Shuozhong Wang
According to our database1,
Shuozhong Wang
authored at least 62 papers
between 2002 and 2017.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2017
Multim. Tools Appl., 2017
2015
Int. J. Netw. Secur., 2015
2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
Comput. Math. Appl., 2013
Blind Estimation of Blur Parameters by 2D-DFT on Polar Coordinate System Presented on Rectangular Grids.
Proceedings of the Seventh International Conference on Image and Graphics, 2013
2012
IEEE Signal Process. Lett., 2012
Simultaneous inpainting for image structure and texture using anisotropic heat transfer model.
Multim. Tools Appl., 2012
Reducing frequency-domain artifacts of binary image due to coarse sampling by repeated interpolation and smoothing of Radon projections.
J. Vis. Commun. Image Represent., 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the Data and Knowledge Engineering - Third International Conference, 2012
2011
IEEE Trans. Image Process., 2011
IEEE Signal Process. Lett., 2011
Multim. Tools Appl., 2011
Lexicographical framework for image hashing with implementation based on DCT and NMF.
Multim. Tools Appl., 2011
Reversible Visible Watermarhing with Lossless Data Embedding Based on Difference Value Shift.
Intell. Autom. Soft Comput., 2011
Structural Feature-Based Image Hashing and Similarity Metric for Tampering Detection.
Fundam. Informaticae, 2011
Digit. Signal Process., 2011
2010
IEEE Trans. Inf. Theory, 2010
Estimation of image rotation angle using interpolation-related spectral signatures with application to blind detection of image forgery.
IEEE Trans. Inf. Forensics Secur., 2010
Signal Process., 2010
Int. J. Found. Comput. Sci., 2010
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2010
2009
Informatica (Slovenia), 2009
Perceptual Similarity Metric Resilient to Rotation for Application in Robust Image Hashing.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009
Proceedings of the Digital Watermarking, 8th International Workshop, 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
2008
IEEE Trans. Multim., 2008
IEEE Signal Process. Lett., 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes.
Proceedings of the Information Hiding, 10th International Workshop, 2008
2007
IEEE Signal Process. Lett., 2007
IEEE Signal Process. Lett., 2007
IEEE Signal Process. Lett., 2007
IEEE Commun. Lett., 2007
2006
IEEE Commun. Lett., 2006
Proceedings of the Visual Information Processing XV, 2006
Proceedings of the 12th International Conference on Multi Media Modeling (MMM 2006), 2006
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006
Proceedings of the Ninth International Conference on Control, 2006
Copyright Management Using Progressive Image Delivery, Visible Watermarking and Robust Fingerprinting.
Proceedings of the Ninth International Conference on Control, 2006
2005
IEEE Signal Process. Lett., 2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
Watermarking Protocol Compatible with Secret Algorithms for Resisting Invertibility Attack.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
2004
Invertibility attack against watermarking based on forged algorithm and a countermeasure.
Pattern Recognit. Lett., 2004
Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security.
Pattern Recognit. Lett., 2004
A new watermarking scheme against inserter-based attacks suitable for digital media with moderate size.
Proceedings of the 3rd International Conference on Information Security, 2004
2003
Proceedings of the Computer Network Security, 2003
Proceedings of the Computer Network Security, 2003
Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation.
Proceedings of the Computer Network Security, 2003
Proceedings of the Computer Network Security, 2003
2002
Signal Process., 2002