no code implementations • 1 Jan 2024 • Xueying Mao, Xiaoxiao Hu, Wanli Peng, Zhenliang Gan, Qichao Ying, Zhenxing Qian, Sheng Li, Xinpeng Zhang
Traditional video steganography methods are based on modifying the covert space for embedding, whereas we propose an innovative approach that embeds secret message within semantic feature for steganography during the video editing process.
no code implementations • 14 Oct 2023 • Xiaoxiao Hu, Haoran Lei
An expert seller chooses an experiment to influence a client's purchasing decision, but may manipulate the experiment result for personal gain.
no code implementations • 12 Aug 2023 • Xiaoxiao Hu, Kit Ian Kou, Cuiming Zou, Dong Cheng
This paper introduces the idea of the color Clifford Hardy signal, which can be used to process color images.
no code implementations • ICCV 2023 • Xiaoxiao Hu, Qichao Ying, Zhenxing Qian, Sheng Li, Xinpeng Zhang
RAW files are the initial measurement of scene radiance widely used in most cameras, and the ubiquitously-used RGB images are converted from RAW data through Image Signal Processing (ISP) pipelines.
no code implementations • 23 Mar 2023 • Xiaoxiao Hu, Haoran Lei
We study a general credence goods model with N problem types and N treatments.
no code implementations • 31 Aug 2022 • Xiaoxiao Hu, Haoran Lei
We analyze the optimal delegation problem between a principal and an agent, assuming that the latter has state-independent preferences.
1 code implementation • 12 Jun 2022 • Qichao Ying, Xiaoxiao Hu, Yangming Zhou, Zhenxing Qian, Dan Zeng, Shiming Ge
Representations from each view are separately used to coarsely predict the fidelity of the whole news, and the multimodal representations are able to predict the cross-modal consistency.
no code implementations • 6 Jun 2022 • Qichao Ying, Hang Zhou, Xiaoxiao Hu, Zhenxing Qian, Sheng Li, Xinpeng Zhang
Existing image cropping detection schemes ignore that recovering the cropped-out contents can unveil the purpose of the behaved cropping attack.
no code implementations • 12 Oct 2021 • Qichao Ying, Xiaoxiao Hu, Xiangyu Zhang, Zhenxing Qian, Xinpeng Zhang
At the recipient's side, ACP extracts the watermark from the attacked image, and we conduct feature matching on the original and extracted watermark to locate the position of the crop in the original image plane.