Shuozhong Wang

According to our database1, Shuozhong Wang authored at least 62 papers between 2002 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Detecting Image Splicing Based on Noise Level Inconsistency.
Multim. Tools Appl., 2017

2015
An Efficient Batch Verifying Scheme for Detecting Illegal Signatures.
Int. J. Netw. Secur., 2015

2014
Reversible Data Hiding in Encrypted JPEG Bitstream.
IEEE Trans. Multim., 2014

2013
Robust Hashing for Image Authentication Using Zernike Moments and Local Features.
IEEE Trans. Inf. Forensics Secur., 2013

Practical parallel key-insulated encryption with multiple helper keys.
Comput. Math. Appl., 2013

Blind Estimation of Blur Parameters by 2D-DFT on Polar Coordinate System Presented on Rectangular Grids.
Proceedings of the Seventh International Conference on Image and Graphics, 2013

2012
Efficient data hiding with histogram-preserving property.
Telecommun. Syst., 2012

Detecting Image Forgery Using Perspective Constraints.
IEEE Signal Process. Lett., 2012

Perceptual differential energy watermarking for H.264/AVC.
Multim. Tools Appl., 2012

Simultaneous inpainting for image structure and texture using anisotropic heat transfer model.
Multim. Tools Appl., 2012

Reducing frequency-domain artifacts of binary image due to coarse sampling by repeated interpolation and smoothing of Radon projections.
J. Vis. Commun. Image Represent., 2012

Non-interactive Dynamic Identity-Based Broadcast Encryption without Random Oracles.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Anonymous Hierarchical Identity-Based Encryption in Prime Order Groups.
Proceedings of the Data and Knowledge Engineering - Third International Conference, 2012

2011
Reference Sharing Mechanism for Watermark Self-Embedding.
IEEE Trans. Image Process., 2011

Log-Polar Based Scheme for Revealing Duplicated Regions in Digital Images.
IEEE Signal Process. Lett., 2011

Self-embedding watermark with flexible restoration quality.
Multim. Tools Appl., 2011

Lexicographical framework for image hashing with implementation based on DCT and NMF.
Multim. Tools Appl., 2011

Reversible Visible Watermarhing with Lossless Data Embedding Based on Difference Value Shift.
Intell. Autom. Soft Comput., 2011

Structural Feature-Based Image Hashing and Similarity Metric for Tampering Detection.
Fundam. Informaticae, 2011

Image self-embedding with high-quality restoration capability.
Digit. Signal Process., 2011

2010
Near-optimal codes for information embedding in gray-scale signals.
IEEE Trans. Inf. Theory, 2010

Estimation of image rotation angle using interpolation-related spectral signatures with application to blind detection of image forgery.
IEEE Trans. Inf. Forensics Secur., 2010

Reversible fragile watermarking for locating tampered blocks in JPEG images.
Signal Process., 2010

New Fuzzy Identity-Based Encryption in the Standard Model.
Informatica, 2010

Hierarchical Identity-Based Proxy Re-Encryption without Random Oracles.
Int. J. Found. Comput. Sci., 2010

Improved modification direction methods.
Comput. Math. Appl., 2010

Detection of Image Region-Duplication with Rotation and Scaling Tolerance.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2010

2009
Fragile watermarking scheme using a hierarchical mechanism.
Signal Process., 2009

Steganography Combining Data Decomposition Mechanism and Stego-coding Method.
Informatica (Slovenia), 2009

Perceptual Similarity Metric Resilient to Rotation for Application in Robust Image Hashing.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009

Fragile Watermarking Scheme with Extensive Content Restoration Capability.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009

Matrix Selection in High Payload Embedding.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

2008
Fragile Watermarking With Error-Free Restoration Capability.
IEEE Trans. Multim., 2008

Multibit Assignment Steganography in Palette Images.
IEEE Signal Process. Lett., 2008

Twice Gric Colorings in Steganography.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Image Editing without Color Inconsistency Using Modified Poisson Equation.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes.
Proceedings of the Information Hiding, 10th International Workshop, 2008

2007
A Double Layered "Plus-Minus One" Data Embedding Scheme.
IEEE Signal Process. Lett., 2007

Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels.
IEEE Signal Process. Lett., 2007

Watermarking Scheme Capable of Resisting Sensitivity Attack.
IEEE Signal Process. Lett., 2007

Improving Embedding Efficiency of Covering Codes for Applications in Steganography.
IEEE Commun. Lett., 2007

2006
Dynamical running coding in digital steganography.
IEEE Signal Process. Lett., 2006

Efficient Steganographic Embedding by Exploiting Modification Direction.
IEEE Commun. Lett., 2006

Moving traffic object retrieval in H.264/MPEG compressed video.
Proceedings of the Visual Information Processing XV, 2006

Information capacity of quantization steganography in the presence of active attack.
Proceedings of the 12th International Conference on Multi Media Modeling (MMM 2006), 2006

Replacement of Image Patches with Rugged Soft Boundary Using Texture Synthesis.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

Information Hiding in Text Using Typesetting Tools with Stego-Encoding.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

Iterative Image Resolution Enhancement Using MAP Estimator.
Proceedings of the Ninth International Conference on Control, 2006

Copyright Management Using Progressive Image Delivery, Visible Watermarking and Robust Fingerprinting.
Proceedings of the Ninth International Conference on Control, 2006

2005
Steganography using multiple-base notational system and human vision sensitivity.
IEEE Signal Process. Lett., 2005

Stego-Encoding with Error Correction Capability.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Watermarking Protocol Compatible with Secret Algorithms for Resisting Invertibility Attack.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Analysis of Parity Assignment Steganography in Palette Images.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

2004
Invertibility attack against watermarking based on forged algorithm and a countermeasure.
Pattern Recognit. Lett., 2004

Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security.
Pattern Recognit. Lett., 2004

Cyber warfare: steganography vs. steganalysis.
Commun. ACM, 2004

A new watermarking scheme against inserter-based attacks suitable for digital media with moderate size.
Proceedings of the 3rd International Conference on Information Security, 2004

2003
Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences.
Proceedings of the Computer Network Security, 2003

Steganography with Least Histogram Abnormality.
Proceedings of the Computer Network Security, 2003

Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation.
Proceedings of the Computer Network Security, 2003

Data Hiding in Digital Audio by Frequency Domain Dithering.
Proceedings of the Computer Network Security, 2003

2002
Watermarking scheme capable of resisting attacks based on availability of inserter.
Signal Process., 2002


  Loading...