Jinwei Wang

According to our database1, Jinwei Wang authored at least 53 papers between 2005 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Dynamic multi-watermarking and detecting in DWT domain.
J. Real-Time Image Processing, 2019

A new method estimating linear gaussian filter kernel by image PRNU noise.
J. Inf. Sec. Appl., 2019

Discrimination of Computer Generated and Photographic Images Based on CQWT Quaternion Markov Features.
IJPRAI, 2019

A Reversible Watermarking Algorithm Resistant to Image Geometric Transformation.
IJDCF, 2019

Quaternion Convolutional Neural Network for Color Image Classification and Forensics.
IEEE Access, 2019

Selective Learning Confusion Class for Text-Based CAPTCHA Recognition.
IEEE Access, 2019

2018
Deceptive SAR Jamming Based on 1-bit Sampling and Time-Varying Thresholds.
IEEE J Sel. Topics in Appl. Earth Observ. and Remote Sensing, 2018

Expose noise level inconsistency incorporating the inhomogeneity scoring strategy.
Multimedia Tools Appl., 2018

Efficient large payloads ternary matrix embedding.
Multimedia Tools Appl., 2018

Quaternion discrete fractional random transform for color image adaptive watermarking.
Multimedia Tools Appl., 2018

Digital Image Splicing Detection Based on Markov Features in QDCT and QWT Domain.
IJDCF, 2018

Pain Intensity Estimation Using Deep Spatiotemporal and Handcrafted Features.
IEICE Transactions, 2018

Decision Stump and StackingC-Based Hybrid Algorithm for Healthcare Data Classification.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
AMR Steganalysis Based on Second-Order Difference of Pitch Delay.
IEEE Trans. Information Forensics and Security, 2017

Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy.
Signal Processing, 2017

Detecting Image Splicing Based on Noise Level Inconsistency.
Multimedia Tools Appl., 2017

Improved reversible data hiding based on two-dimensional difference-histogram modification.
Multimedia Tools Appl., 2017

Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics.
Multimedia Tools Appl., 2017

Fragile image watermarking scheme based on VQ index sharing and self-embedding.
Multimedia Tools Appl., 2017

Hybrid multiplicative multi-watermarking in DWT domain.
Multidim. Syst. Sign. Process., 2017

A privacy-preserving content-based image retrieval method in cloud environment.
J. Visual Communication and Image Representation, 2017

High-fidelity reversible data hiding based on geodesic path and pairwise prediction-error expansion.
Neurocomputing, 2017

Hierarchical recovery for tampered images based on watermark self-embedding.
Displays, 2017

A Novel Robust Reversible Watermarking Scheme Based on IWT.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
Secure hybrid multibit multiplicative watermarking for media distribution over mobile Internet.
Security and Communication Networks, 2016

Video inter-frame forgery identification based on the consistency of quotient of MSSIM.
Security and Communication Networks, 2016

Lossless data hiding algorithm for encrypted images with high capacity.
Multimedia Tools Appl., 2016

High-fidelity reversible data hiding based on pixel-value-ordering and pairwise prediction-error expansion.
J. Visual Communication and Image Representation, 2016

Improved PVO-based reversible data hiding: A new implementation based on multiple histograms modification.
J. Visual Communication and Image Representation, 2016

A novel image hashing scheme with perceptual robustness using block truncation coding.
Inf. Sci., 2016

2015
Hybrid additive multi-watermarking and decoding.
Multimedia Syst., 2015

2014
A nonlocal energy minimization approach to brain image segmentation with simultaneous bias field estimation and denoising.
Mach. Vis. Appl., 2014

Study on some qualitative properties for solutions of a certain two-dimensional fractional differential system with Hadamard derivative.
Appl. Math. Lett., 2014

2013
Hybrid additive watermarking and its decoders.
Telecommunication Systems, 2013

A new level set method for inhomogeneous image segmentation.
Image Vision Comput., 2013

Auto-Tuning of Thread Assignment for Matrix-Vector Multiplication on GPUs.
IEICE Transactions, 2013

2012
On the hybrid multi-watermarking.
Signal Processing, 2012

Content distribution and copyright authentication based on combined indexing and watermarking.
Multimedia Tools Appl., 2012

On multiwatermarking in cloud environment.
Concurrency and Computation: Practice and Experience, 2012

A new convex variational model for liver segmentation.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

A Significance-Driven Framework for Characterizing and Finding Evolving Patterns of News Networks.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2012

2009
MapView: visualization of short reads alignment on a desktop computer.
Bioinformatics, 2009

DUMS: A Dynamical Updatable Monitoring System for Desktop PCs Used for Distributed Computing.
Proceedings of the TASE 2009, 2009

2008
Locally optimum detection for Barni's multiplicative watermarking in DWT domain.
Signal Processing, 2008

Secure multimedia watermarking authentication in wavelet domain.
J. Electronic Imaging, 2008

Optimum Decoder for Barni's Multiplicative Watermarking Based on Minimum Bayesian Risk Criterion.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

2006
Secure multimedia browser over network.
Proceedings of the Visual Information Processing XV, 2006

Data Hiding in Neural Network Prediction Errors.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

Semi-Fragile Watermarking Authentication with Local and Global Watermarks.
Proceedings of the Artificial Intelligence Applications and Innovations, 2006

Robustness Analysis of Watermarking Schemes Based on Two Novel Transforms.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

2005
Analysis on Resource Utilization Patterns of Office Computer.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005

Image Hiding by Non-uniform Generalized LSB and Dynamic Programming.
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005

On Sequence Synchronization Analysis Against Chaos Based Spread Spectrum Image Steganography.
Proceedings of the Advances in Natural Computation, First International Conference, 2005


  Loading...