Yun Q. Shi

Affiliations:
  • New Jersey Institute of Technology, Newark, USA


According to our database1, Yun Q. Shi authored at least 333 papers between 1987 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Event-Triggered Adaptive Neural Control for Full State-Constrained Nonlinear Systems with Unknown Disturbances.
Cogn. Comput., March, 2024

Reversible Data Hiding-Based Contrast Enhancement With Multi-Group Stretching for ROI of Medical Image.
IEEE Trans. Multim., 2024

Reversible Data Hiding in Shared Images With Separate Cover Image Reconstruction and Secret Extraction.
IEEE Trans. Cloud Comput., 2024

2023
PROMISE: A QR Code PROjection Matrix Based Framework for Information Hiding Using Image SEgmentation.
KSII Trans. Internet Inf. Syst., February, 2023

Secret-to-Image Reversible Transformation for Generative Steganography.
IEEE Trans. Dependable Secur. Comput., 2023

A Universal Reversible Data Hiding Method in Encrypted Image Based on MSB Prediction and Error Embedding.
IEEE Trans. Cloud Comput., 2023

High-performance reversible data hiding based on ridge regression prediction algorithm.
Signal Process., 2023

2022
SmsNet: A New Deep Convolutional Neural Network Model for Adversarial Example Detection.
IEEE Trans. Multim., 2022

Perceptual Enhancement for Autonomous Vehicles: Restoring Visually Degraded Images for Context Prediction via Adversarial Training.
IEEE Trans. Intell. Transp. Syst., 2022

Robust Estimation of Upscaling Factor on Double JPEG Compressed Images.
IEEE Trans. Cybern., 2022

Robust Reversible Watermarking in Encrypted Image With Secure Multi-Party Based on Lightweight Cryptography.
IEEE Trans. Circuits Syst. Video Technol., 2022

Dual-Domain Generative Adversarial Network for Digital Image Operation Anti-Forensics.
IEEE Trans. Circuits Syst. Video Technol., 2022

Stereoscopic Image Description With Trinion Fractional-Order Continuous Orthogonal Moments.
IEEE Trans. Circuits Syst. Video Technol., 2022

RD-IWAN: Residual Dense Based Imperceptible Watermark Attack Network.
IEEE Trans. Circuits Syst. Video Technol., 2022

Concealed Attack for Robust Watermarking Based on Generative Model and Perceptual Loss.
IEEE Trans. Circuits Syst. Video Technol., 2022

A Robust GAN-Generated Face Detection Method Based on Dual-Color Spaces and an Improved Xception.
IEEE Trans. Circuits Syst. Video Technol., 2022

A Domain-independent Dual-image based Robust Reversible Watermarking.
KSII Trans. Internet Inf. Syst., 2022

Secret-to-Image Reversible Transformation for Generative Steganography.
CoRR, 2022

2021
Detecting Non-Aligned Double JPEG Compression Based on Amplitude-Angle Feature.
ACM Trans. Multim. Comput. Commun. Appl., 2021

A Serial Image Copy-Move Forgery Localization Scheme With Source/Target Distinguishment.
IEEE Trans. Multim., 2021

Secure Halftone Image Steganography Based on Pixel Density Transition.
IEEE Trans. Dependable Secur. Comput., 2021

Reversible Data Hiding in Halftone Images Based on Dynamic Embedding States Group.
IEEE Trans. Circuits Syst. Video Technol., 2021

High Precision Error Prediction Algorithm Based on Ridge Regression Predictor for Reversible Data Hiding.
IEEE Signal Process. Lett., 2021

CCCIH: Content-consistency Coverless Information Hiding Method Based on Generative Models.
Neural Process. Lett., 2021

Medical image super-resolution via deep residual neural network in the shearlet domain.
Multim. Tools Appl., 2021

A reversible data hiding algorithm for audio files based on code division multiplexing.
Multim. Tools Appl., 2021

Local quaternion polar harmonic Fourier moments-based multiple zero-watermarking scheme for color medical images.
Knowl. Based Syst., 2021

An encrypted coverless information hiding method based on generative models.
Inf. Sci., 2021

Recognition of printed small texture modules based on dictionary learning.
EURASIP J. Image Video Process., 2021

JPEG Steganography with Embedding Cost Learning and Side-Information Estimation.
CoRR, 2021

Image steganography based on style transfer and quaternion exponent moments.
Appl. Soft Comput., 2021

A Layered Embedding-Based Scheme to Cope with Intra-Frame Distortion Drift In IPM-Based HEVC Steganography.
Proceedings of the IEEE International Conference on Acoustics, 2021

