Yun Q. Shi
Affiliations:- New Jersey Institute of Technology, Newark, USA
According to our database1,
Yun Q. Shi
authored at least 335 papers
between 1987 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Event-Triggered Adaptive Neural Control for Full State-Constrained Nonlinear Systems with Unknown Disturbances.
Cogn. Comput., March, 2024
Reversible Data Hiding in Encrypted Images With Adaptive Huffman Code Based on Dynamic Prediction Axes.
IEEE Trans. Multim., 2024
Reversible Data Hiding-Based Contrast Enhancement With Multi-Group Stretching for ROI of Medical Image.
IEEE Trans. Multim., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Reversible Data Hiding in Shared Images With Separate Cover Image Reconstruction and Secret Extraction.
IEEE Trans. Cloud Comput., 2024
2023
PROMISE: A QR Code PROjection Matrix Based Framework for Information Hiding Using Image SEgmentation.
KSII Trans. Internet Inf. Syst., February, 2023
IEEE Trans. Dependable Secur. Comput., 2023
A Universal Reversible Data Hiding Method in Encrypted Image Based on MSB Prediction and Error Embedding.
IEEE Trans. Cloud Comput., 2023
High-performance reversible data hiding based on ridge regression prediction algorithm.
Signal Process., 2023
2022
SmsNet: A New Deep Convolutional Neural Network Model for Adversarial Example Detection.
IEEE Trans. Multim., 2022
Perceptual Enhancement for Autonomous Vehicles: Restoring Visually Degraded Images for Context Prediction via Adversarial Training.
IEEE Trans. Intell. Transp. Syst., 2022
IEEE Trans. Cybern., 2022
Robust Reversible Watermarking in Encrypted Image With Secure Multi-Party Based on Lightweight Cryptography.
IEEE Trans. Circuits Syst. Video Technol., 2022
Dual-Domain Generative Adversarial Network for Digital Image Operation Anti-Forensics.
IEEE Trans. Circuits Syst. Video Technol., 2022
Stereoscopic Image Description With Trinion Fractional-Order Continuous Orthogonal Moments.
IEEE Trans. Circuits Syst. Video Technol., 2022
IEEE Trans. Circuits Syst. Video Technol., 2022
Concealed Attack for Robust Watermarking Based on Generative Model and Perceptual Loss.
IEEE Trans. Circuits Syst. Video Technol., 2022
A Robust GAN-Generated Face Detection Method Based on Dual-Color Spaces and an Improved Xception.
IEEE Trans. Circuits Syst. Video Technol., 2022
KSII Trans. Internet Inf. Syst., 2022
2021
ACM Trans. Multim. Comput. Commun. Appl., 2021
A Serial Image Copy-Move Forgery Localization Scheme With Source/Target Distinguishment.
IEEE Trans. Multim., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Circuits Syst. Video Technol., 2021
High Precision Error Prediction Algorithm Based on Ridge Regression Predictor for Reversible Data Hiding.
IEEE Signal Process. Lett., 2021
CCCIH: Content-consistency Coverless Information Hiding Method Based on Generative Models.
Neural Process. Lett., 2021
Medical image super-resolution via deep residual neural network in the shearlet domain.
Multim. Tools Appl., 2021
A reversible data hiding algorithm for audio files based on code division multiplexing.
Multim. Tools Appl., 2021
Local quaternion polar harmonic Fourier moments-based multiple zero-watermarking scheme for color medical images.
Knowl. Based Syst., 2021
Inf. Sci., 2021
EURASIP J. Image Video Process., 2021
CoRR, 2021
Appl. Soft Comput., 2021
A Layered Embedding-Based Scheme to Cope with Intra-Frame Distortion Drift In IPM-Based HEVC Steganography.
Proceedings of the IEEE International Conference on Acoustics, 2021
2020
IEEE Trans. Syst. Man Cybern. Syst., 2020
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Circuits Syst. Video Technol., 2020
IEEE Trans. Circuits Syst. Video Technol., 2020
Detecting Double JPEG Compressed Color Images With the Same Quantization Matrix in Spherical Coordinates.
