Yun Q. Shi

According to our database1, Yun Q. Shi authored at least 263 papers between 1988 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Identifying Computer Generated Images Based on Quaternion Central Moments in Color Quaternion Wavelet Domain.
IEEE Trans. Circuits Syst. Video Techn., 2019

Separable Data-Hiding Scheme for Encrypted Image to Protect Privacy of User in Cloud.
Symmetry, 2019

Code Division Multiplexing and Machine Learning Based Reversible Data Hiding Scheme for Medical Image.
Security and Communication Networks, 2019

JPEG steganalysis with combined dense connected CNNs and SCA-GFR.
Multimedia Tools Appl., 2019

Smoothing identification for digital image forensics.
Multimedia Tools Appl., 2019

A code division multiplexing and block classification-based real-time reversible data-hiding algorithm for medical images.
J. Real-Time Image Processing, 2019

Dynamic multi-watermarking and detecting in DWT domain.
J. Real-Time Image Processing, 2019

A multi-purpose image forensic method using densely connected convolutional neural networks.
J. Real-Time Image Processing, 2019

Minimum entropy and histogram-pair based JPEG image reversible data hiding.
J. Inf. Sec. Appl., 2019

Color image-spliced localization based on quaternion principal component analysis and quaternion skewness.
J. Inf. Sec. Appl., 2019

Image Steganography using Gaussian Markov Random Field Model.
CoRR, 2019

Quaternion Convolutional Neural Network for Color Image Classification and Forensics.
IEEE Access, 2019

A Cover Selection HEVC Video Steganography Based on Intra Prediction Mode.
IEEE Access, 2019

Towards Automatic Embedding Cost Learning for JPEG Steganography.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

2018
Transportation Spherical Watermarking.
IEEE Trans. Image Processing, 2018

A Study on the Security Levels of Spread-Spectrum Embedding Schemes in the WOA Framework.
IEEE Trans. Cybernetics, 2018

A New Distortion Function Design for JPEG Steganography Using the Generalized Uniform Embedding Strategy.
IEEE Trans. Circuits Syst. Video Techn., 2018

Efficient JPEG Steganography Using Domain Transformation of Embedding Entropy.
IEEE Signal Process. Lett., 2018

Detecting USM image sharpening by using CNN.
Sig. Proc.: Image Comm., 2018

A novel reversible data hiding method with image contrast enhancement.
Sig. Proc.: Image Comm., 2018

Detecting median filtering via two-dimensional AR models of multiple filtered residuals.
Multimedia Tools Appl., 2018

An integer wavelet transform based scheme for reversible data hiding in encrypted images.
Multidim. Syst. Sign. Process., 2018

An efficient weak sharpening detection method for image forensics.
J. Visual Communication and Image Representation, 2018

Histogram-pair based reversible data hiding via searching for optimal four thresholds.
J. Inf. Sec. Appl., 2018

Spatial Image Steganography Based on Generative Adversarial Network.
CoRR, 2018

Fractional Quaternion Zernike Moments for Robust Color Image Copy-Move Forgery Detection.
IEEE Access, 2018

An Improved Splicing Localization Method by Fully Convolutional Networks.
IEEE Access, 2018

Privacy-Aware Reversible Watermarking in Cloud Computing Environments.
IEEE Access, 2018

Comparison of DCT and Gabor Filters in Residual Extraction of CNN Based JPEG Steganalysis.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018

A Convolutional Neural Network Based Seam Carving Detection Scheme for Uncompressed Digital Images.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018

Pixel-Value-Ordering Based Reversible Data Hiding with Adaptive Texture Classification and Modification.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018

A Multiple Linear Regression Based High-Accuracy Error Prediction Algorithm for Reversible Data Hiding.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018

Deep Learning with Feature Reuse for JPEG Image Steganalysis.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

2017
Rate and Distortion Optimization for Reversible Data Hiding Using Multiple Histogram Shifting.
IEEE Trans. Cybernetics, 2017