2020
A Novel Weber Local Binary Descriptor for Fingerprint Liveness Detection.
IEEE Trans. Syst. Man Cybern. Syst., 2020

An Embedding Cost Learning Framework Using GAN.
IEEE Trans. Inf. Forensics Secur., 2020

Secure Binary Image Steganography With Distortion Measurement Based on Prediction.
IEEE Trans. Circuits Syst. Video Technol., 2020

Image Description With Polar Harmonic Fourier Moments.
IEEE Trans. Circuits Syst. Video Technol., 2020

Detecting Double JPEG Compressed Color Images With the Same Quantization Matrix in Spherical Coordinates.
IEEE Trans. Circuits Syst. Video Technol., 2020

Multiple Histograms-Based Reversible Data Hiding: Framework and Realization.
IEEE Trans. Circuits Syst. Video Technol., 2020

Binary Image Steganalysis Based on Histogram of Structuring Elements.
IEEE Trans. Circuits Syst. Video Technol., 2020

Downscaling Factor Estimation on Pre-JPEG Compressed Images.
IEEE Trans. Circuits Syst. Video Technol., 2020

METEOR: Measurable Energy Map Toward the Estimation of Resampling Rate via a Convolutional Neural Network.
IEEE Trans. Circuits Syst. Video Technol., 2020

Robust image watermarking using invariant accurate polar harmonic Fourier moments and chaotic mapping.
Signal Process., 2020

Non-aligned double JPEG compression detection based on refined Markov features in QDCT domain.
J. Real Time Image Process., 2020

Real-time estimation for the parameters of Gaussian filtering via deep learning.
J. Real Time Image Process., 2020

Quaternion Markov Splicing Detection for Color Images Based on Quaternion Discrete Cosine Transform.
KSII Trans. Internet Inf. Syst., 2020

High-Capacity Robust Image Steganography via Adversarial Network.
KSII Trans. Internet Inf. Syst., 2020

A Novel Grayscale Image Steganography Scheme Based on Chaos Encryption and Generative Adversarial Networks.
IEEE Access, 2020

Reinforcement Learning Aided Network Architecture Generation for JPEG Image Steganalysis.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020

Machine Vision Based Novel Scheme for Largely, Reducing Printing Errors in Medical Package.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

Approaching Optimal Embedding In Audio Steganography With GAN.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

2019
Identifying Computer Generated Images Based on Quaternion Central Moments in Color Quaternion Wavelet Domain.
IEEE Trans. Circuits Syst. Video Technol., 2019

Separable Data-Hiding Scheme for Encrypted Image to Protect Privacy of User in Cloud.
Symmetry, 2019

Multiple histograms based reversible data hiding by using FCM clustering.
Signal Process., 2019

Code Division Multiplexing and Machine Learning Based Reversible Data Hiding Scheme for Medical Image.
Secur. Commun. Networks, 2019

JPEG steganalysis with combined dense connected CNNs and SCA-GFR.
Multim. Tools Appl., 2019

Smoothing identification for digital image forensics.
Multim. Tools Appl., 2019

Adaptive error prediction method based on multiple linear regression for reversible data hiding.
J. Real Time Image Process., 2019

A code division multiplexing and block classification-based real-time reversible data-hiding algorithm for medical images.
J. Real Time Image Process., 2019

Dynamic multi-watermarking and detecting in DWT domain.
J. Real Time Image Process., 2019

A multi-purpose image forensic method using densely connected convolutional neural networks.
J. Real Time Image Process., 2019

Minimum entropy and histogram-pair based JPEG image reversible data hiding.
J. Inf. Secur. Appl., 2019

Color image-spliced localization based on quaternion principal component analysis and quaternion skewness.
J. Inf. Secur. Appl., 2019

Dynamic improved pixel value ordering reversible data hiding.
Inf. Sci., 2019

Image Steganography using Gaussian Markov Random Field Model.
CoRR, 2019

Quaternion Convolutional Neural Network for Color Image Classification and Forensics.
IEEE Access, 2019

A Cover Selection HEVC Video Steganography Based on Intra Prediction Mode.
IEEE Access, 2019

Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding.
IEEE Access, 2019

Anti-forensics of Image Sharpening Using Generative Adversarial Network.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

Towards Automatic Embedding Cost Learning for JPEG Steganography.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019

2018
Transportation Spherical Watermarking.
IEEE Trans. Image Process., 2018

A Study on the Security Levels of Spread-Spectrum Embedding Schemes in the WOA Framework.
IEEE Trans. Cybern., 2018

A New Distortion Function Design for JPEG Steganography Using the Generalized Uniform Embedding Strategy.
IEEE Trans. Circuits Syst. Video Technol., 2018

Deep Learning for Detection of Object-Based Forgery in Advanced Video.
Symmetry, 2018

Efficient JPEG Steganography Using Domain Transformation of Embedding Entropy.
IEEE Signal Process. Lett., 2018

Detecting USM image sharpening by using CNN.
Signal Process. Image Commun., 2018

A novel reversible data hiding method with image contrast enhancement.
Signal Process. Image Commun., 2018

Distinguishing Computer-Generated Graphics from Natural Images Based on Sensor Pattern Noise and Deep Learning.
Sensors, 2018

Detecting median filtering via two-dimensional AR models of multiple filtered residuals.
Multim. Tools Appl., 2018

An integer wavelet transform based scheme for reversible data hiding in encrypted images.
Multidimens. Syst. Signal Process., 2018

An efficient weak sharpening detection method for image forensics.
J. Vis. Commun. Image Represent., 2018

Histogram-pair based reversible data hiding via searching for optimal four thresholds.
J. Inf. Secur. Appl., 2018

A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system.
Des. Codes Cryptogr., 2018

Spatial Image Steganography Based on Generative Adversarial Network.
CoRR, 2018

Fractional Quaternion Zernike Moments for Robust Color Image Copy-Move Forgery Detection.
IEEE Access, 2018

An Improved Splicing Localization Method by Fully Convolutional Networks.
IEEE Access, 2018

Privacy-Aware Reversible Watermarking in Cloud Computing Environments.
IEEE Access, 2018

Comparison of DCT and Gabor Filters in Residual Extraction of CNN Based JPEG Steganalysis.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018

A Convolutional Neural Network Based Seam Carving Detection Scheme for Uncompressed Digital Images.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018

Pixel-Value-Ordering Based Reversible Data Hiding with Adaptive Texture Classification and Modification.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018

A Multiple Linear Regression Based High-Accuracy Error Prediction Algorithm for Reversible Data Hiding.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018

A Multiple Linear Regression Based High-Performance Error Prediction Method for Reversible Data Hiding.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Deep Learning with Feature Reuse for JPEG Image Steganalysis.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

Detection of Double JPEG Compression with the Same Quantization Matrix Based on Convolutional Neural Networks.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

2017
Blind Forensics of Successive Geometric Transformations in Digital Images Using Spectral Method: Theory and Applications.
IEEE Trans. Image Process., 2017

A Framework of Camera Source Identification Bayesian Game.
IEEE Trans. Cybern., 2017

Rate and Distortion Optimization for Reversible Data Hiding Using Multiple Histogram Shifting.
IEEE Trans. Cybern., 2017

Separable Reversible Data Hiding for Encrypted Palette Images With Color Partitioning and Flipping Verification.
IEEE Trans. Circuits Syst. Video Technol., 2017

Erratum to: Fingerprint liveness detection using gradient-based texture features.
Signal Image Video Process., 2017

Fingerprint liveness detection using gradient-based texture features.
Signal Image Video Process., 2017

Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics.
Multim. Tools Appl., 2017

Hybrid multiplicative multi-watermarking in DWT domain.
Multidimens. Syst. Signal Process., 2017

A privacy-preserving content-based image retrieval method in cloud environment.
J. Vis. Commun. Image Represent., 2017

Quaternion pseudo-Zernike moments combining both of RGB information and depth information for color image splicing detection.
J. Vis. Commun. Image Represent., 2017

An effective method to detect seam carving.
J. Inf. Secur. Appl., 2017

Detecting multiple H.264/AVC compressions with the same quantisation parameters.
IET Inf. Secur., 2017

JPEG Steganalysis Based on DenseNet.
CoRR, 2017

A Hybrid Feature Model for Seam Carving Detection.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

Steganalysis Based on Awareness of Selection-Channel and Deep Learning.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

Image Quality Assessment in Reversible Data Hiding with Contrast Enhancement.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

2016
Analyzing the Effect of JPEG Compression on Local Variance of Image Intensity.
IEEE Trans. Image Process., 2016

A Reversible Data Hiding Scheme Based on Code Division Multiplexing.
IEEE Trans. Inf. Forensics Secur., 2016

New Framework for Reversible Data Hiding in Encrypted Domain.
IEEE Trans. Inf. Forensics Secur., 2016

Structural Design of Convolutional Neural Networks for Steganalysis.
IEEE Signal Process. Lett., 2016

Robust image watermarking based on Tucker decomposition and Adaptive-Lattice Quantization Index Modulation.
Signal Process. Image Commun., 2016

Twenty years of digital audio watermarking - a comprehensive review.
Signal Process., 2016

An improved scheme for data hiding in encrypted H.264/AVC videos.
J. Vis. Commun. Image Represent., 2016

Reversible Watermarking with Adaptive Embedding Threshold Matrix.
KSII Trans. Internet Inf. Syst., 2016

Can Machine Learn Steganography? - Implementing LSB Substitution and Matrix Coding Steganography with Feed-Forward Neural Networks.
CoRR, 2016

Prediction-error of Prediction Error (PPE)-based Reversible Data Hiding.
CoRR, 2016

Reversible Data Hiding: Advances in the Past Two Decades.
IEEE Access, 2016

Dynamic content selection-and-prediction framework applied to reversible data hiding.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016

A Local Derivative Pattern Based Image Forensic Framework for Seam Carving Detection.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Detecting Double H.264 Compression Based on Analyzing Prediction Residual Distribution.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Ensemble of CNNs for Steganalysis: An Empirical Study.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016

PPE-Based Reversible Data Hiding.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016

A Novel CDMA Based High Performance Reversible Data Hiding Scheme.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016

2015
Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited.
IEEE Trans. Inf. Forensics Secur., 2015

Reversible Image Data Hiding with Contrast Enhancement.
IEEE Signal Process. Lett., 2015

Reversible Data Hiding Using Controlled Contrast Enhancement and Integer Wavelet Transform.
IEEE Signal Process. Lett., 2015

Edge Perpendicular Binary Coding for USM Sharpening Detection.
IEEE Signal Process. Lett., 2015

A reversible data hiding method with contrast enhancement for medical images.
J. Vis. Commun. Image Represent., 2015

Optimal Histogram-Pair and Prediction-Error Based Reversible Data Hiding for Medical Images.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

Camera Source Identification with Limited Labeled Training Set.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

An Advanced Texture Analysis Method for Image Sharpening Detection.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

2014
An Effective Method for Detecting Double JPEG Compression With the Same Quantization Matrix.
IEEE Trans. Inf. Forensics Secur., 2014

Data Hiding in Encrypted H.264/AVC Video Streams by Codeword Substitution.
IEEE Trans. Inf. Forensics Secur., 2014

Uniform Embedding for Efficient JPEG Steganography.
IEEE Trans. Inf. Forensics Secur., 2014

Revealing the Traces of Median Filtering Using High-Order Local Ternary Patterns.
IEEE Signal Process. Lett., 2014

Distinguishing computer graphics from photographic images using a multiresolution approach based on local binary patterns.
Secur. Commun. Networks, 2014

An improved reversible data hiding-based approach for intra-frame error concealment in H.264/AVC.
J. Vis. Commun. Image Represent., 2014

On YASS's Non-monotonic Security Performance.
Circuits Syst. Signal Process., 2014

Combination of SIFT Feature and Convex Region-Based Global Context Feature for Image Copy Detection.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Inter-frame Video Forgery Detection Based on Block-Wise Brightness Variance Descriptor.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

New Developments in Image Tampering Detection.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Reversible Data Hiding by Median-Preserving Histogram Modification for Image Contrast Enhancement.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Stereo Image Coding with Histogram-Pair Based Reversible Data Hiding.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

A Reversible Image Watermarking Scheme Based on Modified Integer-to-Integer Discrete Wavelet Transform and CDMA Algorithm.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Variable Multi-dimensional Co-occurrence for Steganalysis.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Do biometric images follow Benford's law?
Proceedings of the 2nd International Workshop on Biometrics and Forensics, 2014

2013
Pairwise Prediction-Error Expansion for Efficient Reversible Data Hiding.
IEEE Trans. Image Process., 2013

Detecting Covert Channels in Computer Networks Based on Chaos Theory.
IEEE Trans. Inf. Forensics Secur., 2013

Detection of Double Compression in MPEG-4 Videos Based on Markov Statistics.
IEEE Signal Process. Lett., 2013

Detecting Non-aligned Double JPEG Compression Based on Refined Intensity Difference and Calibration.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Reversible Data Hiding in Encrypted H.264/AVC Video Streams.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Using RZL Coding to Enhance Histogram-Pair Based Image Reversible Data Hiding.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

A Novel Method for Detecting Image Sharpening Based on Local Binary Pattern.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Non-uniform Quantization in Breaking HUGO.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Distortion function designing for JPEG steganography with uncompressed side-image.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

2012
Reference index-based H.264 video watermarking scheme.
ACM Trans. Multim. Comput. Commun. Appl., 2012

New Channel Selection Rule for JPEG Steganography.
IEEE Trans. Inf. Forensics Secur., 2012

Steganography in Streaming Multimedia over Networks.
Trans. Data Hiding Multim. Secur., 2012

A Study on Embedding Efficiency of Matrix Encoding.
Int. J. Digit. Crime Forensics, 2012

Detection of tampered region for JPEG images by using mode-based first digit features.
EURASIP J. Adv. Signal Process., 2012

An efficient JPEG steganographic scheme using uniform embedding.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Automatic classification of analog modulation schemes.
Proceedings of the 2012 IEEE Radio and Wireless Symposium, 2012

Optimal Histogram-Pair and Prediction-Error Based Image Reversible Data Hiding.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

Distinguishing Computer Graphics from Photographic Images Using Local Binary Patterns.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

A Novel Mapping Scheme for Steganalysis.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

Textural Features for Steganalysis.
Proceedings of the Information Hiding - 14th International Conference, 2012

An Enhanced EM algorithm using maximum entropy distribution as initial condition.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

Camera Model Identification Using Local Binary Patterns.
Proceedings of the 2012 IEEE International Conference on Multimedia and Expo, 2012

2011
Markovian Rake Transform for Digital Image Tampering Detection.
Trans. Data Hiding Multim. Secur., 2011

Basis arrays and successive packing for <i>M</i>-D interleaving.
Multidimens. Syst. Signal Process., 2011

A Survey on Image Steganography and Steganalysis.
J. Inf. Hiding Multim. Signal Process., 2011

Lossless image data embedding in plain areas.
Proceedings of the Media Forensics and Security III, 2011

Anti-Forensics of Double JPEG Compression Detection.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

A Drift Compensation Algorithm for H.264/AVC Video Robust Watermarking Scheme.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

LinL: Lost in n-best List.
Proceedings of the Information Hiding - 13th International Conference, 2011

2010
Image Steganalysis.
Proceedings of the Intelligent Multimedia Analysis for Security Applications, 2010

Detecting Double JPEG Compression With the Same Quantization Matrix.
IEEE Trans. Inf. Forensics Secur., 2010

An experimental study on the security performance of YASS.
IEEE Trans. Inf. Forensics Secur., 2010

Image Forensics Using Generalised Benford's Law for Improving Image Authentication Detection Rates in Semi-Fragile Watermarking.
Int. J. Digit. Crime Forensics, 2010

Reversible Watermarking Algorithm with Distortion Compensation.
EURASIP J. Adv. Signal Process., 2010

A phase-space reconstruction approach to detect covert channels in TCP/IP protocols.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

A Novel Multi-size Block Benford's Law Scheme for Printer Identification.
Proceedings of the Advances in Multimedia Information Processing - PCM 2010, 2010

Detecting double compression of audio signal.
Proceedings of the Media Forensics and Security II, 2010

Passive Detection of Paint-Doctored JPEG Images.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010

A Statistical Model for Quantized AC Block DCT Coefficients in JPEG Compression and its Application to Detecting Potential Compression History in Bitmap Images.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010

New JPEG Steganographic Scheme with High Security Performance.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010

A Smart Phone Image Database for Single Image Recapture Detection.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010

Double-threshold reversible data hiding.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010

New developments in color image tampering detection.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010

Is physics-based liveness detection truly possible with a single image?
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010

A high-performance YASS-like scheme using randomized big-blocks.
Proceedings of the 2010 IEEE International Conference on Multimedia and Expo, 2010

Rake transform and edge statistics for image forgery detection.
Proceedings of the 2010 IEEE International Conference on Multimedia and Expo, 2010

Hiding Data in Multimedia Streaming over Networks.
Proceedings of the 8th Annual Conference on Communication Networks and Services Research, 2010

2009
Steganalysis of YASS.
IEEE Trans. Inf. Forensics Secur., 2009

Optimum Histogram Pair Based Image Lossless Data Embedding.
Trans. Data Hiding Multim. Secur., 2009

Reversible Watermarking Algorithm Using Sorting and Prediction.
IEEE Trans. Circuits Syst. Video Technol., 2009

Non-ambiguity of blind watermarking: a revisit with analytical resolution.
Sci. China Ser. F Inf. Sci., 2009

Defeating fake-quality MP3.
Proceedings of the Multimedia and Security Workshop, 2009

Mp3 bit rate quality detection through frequency spectrum analysis.
Proceedings of the Multimedia and Security Workshop, 2009

Camera-Model Identification Using Markovian Transition Probability Matrix.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009

An Enhanced Statistical Approach to Identifying Photorealistic Images.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009

Camera brand and model identification using moments of 1-D and 2-D characteristic functions.
Proceedings of the International Conference on Image Processing, 2009

Computer graphics classification based on Markov process model and boosting feature selection technique.
Proceedings of the International Conference on Image Processing, 2009

Image forensics using generalised Benford's Law for accurate detection of unknown JPEG compression in watermarked images.
Proceedings of the 16th International Conference on Digital Signal Processing, 2009

2008
A Novel Difference Expansion Transform for Reversible Data Embedding.
IEEE Trans. Inf. Forensics Secur., 2008

Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication.
IEEE Trans. Circuits Syst. Video Technol., 2008

Evaluating Electronic Voting Systems Equipped with Voter-Verified Paper Records.
IEEE Secur. Priv., 2008

Textural features based universal steganalysis.
Proceedings of the Security, 2008

Detecting doubly compressed JPEG images by using Mode Based First Digit Features.
Proceedings of the International Workshop on Multimedia Signal Processing, 2008

First Digit Law and Its Application to Digital Forensics.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

Run-Length and Edge Statistics Based Approach for Image Splicing Detection.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

Detection of Double MPEG Compression Based on First Digit Statistics.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

JPEG image steganalysis utilizing both intrablock and interblock correlations.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008

Reversible binary image data hiding by run-length histogram modification.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

Computer graphics identification using genetic algorithm.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

A machine learning based scheme for double JPEG compression detection.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

A study on security performance of YASS.
Proceedings of the International Conference on Image Processing, 2008

Data Mining of Modulation Types Using Cyclostationarity-Based Decision Tree.
Proceedings of The 2008 International Conference on Data Mining, 2008

2007
A generalized Benford's law for JPEG coefficients and its applications in image forensics.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Image splicing detection using 2-D phase congruency and statistical moments of characteristic function.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

A natural image model approach to splicing detection.
Proceedings of the 9th workshop on Multimedia & Security, 2007

Optimum Histogram Pair Based Image Lossless Data Embedding.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

Steganalysis Versus Splicing Detection.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

Effect of Recompression on Attacking JPEG Steganographic Schemes An Experimental Study.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2007), 2007

JPEG Steganalysis Based on Classwise Non-Principal Components Analysis and Multi-Directional Markov Model.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

Identifying Computer Graphics using HSV Color Model and Statistical Moments of Characteristic Functions.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

Steganalyzing Texture Images.
Proceedings of the International Conference on Image Processing, 2007

A Novel Bayesian Classifier with Smaller Eigenvalues Reset by Threshold Based on Given Database.
Proceedings of the Image Analysis and Recognition, 4th International Conference, 2007

Reversible Data Hiding for JPEG Images Based on Histogram Pairs.
Proceedings of the Image Analysis and Recognition, 4th International Conference, 2007

2006
Constant quality rate allocation for FGS coding using composite R-D analysis.
IEEE Trans. Multim., 2006

A Semi-Fragile Lossless Digital Watermarking Scheme Based on Integer Wavelet Transform.
IEEE Trans. Circuits Syst. Video Technol., 2006

Reversible data hiding.
IEEE Trans. Circuits Syst. Video Technol., 2006

Network Traffic Prediction Using Least Mean Kurtosis.
IEICE Trans. Commun., 2006

Achieving non-ambiguity of quantization-based watermarking.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

JPEG Steganalysis Using Empirical Transition Matrix in Block DCT Domain.
Proceedings of the IEEE 8th Workshop on Multimedia Signal Processing, 2006

Lossless Data Hiding Using Histogram Shifting Method Based on Integer Wavelets.
Proceedings of the Digital Watermarking, 5th International Workshop, 2006

Steganalysis Using High-Dimensional Features Derived from Co-occurrence Matrix and Class-Wise Non-Principal Components Analysis (CNPCA).
Proceedings of the Digital Watermarking, 5th International Workshop, 2006

Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition.
Proceedings of the Digital Watermarking, 5th International Workshop, 2006

A Markov Process Based Approach to Effective Attacking JPEG Steganography.
Proceedings of the Information Hiding, 8th International Workshop, 2006

Feature Selection based on the Bhattacharyya Distance.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

A Novel Pattern Classification Scheme: Classwise Non-Principal Component Analysis (CNPCA).
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

Steganalysis based on Markov Model of Thresholded Prediction-Error Image.
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006

Steganalysis of JPEG2000 Lazy-Mode Steganography using the Hilbert-Huang Transform Based Sequential Analysis.
Proceedings of the International Conference on Image Processing, 2006

Statistical Moments Based Universal Steganalysis using JPEG 2-D Array and 2-D Characteristic Function.
Proceedings of the International Conference on Image Processing, 2006

