default search action
Yun Q. Shi 0001
Person information
- affiliation: New Jersey Institute of Technology, Newark, USA
Other persons with the same name
- Yunqing Shi 0002 — Fuzhou Technology and Business University, School of Management, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j161]Ziming Wang, Hui Wang, Xin Wang, Ning Pang, Yun-Qing Shi:
Event-Triggered Adaptive Neural Control for Full State-Constrained Nonlinear Systems with Unknown Disturbances. Cogn. Comput. 16(2): 717-726 (2024) - [j160]Lizhi Xiong, Xiao Han, Ching-Nung Yang, Yun-Qing Shi:
Reversible Data Hiding in Shared Images With Separate Cover Image Reconstruction and Secret Extraction. IEEE Trans. Cloud Comput. 12(1): 186-199 (2024) - [j159]Qi Cui, Weixuan Tang, Zhili Zhou, Ruohan Meng, Guoshun Nan, Yun-Qing Shi:
Meta Security Metric Learning for Secure Deep Image Hiding. IEEE Trans. Dependable Secur. Comput. 21(5): 4907-4920 (2024) - [j158]Guangyong Gao, Hui Zhang, Zhihua Xia, Xiangyang Luo, Yun-Qing Shi:
Reversible Data Hiding-Based Contrast Enhancement With Multi-Group Stretching for ROI of Medical Image. IEEE Trans. Multim. 26: 3909-3923 (2024) - [j157]Chi Ji, Guangyong Gao, Yunqing Shi:
Reversible Data Hiding in Encrypted Images With Adaptive Huffman Code Based on Dynamic Prediction Axes. IEEE Trans. Multim. 26: 5962-5975 (2024) - 2023
- [j156]Yixiang Fang, Kai Tu, Kai Wu, Yi Peng, Yunqing Shi:
PROMISE: A QR Code PROjection Matrix Based Framework for Information Hiding Using Image SEgmentation. KSII Trans. Internet Inf. Syst. 17(2): 471-485 (2023) - [j155]Xiaoyu Wang, Xingyuan Wang, Bin Ma, Qi Li, Chunpeng Wang, Yunqing Shi:
High-performance reversible data hiding based on ridge regression prediction algorithm. Signal Process. 204: 108818 (2023) - [j154]Guangyong Gao, Shikun Tong, Zhihua Xia, Yun-Qing Shi:
A Universal Reversible Data Hiding Method in Encrypted Image Based on MSB Prediction and Error Embedding. IEEE Trans. Cloud Comput. 11(2): 1692-1706 (2023) - [j153]Zhili Zhou, Yuecheng Su, Jin Li, Keping Yu, Q. M. Jonathan Wu, Zhangjie Fu, Yunqing Shi:
Secret-to-Image Reversible Transformation for Generative Steganography. IEEE Trans. Dependable Secur. Comput. 20(5): 4118-4134 (2023) - 2022
- [j152]Xuejing Guo, Yixiang Fang, Junxiang Wang, Wenchao Zeng, Yi Zhao, Tianzhu Zhang, Yun-Qing Shi:
A Domain-independent Dual-image based Robust Reversible Watermarking. KSII Trans. Internet Inf. Syst. 16(12): 4024-4041 (2022) - [j151]Lizhi Xiong, Xiao Han, Ching-Nung Yang, Yun-Qing Shi:
Robust Reversible Watermarking in Encrypted Image With Secure Multi-Party Based on Lightweight Cryptography. IEEE Trans. Circuits Syst. Video Technol. 32(1): 75-91 (2022) - [j150]Hao Xie, Jiangqun Ni, Yun Qing Shi:
Dual-Domain Generative Adversarial Network for Digital Image Operation Anti-Forensics. IEEE Trans. Circuits Syst. Video Technol. 32(3): 1701-1706 (2022) - [j149]Chunpeng Wang, Bin Ma, Zhiqiu Xia, Jian Li, Qi Li, Yun-Qing Shi:
Stereoscopic Image Description With Trinion Fractional-Order Continuous Orthogonal Moments. IEEE Trans. Circuits Syst. Video Technol. 32(4): 1998-2012 (2022) - [j148]Beijing Chen, Xin Liu, Yuhui Zheng, Guoying Zhao, Yun-Qing Shi:
A Robust GAN-Generated Face Detection Method Based on Dual-Color Spaces and an Improved Xception. IEEE Trans. Circuits Syst. Video Technol. 32(6): 3527-3538 (2022) - [j147]Qi Li, Xingyuan Wang, Bin Ma, Xiaoyu Wang, Chunpeng Wang, Suo Gao, Yun-Qing Shi:
Concealed Attack for Robust Watermarking Based on Generative Model and Perceptual Loss. IEEE Trans. Circuits Syst. Video Technol. 32(8): 5695-5706 (2022) - [j146]Chunpeng Wang, Qixian Hao, Shujiang Xu, Bin Ma, Zhiqiu Xia, Qi Li, Jian Li, Yun-Qing Shi:
RD-IWAN: Residual Dense Based Imperceptible Watermark Attack Network. IEEE Trans. Circuits Syst. Video Technol. 32(11): 7460-7472 (2022) - [j145]Wei Lu, Qin Zhang, Shangjun Luo, Yicong Zhou, Jiwu Huang, Yun-Qing Shi:
Robust Estimation of Upscaling Factor on Double JPEG Compressed Images. IEEE Trans. Cybern. 52(10): 10814-10826 (2022) - [j144]Feng Ding, Keping Yu, Zonghua Gu, Xiangjun Li, Yunqing Shi:
Perceptual Enhancement for Autonomous Vehicles: Restoring Visually Degraded Images for Context Prediction via Adversarial Training. IEEE Trans. Intell. Transp. Syst. 23(7): 9430-9441 (2022) - [j143]Jinwei Wang, Junjie Zhao, Qilin Yin, Xiangyang Luo, Yuhui Zheng, Yun-Qing Shi, Sunil Kr. Jha:
SmsNet: A New Deep Convolutional Neural Network Model for Adversarial Example Detection. IEEE Trans. Multim. 24: 230-244 (2022) - [i8]Zhili Zhou, Yuecheng Su, Q. M. Jonathan Wu, Zhangjie Fu, Yunqing Shi:
Secret-to-Image Reversible Transformation for Generative Steganography. CoRR abs/2203.06598 (2022) - 2021
- [j142]Qi Li, Xingyuan Wang, Bin Ma, Xiaoyu Wang, Chunpeng Wang, Zhiqiu Xia, Yunqing Shi:
Image steganography based on style transfer and quaternion exponent moments. Appl. Soft Comput. 110: 107618 (2021) - [j141]Lifang Yu, Gang Cao, Huawei Tian, Peng Cao, Zhenzhen Zhang, Yun-Qing Shi:
Recognition of printed small texture modules based on dictionary learning. EURASIP J. Image Video Process. 2021(1): 31 (2021) - [j140]Qi Li, Xingyuan Wang, Xiaoyu Wang, Bin Ma, Chunpeng Wang, Yun-Qing Shi:
An encrypted coverless information hiding method based on generative models. Inf. Sci. 553: 19-30 (2021) - [j139]Zhiqiu Xia, Xingyuan Wang, Chunpeng Wang, Bin Ma, Mingxu Wang, Yun Qing Shi:
Local quaternion polar harmonic Fourier moments-based multiple zero-watermarking scheme for color medical images. Knowl. Based Syst. 216: 106568 (2021) - [j138]Bin Ma, Jin-Cheng Hou, Chun-Peng Wang, Xiao-Ming Wu, Yun-Qing Shi:
A reversible data hiding algorithm for audio files based on code division multiplexing. Multim. Tools Appl. 80(12): 17569-17581 (2021) - [j137]Chunpeng Wang, Simiao Wang, Zhiqiu Xia, Qi Li, Bin Ma, Jian Li, Meihong Yang, Yun-Qing Shi:
Medical image super-resolution via deep residual neural network in the shearlet domain. Multim. Tools Appl. 80(17): 26637-26655 (2021) - [j136]Qi Li, Xingyuan Wang, Xiaoyu Wang, Yunqing Shi:
CCCIH: Content-consistency Coverless Information Hiding Method Based on Generative Models. Neural Process. Lett. 53(6): 4037-4046 (2021) - [j135]Xiaoyu Wang, Xingyuan Wang, Bin Ma, Qi Li, Yun Q. Shi:
High Precision Error Prediction Algorithm Based on Ridge Regression Predictor for Reversible Data Hiding. IEEE Signal Process. Lett. 28: 1125-1129 (2021) - [j134]Xiaolin Yin, Wei Lu, Wanteng Liu, Jing-Ming Guo, Jiwu Huang, Yun-Qing Shi:
Reversible Data Hiding in Halftone Images Based on Dynamic Embedding States Group. IEEE Trans. Circuits Syst. Video Technol. 31(7): 2631-2645 (2021) - [j133]Wei Lu, Yingjie Xue, Yuileong Yeung, Hongmei Liu, Jiwu Huang, Yun Q. Shi:
Secure Halftone Image Steganography Based on Pixel Density Transition. IEEE Trans. Dependable Secur. Comput. 18(3): 1137-1149 (2021) - [j132]Beijing Chen, Weijin Tan, Gouenou Coatrieux, Yuhui Zheng, Yun Qing Shi:
A Serial Image Copy-Move Forgery Localization Scheme With Source/Target Distinguishment. IEEE Trans. Multim. 23: 3506-3517 (2021) - [j131]Jinwei Wang, Wei Huang, Xiangyang Luo, Yun Qing Shi, Sunil Kr. Jha:
Detecting Non-Aligned Double JPEG Compression Based on Amplitude-Angle Feature. ACM Trans. Multim. Comput. Commun. Appl. 17(4): 138:1-138:18 (2021) - [c171]Xiaoqing Jia, Jie Wang, Yongliang Liu, Xiangui Kang, Yun-Qing Shi:
A Layered Embedding-Based Scheme to Cope with Intra-Frame Distortion Drift In IPM-Based HEVC Steganography. ICASSP 2021: 2720-2724 - [e24]Xianfeng Zhao, Yun-Qing Shi, Alessandro Piva, Hyoung Joong Kim:
