Name
Affiliation
Papers
XIAOFENG WANG
Xian Univ Technol, Sch Sci, Xian 710048, Shaanxi, Peoples R China
23
Collaborators
Citations 
PageRank 
59
94
9.88
Referers 
Referees 
References 
278
470
224
Search Limit
100470
Title
Citations
PageRank
Year
An enhanced chimp optimization algorithm for optimal degree reduction of Said–Ball curves00.342022
Coarse-to-fine-grained method for image splicing region detection00.342022
An Efficient Batch Images Encryption Method Based On Dna Encoding And Pwlcm00.342021
Median Filtering Detection Using Lbp Encoding Pattern(Star)00.342021
Perceptual hash-based coarse-to-fine grained image tampering forensics method00.342021
Image alignment based perceptual image hash for content authentication20.372020
Low Dose CT Image Reconstruction Based on Structure Tensor Total Variation Using Accelerated Fast Iterative Shrinkage Thresholding Algorithm.00.342020
Time Series Prediction Method Based on Variant LSTM Recurrent Neural Network20.372020
Image splicing localization using noise distribution characteristic00.342019
Super-resolution image reconstruction using surface fitting with hierarchical structure.10.352018
Reversible data hiding in encrypted image with separable data extraction from image decryption.20.362017
Keypoints-Based Image Passive Forensics Method For Copy-Move Attacks40.452016
Source camera identification from image texture features.110.482016
Steganography forensics method for detecting least significant bit replacement attack00.342015
A Visual Model based Perceptual Image Hash for Content Authentication301.042015
A statistical feature based approach to distinguish PRCG from photographs.70.442014
A Contourlet-Domain Image Signature for Content Authentication00.342013
Image forensic signature for content authenticity analysis90.522012
A Novel Image Signature Method for Content Authentication10.342012
An Identity-Based Mediated Signature Scheme Without Trusted Pkg00.342011
An integrated visual saliency-based watermarking approach for synchronous image authentication and copyright protection130.692011
Hash key-based video encryption scheme for H.264/AVC120.732010
ID-based authenticated multi-group keys agreement scheme for computing grid00.342010