Separable Reversible Data Hiding for Encrypted Palette Images With Color Partitioning and Flipping Verification.
IEEE Trans. Circuits Syst. Video Techn., 2017

Erratum to: Fingerprint liveness detection using gradient-based texture features.
Signal, Image and Video Processing, 2017

Fingerprint liveness detection using gradient-based texture features.
Signal, Image and Video Processing, 2017

Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics.
Multimedia Tools Appl., 2017

Hybrid multiplicative multi-watermarking in DWT domain.
Multidim. Syst. Sign. Process., 2017

A privacy-preserving content-based image retrieval method in cloud environment.
J. Visual Communication and Image Representation, 2017

Quaternion pseudo-Zernike moments combining both of RGB information and depth information for color image splicing detection.
J. Visual Communication and Image Representation, 2017

An effective method to detect seam carving.
J. Inf. Sec. Appl., 2017

JPEG Steganalysis Based on DenseNet.
CoRR, 2017

A Hybrid Feature Model for Seam Carving Detection.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

Image Quality Assessment in Reversible Data Hiding with Contrast Enhancement.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

2016
Analyzing the Effect of JPEG Compression on Local Variance of Image Intensity.
IEEE Trans. Image Processing, 2016

A Reversible Data Hiding Scheme Based on Code Division Multiplexing.
IEEE Trans. Information Forensics and Security, 2016

New Framework for Reversible Data Hiding in Encrypted Domain.
IEEE Trans. Information Forensics and Security, 2016

Structural Design of Convolutional Neural Networks for Steganalysis.
IEEE Signal Process. Lett., 2016

Robust image watermarking based on Tucker decomposition and Adaptive-Lattice Quantization Index Modulation.
Sig. Proc.: Image Comm., 2016

Twenty years of digital audio watermarking - a comprehensive review.
Signal Processing, 2016

An improved scheme for data hiding in encrypted H.264/AVC videos.
J. Visual Communication and Image Representation, 2016

Reversible Watermarking with Adaptive Embedding Threshold Matrix.
TIIS, 2016

Can Machine Learn Steganography? - Implementing LSB Substitution and Matrix Coding Steganography with Feed-Forward Neural Networks.
CoRR, 2016

Prediction-error of Prediction Error (PPE)-based Reversible Data Hiding.
CoRR, 2016

Reversible Data Hiding: Advances in the Past Two Decades.
IEEE Access, 2016

Dynamic content selection-and-prediction framework applied to reversible data hiding.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016

A Local Derivative Pattern Based Image Forensic Framework for Seam Carving Detection.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Detecting Double H.264 Compression Based on Analyzing Prediction Residual Distribution.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Ensemble of CNNs for Steganalysis: An Empirical Study.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016

PPE-Based Reversible Data Hiding.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016

A Novel CDMA Based High Performance Reversible Data Hiding Scheme.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016

2015
Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited.
IEEE Trans. Information Forensics and Security, 2015

Reversible Image Data Hiding with Contrast Enhancement.
IEEE Signal Process. Lett., 2015

Reversible Data Hiding Using Controlled Contrast Enhancement and Integer Wavelet Transform.
IEEE Signal Process. Lett., 2015

Edge Perpendicular Binary Coding for USM Sharpening Detection.
IEEE Signal Process. Lett., 2015

A reversible data hiding method with contrast enhancement for medical images.
J. Visual Communication and Image Representation, 2015

Optimal Histogram-Pair and Prediction-Error Based Reversible Data Hiding for Medical Images.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

An Advanced Texture Analysis Method for Image Sharpening Detection.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

2014
An Effective Method for Detecting Double JPEG Compression With the Same Quantization Matrix.
IEEE Trans. Information Forensics and Security, 2014

Data Hiding in Encrypted H.264/AVC Video Streams by Codeword Substitution.
IEEE Trans. Information Forensics and Security, 2014

