-ED) has received tremendous attention from the research community because data can be embedded into cover media without exposing it to the third party data hider and the cover media can be losslessly recovered after the extraction of the embedded data. Although, in recent years, extensive studies have been carried out about images based RDH-ED, littl… ▽ More

    Submitted 16 November, 2019; v1 submitted 7 August, 2019; originally announced August 2019.

  38. arXiv:1906.03175  [pdf

    cs.MM

    Image Encryption Algorithm Based on Facebook Social Network

    Authors: Xiaoqing Liu, Yinyin Peng, Jie Wang, Zhaoxia Yin

    Abstract: Facebook is the online social networks (OSNs) platform with the largest number of users in the world today, information protection based on Facebook social network platform have important practical significance. Since the information users share on social networks is often based on images, this paper proposes a more secure image encryption algorithm based on Facebook social network platform to ens… ▽ More

    Submitted 21 May, 2019; originally announced June 2019.

    Comments: in Chinese

  39. An Improved Reversible Data Hiding in Encrypted Images using Parametric Binary Tree Labeling

    Authors: Youqing Wu, Youzhi Xiang, Yutang Guo, Jin Tang, Zhaoxia Yin

    Abstract: This work proposes an improved reversible data hiding scheme in encrypted images using parametric binary tree labeling(IPBTL-RDHEI), which takes advantage of the spatial correlation in the entire original image but not in small image blocks to reserve room for hiding data. Then the original image is encrypted with an encryption key and the parametric binary tree is used to label encrypted pixels i… ▽ More

    Submitted 25 November, 2019; v1 submitted 23 May, 2019; originally announced May 2019.

    Journal ref: IEEE Transactions on Multimedia, 2019, 22(8): 1929-1938

  40. arXiv:1905.08967   

    cs.MM eess.IV

    Multiple reconstruction compression framework based on PNG image

    Authors: Zhiqing Lu, Zhaoxia Yin, Bin Luo

    Abstract: It is shown that neural networks (NNs) achieve excellent performances in image compression and reconstruction. However, there are still many shortcomings in the practical application, which eventually lead to the loss of neural network image processing ability. Based on this, this paper proposes a joint framework based on neural network and zoom compression. The framework first encodes the incomin… ▽ More

    Submitted 14 November, 2019; v1 submitted 22 May, 2019; originally announced May 2019.

    Comments: The experimental results cannot reproduced

  41. arXiv:1905.08614  [pdf, other

    cs.CV

    An Efficient Pre-processing Method to Eliminate Adversarial Effects

    Authors: Hua Wang, Jie Wang, Zhaoxia Yin

    Abstract: Deep Neural Networks (DNNs) are vulnerable to adversarial examples generated by imposing subtle perturbations to inputs that lead a model to predict incorrect outputs. Currently, a large number of researches on defending adversarial examples pay little attention to the real-world applications, either with high computational complexity or poor defensive effects. Motivated by this observation, we de… ▽ More

    Submitted 30 December, 2019; v1 submitted 15 May, 2019; originally announced May 2019.

    Comments: in Chinese

  42. High Capacity Lossless Data Hiding in JPEG Bitstream Based on General VLC Mapping

    Authors: Yang Du, Zhaoxia Yin, Xinpeng Zhang

    Abstract: JPEG is the most popular image format, which is widely used in our daily life. Therefore, reversible data hiding (RDH) for JPEG images is important. Most of the RDH schemes for JPEG images will cause significant distortions and large file size increments in the marked JPEG image. As a special case of RDH, the lossless data hiding (LDH) technique can keep the visual quality of the marked images no… ▽ More

    Submitted 18 November, 2019; v1 submitted 14 May, 2019; originally announced May 2019.

  43. Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting

    Authors: Yujie Jia, Zhaoxia Yin, Xinpeng Zhang, Yonglong Luo

    Abstract: In recent years, reversible data hiding (RDH), a new research hotspot in the field of information security, has been paid more and more attention by researchers. Most of the existing RDH schemes do not fully take it into account that natural image's texture has influence on embedding distortion. The image distortion caused by embedding data in the image's smooth region is much smaller than that in… ▽ More

    Submitted 13 May, 2019; originally announced May 2019.

    Comments: 11 pages, 11 figures, 1 table

    Journal ref: Signal Processing, 2019, 163: 238-246

  44. Reversible Data Hiding in JPEG Images with Multi-objective Optimization

    Authors: Zhaoxia Yin, Yuan Ji, Bin Luo

    Abstract: Among various methods of reversible data hiding (RDH) in JPEG images, the consideration in designing is only the image quality, but the image quality and the file size expansion are equally important in JPEG images. Based on this situation, we propose a RDH scheme in JPEG images considering both the image quality and the file size expansion while designing the algorithm. The multi-objective optimi… ▽ More

    Submitted 9 May, 2019; originally announced May 2019.

    Journal ref: IEEE Transactions on Circuits and Systems for Video Technology, 2020, 30(8): 2343-2352

  45. Reversible Data Hiding in Encrypted Images based on MSB Prediction and Huffman Coding

    Authors: Youzhi Xiang, Zhaoxia Yin, Xinpeng Zhang

    Abstract: With the development of cloud storage and privacy protection, reversible data hiding in encrypted images (RDHEI) has attracted increasing attention as a technology that can embed additional data in the encryption domain. In general, an RDHEI method embeds secret data in an encrypted image while ensuring that the embedded data can be extracted error-free and the original image can be restored lossl… ▽ More

    Submitted 22 December, 2018; originally announced December 2018.

    Comments: 20 pages, 8 figures, to submit to IEEE Trans. Multimedia

    Journal ref: [J]. IEEE Transactions on Multimedia, 2019, 22(4): 874-884