2005
Data Integration for Medical Information Management.
J. VLSI Signal Process., 2005

Efficiently self-synchronized audio watermarking for assured audio data transmission.
IEEE Trans. Broadcast., 2005

Binary Image Watermarking Through Blurring, Biased Binarization.
Int. J. Image Graph., 2005

Dwt-Based Video Data Hiding Robust To Mpeg Compression And Frame Loss.
Int. J. Image Graph., 2005

A Feature Selection Based on Minimum Upper Bound of Bayes Error.
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005

Identity Verification System Using Data Hiding and Fingerprint Recognition.
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005

Image Steganalysis Based on Statistical Moments of Wavelet Subband Histograms in DFT Domain.
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005

Multi-band Wavelet Based Digital Watermarking Using Principal Component Analysis.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

Layered MPEG Video Transmission over IP DiffServ.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Effective Steganalysis Based on Statistical Moments of Wavelet Characteristic Function.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Formatted text document data hiding robust to printing, copying and scanning.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

Symbol-rate estimation based on filter bank.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions.
Proceedings of the Information Hiding, 7th International Workshop, 2005

Lossless Data Hiding Using Integer Wavelet Transform and Threshold Embedding Technique.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

2004
Distance-reciprocal distortion measure for binary document images.
IEEE Signal Process. Lett., 2004

Mini-max initialization for function approximation.
Neurocomputing, 2004

A semi-fragile lossless digital watermarking scheme based on integer wavelet transform.
Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing, 2004

Reversible data hiding based on wavelet spread spectrum.
Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing, 2004

A Secure Internet-Based Personal Identity Verification System Using Lossless Watermarking and Fingerprint Recognition.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004

Reversible Data Hiding Using Integer Wavelet Transform and Companding Technique.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004

Reversible Data Hiding.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004

High capacity lossless data hiding based on integer wavelet transform.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004

Self-synchronized audio watermark in DWT domain.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004

Lossless data hiding: fundamentals, algorithms and applications.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004

A unified authentication framework for JPEG2000.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

Robust lossless image data hiding.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

Improve robustness of image watermarking via adaptive receiving.
Proceedings of the 2004 International Conference on Image Processing, 2004

Improve security of fragile watermarking via parameterized wavelet.
Proceedings of the 2004 International Conference on Image Processing, 2004

2003
Constant quality constrained rate allocation for FGS-coded video.
IEEE Trans. Circuits Syst. Video Technol., 2003

A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression.
IEEE Trans. Circuits Syst. Video Technol., 2003

Robust Watermarking with Adaptive Receiving.
Proceedings of the Digital Watermarking, Second International Workshop, 2003

Self-similar Traffic Prediction Using Least Mean Kurtosis.
Proceedings of the 2003 International Symposium on Information Technology (ITCC 2003), 2003

2-D and 3-D successive packing interleaving techniques and their applications to image and video data hiding.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

A high capacity distortion-free data hiding algorithm for palette image.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

Analysis of the role played by error correcting coding in robust watermarking.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

Image watermarking algorithm applying CDMA.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

A content-based image authentication system with lossless data hiding.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003

Rate allocation for FGS coded video using composite R-D analysis.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003

2002
Reliable information bit hiding.
IEEE Trans. Circuits Syst. Video Technol., 2002

On modeling MPEG video traffics.
IEEE Trans. Broadcast., 2002

Constant-quality constrained-rate allocation for FGS video coded bitstreams.
Proceedings of the Visual Communications and Image Processing 2002, 2002

An Image Watermarking Algorithm Robust to Geometric Distortion.
Proceedings of the Digital Watermarking, First International Workshop, 2002

A DWT-Based Fragile Watermarking Tolerant of JPEG Compression.
Proceedings of the Digital Watermarking, First International Workshop, 2002

A Fast Non-Linear Adaptive Algorithm for Video Traffic Prediction.
Proceedings of the 2002 International Symposium on Information Technology (ITCC 2002), 2002

Successive packing based interleaver design for turbo codes.
Proceedings of the 2002 International Symposium on Circuits and Systems, 2002

An Objective Distortion Measure for Binary Document Images Based on Human Visual Perceptio.
Proceedings of the 16th International Conference on Pattern Recognition, 2002

Lossless data hiding based on integer wavelet transform.
Proceedings of the IEEE 5th Workshop on Multimedia Signal Processing, 2002

Sample domain integration of medical data for multimedia diagnosis.
Proceedings of the IEEE 5th Workshop on Multimedia Signal Processing, 2002