Uniform Embedding for Efficient JPEG Steganography.
IEEE Trans. Information Forensics and Security, 2014

Revealing the Traces of Median Filtering Using High-Order Local Ternary Patterns.
IEEE Signal Process. Lett., 2014

An improved reversible data hiding-based approach for intra-frame error concealment in H.264/AVC.
J. Visual Communication and Image Representation, 2014

On YASS's Non-monotonic Security Performance.
CSSP, 2014

Combination of SIFT Feature and Convex Region-Based Global Context Feature for Image Copy Detection.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Inter-frame Video Forgery Detection Based on Block-Wise Brightness Variance Descriptor.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

New Developments in Image Tampering Detection.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Reversible Data Hiding by Median-Preserving Histogram Modification for Image Contrast Enhancement.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Stereo Image Coding with Histogram-Pair Based Reversible Data Hiding.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

A Reversible Image Watermarking Scheme Based on Modified Integer-to-Integer Discrete Wavelet Transform and CDMA Algorithm.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Variable Multi-dimensional Co-occurrence for Steganalysis.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Do biometric images follow Benford's law?
Proceedings of the 2nd International Workshop on Biometrics and Forensics, 2014

2013
Pairwise Prediction-Error Expansion for Efficient Reversible Data Hiding.
IEEE Trans. Image Processing, 2013

Detecting Covert Channels in Computer Networks Based on Chaos Theory.
IEEE Trans. Information Forensics and Security, 2013

Detection of Double Compression in MPEG-4 Videos Based on Markov Statistics.
IEEE Signal Process. Lett., 2013

Detecting Non-aligned Double JPEG Compression Based on Refined Intensity Difference and Calibration.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Reversible Data Hiding in Encrypted H.264/AVC Video Streams.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Using RZL Coding to Enhance Histogram-Pair Based Image Reversible Data Hiding.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

A Novel Method for Detecting Image Sharpening Based on Local Binary Pattern.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Non-uniform Quantization in Breaking HUGO.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Distortion function designing for JPEG steganography with uncompressed side-image.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

2012
Reference index-based H.264 video watermarking scheme.
TOMCCAP, 2012

New Channel Selection Rule for JPEG Steganography.
IEEE Trans. Information Forensics and Security, 2012

Steganography in Streaming Multimedia over Networks.
Trans. Data Hiding and Multimedia Security, 2012

A Study on Embedding Efficiency of Matrix Encoding.
IJDCF, 2012

Detection of tampered region for JPEG images by using mode-based first digit features.
EURASIP J. Adv. Sig. Proc., 2012

An efficient JPEG steganographic scheme using uniform embedding.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Automatic classification of analog modulation schemes.
Proceedings of the 2012 IEEE Radio and Wireless Symposium, 2012

Optimal Histogram-Pair and Prediction-Error Based Image Reversible Data Hiding.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

Distinguishing Computer Graphics from Photographic Images Using Local Binary Patterns.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

A Novel Mapping Scheme for Steganalysis.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

Textural Features for Steganalysis.
Proceedings of the Information Hiding - 14th International Conference, 2012

An Enhanced EM algorithm using maximum entropy distribution as initial condition.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

Camera Model Identification Using Local Binary Patterns.
Proceedings of the 2012 IEEE International Conference on Multimedia and Expo, 2012

2011
Markovian Rake Transform for Digital Image Tampering Detection.
Trans. Data Hiding and Multimedia Security, 2011

Basis arrays and successive packing for M-D interleaving.
Multidim. Syst. Sign. Process., 2011

Lossless image data embedding in plain areas.
Proceedings of the Media Forensics and Security III, 2011

Anti-Forensics of Double JPEG Compression Detection.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

A Drift Compensation Algorithm for H.264/AVC Video Robust Watermarking Scheme.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

LinL: Lost in n-best List.
Proceedings of the Information Hiding - 13th International Conference, 2011

2010
Image Steganalysis.
Proceedings of the Intelligent Multimedia Analysis for Security Applications, 2010

Detecting Double JPEG Compression With the Same Quantization Matrix.
IEEE Trans. Information Forensics and Security, 2010

An experimental study on the security performance of YASS.
IEEE Trans. Information Forensics and Security, 2010

Image Forensics Using Generalised Benford's Law for Improving Image Authentication Detection Rates in Semi-Fragile Watermarking.
IJDCF, 2010

Reversible Watermarking Algorithm with Distortion Compensation.
EURASIP J. Adv. Sig. Proc., 2010

A phase-space reconstruction approach to detect covert channels in TCP/IP protocols.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

A Novel Multi-size Block Benford's Law Scheme for Printer Identification.
Proceedings of the Advances in Multimedia Information Processing - PCM 2010, 2010

Detecting double compression of audio signal.
Proceedings of the Media Forensics and Security II, 2010

Passive Detection of Paint-Doctored JPEG Images.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010

A Statistical Model for Quantized AC Block DCT Coefficients in JPEG Compression and its Application to Detecting Potential Compression History in Bitmap Images.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010

New JPEG Steganographic Scheme with High Security Performance.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010

A Smart Phone Image Database for Single Image Recapture Detection.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010

Double-threshold reversible data hiding.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010

New developments in color image tampering detection.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010

Is physics-based liveness detection truly possible with a single image?
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010

A high-performance YASS-like scheme using randomized big-blocks.
Proceedings of the 2010 IEEE International Conference on Multimedia and Expo, 2010

Rake transform and edge statistics for image forgery detection.
Proceedings of the 2010 IEEE International Conference on Multimedia and Expo, 2010

Hiding Data in Multimedia Streaming over Networks.
Proceedings of the 8th Annual Conference on Communication Networks and Services Research, 2010

2009
Steganalysis of YASS.
IEEE Trans. Information Forensics and Security, 2009

Optimum Histogram Pair Based Image Lossless Data Embedding.
Trans. Data Hiding and Multimedia Security, 2009

Reversible Watermarking Algorithm Using Sorting and Prediction.
IEEE Trans. Circuits Syst. Video Techn., 2009

Non-ambiguity of blind watermarking: a revisit with analytical resolution.
Science in China Series F: Information Sciences, 2009

Defeating fake-quality MP3.
Proceedings of the Multimedia and Security Workshop, 2009

Mp3 bit rate quality detection through frequency spectrum analysis.
Proceedings of the Multimedia and Security Workshop, 2009

Camera-Model Identification Using Markovian Transition Probability Matrix.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009

An Enhanced Statistical Approach to Identifying Photorealistic Images.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009

Camera brand and model identification using moments of 1-D and 2-D characteristic functions.
Proceedings of the International Conference on Image Processing, 2009

Computer graphics classification based on Markov process model and boosting feature selection technique.
Proceedings of the International Conference on Image Processing, 2009

2008
A Novel Difference Expansion Transform for Reversible Data Embedding.
IEEE Trans. Information Forensics and Security, 2008

Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication.
IEEE Trans. Circuits Syst. Video Techn., 2008

Evaluating Electronic Voting Systems Equipped with Voter-Verified Paper Records.
IEEE Security & Privacy, 2008

Textural features based universal steganalysis.
Proceedings of the Security, 2008

Detecting doubly compressed JPEG images by using Mode Based First Digit Features.
Proceedings of the International Workshop on Multimedia Signal Processing, 2008

Steganalysis of YASS.
Proceedings of the 10th workshop on Multimedia & Security, 2008

First Digit Law and Its Application to Digital Forensics.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

Run-Length and Edge Statistics Based Approach for Image Splicing Detection.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

Detection of Double MPEG Compression Based on First Digit Statistics.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

JPEG image steganalysis utilizing both intrablock and interblock correlations.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008

Reversible binary image data hiding by run-length histogram modification.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

Computer graphics identification using genetic algorithm.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

A machine learning based scheme for double JPEG compression detection.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

A study on security performance of YASS.
Proceedings of the International Conference on Image Processing, 2008

Data Mining of Modulation Types Using Cyclostationarity-Based Decision Tree.
Proceedings of The 2008 International Conference on Data Mining, 2008

2007
A generalized Benford's law for JPEG coefficients and its applications in image forensics.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Image splicing detection using 2-D phase congruency and statistical moments of characteristic function.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

A natural image model approach to splicing detection.
Proceedings of the 9th workshop on Multimedia & Security, 2007

Optimum Histogram Pair Based Image Lossless Data Embedding.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

Steganalysis Versus Splicing Detection.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

Effect of Recompression on Attacking JPEG Steganographic Schemes An Experimental Study.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2007), 2007

JPEG Steganalysis Based on Classwise Non-Principal Components Analysis and Multi-Directional Markov Model.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

Identifying Computer Graphics using HSV Color Model and Statistical Moments of Characteristic Functions.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

Steganalyzing Texture Images.
Proceedings of the International Conference on Image Processing, 2007

A Novel Bayesian Classifier with Smaller Eigenvalues Reset by Threshold Based on Given Database.
Proceedings of the Image Analysis and Recognition, 4th International Conference, 2007

Reversible Data Hiding for JPEG Images Based on Histogram Pairs.
Proceedings of the Image Analysis and Recognition, 4th International Conference, 2007

2006
Constant quality rate allocation for FGS coding using composite R-D analysis.
IEEE Trans. Multimedia, 2006

A Semi-Fragile Lossless Digital Watermarking Scheme Based on Integer Wavelet Transform.
IEEE Trans. Circuits Syst. Video Techn., 2006

Reversible data hiding.
IEEE Trans. Circuits Syst. Video Techn., 2006

Network Traffic Prediction Using Least Mean Kurtosis.
IEICE Transactions, 2006

Achieving non-ambiguity of quantization-based watermarking.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

JPEG Steganalysis Using Empirical Transition Matrix in Block DCT Domain.
Proceedings of the IEEE 8th Workshop on Multimedia Signal Processing, 2006

Lossless Data Hiding Using Histogram Shifting Method Based on Integer Wavelets.
Proceedings of the Digital Watermarking, 5th International Workshop, 2006

Steganalysis Using High-Dimensional Features Derived from Co-occurrence Matrix and Class-Wise Non-Principal Components Analysis (CNPCA).
Proceedings of the Digital Watermarking, 5th International Workshop, 2006

Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition.
Proceedings of the Digital Watermarking, 5th International Workshop, 2006

A Markov Process Based Approach to Effective Attacking JPEG Steganography.
Proceedings of the Information Hiding, 8th International Workshop, 2006

Feature Selection based on the Bhattacharyya Distance.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

A Novel Pattern Classification Scheme: Classwise Non-Principal Component Analysis (CNPCA).
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

Steganalysis based on Markov Model of Thresholded Prediction-Error Image.
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006

Steganalysis of JPEG2000 Lazy-Mode Steganography using the Hilbert-Huang Transform Based Sequential Analysis.
Proceedings of the International Conference on Image Processing, 2006

Statistical Moments Based Universal Steganalysis using JPEG 2-D Array and 2-D Characteristic Function.
Proceedings of the International Conference on Image Processing, 2006

2005
Data Integration for Medical Information Management.
VLSI Signal Processing, 2005

Guest Editorial.
VLSI Signal Processing, 2005

Efficiently self-synchronized audio watermarking for assured audio data transmission.
TBC, 2005

Binary Image Watermarking Through Blurring, Biased Binarization.
Int. J. Image Graphics, 2005

Dwt-Based Video Data Hiding Robust To Mpeg Compression And Frame Loss.
Int. J. Image Graphics, 2005

A Feature Selection Based on Minimum Upper Bound of Bayes Error.
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005

Identity Verification System Using Data Hiding and Fingerprint Recognition.
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005

Image Steganalysis Based on Statistical Moments of Wavelet Subband Histograms in DFT Domain.
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005

Multi-band Wavelet Based Digital Watermarking Using Principal Component Analysis.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

Layered MPEG Video Transmission over IP DiffServ.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Effective Steganalysis Based on Statistical Moments of Wavelet Characteristic Function.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Formatted text document data hiding robust to printing, copying and scanning.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

Symbol-rate estimation based on filter bank.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions.
Proceedings of the Information Hiding, 7th International Workshop, 2005

Lossless Data Hiding Using Integer Wavelet Transform and Threshold Embedding Technique.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

2004
Distance-reciprocal distortion measure for binary document images.
IEEE Signal Process. Lett., 2004

Mini-max initialization for function approximation.
Neurocomputing, 2004

A semi-fragile lossless digital watermarking scheme based on integer wavelet transform.
Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing, 2004

Reversible data hiding based on wavelet spread spectrum.
Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing, 2004

A Secure Internet-Based Personal Identity Verification System Using Lossless Watermarking and Fingerprint Recognition.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004

Reversible Data Hiding Using Integer Wavelet Transform and Companding Technique.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004

Reversible Data Hiding.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004

High capacity lossless data hiding based on integer wavelet transform.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004

Self-synchronized audio watermark in DWT domain.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004

Lossless data hiding: fundamentals, algorithms and applications.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004

A unified authentication framework for JPEG2000.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

Robust lossless image data hiding.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

Improve robustness of image watermarking via adaptive receiving.
Proceedings of the 2004 International Conference on Image Processing, 2004

Improve security of fragile watermarking via parameterized wavelet.
Proceedings of the 2004 International Conference on Image Processing, 2004

2003
Constant quality constrained rate allocation for FGS-coded video.
IEEE Trans. Circuits Syst. Video Techn., 2003

A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression.
IEEE Trans. Circuits Syst. Video Techn., 2003

Robust Watermarking with Adaptive Receiving.
Proceedings of the Digital Watermarking, Second International Workshop, 2003

Self-similar Traffic Prediction Using Least Mean Kurtosis.
Proceedings of the 2003 International Symposium on Information Technology (ITCC 2003), 2003

2-D and 3-D successive packing interleaving techniques and their applications to image and video data hiding.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

Reversible data hiding.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

A high capacity distortion-free data hiding algorithm for palette image.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

Analysis of the role played by error correcting coding in robust watermarking.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

Image watermarking algorithm applying CDMA.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

A content-based image authentication system with lossless data hiding.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003

Rate allocation for FGS coded video using composite R-D analysis.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003

2002
Reliable information bit hiding.
IEEE Trans. Circuits Syst. Video Techn., 2002

On modeling MPEG video traffics.
TBC, 2002

Constant-quality constrained-rate allocation for FGS video coded bitstreams.
Proceedings of the Visual Communications and Image Processing 2002, 2002

An Image Watermarking Algorithm Robust to Geometric Distortion.
Proceedings of the Digital Watermarking, First International Workshop, 2002

A DWT-Based Fragile Watermarking Tolerant of JPEG Compression.
Proceedings of the Digital Watermarking, First International Workshop, 2002

A Fast Non-Linear Adaptive Algorithm for Video Traffic Prediction.
Proceedings of the 2002 International Symposium on Information Technology (ITCC 2002), 2002

Successive packing based interleaver design for turbo codes.
Proceedings of the 2002 International Symposium on Circuits and Systems, 2002

An Objective Distortion Measure for Binary Document Images Based on Human Visual Perceptio.
Proceedings of the 16th International Conference on Pattern Recognition, 2002

Lossless data hiding based on integer wavelet transform.
Proceedings of the IEEE 5th Workshop on Multimedia Signal Processing, 2002

Sample domain integration of medical data for multimedia diagnosis.
Proceedings of the IEEE 5th Workshop on Multimedia Signal Processing, 2002