Digital Forensics and Watermarking - 19th International Workshop, IWDW 2020, Melbourne, VIC, Australia, November 25-27, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12617, Springer 2021, ISBN 978-3-030-69448-7 [contents] - [i7]Jianhua Yang, Yi Liao, Fei Shang, Xiangui Kang, Yun Qing Shi:
JPEG Steganography with Embedding Cost Learning and Side-Information Estimation. CoRR abs/2107.13151 (2021) - 2020
- [j130]Qi Li, Xingyuan Wang, Xiaoyu Wang, Bin Ma, Chunpeng Wang, Yongjin Xian, Yun-Qing Shi:
A Novel Grayscale Image Steganography Scheme Based on Chaos Encryption and Generative Adversarial Networks. IEEE Access 8: 168166-168176 (2020) - [j129]Beijing Chen, Jiaxin Wang, Yingyue Chen, Zilong Jin, Hiuk Jae Shim, Yun-Qing Shi:
High-Capacity Robust Image Steganography via Adversarial Network. KSII Trans. Internet Inf. Syst. 14(1): 366-381 (2020) - [j128]Jinwei Wang, Renfeng Liu, Hao Wang, Bin Wu, Yun-Qing Shi:
Quaternion Markov Splicing Detection for Color Images Based on Quaternion Discrete Cosine Transform. KSII Trans. Internet Inf. Syst. 14(7): 2981-2996 (2020) - [j127]Jinwei Wang, Wei Huang, Xiangyang Luo, Yun-Qing Shi, Sunil Kr. Jha:
Non-aligned double JPEG compression detection based on refined Markov features in QDCT domain. J. Real Time Image Process. 17(1): 7-16 (2020) - [j126]Feng Ding, Yuxi Shi, Guopu Zhu, Yun-Qing Shi:
Real-time estimation for the parameters of Gaussian filtering via deep learning. J. Real Time Image Process. 17(1): 17-27 (2020) - [j125]Bin Ma, Lili Chang, Chunpeng Wang, Jian Li, Xingyuan Wang, Yun-Qing Shi:
Robust image watermarking using invariant accurate polar harmonic Fourier moments and chaotic mapping. Signal Process. 172: 107544 (2020) - [j124]Xianjin Liu, Wei Lu, Qin Zhang, Jiwu Huang, Yun-Qing Shi:
Downscaling Factor Estimation on Pre-JPEG Compressed Images. IEEE Trans. Circuits Syst. Video Technol. 30(3): 618-631 (2020) - [j123]Yuileong Yeung, Wei Lu, Yingjie Xue, Jiwu Huang, Yun Qing Shi:
Secure Binary Image Steganography With Distortion Measurement Based on Prediction. IEEE Trans. Circuits Syst. Video Technol. 30(5): 1423-1434 (2020) - [j122]Junxiang Wang, Xin Chen, Jiangqun Ni, Ningxiong Mao, Yun-Qing Shi:
Multiple Histograms-Based Reversible Data Hiding: Framework and Realization. IEEE Trans. Circuits Syst. Video Technol. 30(8): 2313-2328 (2020) - [j121]Jinwei Wang, Hao Wang, Jian Li, Xiangyang Luo, Yun-Qing Shi, Sunil Kr. Jha:
Detecting Double JPEG Compressed Color Images With the Same Quantization Matrix in Spherical Coordinates. IEEE Trans. Circuits Syst. Video Technol. 30(8): 2736-2749 (2020) - [j120]Wei Lu, Ruipeng Li, Lingwen Zeng, Junjia Chen, Jiwu Huang, Yun-Qing Shi:
Binary Image Steganalysis Based on Histogram of Structuring Elements. IEEE Trans. Circuits Syst. Video Technol. 30(9): 3081-3094 (2020) - [j119]Chunpeng Wang, Xingyuan Wang, Zhiqiu Xia, Bin Ma, Yunqing Shi:
Image Description With Polar Harmonic Fourier Moments. IEEE Trans. Circuits Syst. Video Technol. 30(12): 4440-4452 (2020) - [j118]Feng Ding, Hanzhou Wu, Guopu Zhu, Yun-Qing Shi:
METEOR: Measurable Energy Map Toward the Estimation of Resampling Rate via a Convolutional Neural Network. IEEE Trans. Circuits Syst. Video Technol. 30(12): 4715-4727 (2020) - [j117]Jianhua Yang, Danyang Ruan, Jiwu Huang, Xiangui Kang, Yun-Qing Shi:
An Embedding Cost Learning Framework Using GAN. IEEE Trans. Inf. Forensics Secur. 15: 839-851 (2020) - [j116]Zhihua Xia, Chengsheng Yuan, Rui Lv, Xingming Sun, Neal N. Xiong, Yun-Qing Shi:
A Novel Weber Local Binary Descriptor for Fingerprint Liveness Detection. IEEE Trans. Syst. Man Cybern. Syst. 50(4): 1526-1536 (2020) - [c170]Jianhua Yang, Huilin Zheng, Xiangui Kang, Yun-Qing Shi:
Approaching Optimal Embedding In Audio Steganography With GAN. ICASSP 2020: 2827-2831 - [c169]Bin Ma, Qi Li, Xiaoyu Wang, Chunpeng Wang, Yun-Qing Shi:
Machine Vision Based Novel Scheme for Largely, Reducing Printing Errors in Medical Package. ICAIS (2) 2020: 545-556 - [c168]Jianhua Yang, Beiling Lu, Liang Xiao, Xiangui Kang, Yunqing Shi:
Reinforcement Learning Aided Network Architecture Generation for JPEG Image Steganalysis. IH&MMSec 2020: 23-32 - [e23]Hongxia Wang, Xianfeng Zhao, Yunqing Shi, Hyoung Joong Kim, Alessandro Piva:
Digital Forensics and Watermarking - 18th International Workshop, IWDW 2019, Chengdu, China, November 2-4, 2019, Revised Selected Papers. Lecture Notes in Computer Science 12022, Springer 2020, ISBN 978-3-030-43574-5 [contents]
2010 – 2019
- 2019
- [j115]Qilin Yin, Jinwei Wang, Xiangyang Luo, Jiangtao Zhai, Sunil Kr. Jha, Yun-Qing Shi:
Quaternion Convolutional Neural Network for Color Image Classification and Forensics. IEEE Access 7: 20293-20301 (2019) - [j114]Junxiang Wang, Xin Chen, Yunqing Shi:
Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding. IEEE Access 7: 35564-35578 (2019) - [j113]Jie Wang, Xiaoqing Jia, Xiangui Kang, Yun-Qing Shi:
A Cover Selection HEVC Video Steganography Based on Intra Prediction Mode. IEEE Access 7: 119393-119402 (2019) - [j112]Shaowei Weng, Yunqing Shi, Wien Hong, Ye Yao:
Dynamic improved pixel value ordering reversible data hiding. Inf. Sci. 489: 136-154 (2019) - [j111]Guorong Xuan, Xiaolong Li, Yun-Qing Shi:
Minimum entropy and histogram-pair based JPEG image reversible data hiding. J. Inf. Secur. Appl. 45: 1-9 (2019) - [j110]Jinwei Wang, Yangyang Li, Jian Li, Xiangyang Luo, Yun-Qing Shi, Sunil Kr. Jha:
Color image-spliced localization based on quaternion principal component analysis and quaternion skewness. J. Inf. Secur. Appl. 47: 353-362 (2019) - [j109]Youcai Gao, Jinwei Wang, Yun-Qing Shi:
Dynamic multi-watermarking and detecting in DWT domain. J. Real Time Image Process. 16(3): 565-576 (2019) - [j108]Yifang Chen, Xiangui Kang, Yun Q. Shi, Z. Jane Wang:
A multi-purpose image forensic method using densely connected convolutional neural networks. J. Real Time Image Process. 16(3): 725-740 (2019) - [j107]Bin Ma, Xiaoyu Wang, Qi Li, Bing Li, Jian Li, Chunpeng Wang, Yunqing Shi:
Adaptive error prediction method based on multiple linear regression for reversible data hiding. J. Real Time Image Process. 16(4): 821-834 (2019) - [j106]Bin Ma, Bing Li, Xiaoyu Wang, Chunpeng Wang, Jian Li, Yun-Qing Shi:
A code division multiplexing and block classification-based real-time reversible data-hiding algorithm for medical images. J. Real Time Image Process. 16(4): 857-869 (2019) - [j105]Feng Ding, Yuxi Shi, Guopu Zhu, Yun-Qing Shi:
Smoothing identification for digital image forensics. Multim. Tools Appl. 78(7): 8225-8245 (2019) - [j104]Jianhua Yang, Xiangui Kang, Edward K. Wong, Yun-Qing Shi:
JPEG steganalysis with combined dense connected CNNs and SCA-GFR. Multim. Tools Appl. 78(7): 8481-8495 (2019) - [j103]Bin Ma, Bing Li, Xiao-Yu Wang, Chunpeng Wang, Jian Li, Yun-Qing Shi:
Code Division Multiplexing and Machine Learning Based Reversible Data Hiding Scheme for Medical Image. Secur. Commun. Networks 2019: 4732632:1-4732632:9 (2019) - [j102]Junxiang Wang, Ningxiong Mao, Xin Chen, Jiangqun Ni, Chuntao Wang, Yunqing Shi:
Multiple histograms based reversible data hiding by using FCM clustering. Signal Process. 159: 193-203 (2019) - [j101]Li Liu, Lifang Wang, Yun-Qing Shi, Chin-Chen Chang:
Separable Data-Hiding Scheme for Encrypted Image to Protect Privacy of User in Cloud. Symmetry 11(1): 82 (2019) - [j100]Jinwei Wang, Ting Li, Xiangyang Luo, Yun-Qing Shi, Sunil Kr. Jha:
Identifying Computer Generated Images Based on Quaternion Central Moments in Color Quaternion Wavelet Domain. IEEE Trans. Circuits Syst. Video Technol. 29(9): 2775-2785 (2019) - [c167]Jianhua Yang, Danyang Ruan, Xiangui Kang, Yun-Qing Shi:
Towards Automatic Embedding Cost Learning for JPEG Steganography. IH&MMSec 2019: 37-46 - [c166]Zhangyi Shen, Feng Ding, Yunqing Shi:
Anti-forensics of Image Sharpening Using Generative Adversarial Network. IWDW 2019: 150-157 - [e22]Chang D. Yoo, Yun Qing Shi, Hyoung-Joong Kim, Alessandro Piva, Gwangsu Kim:
Digital Forensics and Watermarking - 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings. Lecture Notes in Computer Science 11378, Springer 2019, ISBN 978-3-030-11388-9 [contents] - [i6]Wenkang Su, Jiangqun Ni, Yuanfeng Pan, Xianglei Hu, Yun-Qing Shi:
Image Steganography using Gaussian Markov Random Field Model. CoRR abs/1908.01483 (2019) - 2018
- [j99]Beijing Chen, Ming Yu, Qingtang Su, Hiuk Jae Shim, Yun-Qing Shi:
Fractional Quaternion Zernike Moments for Robust Color Image Copy-Move Forgery Detection. IEEE Access 6: 56637-56646 (2018) - [j98]Beijing Chen, Xiaoming Qi, Yiting Wang, Yuhui Zheng, Hiuk Jae Shim, Yun-Qing Shi:
An Improved Splicing Localization Method by Fully Convolutional Networks. IEEE Access 6: 69472-69480 (2018) - [j97]Ching-Chun Chang, Chang-Tsun Li, Yun-Qing Shi:
Privacy-Aware Reversible Watermarking in Cloud Computing Environments. IEEE Access 6: 70720-70733 (2018) - [j96]Chunpeng Ge, Willy Susilo, Liming Fang, Jiandong Wang, Yunqing Shi:
A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system. Des. Codes Cryptogr. 86(11): 2587-2603 (2018) - [j95]Guorong Xuan, Xiaolong Li, Yun-Qing Shi:
Histogram-pair based reversible data hiding via searching for optimal four thresholds. J. Inf. Secur. Appl. 39: 58-67 (2018) - [j94]Feng Ding, Guopu Zhu, Weiqiang Dong, Yun-Qing Shi:
An efficient weak sharpening detection method for image forensics. J. Vis. Commun. Image Represent. 50: 93-99 (2018) - [j93]Lizhi Xiong, Zhengquan Xu, Yun-Qing Shi:
An integer wavelet transform based scheme for reversible data hiding in encrypted images. Multidimens. Syst. Signal Process. 29(3): 1191-1202 (2018) - [j92]Jianquan Yang, Honglei Ren, Guopu Zhu, Jiwu Huang, Yun-Qing Shi:
Detecting median filtering via two-dimensional AR models of multiple filtered residuals. Multim. Tools Appl. 77(7): 7931-7953 (2018) - [j91]Ye Yao, Weitong Hu, Wei Zhang, Ting Wu, Yun-Qing Shi:
Distinguishing Computer-Generated Graphics from Natural Images Based on Sensor Pattern Noise and Deep Learning. Sensors 18(4): 1296 (2018) - [j90]Hao-Tian Wu, Shaohua Tang, Jiwu Huang, Yun-Qing Shi:
A novel reversible data hiding method with image contrast enhancement. Signal Process. Image Commun. 62: 64-73 (2018) - [j89]Jingyu Ye, Zhangyi Shen, Piyush Behrani, Feng Ding, Yun-Qing Shi:
Detecting USM image sharpening by using CNN. Signal Process. Image Commun. 68: 258-264 (2018) - [j88]Xianglei Hu, Jiangqun Ni, Yun-Qing Shi:
Efficient JPEG Steganography Using Domain Transformation of Embedding Entropy. IEEE Signal Process. Lett. 25(6): 773-777 (2018) - [j87]Ye Yao, Yunqing Shi, Shaowei Weng, Bo Guan:
Deep Learning for Detection of Object-Based Forgery in Advanced Video. Symmetry 10(1): 3 (2018) - [j86]Wenkang Su, Jiangqun Ni, Xiaohan Li, Yun-Qing Shi:
A New Distortion Function Design for JPEG Steganography Using the Generalized Uniform Embedding Strategy. IEEE Trans. Circuits Syst. Video Technol. 28(12): 3545-3549 (2018) - [j85]Yuan-Gen Wang, Guopu Zhu, Sam Kwong, Yun-Qing Shi:
A Study on the Security Levels of Spread-Spectrum Embedding Schemes in the WOA Framework. IEEE Trans. Cybern. 48(8): 2307-2320 (2018) - [j84]Yuan-Gen Wang, Guopu Zhu, Yun-Qing Shi:
Transportation Spherical Watermarking. IEEE Trans. Image Process. 27(4): 2063-2077 (2018) - [c165]Jianhua Yang, Xiangui Kang, Edward K. Wong, Yun-Qing Shi:
Deep Learning with Feature Reuse for JPEG Image Steganalysis. APSIPA 2018: 533-538 - [c164]Peng Peng, Tanfeng Sun, Xinghao Jiang, Ke Xu, Bin Li, Yunqing Shi:
Detection of Double JPEG Compression with the Same Quantization Matrix Based on Convolutional Neural Networks. APSIPA 2018: 717-721 - [c163]Bin Ma, Xiaoyu Wang, Bing Li, Yunqing Shi:
A Multiple Linear Regression Based High-Performance Error Prediction Method for Reversible Data Hiding. ICCCS (4) 2018: 135-146 - [c162]Jingyu Ye, Yuxi Shi, Guanshuo Xu, Yun-Qing Shi:
A Convolutional Neural Network Based Seam Carving Detection Scheme for Uncompressed Digital Images. IWDW 2018: 3-13 - [c161]Huilin Zheng, Xuan Li, Danyang Ruan, Xiangui Kang, Yun-Qing Shi:
Comparison of DCT and Gabor Filters in Residual Extraction of CNN Based JPEG Steganalysis. IWDW 2018: 29-39 - [c160]Bo Ou, Xiaolong Li, Wei Li, Yun-Qing Shi:
Pixel-Value-Ordering Based Reversible Data Hiding with Adaptive Texture Classification and Modification. IWDW 2018: 169-179 - [c159]Bin Ma, Xiaoyu Wang, Bing Li, Yun-Qing Shi:
A Multiple Linear Regression Based High-Accuracy Error Prediction Algorithm for Reversible Data Hiding. IWDW 2018: 195-205 - [c158]Bin Ma, Xiaoyu Wang, Bing Li, Yunqing Shi:
A Multiple Linear Regression Based High-Performance Error Prediction Method for Reversible Data Hiding. SecureComm (2) 2018: 441-452 - [i5]Ye Yao, Weitong Hu, Wei Zhang, Ting Wu, Yun-Qing Shi:
Distinguishing Computer-generated Graphics from Natural Images Based on Sensor Pattern Noise and Deep Learning. CoRR abs/1803.09403 (2018) - [i4]Jianhua Yang, Kai Liu, Xiangui Kang, Edward K. Wong, Yun-Qing Shi:
Spatial Image Steganography Based on Generative Adversarial Network. CoRR abs/1804.07939 (2018) - 2017
- [j83]Zhenzhen Zhang, Jianjun Hou, Yu Zhang, Jingyu Ye, Yunqing Shi:
Detecting multiple H.264/AVC compressions with the same quantisation parameters. IET Inf. Secur. 11(3): 152-158 (2017) - [j82]Jingyu Ye, Yun-Qing Shi:
An effective method to detect seam carving. J. Inf. Secur. Appl. 35: 13-22 (2017) - [j81]Yanyan Xu, Jiaying Gong, Lizhi Xiong, Zhengquan Xu, Jinwei Wang, Yun-Qing Shi:
A privacy-preserving content-based image retrieval method in cloud environment. J. Vis. Commun. Image Represent. 43: 164-172 (2017) - [j80]Beijing Chen, Xiaoming Qi, Xingming Sun, Yun-Qing Shi:
Quaternion pseudo-Zernike moments combining both of RGB information and depth information for color image splicing detection. J. Vis. Commun. Image Represent. 49: 283-290 (2017) - [j79]Jinwei Wang, Shiguo Lian, Yun-Qing Shi:
Hybrid multiplicative multi-watermarking in DWT domain. Multidimens. Syst. Signal Process. 28(2): 617-636 (2017) - [j78]Jinwei Wang, Ting Li, Yun-Qing Shi, Shiguo Lian, Jingyu Ye:
Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics. Multim. Tools Appl. 76(22): 23721-23737 (2017) - [j77]Zhihua Xia, Rui Lv, Yafeng Zhu, Peng Ji, Huiyu Sun, Yun-Qing Shi:
Fingerprint liveness detection using gradient-based texture features. Signal Image Video Process. 11(2): 381-388 (2017) - [j76]Zhihua Xia, Rui Lv, Yafeng Zhu, Peng Ji, Huiyu Sun, Yun-Qing Shi:
Erratum to: Fingerprint liveness detection using gradient-based texture features. Signal Image Video Process. 11(2): 389 (2017) - [j75]Han-Zhou Wu, Yun-Qing Shi, Hong-Xia Wang, Lin-Na Zhou:
Separable Reversible Data Hiding for Encrypted Palette Images With Color Partitioning and Flipping Verification. IEEE Trans. Circuits Syst. Video Technol. 27(8): 1620-1631 (2017) - [j74]Junxiang Wang, Jiangqun Ni, Xing Zhang, Yun-Qing Shi:
Rate and Distortion Optimization for Reversible Data Hiding Using Multiple Histogram Shifting. IEEE Trans. Cybern. 47(2): 315-326 (2017) - [j73]Hui Zeng, Jingxian Liu, Jingjing Yu, Xiangui Kang, Yun Qing Shi, Z. Jane Wang:
A Framework of Camera Source Identification Bayesian Game. IEEE Trans. Cybern. 47(7): 1757-1768 (2017) - [j72]Chenglong Chen, Jiangqun Ni, Zhaoyi Shen, Yun Qing Shi:
Blind Forensics of Successive Geometric Transformations in Digital Images Using Spectral Method: Theory and Applications. IEEE Trans. Image Process. 26(6): 2811-2824 (2017) - [c157]Jingyu Ye, Yun-Qing Shi:
A Hybrid Feature Model for Seam Carving Detection. IWDW 2017: 77-89 - [c156]Jianhua Yang, Kai Liu, Xiangui Kang, Edward K. Wong, Yunqing Shi:
Steganalysis Based on Awareness of Selection-Channel and Deep Learning. IWDW 2017: 263-272 - [c155]Hao-Tian Wu, Shaohua Tang, Yun-Qing Shi:
Image Quality Assessment in Reversible Data Hiding with Contrast Enhancement. IWDW 2017: 290-302 - [e21]Yun-Qing Shi, Hyoung-Joong Kim, Fernando Pérez-González, Feng Liu:
Digital Forensics and Watermarking - 15th International Workshop, IWDW 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10082, 2017, ISBN 978-3-319-53464-0 [contents] - [e20]Christian Kraetzer, Yun-Qing Shi, Jana Dittmann, Hyoung Joong Kim:
Digital Forensics and Watermarking - 16th International Workshop, IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings. Lecture Notes in Computer Science 10431, Springer 2017, ISBN 978-3-319-64184-3 [contents] - [i3]Jianhua Yang, Yun-Qing Shi, Edward K. Wong, Xiangui Kang:
JPEG Steganalysis Based on DenseNet. CoRR abs/1711.09335 (2017) - 2016
- [j71]Yun-Qing Shi, Xiaolong Li, Xinpeng Zhang, Hao-Tian Wu, Bin Ma:
Reversible Data Hiding: Advances in the Past Two Decades. IEEE Access 4: 3210-3237 (2016) - [j70]Guangyong Gao, Yun-Qing Shi, Xingming Sun, Caixue Zhou, Zongmin Cui, Liya Xu:
Reversible Watermarking with Adaptive Embedding Threshold Matrix. KSII Trans. Internet Inf. Syst. 10(9): 4603-4624 (2016) - [j69]Dawen Xu, Rangding Wang, Yun Q. Shi:
An improved scheme for data hiding in encrypted H.264/AVC videos. J. Vis. Commun. Image Represent. 36: 229-242 (2016) - [j68]Guang Hua, Jiwu Huang, Yun Q. Shi, Jonathan Goh, Vrizlynn L. L. Thing:
Twenty years of digital audio watermarking - a comprehensive review. Signal Process. 128: 222-242 (2016) - [j67]Bingwen Feng, Wei Lu, Wei Sun, Jiwu Huang, Yun-Qing Shi:
Robust image watermarking based on Tucker decomposition and Adaptive-Lattice Quantization Index Modulation. Signal Process. Image Commun. 41: 1-14 (2016) - [j66]Guanshuo Xu, Han-Zhou Wu, Yun-Qing Shi:
Structural Design of Convolutional Neural Networks for Steganalysis. IEEE Signal Process. Lett. 23(5): 708-712 (2016) - [j65]Bin Ma, Yun Q. Shi:
A Reversible Data Hiding Scheme Based on Code Division Multiplexing. IEEE Trans. Inf. Forensics Secur. 11(9): 1914-1927 (2016) - [j64]Fangjun Huang, Jiwu Huang, Yun-Qing Shi:
New Framework for Reversible Data Hiding in Encrypted Domain. IEEE Trans. Inf. Forensics Secur. 11(12): 2777-2789 (2016) - [j63]Jianquan Yang, Guopu Zhu, Yun-Qing Shi:
Analyzing the Effect of JPEG Compression on Local Variance of Image Intensity. IEEE Trans. Image Process. 25(6): 2647-2656 (2016) - [c154]Bin Ma, Jian Xu, Yun Q. Shi:
A Novel CDMA Based High Performance Reversible Data Hiding Scheme. IH&MMSec 2016: 39-44 - [c153]Guanshuo Xu, Han-Zhou Wu, Yun Q. Shi:
Ensemble of CNNs for Steganalysis: An Empirical Study. IH&MMSec 2016: 103-107 - [c152]Han-Zhou Wu, Hong-Xia Wang, Yun-Qing Shi:
PPE-Based Reversible Data Hiding. IH&MMSec 2016: 187-188 - [c151]Shuo Chen, Tanfeng Sun, Xinghao Jiang, Peisong He, Shilin Wang, Yun Q. Shi:
Detecting Double H.264 Compression Based on Analyzing Prediction Residual Distribution. IWDW 2016: 61-74 - [c150]Jingyu Ye, Yun-Qing Shi:
A Local Derivative Pattern Based Image Forensic Framework for Seam Carving Detection. IWDW 2016: 172-184 - [c149]Han-Zhou Wu, Hong-Xia Wang, Yun-Qing Shi:
Dynamic content selection-and-prediction framework applied to reversible data hiding. WIFS 2016: 1-6 - [e19]Yun-Qing Shi, Hyoung-Joong Kim, Fernando Pérez-González, Isao Echizen:
Digital-Forensics and Watermarking - 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9569, Springer 2016, ISBN 978-3-319-31959-9 [contents] - [i2]Han-Zhou Wu, Hong-Xia Wang, Yun-Qing Shi:
Prediction-error of Prediction Error (PPE)-based Reversible Data Hiding. CoRR abs/1604.04984 (2016) - [i1]Han-Zhou Wu, Hong-Xia Wang, Yun-Qing Shi:
Can Machine Learn Steganography? - Implementing LSB Substitution and Matrix Coding Steganography with Feed-Forward Neural Networks. CoRR abs/1606.05294 (2016) - 2015
- [j62]Hao-Tian Wu, Jiwu Huang, Yun-Qing Shi:
A reversible data hiding method with contrast enhancement for medical images. J. Vis. Commun. Image Represent. 31: 146-153 (2015) - [j61]Hao-Tian Wu, Jean-Luc Dugelay, Yun-Qing Shi:
Reversible Image Data Hiding with Contrast Enhancement. IEEE Signal Process. Lett. 22(1): 81-85 (2015) - [j60]Feng Ding, Guopu Zhu, Jianquan Yang, Jin Xie, Yun-Qing Shi:
Edge Perpendicular Binary Coding for USM Sharpening Detection. IEEE Signal Process. Lett. 22(3): 327-331 (2015) - [j59]Guangyong Gao, Yun-Qing Shi:
Reversible Data Hiding Using Controlled Contrast Enhancement and Integer Wavelet Transform. IEEE Signal Process. Lett. 22(11): 2078-2082 (2015) - [j58]Linjie Guo, Jiangqun Ni, Wenkang Su, Chengpei Tang, Yun-Qing Shi:
Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited. IEEE Trans. Inf. Forensics Secur. 10(12): 2669-2680 (2015) - [c148]Yue Tan, Bo Wang, Ming Li, Yanqing Guo, Xiangwei Kong, Yunqing Shi:
Camera Source Identification with Limited Labeled Training Set. IWDW 2015: 18-27 - [c147]Feng Ding, Weiqiang Dong, Guopu Zhu, Yun-Qing Shi:
An Advanced Texture Analysis Method for Image Sharpening Detection. IWDW 2015: 72-82 - [c146]Xuefeng Tong, Xin Wang, Guorong Xuan, Shumeng Li, Yun Q. Shi:
Optimal Histogram-Pair and Prediction-Error Based Reversible Data Hiding for Medical Images. IWDW 2015: 378-391 - [e18]Yun-Qing Shi, Hyoung-Joong Kim, Fernando Pérez-González, Ching-Nung Yang:
Digital-Forensics and Watermarking - 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers. Lecture Notes in Computer Science 9023, Springer 2015, ISBN 978-3-319-19320-5 [contents] - [e17]Yun Q. Shi:
Transactions on Data Hiding and Multimedia Security X. Lecture Notes in Computer Science 8948, Springer 2015, ISBN 978-3-662-46738-1 [contents] - 2014
- [j57]Lifang Yu, Yao Zhao, Rongrong Ni, Yun-Qing Shi:
On YASS's Non-monotonic Security Performance. Circuits Syst. Signal Process. 33(11): 3527-3537 (2014) - [j56]Dawen Xu, Rangding Wang, Yun Q. Shi:
An improved reversible data hiding-based approach for intra-frame error concealment in H.264/AVC. J. Vis. Commun. Image Represent. 25(2): 410-422 (2014) - [j55]Zhaohong Li, Zhenzhen Zhang, Yunqing Shi:
Distinguishing computer graphics from photographic images using a multiresolution approach based on local binary patterns. Secur. Commun. Networks 7(11): 2153-2159 (2014) - [j54]Yujin Zhang, Shenghong Li, Shilin Wang, Yun-Qing Shi:
Revealing the Traces of Median Filtering Using High-Order Local Ternary Patterns. IEEE Signal Process. Lett. 21(3): 275-279 (2014) - [j53]Dawen Xu, Rangding Wang, Yun Q. Shi:
Data Hiding in Encrypted H.264/AVC Video Streams by Codeword Substitution. IEEE Trans. Inf. Forensics Secur. 9(4): 596-606 (2014) - [j52]Linjie Guo, Jiangqun Ni, Yun-Qing Shi:
Uniform Embedding for Efficient JPEG Steganography. IEEE Trans. Inf. Forensics Secur. 9(5): 814-825 (2014) - [j51]Jianquan Yang, Jin Xie, Guopu Zhu, Sam Kwong, Yun-Qing Shi:
An Effective Method for Detecting Double JPEG Compression With the Same Quantization Matrix. IEEE Trans. Inf. Forensics Secur. 9(11): 1933-1942 (2014) - [c145]Aamo Iorliam, Anthony T. S. Ho, Norman Poh, Yun Q. Shi:
Do biometric images follow Benford's law? IWBF 2014: 1-6 - [c144]Guanshuo Xu, Jingyu Ye, Yun-Qing Shi:
New Developments in Image Tampering Detection. IWDW 2014: 3-17 - [c143]Lu Zheng, Tanfeng Sun, Yun-Qing Shi:
Inter-frame Video Forgery Detection Based on Block-Wise Brightness Variance Descriptor. IWDW 2014: 18-30 - [c142]Zhili Zhou, Xingming Sun, Yunlong Wang, Zhangjie Fu, Yun-Qing Shi:
Combination of SIFT Feature and Convex Region-Based Global Context Feature for Image Copy Detection. IWDW 2014: 60-71 - [c141]Xuefeng Tong, Guangce Shen, Guorong Xuan, Shumeng Li, Zhiqiang Yang, Jian Li, Yun-Qing Shi:
Stereo Image Coding with Histogram-Pair Based Reversible Data Hiding. IWDW 2014: 201-214 - [c140]Hao-Tian Wu, Yuan Liu, Yun-Qing Shi:
Reversible Data Hiding by Median-Preserving Histogram Modification for Image Contrast Enhancement. IWDW 2014: 289-301 - [c139]Bin Ma, Yun-Qing Shi:
A Reversible Image Watermarking Scheme Based on Modified Integer-to-Integer Discrete Wavelet Transform and CDMA Algorithm. IWDW 2014: 420-432 - [c138]Licong Chen, Yun-Qing Shi, Patchara Sutthiwan:
Variable Multi-dimensional Co-occurrence for Steganalysis. IWDW 2014: 559-573 - [e16]Yun-Qing Shi, Hyoung-Joong Kim, Fernando Pérez-González:
Digital-Forensics and Watermarking - 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers. Lecture Notes in Computer Science 8389, Springer 2014, ISBN 978-3-662-43885-5 [contents] - [e15]Yun Q. Shi, Feng Liu, WeiQi Yan:
Transactions on Data Hiding and Multimedia Security IX - Special Issue on Visual Cryptography. Lecture Notes in Computer Science 8363, Springer 2014, ISBN 978-3-642-55045-4 [contents] - 2013
- [j50]Xinghao Jiang, Wan Wang, Tanfeng Sun, Yun Q. Shi, Shilin Wang:
Detection of Double Compression in MPEG-4 Videos Based on Markov Statistics. IEEE Signal Process. Lett. 20(5): 447-450 (2013) - [j49]Hong Zhao, Yun-Qing Shi:
Detecting Covert Channels in Computer Networks Based on Chaos Theory. IEEE Trans. Inf. Forensics Secur. 8(2): 273-282 (2013) - [j48]Bo Ou, Xiaolong Li, Yao Zhao, Rongrong Ni, Yun-Qing Shi:
Pairwise Prediction-Error Expansion for Efficient Reversible Data Hiding. IEEE Trans. Image Process. 22(12): 5010-5021 (2013) - [c137]Fangjun Huang, Weiqi Luo, Jiwu Huang, Yun-Qing Shi:
Distortion function designing for JPEG steganography with uncompressed side-image. IH&MMSec 2013: 69-76 - [c136]Licong Chen, Yun Q. Shi, Patchara Sutthiwan, Xinxin Niu:
Non-uniform Quantization in Breaking HUGO. IWDW 2013: 48-62 - [c135]Dawen Xu, Rangding Wang, Yun-Qing Shi:
Reversible Data Hiding in Encrypted H.264/AVC Video Streams. IWDW 2013: 141-152 - [c134]Xuefeng Tong, Guorong Xuan, Guangce Shen, Xiaoli Huan, Yun-Qing Shi:
Using RZL Coding to Enhance Histogram-Pair Based Image Reversible Data Hiding. IWDW 2013: 153-166 - [c133]Jianquan Yang, Guopu Zhu, Junlong Wang, Yun-Qing Shi:
Detecting Non-aligned Double JPEG Compression Based on Refined Intensity Difference and Calibration. IWDW 2013: 169-179 - [c132]Feng Ding, Guopu Zhu, Yun-Qing Shi:
A Novel Method for Detecting Image Sharpening Based on Local Binary Pattern. IWDW 2013: 180-191 - [e14]Yun Q. Shi, Hyoung-Joong Kim, Fernando Pérez-González:
Digital Forensics and Watermaking - 11th International Workshop, IWDW 2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7809, Springer 2013, ISBN 978-3-642-40098-8 [contents] - 2012
- [j47]Xiang Hua Li, Yu Qian Zhao, Miao Liao, Frank Y. Shih, Yun Q. Shi:
Detection of tampered region for JPEG images by using mode-based first digit features. EURASIP J. Adv. Signal Process. 2012: 190 (2012) - [j46]Lifang Yu, Yun Q. Shi, Yao Zhao, Rongrong Ni, Gang Cao:
A Study on Embedding Efficiency of Matrix Encoding. Int. J. Digit. Crime Forensics 4(1): 37-48 (2012) - [j45]Hong Zhao, Yun Q. Shi, Nirwan Ansari:
Steganography in Streaming Multimedia over Networks. Trans. Data Hiding Multim. Secur. 7: 96-114 (2012) - [j44]Fangjun Huang, Jiwu Huang, Yun-Qing Shi:
New Channel Selection Rule for JPEG Steganography. IEEE Trans. Inf. Forensics Secur. 7(4): 1181-1191 (2012) - [j43]Jian Li, Hongmei Liu, Jiwu Huang, Yun Q. Shi:
Reference index-based H.264 video watermarking scheme. ACM Trans. Multim. Comput. Commun. Appl. 8(S2): 33:1-33:22 (2012) - [c131]Guanshuo Xu, Yun-Qing Shi:
Camera Model Identification Using Local Binary Patterns. ICME 2012: 392-397 - [c130]Guorong Xuan, Yun Q. Shi, Peiqi Chai, Patchara Sutthiwan:
An Enhanced EM algorithm using maximum entropy distribution as initial condition. ICPR 2012: 849-852 - [c129]Yun Q. Shi, Patchara Sutthiwan, Licong Chen:
Textural Features for Steganalysis. Information Hiding 2012: 63-77 - [c128]Licong Chen, Yun Q. Shi, Patchara Sutthiwan, Xinxin Niu:
A Novel Mapping Scheme for Steganalysis. IWDW 2012: 19-33 - [c127]Zhaohong Li, Jingyu Ye, Yun-Qing Shi:
Distinguishing Computer Graphics from Photographic Images Using Local Binary Patterns. IWDW 2012: 228-241 - [c126]Guorong Xuan, Xuefeng Tong, Jianzhong Teng, Xiaojie Zhang, Yun-Qing Shi:
Optimal Histogram-Pair and Prediction-Error Based Image Reversible Data Hiding. IWDW 2012: 368-383 - [c125]Haifeng Xiao, Yun Q. Shi, Wei Su, John A. Kosinski:
Automatic classification of analog modulation schemes. RWS 2012: 5-8 - [c124]Linjie Guo, Jiangqun Ni, Yun-Qing Shi:
An efficient JPEG steganographic scheme using uniform embedding. WIFS 2012: 169-174 - [e13]Yun-Qing Shi, Hyoung-Joong Kim, Fernando Pérez-González:
Digital Forensics and Watermarking - 10th International Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7128, Springer 2012, ISBN 978-3-642-32204-4 [contents] - [e12]Yun Q. Shi:
Transactions on Data Hiding and Multimedia Security VII. Lecture Notes in Computer Science 7110, Springer 2012, ISBN 978-3-642-28692-6 [contents] - [e11]Yun Q. Shi, Stefan Katzenbeisser:
Transactions on Data Hiding and Multimedia Security VIII - Special Issue on Pattern Recognition for IT Security. Lecture Notes in Computer Science 7228, Springer 2012, ISBN 978-3-642-31970-9 [contents] - 2011
- [j42]Bin Li, Junhui He, Jiwu Huang, Yun Qing Shi:
A Survey on Image Steganography and Steganalysis. J. Inf. Hiding Multim. Signal Process. 2(2): 142-172 (2011) - [j41]Xi Min Zhang, Wen-Qing Xu, Yun-Qing Shi, Sankar Basu:
Basis arrays and successive packing for M-D interleaving. Multidimens. Syst. Signal Process. 22(1-3): 237-257 (2011) - [j40]Patchara Sutthiwan, Yun Q. Shi, Hong Zhao, Tian-Tsong Ng, Wei Su:
Markovian Rake Transform for Digital Image Tampering Detection. Trans. Data Hiding Multim. Secur. 6: 1-17 (2011) - [c123]Peng Meng, Yun-Qing Shi, Liusheng Huang, Zhili Chen, Wei Yang, Abdelrahman Desoky:
LinL: Lost in n-best List. Information Hiding 2011: 329-341 - [c122]Xinghao Jiang, Tanfeng Sun, Yue Zhou, Yun Q. Shi:
A Drift Compensation Algorithm for H.264/AVC Video Robust Watermarking Scheme. IWDW 2011: 30-41 - [c121]Patchara Sutthiwan, Yun Q. Shi:
Anti-Forensics of Double JPEG Compression Detection. IWDW 2011: 411-424 - [c120]Mehdi Fallahpour, David Megías, Yun Q. Shi:
Lossless image data embedding in plain areas. Media Forensics and Security 2011: 78800H - [e10]Hyoung-Joong Kim, Yun-Qing Shi, Mauro Barni:
Digital Watermarking - 9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6526, Springer 2011, ISBN 978-3-642-18404-8 [contents] - [e9]Yun Q. Shi, Sabu Emmanuel, Mohan S. Kankanhalli, Shih-Fu Chang, Regunathan Radhakrishnan, Fulong Ma, Li Zhao:
Transactions on Data Hiding and Multimedia Security VI. Lecture Notes in Computer Science 6730, Springer 2011, ISBN 978-3-642-24555-8 [contents] - 2010
- [j39]Vasiliy Sachnev, Hyoung Joong Kim, Suresh Sundaram, Yun-Qing Shi:
Reversible Watermarking Algorithm with Distortion Compensation. EURASIP J. Adv. Signal Process. 2010 (2010) - [j38]Xi Zhao, Anthony Tung Shuen Ho, Yun Q. Shi:
Image Forensics Using Generalised Benford's Law for Improving Image Authentication Detection Rates in Semi-Fragile Watermarking. Int. J. Digit. Crime Forensics 2(2): 1-20 (2010) - [j37]Fangjun Huang, Jiwu Huang, Yun-Qing Shi:
An experimental study on the security performance of YASS. IEEE Trans. Inf. Forensics Secur. 5(3): 374-380 (2010) - [j36]Fangjun Huang, Jiwu Huang, Yun-Qing Shi:
Detecting Double JPEG Compression With the Same Quantization Matrix. IEEE Trans. Inf. Forensics Secur. 5(4): 848-856 (2010) - [c119]Hong Zhao, Yun Q. Shi, Nirwan Ansari:
Hiding Data in Multimedia Streaming over Networks. CNSR 2010: 50-55 - [c118]Lifang Yu, Yao Zhao, Rongrong Ni, Yun Q. Shi:
A high-performance YASS-like scheme using randomized big-blocks. ICME 2010: 474-479 - [c117]Patchara Sutthiwan, Yun Q. Shi, Wei Su, Tian-Tsong Ng:
Rake transform and edge statistics for image forgery detection. ICME 2010: 1463-1468 - [c116]Guorong Xuan, Yun Q. Shi, Jianzhong Teng, Xuefeng Tong, Peiqi Chai:
Double-threshold reversible data hiding. ISCAS 2010: 1129-1132 - [c115]Patchara Sutthiwan, Yun-Qing Shi, Jing Dong, Tieniu Tan, Tian-Tsong Ng:
New developments in color image tampering detection. ISCAS 2010: 3064-3067 - [c114]Jiamin Bai, Tian-Tsong Ng, Xinting Gao, Yun-Qing Shi:
Is physics-based liveness detection truly possible with a single image? ISCAS 2010: 3425-3428 - [c113]Yu Qian Zhao, Frank Y. Shih, Yun Q. Shi:
Passive Detection of Paint-Doctored JPEG Images. IWDW 2010: 1-11 - [c112]Gopal Narayanan, Yun-Qing Shi:
A Statistical Model for Quantized AC Block DCT Coefficients in JPEG Compression and its Application to Detecting Potential Compression History in Bitmap Images. IWDW 2010: 75-89 - [c111]Xinting Gao, Bo Qiu, JingJing Shen, Tian-Tsong Ng, Yun-Qing Shi:
A Smart Phone Image Database for Single Image Recapture Detection. IWDW 2010: 90-104 - [c110]Fangjun Huang, Yun-Qing Shi, Jiwu Huang:
New JPEG Steganographic Scheme with High Security Performance. IWDW 2010: 189-201 - [c109]Rui Yang, Yun Q. Shi, Jiwu Huang:
Detecting double compression of audio signal. Media Forensics and Security 2010: 75410K - [c108]Weina Jiang, Anthony T. S. Ho, Helen Treharne, Yun Q. Shi:
A Novel Multi-size Block Benford's Law Scheme for Printer Identification. PCM (1) 2010: 643-652 - [c107]Hong Zhao, Yun Q. Shi:
A phase-space reconstruction approach to detect covert channels in TCP/IP protocols. WIFS 2010: 1-6 - [p1]Fangjun Huang, Bin Li, Yun-Qing Shi, Jiwu Huang, Guorong Xuan:
Image Steganalysis. Intelligent Multimedia Analysis for Security Applications 2010: 275-303 - [e8]Yun Q. Shi:
Transactions on Data Hiding and Multimedia Security V. Lecture Notes in Computer Science 6010, Springer 2010, ISBN 978-3-642-14297-0 [contents]
2000 – 2009
- 2009
- [j35]Xiangui Kang, Jiwu Huang, Wenjun Zeng, Yun Q. Shi:
Non-ambiguity of blind watermarking: a revisit with analytical resolution. Sci. China Ser. F Inf. Sci. 52(2): 276-285 (2009) - [j34]Vasiliy Sachnev, Hyoung-Joong Kim, Jeho Nam, Suresh Sundaram, Yun-Qing Shi:
Reversible Watermarking Algorithm Using Sorting and Prediction. IEEE Trans. Circuits Syst. Video Technol. 19(7): 989-999 (2009) - [j33]Guorong Xuan, Yun Q. Shi, Peiqi Chai, Jianzhong Teng, Zhicheng Ni, Xuefeng Tong:
Optimum Histogram Pair Based Image Lossless Data Embedding. Trans. Data Hiding Multim. Secur. 4: 84-102 (2009) - [j32]Bin Li, Jiwu Huang, Yun-Qing Shi:
Steganalysis of YASS. IEEE Trans. Inf. Forensics Secur. 4(3): 369-382 (2009) - [c106]Xi Zhao, Anthony T. S. Ho, Yun Q. Shi:
Image forensics using generalised Benford's Law for accurate detection of unknown JPEG compression in watermarked images. DPS 2009: 1-8 - [c105]Patchara Sutthiwan, Xiao Cai, Yun-Qing Shi, Hong Zhang:
Computer graphics classification based on Markov process model and boosting feature selection technique. ICIP 2009: 2913-2916 - [c104]Guanshuo Xu, Yun-Qing Shi, Wei Su:
Camera brand and model identification using moments of 1-D and 2-D characteristic functions. ICIP 2009: 2917-2920 - [c103]Guanshuo Xu, Shang Gao, Yun-Qing Shi, Ruimin Hu, Wei Su:
Camera-Model Identification Using Markovian Transition Probability Matrix. IWDW 2009: 294-307 - [c102]Patchara Sutthiwan, Jingyu Ye, Yun Q. Shi:
An Enhanced Statistical Approach to Identifying Photorealistic Images. IWDW 2009: 323-335 - [c101]Brian D'Alessandro, Yun Q. Shi:
Mp3 bit rate quality detection through frequency spectrum analysis. MM&Sec 2009: 57-62 - [c100]Rui Yang, Yun-Qing Shi, Jiwu Huang:
Defeating fake-quality MP3. MM&Sec 2009: 117-124 - [e7]Anthony T. S. Ho, Yun Q. Shi, H. J. Kim, Mauro Barni:
Digital Watermarking, 8th International Workshop, IWDW 2009, Guildford, UK, August 24-26, 2009. Proceedings. Lecture Notes in Computer Science 5703, Springer 2009, ISBN 978-3-642-03687-3 [contents] - [e6]Yun Q. Shi:
Transactions on Data Hiding and Multimedia Security IV. Lecture Notes in Computer Science 5510, Springer 2009, ISBN 978-3-642-01756-8 [contents] - 2008
- [j31]Nirwan Ansari, Pitipatana Sakarindr, Ehsan Haghani, Chao Zhang, Aridaman K. Jain, Yun Q. Shi:
Evaluating Electronic Voting Systems Equipped with Voter-Verified Paper Records. IEEE Secur. Priv. 6(3): 30-39 (2008) - [j30]Zhicheng Ni, Yun Q. Shi, Nirwan Ansari, Wei Su, Qibin Sun, Xiao Lin:
Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication. IEEE Trans. Circuits Syst. Video Technol. 18(4): 497-509 (2008) - [j29]Hyoung-Joong Kim, Vasiliy Sachnev, Yun-Qing Shi, Jeho Nam, Hyon-Gon Choo:
A Novel Difference Expansion Transform for Reversible Data Embedding. IEEE Trans. Inf. Forensics Secur. 3(3): 456-465 (2008) - [c99]Haifeng Xiao, Chunhua Chen, Wei Su, John A. Kosinski, Yun Q. Shi:
Data Mining of Modulation Types Using Cyclostationarity-Based Decision Tree. DMIN 2008: 3-9 - [c98]Fangjun Huang, Yun Q. Shi, Jiwu Huang:
A study on security performance of YASS. ICIP 2008: 2084-2087 - [c97]Chunhua Chen, Yun Q. Shi, Wei Su:
A machine learning based scheme for double JPEG compression detection. ICPR 2008: 1-4 - [c96]Wen Chen, Yun Q. Shi, Guorong Xuan, Wei Su:
Computer graphics identification using genetic algorithm. ICPR 2008: 1-4 - [c95]Guorong Xuan, Yun Q. Shi, Peiqi Chai, Xuefeng Tong, Jianzhong Teng, Jue Li:
Reversible binary image data hiding by run-length histogram modification. ICPR 2008: 1-4 - [c94]Chunhua Chen, Yun Q. Shi:
JPEG image steganalysis utilizing both intrablock and interblock correlations. ISCAS 2008: 3029-3032 - [c93]Wen Chen, Yun Q. Shi:
Detection of Double MPEG Compression Based on First Digit Statistics. IWDW 2008: 16-30 - [c92]Jing Dong, Wei Wang, Tieniu Tan, Yun Q. Shi:
Run-Length and Edge Statistics Based Approach for Image Splicing Detection. IWDW 2008: 76-87 - [c91]Yun Q. Shi:
First Digit Law and Its Application to Digital Forensics. IWDW 2008: 448-453 - [c90]Bin Li, Yun Q. Shi, Jiwu Huang:
Steganalysis of YASS. MM&Sec 2008: 139-148 - [c89]Bin Li, Yun Q. Shi, Jiwu Huang:
Detecting doubly compressed JPEG images by using Mode Based First Digit Features. MMSP 2008: 730-735 - [c88]Bin Li, Jiwu Huang, Yun Q. Shi:
Textural features based universal steganalysis. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 681912 - [e5]Yun Q. Shi, Hyoung-Joong Kim, Stefan Katzenbeisser:
Digital Watermarking, 6th International Workshop, IWDW 2007, Guangzhou, China, December 3-5, 2007, Proceedings. Lecture Notes in Computer Science 5041, Springer 2008, ISBN 978-3-540-92237-7 [contents] - [e4]Yun Q. Shi:
Transactions on Data Hiding and Multimedia Security III. Lecture Notes in Computer Science 4920, Springer 2008, ISBN 978-3-540-69016-0 [contents] - 2007
- [c87]Guorong Xuan, Xiuming Zhu, Yun Q. Shi, Peiqi Chai, Xia Cui, Jue Li:
A Novel Bayesian Classifier with Smaller Eigenvalues Reset by Threshold Based on Given Database. ICIAR 2007: 375-386 - [c86]Guorong Xuan, Yun Q. Shi, Zhicheng Ni, Peiqi Chai, Xia Cui, Xuefeng Tong:
Reversible Data Hiding for JPEG Images Based on Histogram Pairs. ICIAR 2007: 715-727 - [c85]Chunhua Chen, Yun Q. Shi, Guorong Xuan:
