Search Results for author: Xiaoxiao Hu

Found 9 papers, 1 papers with code

From Covert Hiding to Visual Editing: Robust Generative Video Steganography

no code implementations1 Jan 2024 Xueying Mao, Xiaoxiao Hu, Wanli Peng, Zhenliang Gan, Qichao Ying, Zhenxing Qian, Sheng Li, Xinpeng Zhang

Traditional video steganography methods are based on modifying the covert space for embedding, whereas we propose an innovative approach that embeds secret message within semantic feature for steganography during the video editing process.

Face Swapping Image Steganography +1

Credibility in Credence Goods Markets

no code implementations14 Oct 2023 Xiaoxiao Hu, Haoran Lei

An expert seller chooses an experiment to influence a client's purchasing decision, but may manipulate the experiment result for personal gain.

DRAW: Defending Camera-shooted RAW against Image Manipulation

no code implementations ICCV 2023 Xiaoxiao Hu, Qichao Ying, Zhenxing Qian, Sheng Li, Xinpeng Zhang

RAW files are the initial measurement of scene radiance widely used in most cameras, and the ubiquitously-used RGB images are converted from RAW data through Image Signal Processing (ISP) pipelines.

Image Manipulation

Information transmission in monopolistic credence goods markets

no code implementations23 Mar 2023 Xiaoxiao Hu, Haoran Lei

We study a general credence goods model with N problem types and N treatments.

The optimality of (stochastic) veto delegation

no code implementations31 Aug 2022 Xiaoxiao Hu, Haoran Lei

We analyze the optimal delegation problem between a principal and an agent, assuming that the latter has state-independent preferences.

Bootstrapping Multi-view Representations for Fake News Detection

1 code implementation12 Jun 2022 Qichao Ying, Xiaoxiao Hu, Yangming Zhou, Zhenxing Qian, Dan Zeng, Shiming Ge

Representations from each view are separately used to coarsely predict the fidelity of the whole news, and the multimodal representations are able to predict the cross-modal consistency.

Decision Making Fake News Detection

Image Protection for Robust Cropping Localization and Recovery

no code implementations6 Jun 2022 Qichao Ying, Hang Zhou, Xiaoxiao Hu, Zhenxing Qian, Sheng Li, Xinpeng Zhang

Existing image cropping detection schemes ignore that recovering the cropped-out contents can unveil the purpose of the behaved cropping attack.

Image Cropping

RWN: Robust Watermarking Network for Image Cropping Localization

no code implementations12 Oct 2021 Qichao Ying, Xiaoxiao Hu, Xiangyu Zhang, Zhenxing Qian, Xinpeng Zhang

At the recipient's side, ACP extracts the watermark from the attacked image, and we conduct feature matching on the original and extracted watermark to locate the position of the crop in the original image plane.

Image Cropping Image Forensics

Cannot find the paper you are looking for? You can Submit a new open access paper.