IEEE Trans. Circuits Syst. Video Technol., 2020
IEEE Trans. Circuits Syst. Video Technol., 2020
IEEE Trans. Circuits Syst. Video Technol., 2020
IEEE Trans. Circuits Syst. Video Technol., 2020
METEOR: Measurable Energy Map Toward the Estimation of Resampling Rate via a Convolutional Neural Network.
IEEE Trans. Circuits Syst. Video Technol., 2020
Robust image watermarking using invariant accurate polar harmonic Fourier moments and chaotic mapping.
Signal Process., 2020
Non-aligned double JPEG compression detection based on refined Markov features in QDCT domain.
J. Real Time Image Process., 2020
J. Real Time Image Process., 2020
Quaternion Markov Splicing Detection for Color Images Based on Quaternion Discrete Cosine Transform.
KSII Trans. Internet Inf. Syst., 2020
KSII Trans. Internet Inf. Syst., 2020
A Novel Grayscale Image Steganography Scheme Based on Chaos Encryption and Generative Adversarial Networks.
IEEE Access, 2020
Reinforcement Learning Aided Network Architecture Generation for JPEG Image Steganalysis.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020
Machine Vision Based Novel Scheme for Largely, Reducing Printing Errors in Medical Package.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020
2019
Identifying Computer Generated Images Based on Quaternion Central Moments in Color Quaternion Wavelet Domain.
IEEE Trans. Circuits Syst. Video Technol., 2019
Separable Data-Hiding Scheme for Encrypted Image to Protect Privacy of User in Cloud.
Symmetry, 2019
Signal Process., 2019
Code Division Multiplexing and Machine Learning Based Reversible Data Hiding Scheme for Medical Image.
Secur. Commun. Networks, 2019
Multim. Tools Appl., 2019
Adaptive error prediction method based on multiple linear regression for reversible data hiding.
J. Real Time Image Process., 2019
A code division multiplexing and block classification-based real-time reversible data-hiding algorithm for medical images.
J. Real Time Image Process., 2019
J. Real Time Image Process., 2019
A multi-purpose image forensic method using densely connected convolutional neural networks.
J. Real Time Image Process., 2019
J. Inf. Secur. Appl., 2019
Color image-spliced localization based on quaternion principal component analysis and quaternion skewness.
J. Inf. Secur. Appl., 2019
Quaternion Convolutional Neural Network for Color Image Classification and Forensics.
IEEE Access, 2019
IEEE Access, 2019
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding.
IEEE Access, 2019
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019
2018
A Study on the Security Levels of Spread-Spectrum Embedding Schemes in the WOA Framework.
IEEE Trans. Cybern., 2018
A New Distortion Function Design for JPEG Steganography Using the Generalized Uniform Embedding Strategy.
IEEE Trans. Circuits Syst. Video Technol., 2018
Symmetry, 2018
IEEE Signal Process. Lett., 2018
Signal Process. Image Commun., 2018
Distinguishing Computer-Generated Graphics from Natural Images Based on Sensor Pattern Noise and Deep Learning.
Sensors, 2018
Detecting median filtering via two-dimensional AR models of multiple filtered residuals.
Multim. Tools Appl., 2018
An integer wavelet transform based scheme for reversible data hiding in encrypted images.
Multidimens. Syst. Signal Process., 2018
J. Vis. Commun. Image Represent., 2018
Histogram-pair based reversible data hiding via searching for optimal four thresholds.
J. Inf. Secur. Appl., 2018
A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system.
Des. Codes Cryptogr., 2018
Fractional Quaternion Zernike Moments for Robust Color Image Copy-Move Forgery Detection.
IEEE Access, 2018
IEEE Access, 2018
IEEE Access, 2018
Comparison of DCT and Gabor Filters in Residual Extraction of CNN Based JPEG Steganalysis.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018
A Convolutional Neural Network Based Seam Carving Detection Scheme for Uncompressed Digital Images.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018
Pixel-Value-Ordering Based Reversible Data Hiding with Adaptive Texture Classification and Modification.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018
A Multiple Linear Regression Based High-Accuracy Error Prediction Algorithm for Reversible Data Hiding.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018
A Multiple Linear Regression Based High-Performance Error Prediction Method for Reversible Data Hiding.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018
Detection of Double JPEG Compression with the Same Quantization Matrix Based on Convolutional Neural Networks.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018
2017
Blind Forensics of Successive Geometric Transformations in Digital Images Using Spectral Method: Theory and Applications.
IEEE Trans. Image Process., 2017
Rate and Distortion Optimization for Reversible Data Hiding Using Multiple Histogram Shifting.
IEEE Trans. Cybern., 2017
Separable Reversible Data Hiding for Encrypted Palette Images With Color Partitioning and Flipping Verification.
IEEE Trans. Circuits Syst. Video Technol., 2017
Signal Image Video Process., 2017
Signal Image Video Process., 2017
Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics.
Multim. Tools Appl., 2017
Multidimens. Syst. Signal Process., 2017
J. Vis. Commun. Image Represent., 2017
Quaternion pseudo-Zernike moments combining both of RGB information and depth information for color image splicing detection.
J. Vis. Commun. Image Represent., 2017
IET Inf. Secur., 2017
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017
2016
IEEE Trans. Image Process., 2016
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Signal Process. Lett., 2016
Robust image watermarking based on Tucker decomposition and Adaptive-Lattice Quantization Index Modulation.
Signal Process. Image Commun., 2016
Signal Process., 2016
J. Vis. Commun. Image Represent., 2016
KSII Trans. Internet Inf. Syst., 2016
Can Machine Learn Steganography? - Implementing LSB Substitution and Matrix Coding Steganography with Feed-Forward Neural Networks.
CoRR, 2016
Dynamic content selection-and-prediction framework applied to reversible data hiding.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016
A Local Derivative Pattern Based Image Forensic Framework for Seam Carving Detection.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
Detecting Double H.264 Compression Based on Analyzing Prediction Residual Distribution.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
IEEE Signal Process. Lett., 2015
Reversible Data Hiding Using Controlled Contrast Enhancement and Integer Wavelet Transform.
IEEE Signal Process. Lett., 2015
IEEE Signal Process. Lett., 2015
J. Vis. Commun. Image Represent., 2015
Optimal Histogram-Pair and Prediction-Error Based Reversible Data Hiding for Medical Images.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015
2014
An Effective Method for Detecting Double JPEG Compression With the Same Quantization Matrix.
IEEE Trans. Inf. Forensics Secur., 2014
IEEE Trans. Inf. Forensics Secur., 2014
IEEE Trans. Inf. Forensics Secur., 2014
IEEE Signal Process. Lett., 2014
Distinguishing computer graphics from photographic images using a multiresolution approach based on local binary patterns.
Secur. Commun. Networks, 2014
An improved reversible data hiding-based approach for intra-frame error concealment in H.264/AVC.
J. Vis. Commun. Image Represent., 2014
Combination of SIFT Feature and Convex Region-Based Global Context Feature for Image Copy Detection.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
Inter-frame Video Forgery Detection Based on Block-Wise Brightness Variance Descriptor.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
Reversible Data Hiding by Median-Preserving Histogram Modification for Image Contrast Enhancement.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
A Reversible Image Watermarking Scheme Based on Modified Integer-to-Integer Discrete Wavelet Transform and CDMA Algorithm.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
Proceedings of the 2nd International Workshop on Biometrics and Forensics, 2014
2013
IEEE Trans. Image Process., 2013
IEEE Trans. Inf. Forensics Secur., 2013
IEEE Signal Process. Lett., 2013
Detecting Non-aligned Double JPEG Compression Based on Refined Intensity Difference and Calibration.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013
2012
ACM Trans. Multim. Comput. Commun. Appl., 2012
IEEE Trans. Inf. Forensics Secur., 2012
Trans. Data Hiding Multim. Secur., 2012
Int. J. Digit. Crime Forensics, 2012
Detection of tampered region for JPEG images by using mode-based first digit features.
EURASIP J. Adv. Signal Process., 2012
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
Proceedings of the 2012 IEEE Radio and Wireless Symposium, 2012
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012
Distinguishing Computer Graphics from Photographic Images Using Local Binary Patterns.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012
Proceedings of the Information Hiding - 14th International Conference, 2012
Proceedings of the 21st International Conference on Pattern Recognition, 2012
Proceedings of the 2012 IEEE International Conference on Multimedia and Expo, 2012
2011
Trans. Data Hiding Multim. Secur., 2011
Multidimens. Syst. Signal Process., 2011
J. Inf. Hiding Multim. Signal Process., 2011
Proceedings of the Media Forensics and Security III, 2011
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011
Proceedings of the Information Hiding - 13th International Conference, 2011
2010
Proceedings of the Intelligent Multimedia Analysis for Security Applications, 2010
IEEE Trans. Inf. Forensics Secur., 2010
IEEE Trans. Inf. Forensics Secur., 2010
Image Forensics Using Generalised Benford's Law for Improving Image Authentication Detection Rates in Semi-Fragile Watermarking.
Int. J. Digit. Crime Forensics, 2010
EURASIP J. Adv. Signal Process., 2010
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010
Proceedings of the Advances in Multimedia Information Processing - PCM 2010, 2010
Proceedings of the Media Forensics and Security II, 2010
Proceedings of the Digital Watermarking - 9th International Workshop, 2010
A Statistical Model for Quantized AC Block DCT Coefficients in JPEG Compression and its Application to Detecting Potential Compression History in Bitmap Images.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010
Proceedings of the Digital Watermarking - 9th International Workshop, 2010
Proceedings of the Digital Watermarking - 9th International Workshop, 2010
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010
Proceedings of the 2010 IEEE International Conference on Multimedia and Expo, 2010
Proceedings of the 2010 IEEE International Conference on Multimedia and Expo, 2010
Proceedings of the 8th Annual Conference on Communication Networks and Services Research, 2010
2009
Trans. Data Hiding Multim. Secur., 2009
IEEE Trans. Circuits Syst. Video Technol., 2009
Sci. China Ser. F Inf. Sci., 2009
Proceedings of the Multimedia and Security Workshop, 2009
Proceedings of the Multimedia and Security Workshop, 2009
Proceedings of the Digital Watermarking, 8th International Workshop, 2009
Proceedings of the Digital Watermarking, 8th International Workshop, 2009
Camera brand and model identification using moments of 1-D and 2-D characteristic functions.
Proceedings of the International Conference on Image Processing, 2009
Computer graphics classification based on Markov process model and boosting feature selection technique.
Proceedings of the International Conference on Image Processing, 2009
Image forensics using generalised Benford's Law for accurate detection of unknown JPEG compression in watermarked images.
Proceedings of the 16th International Conference on Digital Signal Processing, 2009
2008
IEEE Trans. Inf. Forensics Secur., 2008
IEEE Trans. Circuits Syst. Video Technol., 2008
IEEE Secur. Priv., 2008
Proceedings of the International Workshop on Multimedia Signal Processing, 2008
Proceedings of the Digital Watermarking, 7th International Workshop, 2008
Proceedings of the Digital Watermarking, 7th International Workshop, 2008
Proceedings of the Digital Watermarking, 7th International Workshop, 2008
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008
Proceedings of the International Conference on Image Processing, 2008
Data Mining of Modulation Types Using Cyclostationarity-Based Decision Tree.
Proceedings of The 2008 International Conference on Data Mining, 2008
2007
A generalized Benford's law for JPEG coefficients and its applications in image forensics.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007
Image splicing detection using 2-D phase congruency and statistical moments of characteristic function.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007
Proceedings of the 9th workshop on Multimedia & Security, 2007
Proceedings of the Digital Watermarking, 6th International Workshop, 2007
Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007
Proceedings of the Digital Watermarking, 6th International Workshop, 2007
Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007
Effect of Recompression on Attacking JPEG Steganographic Schemes An Experimental Study.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2007), 2007
JPEG Steganalysis Based on Classwise Non-Principal Components Analysis and Multi-Directional Markov Model.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007
Identifying Computer Graphics using HSV Color Model and Statistical Moments of Characteristic Functions.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007
Proceedings of the International Conference on Image Processing, 2007
A Novel Bayesian Classifier with Smaller Eigenvalues Reset by Threshold Based on Given Database.
Proceedings of the Image Analysis and Recognition, 4th International Conference, 2007
Proceedings of the Image Analysis and Recognition, 4th International Conference, 2007
2006
IEEE Trans. Multim., 2006
A Semi-Fragile Lossless Digital Watermarking Scheme Based on Integer Wavelet Transform.
IEEE Trans. Circuits Syst. Video Technol., 2006
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006
Proceedings of the IEEE 8th Workshop on Multimedia Signal Processing, 2006
Proceedings of the Digital Watermarking, 5th International Workshop, 2006
Steganalysis Using High-Dimensional Features Derived from Co-occurrence Matrix and Class-Wise Non-Principal Components Analysis (CNPCA).
Proceedings of the Digital Watermarking, 5th International Workshop, 2006
Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition.
Proceedings of the Digital Watermarking, 5th International Workshop, 2006
Proceedings of the Information Hiding, 8th International Workshop, 2006
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006
A Novel Pattern Classification Scheme: Classwise Non-Principal Component Analysis (CNPCA).
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006
Steganalysis of JPEG2000 Lazy-Mode Steganography using the Hilbert-Huang Transform Based Sequential Analysis.
Proceedings of the International Conference on Image Processing, 2006
Statistical Moments Based Universal Steganalysis using JPEG 2-D Array and 2-D Characteristic Function.
Proceedings of the International Conference on Image Processing, 2006
2005
Efficiently self-synchronized audio watermarking for assured audio data transmission.
IEEE Trans. Broadcast., 2005
Int. J. Image Graph., 2005
Int. J. Image Graph., 2005
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005
Image Steganalysis Based on Statistical Moments of Wavelet Subband Histograms in DFT Domain.
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005
Proceedings of the Digital Watermarking, 4th International Workshop, 2005
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005
Effective Steganalysis Based on Statistical Moments of Wavelet Characteristic Function.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005
Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions.
Proceedings of the Information Hiding, 7th International Workshop, 2005
Lossless Data Hiding Using Integer Wavelet Transform and Threshold Embedding Technique.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005
Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005
2004
IEEE Signal Process. Lett., 2004
A semi-fragile lossless digital watermarking scheme based on integer wavelet transform.
Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing, 2004
Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing, 2004
A Secure Internet-Based Personal Identity Verification System Using Lossless Watermarking and Fingerprint Recognition.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004
High capacity lossless data hiding based on integer wavelet transform.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004
Self-synchronized audio watermark in DWT domain.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004
Lossless data hiding: fundamentals, algorithms and applications.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004
Proceedings of the 2004 International Conference on Image Processing, 2004
Proceedings of the 2004 International Conference on Image Processing, 2004
2003
IEEE Trans. Circuits Syst. Video Technol., 2003
A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression.
IEEE Trans. Circuits Syst. Video Technol., 2003
Proceedings of the Digital Watermarking, Second International Workshop, 2003
Proceedings of the 2003 International Symposium on Information Technology (ITCC 2003), 2003
2-D and 3-D successive packing interleaving techniques and their applications to image and video data hiding.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003
2002
Constant-quality constrained-rate allocation for FGS video coded bitstreams.