Detection of block DCT-based steganography in gray-scale images.
Proceedings of the IEEE 5th Workshop on Multimedia Signal Processing, 2002

Watermark embedding in DC components of DCT for binary images.
Proceedings of the IEEE 5th Workshop on Multimedia Signal Processing, 2002

2001
Modeling MPEG Coded Video Traffic by Markov-Modulated Self-Similar Processes.
VLSI Signal Processing, 2001

On-Line Dynamic Bandwidth Allocation For Vbr Video Transmission.
Proceedings of the 2001 International Symposium on Information Technology (ITCC 2001), 2001

Embedding gray level images.
Proceedings of the 2001 International Symposium on Circuits and Systems, 2001

The tale of a simple accurate MPEG video traffic model.
Proceedings of the IEEE International Conference on Communications, 2001

On Test and Characterization of Analog Linear Time-Invariant Circuits Using Neural Networks.
Proceedings of the 10th Asian Test Symposium (ATS 2001), 19-21 November 2001, Kyoto, Japan, 2001

2000
Embedding image watermarks in dc components.
IEEE Trans. Circuits Syst. Video Techn., 2000

Dynamic Bandwidth Allocation for VBR Video Traffic Based on Scene Change Identification.
Proceedings of the 2000 International Symposium on Information Technology (ITCC 2000), 2000

Enhancing Robustness of Digital Watermarking Against Geometric Attack based on Fractal Transform.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000

A Simple Model for MPEG Video Traffic.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000

3-D Interleaving for Enhancing the Robustness of Watermark Signals Embedded in Video Sequences.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000

2-D Interleaving for Enhancing the Robustness of Watermark Signals Embedded in Still Images.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000

1999
MAP symbol decoding of arithmetic coding with embedded channel coding.
Proceedings of the 1999 IEEE Wireless Communications and Networking Conference, 1999

Maximum-likelihood sequence decoding of digital image watermarking.
Proceedings of the Security and Watermarking of Multimedia Contents, 1999

Modeling VBR video traffic by Markov-modulated self-similar processes.
Proceedings of the Third IEEE Workshop on Multimedia Signal Processing, 1999

MPEG Video Traffic Models: Sequentially Modulated Self-Similar Processes.
Proceedings of the Broadband Communications: Convergence of Network Technologies, 1999

1998
Correlation-feedback technique in optical flow determination.
IEEE Trans. Image Processing, 1998

Optical flow-based motion compensation algorithm for very low-bit-rate video coding.
Int. J. Imaging Systems and Technology, 1998

Guest Editorial.
Int. J. Imaging Systems and Technology, 1998

Power constrained multiple signaling in digital image watermarking.
Proceedings of the Second IEEE Workshop on Multimedia Signal Processing, 1998

1997
A thresholding multiresolution block matching algorithm.
IEEE Trans. Circuits Syst. Video Techn., 1997

Region-based adaptive DWT video coding using dense motion field.
Proceedings of the First IEEE Workshop on Multimedia Signal Processing, 1997

An optical flow based motion compensation algorithm for very low bit-rate video coding.
Proceedings of the 1997 IEEE International Conference on Acoustics, 1997

1994
Unified optical flow field approach to motion analysis from a sequence of stereo images.
Pattern Recognition, 1994

Correlation-feedback Approach to Computation of Optical Flow.
Proceedings of the 1994 IEEE International Symposium on Circuits and Systems, ISCAS 1994, London, England, UK, May 30, 1994

A Kalman Filter in Motion Analysis from Stereo Image Sequences.
Proceedings of the Proceedings 1994 International Conference on Image Processing, 1994

1993
Direct recovering of Nth order surface structure using unified optical flow field.
Pattern Recognition, 1993

1991
On unified optical flow field.
Pattern Recognition, 1991

1988
2-D Wilson spectral factorization.
IEEE Trans. Acoustics, Speech, and Signal Processing, 1988


  Loading...