Steganalyzing Texture Images. ICIP (2) 2007: 153-156 - [c84]Guorong Xuan, Xia Cui, Yun Q. Shi, Wen Chen, Xuefeng Tong, Cong Huang:
JPEG Steganalysis Based on Classwise Non-Principal Components Analysis and Multi-Directional Markov Model. ICME 2007: 903-906 - [c83]Wen Chen, Yun Q. Shi, Guorong Xuan:
Identifying Computer Graphics using HSV Color Model and Statistical Moments of Characteristic Functions. ICME 2007: 1123-1126 - [c82]Yun Q. Shi, Chunhua Chen, Wen Chen, Maala P. Kaundinya:
Effect of Recompression on Attacking JPEG Steganographic Schemes An Experimental Study. ISCAS 2007: 1265-1268 - [c81]Shunquan Tan, Jiwu Huang, Yun Q. Shi:
Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis. IWDW 2007: 112-126 - [c80]Bin Li, Fangjun Huang, Shunquan Tan, Jiwu Huang, Yun Q. Shi:
Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis. IWDW 2007: 143-157 - [c79]Yun Q. Shi, Chunhua Chen, Guorong Xuan, Wei Su:
Steganalysis Versus Splicing Detection. IWDW 2007: 158-172 - [c78]Guorong Xuan, Yun Q. Shi, Peiqi Chai, Xia Cui, Zhicheng Ni, Xuefeng Tong:
Optimum Histogram Pair Based Image Lossless Data Embedding. IWDW 2007: 264-278 - [c77]Yun Q. Shi, Chunhua Chen, Wen Chen:
A natural image model approach to splicing detection. MM&Sec 2007: 51-62 - [c76]Wen Chen, Yun Q. Shi, Wei Su:
Image splicing detection using 2-D phase congruency and statistical moments of characteristic function. Security, Steganography, and Watermarking of Multimedia Contents 2007: 65050R - [c75]Dongdong Fu, Yun Q. Shi, Wei Su:
A generalized Benford's law for JPEG coefficients and its applications in image forensics. Security, Steganography, and Watermarking of Multimedia Contents 2007: 65051L - [e3]Yun Q. Shi:
Transactions on Data Hiding and Multimedia Security II. Lecture Notes in Computer Science 4499, Springer 2007, ISBN 978-3-540-73091-0 [contents] - 2006
- [j28]Hong Zhao, Nirwan Ansari, Yun Q. Shi:
Network Traffic Prediction Using Least Mean Kurtosis. IEICE Trans. Commun. 89-B(5): 1672-1674 (2006) - [j27]Zhicheng Ni, Yun-Qing Shi, Nirwan Ansari, Wei Su:
Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3): 354-362 (2006) - [j26]Dekun Zou, Yun Q. Shi, Zhicheng Ni, Wei Su:
A Semi-Fragile Lossless Digital Watermarking Scheme Based on Integer Wavelet Transform. IEEE Trans. Circuits Syst. Video Technol. 16(10): 1294-1300 (2006) - [j25]Hui Cheng, Xi Min Zhang, Yun Q. Shi, Anthony Vetro, Huifang Sun:
Constant quality rate allocation for FGS coding using composite R-D analysis. IEEE Trans. Multim. 8(2): 405-407 (2006) - [c74]Shunquan Tan, Jiwu Huang, Zhihua Yang, Yun Q. Shi:
Steganalysis of JPEG2000 Lazy-Mode Steganography using the Hilbert-Huang Transform Based Sequential Analysis. ICIP 2006: 101-104 - [c73]Chunhua Chen, Yun Q. Shi, Wen Chen, Guorong Xuan:
Statistical Moments Based Universal Steganalysis using JPEG 2-D Array and 2-D Characteristic Function. ICIP 2006: 105-108 - [c72]Dekun Zou, Yun Q. Shi, Wei Su, Guorong Xuan:
Steganalysis based on Markov Model of Thresholded Prediction-Error Image. ICME 2006: 1365-1368 - [c71]Guorong Xuan, Peiqi Chai, Xiuming Zhu, Qiuming Yao, Cong Huang, Yun Q. Shi, Dongdong Fu:
A Novel Pattern Classification Scheme: Classwise Non-Principal Component Analysis (CNPCA). ICPR (3) 2006: 320-323 - [c70]Guorong Xuan, Xiuming Zhu, Peiqi Chai, Zhenping Zhang, Yun Q. Shi, Dongdong Fu:
Feature Selection based on the Bhattacharyya Distance. ICPR (4) 2006: 957 - [c69]Guorong Xuan, Xiuming Zhu, Peiqi Chai, Zhenping Zhang, Yun Q. Shi, Dongdong Fu:
Feature Selection based on the Bhattacharyya Distance. ICPR (3) 2006: 1232-1235 - [c68]Yun Q. Shi, Chunhua Chen, Wen Chen:
A Markov Process Based Approach to Effective Attacking JPEG Steganography. Information Hiding 2006: 249-264 - [c67]Guorong Xuan, Yun Q. Shi, Cong Huang, Dongdong Fu, Xiuming Zhu, Peiqi Chai, Jianjiong Gao:
Steganalysis Using High-Dimensional Features Derived from Co-occurrence Matrix and Class-Wise Non-Principal Components Analysis (CNPCA). IWDW 2006: 49-60 - [c66]Dongdong Fu, Yun Q. Shi, Wei Su:
Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition. IWDW 2006: 177-187 - [c65]Guorong Xuan, Qiuming Yao, Chengyun Yang, Jianjiong Gao, Peiqi Chai, Yun Q. Shi, Zhicheng Ni:
Lossless Data Hiding Using Histogram Shifting Method Based on Integer Wavelets. IWDW 2006: 323-332 - [c64]Dongdong Fu, Yun Q. Shi, Dekun Zou, Guorong Xuan:
JPEG Steganalysis Using Empirical Transition Matrix in Block DCT Domain. MMSP 2006: 310-313 - [c63]Xiangui Kang, Yun Q. Shi, Jiwu Huang:
Achieving non-ambiguity of quantization-based watermarking. Security, Steganography, and Watermarking of Multimedia Contents 2006: 60720F - [e2]Yun-Qing Shi, Byeungwoo Jeon:
Digital Watermarking, 5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings. Lecture Notes in Computer Science 4283, Springer 2006, ISBN 3-540-48825-1 [contents] - [e1]Yun Q. Shi:
Transactions on Data Hiding and Multimedia Security I. Lecture Notes in Computer Science 4300, Springer 2006, ISBN 3-540-49071-X [contents] - 2005
- [j24]Haiping Lu, Yun Q. Shi, Alex C. Kot, Lihui Chen:
Binary Image Watermarking Through Blurring, Biased Binarization. Int. J. Image Graph. 5(1): 67-88 (2005) - [j23]Hongmei Liu, Jiwu Huang, Yun Q. Shi:
Dwt-Based Video Data Hiding Robust To Mpeg Compression And Frame Loss. Int. J. Image Graph. 5(1): 111-134 (2005) - [j22]Shaoquan Wu, Jiwu Huang, Daren Huang, Yun Q. Shi:
Efficiently self-synchronized audio watermarking for assured audio data transmission. IEEE Trans. Broadcast. 51(1): 69-76 (2005) - [j21]Yun Q. Shi:
Guest Editorial. J. VLSI Signal Process. 41(3): 243-244 (2005) - [j20]Mingui Sun, Yun Q. Shi, Qiang Liu, Robert J. Sclabassi:
Data Integration for Medical Information Management. J. VLSI Signal Process. 41(3): 319-328 (2005) - [c62]Yun Q. Shi, Guorong Xuan, Dekun Zou, Jianjiong Gao, Chengyun Yang, Zhenping Zhang, Peiqi Chai, Wen Chen, Chunhua Chen:
Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network. ICME 2005: 269-272 - [c61]Guorong Xuan, Yun Q. Shi, Chengyun Yang, Yizhan Zhen, Dekun Zou, Peiqi Chai:
Lossless Data Hiding Using Integer Wavelet Transform and Threshold Embedding Technique. ICME 2005: 1520-1523 - [c60]Guorong Xuan, Yun Q. Shi, Jianjiong Gao, Dekun Zou, Chengyun Yang, Zhenping Zhang, Peiqi Chai, Chunhua Chen, Wen Chen:
Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions. Information Hiding 2005: 262-277 - [c59]Zaihe Yu, Yun Q. Shi, Wei Su:
Symbol-rate estimation based on filter bank. ISCAS (2) 2005: 1437-1440 - [c58]Dekun Zou, Yun Q. Shi:
Formatted text document data hiding robust to printing, copying and scanning. ISCAS (5) 2005: 4971-4974 - [c57]Hong Zhao, Nirwan Ansari, Yun Q. Shi:
Layered MPEG Video Transmission over IP DiffServ. ITCC (1) 2005: 63-67 - [c56]Yun Q. Shi, Guorong Xuan, Chengyun Yang, Jianjiong Gao, Zhenping Zhang, Peiqi Chai, Dekun Zou, Chunhua Chen, Wen Chen:
Effective Steganalysis Based on Statistical Moments of Wavelet Characteristic Function. ITCC (1) 2005: 768-773 - [c55]Xiangui Kang, Yun Q. Shi, Jiwu Huang, Wenjun Zeng:
Multi-band Wavelet Based Digital Watermarking Using Principal Component Analysis. IWDW 2005: 139-146 - [c54]Guorong Xuan, Jianjiong Gao, Yun-Qing Shi, Dekun Zou:
Image Steganalysis Based on Statistical Moments of Wavelet Subband Histograms in DFT Domain. MMSP 2005: 1-4 - [c53]Guorong Xuan, Dan Jiang, Hongfei Ji, Yun-Qing Shi, Dekun Zou, Liansheng Liu, Heisheng Liu, Weichao Bai:
Identity Verification System Using Data Hiding and Fingerprint Recognition. MMSP 2005: 1-4 - [c52]Guorong Xuan, Zhenping Zhang, Peiqi Chai, Yun-Qing Shi, Dongdong Fu:
A Feature Selection Based on Minimum Upper Bound of Bayes Error. MMSP 2005: 1-4 - 2004
