Follow
Zhihua Xia
Zhihua Xia
Verified email at jnu.edu.cn - Homepage
Title
Cited by
Year
A Bitcoin-based secure outsourcing scheme for optimization problem in multimedia internet of things
W Yang, S Wu, J Fei, X Zeng, Y Ding, Z Xia
ACM Transactions on Multimedia Computing, Communications and Applications 20 …, 2024
12024
A chaotic IP watermarking in physical layout level based on FPGA
W Liang, X Sun, Z Xia, D Sun, J Long
Radioengineering 20 (1), 118-125, 2011
252011
A content-based image retrieval scheme using an encrypted difference histogram in cloud computing
D Liu, J Shen, Z Xia, X Sun
Information 8 (3), 96, 2017
292017
A copy-move forgery detection method based on CMFD-SIFT
B Yang, X Sun, H Guo, Z Xia, X Chen
Multimedia Tools and Applications 77, 837-855, 2018
1162018
A Data Integrity Authentication Scheme in WSNs Based on Double Watermark
G Gao, T Han, Z Feng, M Wang, Z Xia
IEEE Internet of Things Journal 10 (9), 8245-8256, 2022
22022
A Distribution Outsourcing Scheme Based on Partial Image Encryption
X Li, Z Xia
Journal of Internet Technology 19 (3), 807-814, 2018
12018
A fair and scalable watermarking scheme for the digital content trading industry
X Xiao, M Su, J Jiang, Y Zhang, Z Hua, Z Xia
Computers in Industry 161, 104125, 2024
2024
A format-compatible searchable encryption scheme for JPEG images using bag-of-words
Z Xia, Q Ji, Q Gu, C Yuan, F Xiao
ACM Transactions on Multimedia Computing, Communications, and Applications …, 2022
142022
A hue preservation lossless contrast enhancement method with RDH for color images
G Gao, T Han, B Wu, J Fu, Z Xia
Digital Signal Processing 136, 103965, 2023
42023
A learning-based steganalytic method against LSB matching steganography
Z Xia, L Yang, X Sun, W Liang, D Sun, Z Ruan
Radioengineering 20 (1), 102-109, 2011
132011
A lightweight convolutional neural network with representation self-challenge for fingerprint liveness detection
J Chen, C Yuan, C Cui, Z Xia, X Sun, T Akilan
Comput. Mater. Contin. 73 (1), 719-733, 2022
12022
A multi-keyword ranked search over encrypted cloud data supporting semantic extension
Z Xia, L Chen, X Sun, J Liu
International Journal of Multimedia and Ubiquitous Engineering 11 (8), 107-120, 2016
112016
A Novel Authentication Protocol with Tree-based Signature for Green Cloud Computing
D Liu, Q Liu, Z Xia, T Zhou
2018 International Conference on Computing, Networking and Communications …, 2018
12018
A novel weber local binary descriptor for fingerprint liveness detection
Z Xia, C Yuan, R Lv, X Sun, NN Xiong, YQ Shi
IEEE Transactions on Systems, Man, and Cybernetics: Systems 50 (4), 1526-1536, 2018
1072018
A privacy preserving deep linear regression scheme based on homomorphic encryption
D Dong, Y Wu, L Xiong, Z Xia
Journal on Big Data 1 (3), 145, 2019
52019
A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing
Z Xia, X Wang, L Zhang, Z Qin, X Sun, K Ren
IEEE Transactions on Information Forensics and Security 11 (11), 2594-2608, 2016
7712016
A privacy-preserving handwritten signature verification method using combinational features and secure kNN
Z Xia, T Shi, NN Xiong, X Sun, B Jeon
IEEE Access 6, 46695-46705, 2018
222018
A Privacy-Preserving Image Retrieval Based on AC-Coefficients and Color Histograms in Cloud Environment.
Z Xia, L Lu, T Qiu, HJ Shim, X Chen, B Jeon
Computers, Materials & Continua 58 (1), 2019
662019
A privacy-preserving image retrieval scheme using secure local binary pattern in cloud computing
Z Xia, L Wang, J Tang, NN Xiong, J Weng
IEEE Transactions on Network Science and Engineering 8 (1), 318-330, 2020
522020
A privacy-preserving JPEG image retrieval scheme using the local Markov feature and bag-of-words model in cloud computing
P Yu, J Tang, Z Xia, Z Li, J Weng
IEEE Transactions on Cloud Computing 11 (3), 2885-2896, 2023
92023
The system can't perform the operation now. Try again later.
Articles 1–20