Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yin Zhaoxia is active.

Publication


Featured researches published by Yin Zhaoxia.


international conference on cloud computing | 2015

Complete Separable Reversible Data Hiding in Encrypted Image

Yin Zhaoxia; Wang Hua-bin; Zhao Haifeng; Luo Bin; Zhang Xin-peng

Reversible data hiding in encrypted image (RDHEI) is an emerging technology since it has good potential for practical applications such as encrypted image authentication, content owner identification and privacy protection. But there is one key problem of many existing published works, that the embedded data only can be extracted either before or after image decryption. In this paper, a complete separable reversible data hiding scheme in encrypted images is proposed. Additional data can be embedded into a cipher image which is encrypted by RC4 and can be extracted error-free both from the cipher domain and the plaintext domain. Moreover, the proposed method is simpler to calculate, while offering better performance. The results demonstrate that larger payload, better image quality, and error-free data extraction as well as image recovery are achieved.Reversible data hiding in encrypted image (RDHEI) is an emerging technology since it has good potential for practical applications such as encrypted image authentication, content owner identification and privacy protection. But there is one key problem of many existing published works, that the embedded data only can be extracted either before or after image decryption. In this paper, a complete separable reversible data hiding scheme in encrypted images is proposed. Additional data can be embedded into a cipher image which is encrypted by RC4 and can be extracted error-free both from the cipher domain and the plaintext domain. Moreover, the proposed method is simpler to calculate, while offering better performance. The results demonstrate that larger payload, better image quality, and error-free data extraction as well as image recovery are achieved.


Archive | 2017

Image tampering detection method based on reversible fragile watermarks of two images

Yin Zhaoxia; Niu Xuejing; Du Yang


Archive | 2017

Image compression encoding method based on AMBTC (Absolute Moment BTC)

Yin Zhaoxia; Puyang Yi; Wang Hua-bin; Wang Futian; Wang Wenzhong; Luo Bin; Tang Jin


Archive | 2017

Reversible data embedding coding method facing digital image privacy protection and management

Yin Zhaoxia; Gao Lili; Niu Xuejing; Jiang Bo; Sun Dengdi; Tang Jin; Luo Bin


Archive | 2016

Compression, encryption and authentication joint coding method

Yin Zhaoxia; Niu Xuejing; Tang Jin; Luo Bin; Ji Dong; Zhao Shu; Tang Cong


Archive | 2016

Secure nearest neighbor query method oriented to plurality of data owners in outsourcing cloud environment

Cheng Ke; Wang Liangmin; Zhong Hong; Cui Jie; Xie Qingqing; Xiao Yun; Yin Zhaoxia


Archive | 2016

Location-based privacy protection inquiring and processing method facing mobile cloud platform

Xie Qingqing; Wang Liangmin; Zhong Hong; Yin Zhaoxia; Cui Jie; Xiao Yun; Cheng Ke


Archive | 2016

Server load balancing method for software defined network

Gong Ran; Cui Jie; Wang Liangmin; Zhong Hong; Xie Qingqing; Yin Zhaoxia; Xiao Yun


Archive | 2016

Mobile terminal voice communication integrity authentication device and method

Yin Zhaoxia; Cai Jingjing; Niu Xuejing; Tang Jin; Luo Bin; Wang Hua-bin; Gao Xiangping


Archive | 2016

Internet of vehicles group key management method oriented to multiple services and privacy protection

Wang Liangmin; Wu Haiyun; Yin Zhaoxia; Zhong Hong; Feng Xia; Xiao Yun; Tang Jin

Collaboration


Dive into the Yin Zhaoxia's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge