Hengfu Yang

Hengfu Yang
Huan First Normal University · Department of Information Science and engineering

PhD

About

53
Publications
10,986
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
835
Citations
Introduction
Mr. Hengfu Yang was born in Hunan, China, 1974. He received the M.S. degree in Computer Application from Guizhou University, China, in 2003, the Ph. D. degree in Computer Application from Hunan University, China, in 2009. In 2003, he joined the Department of Computer Science at Hunan Institute of Engineering, Xiangtan, China, where he is a Lecture of Computer Science. He is currently a Professor in Department of Information Science and Engineering, Hunan Fist Normal University, Changsha, China. He has initiated and conducted more than 5 under-graduate courses in Hunan First Normal University, still including: "Image Processing", "Computer Graphics", "Multimedia Technology", "Operating System", "Network Security". He has been invited as the reviewer of the international journal ‘Multimedia Tools and Applications (ISSN: 1380-7501)’ and Information Technology Journal (ISSN: 1812-5638) since 2009. His research interests include Information Hiding, Digital Watermarking, Digital Forensics, Information Security, Multimedia and Image Processing. He has published extensively in Information Hiding and related areas, with around 20 research papers.
Additional affiliations
January 2006 - May 2016
Hu Nan First Normal University
Position
  • Professor
April 2014 - April 2015
Boston Children's Hospital
Position
  • visiting scientist
Description
  • neuroimaging (Harvard Medical School)
December 2015 - present
Hunan Normal University
Position
  • Professor (Full)
Description
  • image processing; information security
Education
April 2005 - December 2009
Hunan University
Field of study
  • information security
September 2000 - July 2003
GuiZhou University
Field of study
  • image proccesing

Publications

Publications (53)
Article
Full-text available
Image encryption based on chaotic maps is an important method for ensuring the secure communication of digital multimedia on the Internet. To improve the encryption performance and security of image encryption systems, a new image encryption algorithm is proposed that employs a compound chaotic map and random cyclic shift. First, a new hybrid chaot...
Preprint
Full-text available
Image encryption based on chaotic maps is an important way to ensure the secure communication of digital multimedia on the Internet. To improve the encryption performance and security of image encryption systems, a new image encryption algorithm is proposed by employing a compound chaotic map and random cyclic shift. Firstly, an improved Hybrid cha...
Article
Full-text available
To improve the randomness of the Chebyshev chaotic sequences by coupling the Logistic map and the Chebyshev map, a new one-dimensional Logistic–Chebyshev chaotic map (LCCM) is first presented in this paper. Several tests, including the bifurcation diagram, Lyapunov exponents, and information entropy, are employed to analyze the dynamics of the LCCM...
Article
Due to the lack of a method to efficiently represent the multimodal information of a protein, including its structure and sequence information, predicting compound-protein binding affinity (CPA) still suffers from low accuracy when applying machine-learning methods. To overcome this limitation, in a novel end-to-end architecture (named FeatNN), we...
Article
Full-text available
Few previous Reversible Visible Watermarking (RVW) schemes have both good transparency and watermark visibility. An adaptive RVW scheme that integrates Total Variation and visual perception in Block Truncation Coding (BTC) compressed domain, called TVB-RVW is proposed in this paper. A new mean image estimation method for BTC-compressed images is fi...
Article
Full-text available
The intelligent diagnosis of rotating machinery with big data has been widely studied. However, due to the variability of working conditions and difficulty in marking fault samples, it is difficult to obtain enough high-quality fault marking data for training bearing fault diagnosis models in practical industrial application scenarios. Aiming at th...
Article
Full-text available
Graphical password systems have received significant attention as one potential solution to the need for more usable authentication, but graphical passwords are often considered prone to shoulder-surfing attacks. In this paper, in order to build a balance between usability and security for authentication, we propose a new graphical password scheme...
Preprint
Theoretically, the accuracy of computational models in predicting compound-protein binding affinities (CPAs) could be improved by the introduction of protein 3D structure information. However, most of these models still suffer from a low accuracy due to the lack of an efficient approach to encode informative protein features. The major challenge is...
Chapter
Import table is a very important data structure in PE file, and it is the basis of dynamic link and code reuse. The import address table (IAT) is a collection of all the JMP instruction operands in the PE file. The user program can call a specific import function by jumping to virtual address (VA) of an import function through unconditional transfe...
Article
Full-text available
PE (portable executable) file has the characteristics of diversity, uncertainty of file size, complexity of file structure, and singleness of file format, which make it easy to be a carrier of information hiding, especially for that of large hiding capacity. This paper proposes an information-hiding algorithm based on PE file function migration, wh...
Article
Full-text available
In the era of big data, outsourcing massive data to a remote cloud server is a promising approach. Outsourcing storage and computation services can reduce storage costs and computational burdens. However, public cloud storage brings about new privacy and security concerns since the cloud servers can be shared by multiple users. Privacy-preserving f...
Chapter
This paper presents a software information hiding technique based on packing under Windows. The main function of the system includes identifying PE files, PE file packing, PE file code encryption, PE file information implantation, PE file information extraction, etc. The system uses the dynamic link library as a shell program, implants the end of t...
Article
Full-text available
Advances in cloud computing have aroused many researchers’ interest in privacy-preserving feature extraction over outsourced multimedia data, especially private image data. Since block truncation coding (BTC) is known as a simple and efficient technology for image compression, this paper focuses on privacy-preserving feature extraction in BTC compr...
Article
Full-text available
This paper presents a robust image hashing algorithm that exploits low-rank decomposition and path integral local binary pattern (pi-LBP), referred to LRPL hashing. The proposed algorithm generates a compact binary sequence from a low-rank component of the normalized image as the hash code. Considering the excellent texture structure description ab...
Article
Full-text available
Robustness and discriminability are the two most important features of perceptual image hashing (PIH) schemes. In order to achieve a good balance between perceptual robustness and discriminability, a novel PIH algorithm is proposed by combining latent low-rank representation (LLRR) and rotation invariant uniform local binary patterns (RiuLBP). LLRR...
Article
Corticospinal neurons (CSNs) represent the direct cortical outputs to the spinal cord and play important roles in motor control across different species. However, their organizational principle remains unclear. By using a retrograde labeling system, we defined the requirement of CSNs in the execution of a skilled forelimb food-pellet retrieval task...
Article
Full-text available
Most existing BTC (Block Truncation Coding) based watermarking algorithms do not fully exploit visual perception of the host images. These schemes cannot obtain visual quality of stego-images and recover original images without distortion. To solve this issue, a new reversible visible watermarking scheme based on AMBTC (Absolute Moment Block Trunca...
Article
Full-text available
A novel digital camouflage generation scheme based on color quantization is proposed. First, a color similarity measurement in RGB color space is presented by exploiting the similarity of two color vectors. Then main colors in the background of the host image are extracted by combining color similarity and color quantization. Finally, the camouflag...
Article
The development of modern communication technology, demand for digital image, audio, video and other digital contents transmission and storage are increasing rapidly. To protect digital product and ensure the secure transfer of the digital content become important issue in every fields. The researcher developed many visible watermarking algorithms;...
Article
Full-text available
A new digital camouflage design scheme is presented by exploiting the visual perception of images. Firstly, the proposed scheme used color similarity and k-mean clustering to extract dominant background colors in RGB color space. Then pixels in the target selected by users were replaced with dominant colors under the control of color similarity. So...
Article
A novel removable visible watermarking (RVW) algorithm by combining Block Truncation Coding (BTC) and chaotic map (RVWBCM) is presented in this paper. It embeds a visible watermark in the BTC codes of images, namely both the host image and the watermarked image are BTC compressed images. First, the original image is divided into watermarked region...
Article
In P2P network, the existing researches focus on protecting the security of information transmission, or ensuring users' privacy. Security certification is a basic demand of P2P network, including the general authenticity, credibility, integrity and so on. Privacy protection for transactions is the high-level requirement of security, including conf...
Article
Generally, image compression using Block Truncation Coding (BTC) can't provide high compression ratio and visual quality. A new adaptive BTC scheme is proposed by combining visual perception of original images and data hiding technique. The texture sensitivity is exploited to classify the types of image sub-block and reduce the bit rate while remai...
Article
Full-text available
In this work, a removable visible watermarking scheme, which operates in DCT domain, is proposed for combating copyright piracy. First, the original watermark image is divided into 16×16 blocks and the preprocessed watermark to be embedded is generated by performing element-by-element matrix multiplication on the DCT coefficient matrix of each bloc...
Article
A lot of attention has been paid to anonymity due to the users' privacy protection. While peer-topeer (P2P) networks need anonymity capacity, the authority also requires partner traceability to prevent anonymous abuse. So there is a challenge to harmonize the dilemma between the anonymity and authentication in P2P networks. Few P2P protocol provide...
Article
This study presented a method to detect Least Significant Bit (LSB) matching steganography in gray images based on the neighborhood node degree characteristic. Natural imageshave a strong correlation between adjacent pixels and it's disturbed by LSB matching. Accordingly the effects of LSB matching steganography on neighborhood node degree were exa...
Article
The Development of modern communication technology, demand for digital image, audio,video and other contents transmission and storage are increasing rapidly. To protect digital product and ensure the secure transfer of the digital items become important issue inhome and abroad. The researcher developed many algorithms; these are some specific field...
Article
This paper proposes a novel software information hiding algorithm based on PE file icon resource, which makes full use of the transparent display characteristics of PE file icon resources. Firstly, the proposed algorithm analyzes extensively transparency display principle of icons. Secondly, it utilizes the redundant datum of 32-bit icons to hide t...
Article
Full-text available
This paper introduces a novel robust watermark-ing scheme for digital images, which is robust against com-mon signal processing and geometric distortion attacks. In order to be resistant to geometric distortion attacks, the matched feature points determined by the scale-invariance feature transform (SIFT) are used for image restoration to reduce th...
Article
In this study, a novel secure steganographic method was proposed by taking advantage of Multiple-Choice Questions (MCQs). Selecting a series of MCQs to automatically generate a stego text could conceal secret information. The proposed method could achieve a considerable embedding bit rate while being able to hide more information by reordering the...
Article
N-gram frequency is always an important indicator in corpus-based natural language processing. As the corpus being larger, time and space consumption is always a serious issue. In this paper, we proposed a two-stage inverted index based on bigrams. The proposed index is constructed by two levels of variable length vectors and the two characters of...
Article
Authentication has received increasing attention in the literatures of Internet of Things. At the same time, numerous concerns have been raised about the issue of anonymity due to users' awareness of their privacy nowadays. How to achieve trade-off between anonymity and certification simultaneously? In this paper, we propose a security architecture...
Article
It is a difficult issue in the anti-virus field about how to detect unknown and packed PE (Portable Executable) viruses effectively, and existing schemes for anti-virus detection are dissatisfactory. Based on an analysis of the logical structures of Windows PE file and PE virus, a new method of PE virus detection is presented here, which exploits f...
Article
Adaptive digital watermarking algorithm based on DWT and Human Visual System (HVS) is presented for video copyright protection. The scheme contains the preprocessing, watermark embedding and watermark extraction. To improve and enhance the security, the watermark is scrambled by Arnold transform. The proposed technique embeds the scrambled watermar...
Article
Full-text available
Reversible watermarking schemes based on modulo-256 addition may cause annoying salt-and-pepper noise. To avoid the salt-and-pepper noise, a reversible watermarking scheme using human visual perception characteristics and adaptive modular arithmetic is proposed. First, a high-bit residual image is obtained by extracting the most significant bits (M...
Article
Reversible watermarking schemes based on modulo-256 addition may cause annoying salt-and-pepper noise. To avoid the salt-and-pepper noise, a reversible watermarking scheme using human visual perception characteristics and adaptive modular arithmetic is proposed. First, a high-bit residual image is obtained by extracting the most significant bits (M...
Article
Full-text available
In this study, two image adaptive invisible digital watermarking algorithms based on DWT and DCT are proposed for copyright protection. The first proposed algorithm utilizes Watson’s visual model (JND) to determine the watermarking strength necessary to invisibly embed the watermark in the DCT block coefficients of the cover image by controlling th...
Article
Full-text available
A novel semi-fragile watermarking scheme in image spatial domain is proposed. Each watermark bit is duplicated and embedded into sub-blocks of the host image by adaptive least significant bit (LSB) substitution. The adaptive LSB substitution fully exploits the human visual system (HVS) masking characteristics, which ensures high visual quality of w...
Article
A novel semi-fragile watermarking scheme in image spatial domain is proposed. Each watermark bit is duplicated and embedded into sub-blocks of the host image by adaptive Least Significant Bit (LSB) substitution. The adaptive LSB substitution fully exploits the Human Visual System (HVS) masking characteristics, which ensures high visual quality of w...
Thesis
Full-text available
With the rapid development of the Internet and multimedia information processing technology since 1990s, the storage, modification, copy and transmission of the digital works via computers and Internet is becoming pretty easier and used more frequently. This causes the secure communication and authentication on digital works to face severe challeng...
Article
Full-text available
Many existing steganographic methods hide more secret data into edged areas than smooth areas in the host image, which does not differentiate textures from edges and causes serious degradation in actual edge areas. To avoid abrupt changes in image edge areas, as well as to achieve better quality of the stego-image, a novel image data hiding techniq...
Article
In this study, we proposed a robust quantization based digital image watermarking for copy right protection in DCT-SVD domain. The proposed watermarking algorithm which combines both merits of the algorithm based on Discrete Cosine Transform (DCT) and algorithm based on Singular Value Decomposition (SVD). The watermark is embedded by applying a qua...
Article
Full-text available
A reversible (also called lossless, distortion-free, or invertible) visible watermarking scheme is proposed to satisfy the applications, in which the visible watermark is expected to combat copyright piracy but can be removed to losslessly recover the original image. We transparently reveal the watermark image by overlapping it on a user-specified...
Article
Full-text available
With the growth of networked multimedia systems, the need of secure communication and data transfer goes increasingly1 Applications such as satellite or medical imagery, or remote monitoring are numerous and various. During images transfer, data integrity is not really secure. Watermarking can be an answer to such problems1 In this paper, a new rob...
Article
Full-text available
In this work, a removable visible watermarking scheme, which operates in DCT domain, is proposed for combating copyright piracy. First, the original watermark image is divided into 16×16 blocks and the preprocessed watermark to be embedded is generated by performing element-by-element matrix multiplication on the DCT coefficient matrix of each bloc...
Conference Paper
Full-text available
By taking full advantage of the masking characteristics of the HVS (human visual system), this paper first deduces a JND (just noticeable differences) threshold matrix based on blocks, and then presents an image-adaptive semi-fragile watermarking technique operating in DWT (discrete wavelet transform) domain. The proposed technique embeds the water...
Conference Paper
In this paper, a content based image public watermarking technique which operates in DCT domain is proposed. First, the 8×8 DCT sub-blocks of the host image are rearranged into a Hilbert sequence in Hilbert scanning order, then two neighboring sub-blocks in the Hilbert sequence is pseudo-randomly selected by using chaotic sequences. Then a watermar...
Article
Full-text available
Most previous DWT-based watermarking algorithms belong to either private watermarking algorithms or fragile watermarking algorithms, but there are few DWT-based robust public watermarking techniques for copyright protection. By taking full advantage of the masking characteristics of the human visual system, first a JND (just noticed difference) thr...

Network

Cited By