Detection of block DCT-based steganography in gray-scale images.
Proceedings of the IEEE 5th Workshop on Multimedia Signal Processing, 2002

Watermark embedding in DC components of DCT for binary images.
Proceedings of the IEEE 5th Workshop on Multimedia Signal Processing, 2002

2001
Modeling MPEG Coded Video Traffic by Markov-Modulated Self-Similar Processes.
J. VLSI Signal Process., 2001

On-Line Dynamic Bandwidth Allocation For Vbr Video Transmission.
Proceedings of the 2001 International Symposium on Information Technology (ITCC 2001), 2001

Embedding gray level images.
Proceedings of the 2001 International Symposium on Circuits and Systems, 2001

The tale of a simple accurate MPEG video traffic model.
Proceedings of the IEEE International Conference on Communications, 2001

On Test and Characterization of Analog Linear Time-Invariant Circuits Using Neural Networks.
Proceedings of the 10th Asian Test Symposium (ATS 2001), 19-21 November 2001, Kyoto, Japan, 2001

2000
Embedding image watermarks in dc components.
IEEE Trans. Circuits Syst. Video Technol., 2000

Dynamic Bandwidth Allocation for VBR Video Traffic Based on Scene Change Identification.
Proceedings of the 2000 International Symposium on Information Technology (ITCC 2000), 2000

Enhancing Robustness of Digital Watermarking Against Geometric Attack based on Fractal Transform.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000

A Simple Model for MPEG Video Traffic.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000

3-D Interleaving for Enhancing the Robustness of Watermark Signals Embedded in Video Sequences.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000

2-D Interleaving for Enhancing the Robustness of Watermark Signals Embedded in Still Images.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000

1999
MAP symbol decoding of arithmetic coding with embedded channel coding.
Proceedings of the 1999 IEEE Wireless Communications and Networking Conference, 1999

Maximum-likelihood sequence decoding of digital image watermarking.
Proceedings of the Security and Watermarking of Multimedia Contents, 1999

Modeling VBR video traffic by Markov-modulated self-similar processes.
Proceedings of the Third IEEE Workshop on Multimedia Signal Processing, 1999

MPEG Video Traffic Models: Sequentially Modulated Self-Similar Processes.
Proceedings of the Broadband Communications: Convergence of Network Technologies, 1999

1998
Correlation-feedback technique in optical flow determination.
IEEE Trans. Image Process., 1998

Optical flow-based motion compensation algorithm for very low-bit-rate video coding.
Int. J. Imaging Syst. Technol., 1998

Guest Editorial.
Int. J. Imaging Syst. Technol., 1998

Power constrained multiple signaling in digital image watermarking.
Proceedings of the Second IEEE Workshop on Multimedia Signal Processing, 1998

1997
A thresholding multiresolution block matching algorithm.
IEEE Trans. Circuits Syst. Video Technol., 1997

Region-based adaptive DWT video coding using dense motion field.
Proceedings of the First IEEE Workshop on Multimedia Signal Processing, 1997

An optical flow based motion compensation algorithm for very low bit-rate video coding.
Proceedings of the 1997 IEEE International Conference on Acoustics, 1997

1994
Comments on "Two necessary conditions for a complex polynomial to be strictly Hurwitz and their applications in robust stability analysis" [with reply].
IEEE Trans. Autom. Control., 1994

Unified optical flow field approach to motion analysis from a sequence of stereo images.
Pattern Recognit., 1994

Correlation-feedback Approach to Computation of Optical Flow.
Proceedings of the 1994 IEEE International Symposium on Circuits and Systems, ISCAS 1994, London, England, UK, May 30, 1994

A Kalman Filter in Motion Analysis from Stereo Image Sequences.
Proceedings of the Proceedings 1994 International Conference on Image Processing, 1994

1993
Two necessary conditions for a complex polynomial to be strictly Hurwitz and their applications in robust stability analysis.
IEEE Trans. Autom. Control., 1993

Direct recovering of Nth order surface structure using unified optical flow field.
Pattern Recognit., 1993

1991
On unified optical flow field.
Pattern Recognit., 1991

Comments on 'Boundary implications of stability and positivity properties of multidimensional systems' by S. Basu.
Proc. IEEE, 1991

1988
2-D Wilson spectral factorization.
IEEE Trans. Acoust. Speech Signal Process., 1988

Nonnegativity constrained spectral factorization for image reconstruction from autocorrelation data.
Proceedings of the IEEE International Conference on Acoustics, 1988

1987
Iterative schemes for two-dimensional spectral factorization.
Proceedings of the IEEE International Conference on Acoustics, 1987


  Loading...