default search action
Wenkang Su
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j12]Zixuan Li, Fang Long, Wenkang Su, Yuan-Gen Wang, Qingxiao Guan, Lei Cai:
DRR: A new method for multiple adverse weather removal. Expert Syst. Appl. 268: 126248 (2025) - 2024
- [j11]Qingliang Liu, Wenkang Su, Jiangqun Ni, Xianglei Hu, Jiwu Huang:
An efficient distortion cost function design for image steganography in spatial domain using quaternion representation. Signal Process. 219: 109370 (2024) - [j10]Yuanfeng Pan, Jiangqun Ni, Qingliang Liu, Wenkang Su, Jiwu Huang:
Efficient JPEG image steganography using pairwise conditional random field model. Signal Process. 221: 109493 (2024) - [j9]Shiyuan Tang, Jiangqun Ni, Wenkang Su, Yulin Zhang:
DWW: Robust Deep Wavelet-Domain Watermarking With Enhanced Frequency Mask. IEEE Signal Process. Lett. 31: 3074-3078 (2024) - [j8]Wenkang Su, Jiangqun Ni, Xianglei Hu, Bin Li:
Efficient Audio Steganography Using Generalized Audio Intrinsic Energy With Micro-Amplitude Modification Suppression. IEEE Trans. Inf. Forensics Secur. 19: 6559-6572 (2024) - [c11]Wenkang Su, Jiangqun Ni, Yiyan Sun:
StegaStyleGAN: Towards Generic and Practical Generative Image Steganography. AAAI 2024: 240-248 - [c10]Yuanfeng Pan, Wenkang Su, Jiangqun Ni, Qingliang Liu, Yulin Zhang, Donghua Jiang:
Model-Based Non-Independent Distortion Cost Design for Effective JPEG Steganography. ACM Multimedia 2024: 2419-2427 - [i3]Fang Long, Wenkang Su, Zixuan Li, Lei Cai, Mingjie Li, Yuan-Gen Wang, Xiaochun Cao:
SemiDDM-Weather: A Semi-supervised Learning Framework for All-in-one Adverse Weather Removal. CoRR abs/2409.19679 (2024) - 2023
- [j7]Ying Liu, Jiangqun Ni, Wenkang Su:
Efficient Video Steganalytic Feature Design by Exploiting Local Optimality and Lagrangian Cost Quotient. Symmetry 15(2): 520 (2023) - [c9]Yulin Zhang, Jiangqun Ni, Wenkang Su, Xin Liao:
A Novel Deep Video Watermarking Framework with Enhanced Robustness to H.264/AVC Compression. ACM Multimedia 2023: 8095-8104 - 2022
- [j6]Wenkang Su, Jiangqun Ni, Xianglei Hu, Fangjun Huang:
Towards improving the security of image steganography via minimizing the spatial embedding impact. Digit. Signal Process. 131: 103758 (2022) - [j5]Wenkang Su, Jiangqun Ni, Xianglei Hu, Jiwu Huang:
New design paradigm of distortion cost function for efficient JPEG steganography. Signal Process. 190: 108319 (2022) - [c8]Jiangqun Ni, Yichen Tong, Xianglei Hu, Wenkang Su, Xiangui Kang:
Spatial Image Steganography Using a Correlational Model. ICAIS (3) 2022: 400-411 - [c7]Yichen Tong, Jiangqun Ni, Wenkang Su, Xianglei Hu:
Spatial Image Steganography Incorporating Adjacent Dependencies. ICAIS (3) 2022: 412-423 - [c6]Junxiong Lu, Jiangqun Ni, Wenkang Su, Hao Xie:
Wavelet-Based CNN for Robust and High-Capacity Image Watermarking. ICME 2022: 1-6 - 2021
- [j4]Wenkang Su, Jiangqun Ni, Xianglei Hu, Jessica J. Fridrich:
Image Steganography With Symmetric Embedding Using Gaussian Markov Random Field Model. IEEE Trans. Circuits Syst. Video Technol. 31(3): 1001-1015 (2021)
2010 – 2019
- 2019
- [c5]Yichen Tong, Jiangqun Ni, Wenkang Su:
Image Steganography Using an Eight-Element Neighborhood Gaussian Markov Random Field Model. IWDW 2019: 247-255 - [i2]Wenkang Su, Jiangqun Ni, Yuanfeng Pan, Xianglei Hu, Yun-Qing Shi:
Image Steganography using Gaussian Markov Random Field Model. CoRR abs/1908.01483 (2019) - [i1]Wenkang Su, Jiangqun Ni, Yuanfeng Pan, Xianglei Hu, Qingliang Liu:
An Efficient JPEG Steganographic Scheme Design Using Domain Transformation of Embedding Cost. CoRR abs/1908.01947 (2019) - 2018
- [j3]Xianglei Hu, Jiangqun Ni, Wenkang Su, Junwen Huang:
Model-based image steganography using asymmetric embedding scheme. J. Electronic Imaging 27(04): 043023 (2018) - [j2]Wenkang Su, Jiangqun Ni, Xiaohan Li, Yun-Qing Shi:
A New Distortion Function Design for JPEG Steganography Using the Generalized Uniform Embedding Strategy. IEEE Trans. Circuits Syst. Video Technol. 28(12): 3545-3549 (2018) - [c4]Xianglei Hu, Haishan Chen, Jiangqun Ni, Wenkang Su:
A Novel Steganography Scheme Based on Asymmetric Embedding Model. ICCCS (4) 2018: 183-194 - [c3]Wenkang Su, David Lehman, Gregg Vesonder:
Smart City Software Revolution - Blackboard Systems for Smart City Solutions. UEMCON 2018: 241-244 - 2017
- [c2]Nicholas DiMaria, Kristen Tan, Bruno Salgado, Wenkang Su, Gregg Vesonder:
Eldercare robotics revolution-explaining robotics for eldercare. UEMCON 2017: 431-436 - 2016
- [c1]Yuanfeng Pan, Jiangqun Ni, Wenkang Su:
Improved Uniform Embedding for Efficient JPEG Steganography. ICCCS (1) 2016: 125-133 - 2015
- [j1]Linjie Guo, Jiangqun Ni, Wenkang Su, Chengpei Tang, Yun-Qing Shi:
Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited. IEEE Trans. Inf. Forensics Secur. 10(12): 2669-2680 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-26 23:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint