Chuan Qin

According to our database1, Chuan Qin authored at least 95 papers between 2006 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Wideband Inductorless Low-Power LNAs with Gm Enhancement and Noise-Cancellation.
IEEE Trans. on Circuits and Systems, 2018

Visible watermark removal scheme based on reversible data hiding and image inpainting.
Sig. Proc.: Image Comm., 2018

On the fault-tolerant performance for a class of robust image steganography.
Signal Processing, 2018

Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection.
Signal Processing, 2018

Perceptual hashing for color images based on hybrid extraction of structural features.
Signal Processing, 2018

Dither modulation based adaptive steganography resisting jpeg compression and statistic detection.
Multimedia Tools Appl., 2018

Guest Editorial: Multimedia Information Security and Its Applications in Cloud Computing.
Multimedia Tools Appl., 2018

Reversible visual transformation via exploring the correlations within color images.
J. Visual Communication and Image Representation, 2018

Perceptual image hashing via dual-cross pattern encoding and salient structure detection.
Inf. Sci., 2018

How Images Inspire Poems: Generating Classical Chinese Poetry from Images with Memory Networks.
CoRR, 2018

An Improved Image Camouflage Technique Using Color Difference Channel Transformation and Optimal Prediction-Error Expansion.
IEEE Access, 2018

Enhancing Person-Job Fit for Talent Recruitment: An Ability-aware Neural Network Approach.
Proceedings of the 41st International ACM SIGIR Conference on Research & Development in Information Retrieval, 2018

XiaoIce Band: A Melody and Arrangement Generation Framework for Pop Music.
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018

Ensemble Steganography.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspacem, 2018

How Images Inspire Poems: Generating Classical Chinese Poetry from Images with Memory Networks.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
The Design and Implementation of a Rekeying-Aware Encrypted Deduplication Storage System.
TOS, 2017

Dual AC Boosting Compensation Scheme for Multistage Amplifiers.
IEEE Trans. on Circuits and Systems, 2017

Detection of Double-Compressed H.264/AVC Video Incorporating the Features of the String of Data Bits and Skip Macroblocks.
Symmetry, 2017

Improved dual-image reversible data hiding method using the selection strategy of shiftable pixels' coordinates with minimum distortion.
Signal Processing, 2017

Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy.
Signal Processing, 2017

Detecting Image Splicing Based on Noise Level Inconsistency.
Multimedia Tools Appl., 2017

Fragile image watermarking scheme based on VQ index sharing and self-embedding.
Multimedia Tools Appl., 2017

Guided filtering based color image reversible data hiding.
J. Visual Communication and Image Representation, 2017

A Dynamic Hand Gesture Recognition System Incorporating Orientation-based Linear Extrapolation Predictor and Velocity-assisted Longest Common Subsequence Algorithm.
TIIS, 2017

A 5.8 GHz class-AB power amplifier with 25.4 dBm saturation power and 29.7% PAE.
SCIENCE CHINA Information Sciences, 2017

App Download Forecasting: An Evolutionary Hierarchical Competition Approach.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

Information Leakage in Encrypted Deduplication via Frequency Analysis.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

2016
Joint Allocation of Spectral and Power Resources for Non-Cooperative Wireless Localization Networks.
IEEE Trans. Communications, 2016

Reversible data hiding in VQ index table with lossless coding and adaptive switching mechanism.
Signal Processing, 2016

Guest Editorial: Information Hiding and Forensics for Multimedia Security.
Multimedia Tools Appl., 2016

Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode.
Inf. Sci., 2016

A novel image hashing scheme with perceptual robustness using block truncation coding.
Inf. Sci., 2016

CDStore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal.
IEEE Internet Computing, 2016

Reversible Data Hiding Based on Geometric Structure of Pixel Groups.
I. J. Network Security, 2016

Scheduling in Cooperative UWB Localization Networks Using Round Trip Measurements.
IEEE Communications Letters, 2016

Perceptual image hashing with selective sampling for salient structure features.
Displays, 2016

The Design and Implementation of a Rekeying-aware Encrypted Deduplication Storage System.
CoRR, 2016

Fragile Watermarking with Self-recovery Capability via Absolute Moment Block Truncation Coding.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

Rekeying for Encrypted Deduplication Storage.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

2015
Study and Test of a New Bundle-Structure Riser Stress Monitoring Sensor Based on FBG.
Sensors, 2015

Reversible data embedding for vector quantization compressed images using search-order coding and index parity matching.
Security and Communication Networks, 2015

An adaptive reversible steganographic scheme based on the just noticeable distortion.
Multimedia Tools Appl., 2015

Reversible data hiding scheme based on exploiting modification direction with two steganographic images.
Multimedia Tools Appl., 2015

Effective reversible data hiding in encrypted image with privacy protection for image content.
J. Visual Communication and Image Representation, 2015

Sharing a Large Secret Image Using Meaningful Shadows Based on VQ and Inpainting.
TIIS, 2015

Unequal Protection Mechanism for Digital Speech Transmission Based on Turbo Codes.
I. J. Network Security, 2015

Robust image hashing with embedding vector variance of LLE.
Digital Signal Processing, 2015

CDStore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal.
CoRR, 2015

3D elastic optical networking in the temporal, spectral, and spatial domains.
IEEE Communications Magazine, 2015

CDStore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal.
Proceedings of the 2015 USENIX Annual Technical Conference, 2015

Multiple Description Coding for Encrypted Images.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

Joint power and spectrum optimization in wireless localization networks.
Proceedings of the IEEE International Conference on Communication, 2015

Automatic design for analog/RF front-end system in 802.11ac receiver.
Proceedings of the 20th Asia and South Pacific Design Automation Conference, 2015

Perceptual image hashing using block truncation coding and local binary pattern.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2015

2014
TagSense: Leveraging Smartphones for Automatic Image Tagging.
IEEE Trans. Mob. Comput., 2014

A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting.
IEEE Trans. Image Processing, 2014

Compression of encrypted images with multi-layer decomposition.
Multimedia Tools Appl., 2014

A novel (n, t, n) secret image sharing scheme without a trusted third party.
Multimedia Tools Appl., 2014

Efficient wet paper embedding for steganography with multilayer construction.
Annales des Télécommunications, 2014

Tampering Detection and Content Recovery for Digital Images Using Halftone Mechanism.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Convergent Dispersal: Toward Storage-Efficient Security in a Cloud-of-Clouds.
Proceedings of the 6th USENIX Workshop on Hot Topics in Cloud Computing, 2014

A Database with ROI Extraction for Studying Fusion of Finger Vein and Finger Dorsal Texture.
Proceedings of the Biometric Recognition - 9th Chinese Conference, 2014

Finger-Vein Recognition by Using Spatial Feature Interdependence Matrix Weighted by Probability and Direction.
Proceedings of the Biometric Recognition - 9th Chinese Conference, 2014

2013
Optimized Control of DFIG-Based Wind Generation Using Sensitivity Analysis and Particle Swarm Optimization.
IEEE Trans. Smart Grid, 2013

An Inpainting-Assisted Reversible Steganographic Scheme Using a Histogram Shifting Mechanism.
IEEE Trans. Circuits Syst. Video Techn., 2013

Efficient reversible data hiding for VQ-compressed images based on index mapping mechanism.
Signal Processing, 2013

Adaptive self-recovery for tampered images based on VQ indexing and inpainting.
Signal Processing, 2013

Modeling, Control Strategy, and Power Conditioning for Direct-Drive Wave Energy Conversion to Operate With Power Grid.
Proceedings of the IEEE, 2013

Effective Fragile Watermarking for Image Authentication with High-quality Recovery Capability.
TIIS, 2013

A Novel Reversible Data Hiding Scheme for VQ-Compressed Images Using Index Set Construction Strategy.
TIIS, 2013

A Novel Turbo Unequal Error Protection Scheme for Image Steganography.
Informatica, Lith. Acad. Sci., 2013

Robust image hashing using non-uniform sampling in discrete Fourier domain.
Digital Signal Processing, 2013

An inductorless wideband low noise amplifier with current reuse and linearity enhancement.
Proceedings of the 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013), 2013

3D GIS Modeling of Virtual High-Speed Railway Scene Based on ArcGlobe.
Proceedings of the Seventh International Conference on Image and Graphics, 2013

A Virtual High-Speed Railway Scene Modeling Method Based on Basic-Element Model Combination.
Proceedings of the Seventh International Conference on Image and Graphics, 2013

2012
Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism.
Signal Processing, 2012

An adaptive prediction-error expansion oriented reversible information hiding scheme.
Pattern Recognition Letters, 2012

A multi-threshold secret image sharing scheme based on MSP.
Pattern Recognition Letters, 2012

A hierarchical threshold secret image sharing.
Pattern Recognition Letters, 2012

Simultaneous inpainting for image structure and texture using anisotropic heat transfer model.
Multimedia Tools Appl., 2012

A Novel Turbo-Based Encryption Scheme Using Dynamic Puncture Mechanism.
JNW, 2012

Reversible Data Hiding Scheme Based on Image Inpainting.
Fundam. Inform., 2012

Progressive Authentication: Deciding When to Authenticate on Mobile Phones.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Can smartphone sensors enhance kinect experience?
Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2012

Reversible Data Hiding in Encrypted Images Using Pseudorandom Sequence Modulation.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

2011
A Secret Image Sharing Scheme with High Quality Shadows Based on Exploiting Modification Direction.
Journal of Multimedia, 2011

Adaptive Secret Sharing for Color Images.
Int. J. Comput. Intell. Syst., 2011

Demo: an out-of-band alternative to face recognition.
Proceedings of the 9th International Conference on Mobile Systems, 2011

TagSense: a smartphone-based approach to automatic image tagging.
Proceedings of the 9th International Conference on Mobile Systems, 2011

2010
Movement strategies for intelligent mobile routers.
Mobile Computing and Communications Review, 2010

Image Watermarking Scheme With Unequal Protection Capability Based on Error Correcting Codes.
Journal of Multimedia, 2010

2009
Fast Texture Synthesis Based on Dynamic Space Partitioning.
Proceedings of the Fifth International Conference on Natural Computation, 2009

2008
Image Editing without Color Inconsistency Using Modified Poisson Equation.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

2006
A distributed algorithm for computing Connected Dominating Set in ad hoc networks.
IJWMC, 2006

Copyright Management Using Progressive Image Delivery, Visible Watermarking and Robust Fingerprinting.
Proceedings of the Ninth International Conference on Control, 2006


  Loading...