Weimin Wei

According to our database1, Weimin Wei authored at least 14 papers between 2009 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Application of Improved YOLOv3 Algorithm in Mask Recognition.
Proceedings of the Intelligent Information and Database Systems - 13th Asian Conference, 2021

2020
Reversible data hiding in encrypted binary image with shared pixel prediction and halving compression.
EURASIP J. Image Video Process., 2020

2019
Separable reversible data hiding in encrypted images based on scalable blocks.
Multim. Tools Appl., 2019

Robust real-time image encryption with aperiodic chaotic map and random-cycling bit shift.
J. Real Time Image Process., 2019

Image Splicing Localization Using Superpixel Segmentation and Noise Level Estimation.
Proceedings of the 12th International Congress on Image and Signal Processing, 2019

Image Copy-Paste Tampering Detection Based on Superpixel Segmentation and Feature Extraction Algorithm.
Proceedings of the 12th International Congress on Image and Signal Processing, 2019

2017
Smart grid data privacy protection algorithm.
Proceedings of the 2017 International Symposium on Intelligent Signal Processing and Communication Systems, 2017

Research progress of anonymous data release.
Proceedings of the 2017 International Symposium on Intelligent Signal Processing and Communication Systems, 2017

Research on information security evaluation model of public institution.
Proceedings of the 2017 International Symposium on Intelligent Signal Processing and Communication Systems, 2017

2012
Innovative Teaching and Learning Experiences in Network Attacks and Defense.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

2011
Lexicographical framework for image hashing with implementation based on DCT and NMF.
Multim. Tools Appl., 2011

Structural Feature-Based Image Hashing and Similarity Metric for Tampering Detection.
Fundam. Informaticae, 2011

2010
Estimation of image rotation angle using interpolation-related spectral signatures with application to blind detection of image forgery.
IEEE Trans. Inf. Forensics Secur., 2010

2009
Perceptual Similarity Metric Resilient to Rotation for Application in Robust Image Hashing.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009


  Loading...