


default search action
Heng Yao 0001
Person information
- affiliation: University of Shanghai of Science and Technology, Shanghai, China
Other persons with the same name
- Heng Yao — disambiguation page
- Heng Yao 0002
— University of Florida, Gainesville, FL, USA - Heng Yao 0003
— Ningbo University, Ningbo, Zhejiang, China - Heng Yao 0004
— The Hong Kong Polytechnic University, Kowloon, Hong Kong, SAR, China
Other persons with a similar name
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j66]Fang Cao, Xinluo Chen, Xinran Li
, Yuanding Zhou
, Heng Yao
, Chuan Qin
:
Perceptual hashing method for text-picture mixed image based on saliency feature and statistical feature. Signal Process. 244: 110548 (2026)
[j65]Zihe Huang, Lv Wu
, Na Wang
, Heng Yao
, Chuan Qin
:
Robust Audio Fingerprinting With Multi-Feature Enhancement for Copyright Protection. IEEE Signal Process. Lett. 33: 1361-1365 (2026)- 2025
[j64]Lin Huang
, Fengyong Li, Heng Yao
, Chuan Qin
, Xinpeng Zhang:
Soft integrity authentication for neural network models. Expert Syst. Appl. 267: 126172 (2025)
[j63]Cheng Xiong
, Guorui Feng, Yunlong Sun, Zhenxing Qian, Heng Yao
, Chuan Qin
:
Model authentication hashing: Identifying pirated neural network models. Expert Syst. Appl. 283: 127706 (2025)
[j62]Meng Chen
, Daidou Guo
, Heng Yao
, Chuan Qin
:
Feature-Attention-Mechanism-Based Attack for Deep Robust Watermarking. IEEE Multim. 32(1): 83-91 (2025)
[j61]Kexin Zhang
, Heng Yao
, Xin Yang
, Chuan Qin
:
Histogram Matching-Based Reversible Data Hiding for Intelligent Transportation Applications. IEEE Internet Things J. 12(13): 24599-24614 (2025)
[j60]Haiqing Dong
, Jie Song, Heng Yao
, Chuan Qin:
Reversible data hiding in encrypted images using adaptive classification encoding. J. Vis. Commun. Image Represent. 111: 104501 (2025)
[j59]Yanfen Le
, Shu Wang, Ruolan Lei, Heng Yao
:
Privacy Preserving in Range-Based Cooperative Indoor Localization. IEEE Signal Process. Lett. 32: 2982-2986 (2025)
[j58]Zihe Huang, Luyang Ying
, Chuan Qin
, Heng Yao
, Xinpeng Zhang
:
Inversion Attack Framework for Deep Face Hashing. IEEE Signal Process. Lett. 32: 3899-3903 (2025)
[j57]Xiaotong Situ, Tong Liu, Heng Yao
, Chuan Qin
, Xinpeng Zhang
:
Document-Image Perceptual Hashing for Content Authentication. IEEE Trans. Big Data 11(6): 3474-3487 (2025)
[j56]Jiaheng Wei
, Heng Yao
, Na Wang
, Chuan Qin
:
Dual-Color Space Hierarchical Classification Network for Image-Sharing Chain Detection. IEEE Trans. Instrum. Meas. 74: 1-11 (2025)
[j55]Daidou Guo
, Chuan Qin
, Fengyong Li
, Heng Yao
, Xinpeng Zhang
:
Improving Robustness of Screen-Camera Resilient Watermarking: A Large-Scale Dataset and a Noise Simulation Network. IEEE Trans. Multim. 27: 8723-8736 (2025)
[j54]Yuanding Zhou
, Xinran Li
, Cheng Xiong
, Heng Yao
, Chuan Qin
:
A Survey of Perceptual Hashing for Multimedia. ACM Trans. Multim. Comput. Commun. Appl. 21(7): 195:1-195:28 (2025)
[c5]Mian Zou
, Heng Yao
:
Sensor-Aware Blind Image Splicing Detection by Noise Probabilistic Modeling. ICIC (19) 2025: 3-14- 2024
[j53]Zixuan Bian, Heng Yao
, Yanfen Le, Chuan Qin:
Two-dimensional histogram-based reversible contrast enhancement using bi-histogram equalization. Displays 81: 102580 (2024)
[j52]Fang Cao, Daidou Guo, Tianjun Wang, Heng Yao, Jian Li
, Chuan Qin
:
Universal screen-shooting robust image watermarking with channel-attention in DCT domain. Expert Syst. Appl. 238(Part F): 122062 (2024)
[j51]Heng Yao
, Tong Liu, Guihao Li, Chuan Qin:
Screen-shot and Demoiréd image identification based on DenseNet and DeepViT. Expert Syst. Appl. 240: 122580 (2024)
[j50]Daidou Guo, Xuan Zhu, Fengyong Li, Heng Yao, Chuan Qin
:
DoBMark: A double-branch network for screen-shooting resilient image watermarking. Expert Syst. Appl. 246: 123159 (2024)
[j49]Fang Cao, Shifei Yao, Yuanding Zhou
, Heng Yao
, Chuan Qin
:
Perceptual authentication hashing for digital images based on multi-domain feature fusion. Signal Process. 223: 109576 (2024)
[j48]Tong Liu, Heng Yao
, Xinran Li
, Chuan Qin
:
Robust Perceptual Image Hashing for Screen-Shooting Attack. IEEE Trans. Consumer Electron. 70(1): 4367-4378 (2024)
[j47]Haodong Wang, Heng Yao
, Chuan Qin
, Xinpeng Zhang
:
When Robust Reversible Watermarking Meets Cropping Attacks. IEEE Trans. Circuits Syst. Video Technol. 34(12): 13282-13296 (2024)
[j46]Xiaofeng Shen
, Heng Yao
, Shunquan Tan
, Chuan Qin
:
Hiding Face Into Background: A Proactive Countermeasure Against Malicious Face Swapping. IEEE Trans. Ind. Informatics 20(8): 10613-10623 (2024)- 2023
[j45]Xiaofeng Shen, Heng Yao
, Shunquan Tan
, Chuan Qin:
VHNet: A Video Hiding Network with robustness to video coding. J. Inf. Secur. Appl. 75: 103515 (2023)
[j44]Zixuan Bian, Heng Yao, Yanfen Le, Chuan Qin:
Quality guided reversible data hiding with contrast enhancement. J. King Saud Univ. Comput. Inf. Sci. 35(10): 101808 (2023)
[j43]Guihao Li, Heng Yao
, Yanfen Le, Chuan Qin:
Recaptured screen image identification based on vision transformer. J. Vis. Commun. Image Represent. 90: 103692 (2023)
[j42]Gejian Zhao, Fengyong Li, Heng Yao, Chuan Qin
:
TASTNet: An end-to-end deep fingerprinting net with two-dimensional attention mechanism and spatio-temporal weighted fusion for video content authentication. J. Vis. Commun. Image Represent. 96: 103913 (2023)
[j41]Wei Tang, Heng Yao
, Yanfen Le, Chuan Qin:
Reversible data hiding for JPEG images based on block difference model and Laplacian distribution estimation. Signal Process. 212: 109130 (2023)
[j40]Mingji Yu, Heng Yao
, Chuan Qin
, Xinpeng Zhang
:
Reversible Data Hiding in Palette Images. IEEE Trans. Circuits Syst. Video Technol. 33(2): 648-660 (2023)- 2022
[j39]Gejian Zhao, Chuan Qin
, Heng Yao, Yanfang Han:
DNN self-embedding watermarking: Towards tampering detection and parameter recovery for deep neural network. Pattern Recognit. Lett. 164: 16-22 (2022)
[j38]Mingji Yu, Heng Yao
, Chuan Qin
:
Reversible data hiding in encrypted images without additional information transmission. Signal Process. Image Commun. 105: 116696 (2022)
[j37]Chuan Qin
, Chanyu Jiang, Qun Mo, Heng Yao
, Chin-Chen Chang
:
Reversible Data Hiding in Encrypted Image via Secret Sharing Based on GF(p) and GF(2⁸). IEEE Trans. Circuits Syst. Video Technol. 32(4): 1928-1941 (2022)
[j36]Mingji Yu, Heng Yao
, Chuan Qin
, Xinpeng Zhang
:
A Comprehensive Analysis Method for Reversible Data Hiding in Stream-Cipher-Encrypted Images. IEEE Trans. Circuits Syst. Video Technol. 32(10): 7241-7254 (2022)
[j35]Heng Yao
, Mian Zou
, Chuan Qin
, Xinpeng Zhang
:
Signal-Dependent Noise Estimation for a Real-Camera Model via Weight and Shape Constraints. IEEE Trans. Multim. 24: 640-654 (2022)- 2021
[j34]Zhenjun Tang, Mengzhu Yu
, Heng Yao, Hanyun Zhang
, Chunqiang Yu, Xianquan Zhang:
Robust Image Hashing With Singular Values Of Quaternion SVD. Comput. J. 64(11): 1656-1671 (2021)
[j33]Heng Yao
, Fanyu Mao, Chuan Qin
, Zhenjun Tang
:
Dual-JPEG-image reversible data hiding. Inf. Sci. 563: 130-149 (2021)
[j32]Xinran Li, Chuan Qin
, Heng Yao, Jian Li:
Perceptual hashing for color images. J. Electronic Imaging 30(6) (2021)
[j31]Yanfen Le
, Hena Zhang, Weibin Shi, Heng Yao
:
Received signal strength based indoor positioning algorithm using advanced clustering and kernel ridge regression. Frontiers Inf. Technol. Electron. Eng. 22(6): 827-838 (2021)
[j30]Heng Yao
, Ben Ma, Mian Zou, Dong Xu
, Jincao Yao
:
No-reference noisy image quality assessment incorporating features of entropy, gradient, and kurtosis. Frontiers Inf. Technol. Electron. Eng. 22(12): 1565-1582 (2021)
[j29]Yanfen Le
, Shijialuo Jin, Hena Zhang, Weibin Shi, Heng Yao:
Fingerprinting Indoor Positioning Method Based on Kernel Ridge Regression with Feature Reduction. Wirel. Commun. Mob. Comput. 2021: 6631585:1-6631585:12 (2021)
[c4]Chuan Qin
, Shengyan Gao, Chanyu Jiang, Heng Yao, Ching-Chun Chang:
Reversible Data Hiding in Encrypted Images Based on Chinese Remainder Theorem and Secret Sharing Mechanism. BDSIC 2021: 23-32- 2020
[j28]Zhenjun Tang
, Hewang Nie
, Chi-Man Pun, Heng Yao
, Chunqiang Yu
, Xianquan Zhang:
Color Image Reversible Data Hiding With Double-Layer Embedding. IEEE Access 8: 6915-6926 (2020)
[j27]Zhenjun Tang
, Lv Chen, Heng Yao, Xianquan Zhang, Chunqiang Yu, Fionn Murtagh:
Video Hashing with DCT and NMF. Comput. J. 63(7): 1017-1030 (2020)
[j26]Zhenjun Tang
, Hanyun Zhang
, Shenglian Lu, Heng Yao, Xianquan Zhang:
Robust image hashing with compressed sensing and ordinal measures. EURASIP J. Image Video Process. 2020(1): 21 (2020)
[j25]Ben Ma, Jincao Yao, Yanfen Le, Chuan Qin
, Heng Yao
:
Efficient image noise estimation based on skewness invariance and adaptive noise injection. IET Image Process. 14(7): 1393-1401 (2020)
[j24]Heng Yao, Hongbin Wei, Chuan Qin
, Zhenjun Tang:
A real-time reversible image authentication method using uniform embedding strategy. J. Real Time Image Process. 17(1): 41-54 (2020)
[j23]Heng Yao
, Hongbin Wei, Tong Qiao, Chuan Qin
:
JPEG quantization step estimation with coefficient histogram and spectrum analyses. J. Vis. Commun. Image Represent. 69: 102795 (2020)
[j22]Heng Yao
, Hongbin Wei, Chuan Qin
, Xinpeng Zhang:
An improved first quantization matrix estimation for nonaligned double compressed JPEG images. Signal Process. 170: 107430 (2020)
[j21]Heng Yao
, Fanyu Mao, Zhenjun Tang
, Chuan Qin
:
High-fidelity dual-image reversible data hiding via prediction-error shift. Signal Process. 170: 107447 (2020)
[i1]Xinran Li, Chuan Qin, Zhenxing Qian, Heng Yao, Xinpeng Zhang:
Perceptual Robust Hashing for Color Images with Canonical Correlation Analysis. CoRR abs/2012.04312 (2020)
2010 – 2019
- 2019
[j20]Chuan Qin
, Yecen Hu, Heng Yao
, Xintao Duan, Liping Gao:
Perceptual Image Hashing Based on Weber Local Binary Pattern and Color Angle Representation. IEEE Access 7: 45460-45471 (2019)
[j19]Yujie Fu, Ping Kong, Heng Yao
, Zhenjun Tang
, Chuan Qin
:
Effective reversible data hiding in encrypted image with adaptive encoding strategy. Inf. Sci. 494: 21-36 (2019)
[j18]Qing Zhou, Heng Yao
, Fang Cao, Yu-Chen Hu:
Efficient image compression based on side match vector quantization and digital inpainting. J. Real Time Image Process. 16(3): 799-810 (2019)
[j17]Zhaoyang Xiang, Yu-Chen Hu, Heng Yao, Chuan Qin
:
Adaptive and dynamic multi-grouping scheme for absolute moment block truncation coding. Multim. Tools Appl. 78(7): 7895-7909 (2019)
[j16]Fang Cao, Bowen An, Heng Yao, Zhenjun Tang:
Local complexity based adaptive embedding mechanism for reversible data hiding in digital images. Multim. Tools Appl. 78(7): 7911-7926 (2019)
[j15]Heng Yao, Xiaokai Liu, Zhenjun Tang, Chuan Qin
, Ying Tian:
Adaptive image camouflage using human visual system model. Multim. Tools Appl. 78(7): 8311-8334 (2019)
[j14]Heng Yao, Xiaokai Liu, Zhenjun Tang, Chuan Qin
, Ying Tian:
Correction to: Adaptive image camouflage using human visual system model. Multim. Tools Appl. 78(7): 8335 (2019)
[j13]Zhenjun Tang
, Shijie Xu
, Heng Yao, Chuan Qin
, Xianquan Zhang:
Reversible data hiding with differential compression in encrypted image. Multim. Tools Appl. 78(8): 9691-9715 (2019)
[c3]Yujie Fu, Dongsheng Peng, Heng Yao, Chuan Qin
:
A Novel Reversible Data Hiding Scheme for Encrypted VQ-Compressed Image. ICAIS (3) 2019: 150-160- 2018
[j12]Heng Yao
, Xiaokai Liu, Zhenjun Tang, Yu-Chen Hu, Chuan Qin
:
An Improved Image Camouflage Technique Using Color Difference Channel Transformation and Optimal Prediction-Error Expansion. IEEE Access 6: 40569-40584 (2018)
[j11]Zhenjun Tang
, Ziqing Huang, Heng Yao, Xianquan Zhang, Lv Chen, Chunqiang Yu:
Perceptual Image Hashing with Weighted DWT Features for Reduced-Reference Image Quality Assessment. Comput. J. 61(11): 1695-1709 (2018)
[j10]Heng Yao, Chuan Qin
, Zhenjun Tang, Xinpeng Zhang:
A general framework for shiftable position-based dual-image reversible data hiding. EURASIP J. Image Video Process. 2018: 41 (2018)
[j9]Heng Yao, Fang Cao, Zhenjun Tang, Jinwei Wang, Tong Qiao:
Expose noise level inconsistency incorporating the inhomogeneity scoring strategy. Multim. Tools Appl. 77(14): 18139-18161 (2018)
[j8]Chuan Qin
, Zhihong He, Heng Yao, Fang Cao, Liping Gao:
Visible watermark removal scheme based on reversible data hiding and image inpainting. Signal Process. Image Commun. 60: 160-172 (2018)
[c2]Fang Cao, Yalei Zhang, Bowen An, Heng Yao, Zhenjun Tang:
An Improved Reversible Data Hiding Scheme with Large Payload Based on Image Local-Complexity. ICCCS (4) 2018: 231-241- 2017
[j7]Min Yuan, Heng Yao, Chuan Qin
, Ying Tian:
A Dynamic Hand Gesture Recognition System Incorporating Orientation-based Linear Extrapolation Predictor and Velocity-assisted Longest Common Subsequence Algorithm. KSII Trans. Internet Inf. Syst. 11(9): 4491-4509 (2017)
[j6]Heng Yao, Chuan Qin
, Zhenjun Tang, Ying Tian:
Guided filtering based color image reversible data hiding. J. Vis. Commun. Image Represent. 43: 152-163 (2017)
[j5]Heng Yao, Shuozhong Wang, Xinpeng Zhang, Chuan Qin
, Jinwei Wang:
Detecting Image Splicing Based on Noise Level Inconsistency. Multim. Tools Appl. 76(10): 12457-12479 (2017)
[j4]Heng Yao, Chuan Qin
, Zhenjun Tang, Ying Tian:
Improved dual-image reversible data hiding method using the selection strategy of shiftable pixels' coordinates with minimum distortion. Signal Process. 135: 26-35 (2017)
[j3]Heng Yao
, Saihua Song, Chuan Qin
, Zhenjun Tang, Xiaokai Liu:
Detection of Double-Compressed H.264/AVC Video Incorporating the Features of the String of Data Bits and Skip Macroblocks. Symmetry 9(12): 313 (2017)- 2016
[c1]Saihua Song, Heng Yao, Chuan Qin
, Ying Tian:
A Forgery Video Detection Algorithm for Resolution Promotion Manipulations Using Frequency Spectrum Analysis. ICNCC 2016: 22-26- 2013
[j2]Yan Zhao, Shuozhong Wang, Xinpeng Zhang, Heng Yao:
Robust Hashing for Image Authentication Using Zernike Moments and Local Features. IEEE Trans. Inf. Forensics Secur. 8(1): 55-63 (2013)- 2012
[j1]Heng Yao, Shuozhong Wang, Yan Zhao, Xinpeng Zhang:
Detecting Image Forgery Using Perspective Constraints. IEEE Signal Process. Lett. 19(3): 123-126 (2012)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-04-19 00:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







