Chuhong Fei

According to our database1, Chuhong Fei authored at least 13 papers between 2001 and 2017.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
A cognitive dynamic system for chemical coagulation control.
Proceedings of the 30th IEEE Canadian Conference on Electrical and Computer Engineering, 2017

2016
Recursive regression and Wiener deconvolution for coagulation optimization in water treatment plant.
Proceedings of the 2016 IEEE International Conference on Digital Signal Processing, 2016

2012
Markov Chain CFAR Detection for Polarimetric Data Using Data Fusion.
IEEE Trans. Geosci. Remote. Sens., 2012

2009
A hypothesis testing approach to semifragile watermark-based authentication.
IEEE Trans. Inf. Forensics Secur., 2009

Secure semi-fragilewatermarking for image authentication.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

2008
Hyperspectral Classification Fusion for Classifying Different Military Targets.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2008

A Markov Chain CFAR Detector for Polarimetric Data using Adaptive Linear Discriminant Analysis.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2008

2006
Analysis and design of secure watermark-based authentication systems.
IEEE Trans. Inf. Forensics Secur., 2006

A hypothesis testing approach for achieving semi-fragility in multimedia authentication.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

2005
Achieving computational and unconditional security in authentication watermarking: analysis, insights, and algorithms.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

2004
Analysis and design of watermarking algorithms for improved resistance to compression.
IEEE Trans. Image Process., 2004

Analysis and design of authentication watermarking.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

2001
The Choice of Watermark Domain in the Presence of Compression.
Proceedings of the 2001 International Symposium on Information Technology (ITCC 2001), 2001


  Loading...