Proceedings of the Visual Communications and Image Processing 2002, 2002
Proceedings of the Digital Watermarking, First International Workshop, 2002
Proceedings of the Digital Watermarking, First International Workshop, 2002
Proceedings of the 2002 International Symposium on Information Technology (ITCC 2002), 2002
Proceedings of the 2002 International Symposium on Circuits and Systems, 2002
An Objective Distortion Measure for Binary Document Images Based on Human Visual Perceptio.
Proceedings of the 16th International Conference on Pattern Recognition, 2002
Proceedings of the IEEE 5th Workshop on Multimedia Signal Processing, 2002
Proceedings of the IEEE 5th Workshop on Multimedia Signal Processing, 2002
Proceedings of the IEEE 5th Workshop on Multimedia Signal Processing, 2002
Proceedings of the IEEE 5th Workshop on Multimedia Signal Processing, 2002
2001
J. VLSI Signal Process., 2001
Proceedings of the 2001 International Symposium on Information Technology (ITCC 2001), 2001
Proceedings of the 2001 International Symposium on Circuits and Systems, 2001
Proceedings of the IEEE International Conference on Communications, 2001
On Test and Characterization of Analog Linear Time-Invariant Circuits Using Neural Networks.
Proceedings of the 10th Asian Test Symposium (ATS 2001), 19-21 November 2001, Kyoto, Japan, 2001
2000
IEEE Trans. Circuits Syst. Video Technol., 2000
Dynamic Bandwidth Allocation for VBR Video Traffic Based on Scene Change Identification.
Proceedings of the 2000 International Symposium on Information Technology (ITCC 2000), 2000
Enhancing Robustness of Digital Watermarking Against Geometric Attack based on Fractal Transform.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000
3-D Interleaving for Enhancing the Robustness of Watermark Signals Embedded in Video Sequences.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000
2-D Interleaving for Enhancing the Robustness of Watermark Signals Embedded in Still Images.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000
1999
Proceedings of the 1999 IEEE Wireless Communications and Networking Conference, 1999
Proceedings of the Security and Watermarking of Multimedia Contents, 1999
Proceedings of the Third IEEE Workshop on Multimedia Signal Processing, 1999
Proceedings of the Broadband Communications: Convergence of Network Technologies, 1999
1998
IEEE Trans. Image Process., 1998
Int. J. Imaging Syst. Technol., 1998
Proceedings of the Second IEEE Workshop on Multimedia Signal Processing, 1998
1997
IEEE Trans. Circuits Syst. Video Technol., 1997
Proceedings of the First IEEE Workshop on Multimedia Signal Processing, 1997
An optical flow based motion compensation algorithm for very low bit-rate video coding.
Proceedings of the 1997 IEEE International Conference on Acoustics, 1997
1994
Comments on "Two necessary conditions for a complex polynomial to be strictly Hurwitz and their applications in robust stability analysis" [with reply].
IEEE Trans. Autom. Control., 1994
Unified optical flow field approach to motion analysis from a sequence of stereo images.
Pattern Recognit., 1994
Proceedings of the 1994 IEEE International Symposium on Circuits and Systems, ISCAS 1994, London, England, UK, May 30, 1994
Proceedings of the Proceedings 1994 International Conference on Image Processing, 1994
1993
Two necessary conditions for a complex polynomial to be strictly Hurwitz and their applications in robust stability analysis.
IEEE Trans. Autom. Control., 1993
Pattern Recognit., 1993
1991
Comments on 'Boundary implications of stability and positivity properties of multidimensional systems' by S. Basu.
Proc. IEEE, 1991
1988
Nonnegativity constrained spectral factorization for image reconstruction from autocorrelation data.
Proceedings of the IEEE International Conference on Acoustics, 1988
1987
Proceedings of the IEEE International Conference on Acoustics, 1987