- [j19]Xi Min Zhang, Yan Qiu Chen, Nirwan Ansari, Yun Q. Shi:
Mini-max initialization for function approximation. Neurocomputing 57: 389-409 (2004) - [j18]Haiping Lu, A. C. Kot, Yun Q. Shi:
Distance-reciprocal distortion measure for binary document images. IEEE Signal Process. Lett. 11(2): 228-231 (2004) - [c51]Jiwu Huang, Junquan Hu, Daren Huang, Yun Q. Shi:
Improve security of fragile watermarking via parameterized wavelet. ICIP 2004: 721-724 - [c50]Xiangui Kang, Jiwu Huang, Yun Q. Shi:
Improve robustness of image watermarking via adaptive receiving. ICIP 2004: 2343-2346 - [c49]Zhishou Zhang, Gang Qiu, Qibin Sun, Xiao Lin, Zhicheng Ni, Yun Q. Shi:
A unified authentication framework for JPEG2000. ICME 2004: 915-918 - [c48]Zhicheng Ni, Yun Q. Shi, Nirwan Ansari, Wei Su, Qibin Sun, Xiao Lin:
Robust lossless image data hiding. ICME 2004: 2199-2202 - [c47]Guorong Xuan, Yun Q. Shi, Zhicheng Ni, Jidong Chen, Chengyun Yang, Yizhan Zhen, Junxiang Zheng:
High capacity lossless data hiding based on integer wavelet transform. ISCAS (2) 2004: 29-32 - [c46]Yun Q. Shi, Zhicheng Ni, Dekun Zou, Changyin Liang, Guorong Xuan:
Lossless data hiding: fundamentals, algorithms and applications. ISCAS (2) 2004: 33-36 - [c45]Shaoquan Wu, Jiwu Huang, Daren Huang, Yun Q. Shi:
Self-synchronized audio watermark in DWT domain. ISCAS (5) 2004: 712-715 - [c44]Yun Q. Shi:
Reversible Data Hiding. IWDW 2004: 1-12 - [c43]Guorong Xuan, Junxiang Zheng, Chengyun Yang, Yun Q. Shi, Dekun Zou, Liansheng Liu, Weichao Bai:
A Secure Internet-Based Personal Identity Verification System Using Lossless Watermarking and Fingerprint Recognition. IWDW 2004: 55-65 - [c42]Guorong Xuan, Chengyun Yang, Yizhan Zhen, Yun Q. Shi, Zhicheng Ni:
Reversible Data Hiding Using Integer Wavelet Transform and Companding Technique. IWDW 2004: 115-124 - [c41]Dekun Zou, Yun Q. Shi, Zhicheng Ni:
A semi-fragile lossless digital watermarking scheme based on integer wavelet transform. MMSP 2004: 195-198 - [c40]Guorong Xuan, Chengyun Yang, Yizhan Zhen, Yun Q. Shi, Zhicheng Ni:
Reversible data hiding based on wavelet spread spectrum. MMSP 2004: 211-214 - 2003
- [j17]Xi Min Zhang, Anthony Vetro, Yun Q. Shi, Huifang Sun:
Constant quality constrained rate allocation for FGS-coded video. IEEE Trans. Circuits Syst. Video Technol. 13(2): 121-130 (2003) - [j16]Xiangui Kang, Jiwu Huang, Yun Q. Shi, Yan Lin:
A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Trans. Circuits Syst. Video Technol. 13(8): 776-786 (2003) - [c39]Hui Cheng, Xi Min Zhang, Yun-Qing Shi, Anthony Vetro, Huifang Sun:
Rate allocation for FGS coded video using composite R-D analysis. ICME 2003: 41-44 - [c38]Dekun Zou, Chai Wah Wu, Guorong Xuan, Yun-Qing Shi:
A content-based image authentication system with lossless data hiding. ICME 2003: 213-216 - [c37]Limin Gu, Jiwu Huang, Yun Q. Shi:
Analysis of the role played by error correcting coding in robust watermarking. ISCAS (3) 2003: 798-801 - [c36]Zhicheng Ni, Yun Q. Shi, Nirwan Ansari, Wei Su:
Reversible data hiding. ISCAS (2) 2003: 912-915 - [c35]Hongmei Liu, Zhang Zhefeng, Jiwu Huang, Huang Xialing, Yun Q. Shi:
A high capacity distortion-free data hiding algorithm for palette image. ISCAS (2) 2003: 916-919 - [c34]Yun Q. Shi, Zhicheng Ni, Nirwan Ansari, Jiwu Huang:
2-D and 3-D successive packing interleaving techniques and their applications to image and video data hiding. ISCAS (2) 2003: 924-927 - [c33]Yanmei Fang, Jiwu Huang, Yun Q. Shi:
Image watermarking algorithm applying CDMA. ISCAS (2) 2003: 948-951 - [c32]Hong Zhao, Nirwan Ansari, Yun Q. Shi:
Self-similar Traffic Prediction Using Least Mean Kurtosis. ITCC 2003: 352-355 - [c31]Xiangui Kang, Jiwu Huang, Yun Q. Shi, Jianxiang Zhu:
Robust Watermarking with Adaptive Receiving. IWDW 2003: 396-407 - 2002
- [j15]Nirwan Ansari, Hai Liu, Yun Q. Shi, Hong Zhao:
On modeling MPEG video traffics. IEEE Trans. Broadcast. 48(4): 337-347 (2002) - [j14]Jiwu Huang, Yun Q. Shi:
Reliable information bit hiding. IEEE Trans. Circuits Syst. Video Technol. 12(10): 916-920 (2002) - [c30]Haiping Lu, Xuxia Shi, Yun Q. Shi, Alex C. Kot, Lihui Chen:
Watermark embedding in DC components of DCT for binary images. IEEE Workshop on Multimedia Signal Processing 2002: 300-303 - [c29]Guorong Xuan, Jidong Chen, Jiang Zhu, Yun Q. Shi, Zhicheng Ni, Wei Su:
Lossless data hiding based on integer wavelet transform. IEEE Workshop on Multimedia Signal Processing 2002: 312-315 - [c28]Constantine N. Manikopoulos, Yun-Qing Shi, Sui Song, Zheng Zhang, Zhicheng Ni, Dekun Zou:
Detection of block DCT-based steganography in gray-scale images. IEEE Workshop on Multimedia Signal Processing 2002: 355-358 - [c27]Mingui Sun, Yun-Qing Shi, Qiang Liu, Robert J. Sclabassi:
Sample domain integration of medical data for multimedia diagnosis. IEEE Workshop on Multimedia Signal Processing 2002: 363-366 - [c26]Haiping Lu, Jian Wang, Alex C. Kot, Yun Q. Shi:
An Objective Distortion Measure for Binary Document Images Based on Human Visual Perceptio. ICPR (4) 2002: 239-242 - [c25]X. Zhang, Yun Q. Shi, Hangjun Chen, Alexander M. Haimovich, Anthony Vetro, Huifang Sun:
Successive packing based interleaver design for turbo codes. ISCAS (1) 2002: 17-20 - [c24]Hong Zhao, Nirwan Ansari, Yun Q. Shi:
A Fast Non-Linear Adaptive Algorithm for Video Traffic Prediction. ITCC 2002: 54-58 - [c23]Junquan Hu, Jiwu Huang, Daren Huang, Yun Q. Shi:
A DWT-Based Fragile Watermarking Tolerant of JPEG Compression. IWDW 2002: 179-188 - [c22]Xiangui Kang, Jiwu Huang, Yun Q. Shi:
An Image Watermarking Algorithm Robust to Geometric Distortion. IWDW 2002: 212-223 - [c21]Xi Min Zhang, Anthony Vetro, Yun-Qing Shi, Huifang Sun:
Constant-quality constrained-rate allocation for FGS video coded bitstreams. VCIP 2002: 817-827 - 2001
- [j13]Hai Liu, Nirwan Ansari, Yun Q. Shi:
Modeling MPEG Coded Video Traffic by Markov-Modulated Self-Similar Processes. J. VLSI Signal Process. 29(1-2): 101-113 (2001) - [c20]Zhen Guo, Xi Min Zhang, Jacob Savir, Yun-Qing Shi:
On Test and Characterization of Analog Linear Time-Invariant Circuits Using Neural Networks. Asian Test Symposium 2001: 338-343 - [c19]Hai Liu, Nirwan Ansari, Yun Q. Shi:
The tale of a simple accurate MPEG video traffic model. ICC 2001: 1042-1046 - [c18]Jiwu Huang, Yun Q. Shi:
Embedding gray level images. ISCAS (5) 2001: 239-242 - [c17]Hai Liu, Nirwan Ansari, Yun Q. Shi:
On-Line Dynamic Bandwidth Allocation For Vbr Video Transmission. ITCC 2001: 354-358 - 2000
- [j12]Jiwu Huang, Yun Q. Shi, Yi Shi:
Embedding image watermarks in dc components. IEEE Trans. Circuits Syst. Video Technol. 10(6): 974-979 (2000) - [c16]Hai Liu, Nirwan Ansari, Yun Q. Shi:
A Simple Model for MPEG Video Traffic. IEEE International Conference on Multimedia and Expo (I) 2000: 553-556 - [c15]George F. Elmasry, Yun Q. Shi:
2-D Interleaving for Enhancing the Robustness of Watermark Signals Embedded in Still Images. IEEE International Conference on Multimedia and Expo (II) 2000: 731-734 - [c14]Zhicheng Ni, Eric Sung, Yun Q. Shi:
Enhancing Robustness of Digital Watermarking Against Geometric Attack based on Fractal Transform. IEEE International Conference on Multimedia and Expo (II) 2000: 1033-1036 - [c13]George F. Elmasry, Yun Q. Shi:
3-D Interleaving for Enhancing the Robustness of Watermark Signals Embedded in Video Sequences. IEEE International Conference on Multimedia and Expo (II) 2000: 1037- - [c12]Hai Liu, Nirwan Ansari, Yun Q. Shi:
Dynamic Bandwidth Allocation for VBR Video Traffic Based on Scene Change Identification. ITCC 2000: 284-288
1990 – 1999
- 1999
- [c11]Hai Liu, Nirwan Ansari, Yun Q. Shi:
MPEG Video Traffic Models: Sequentially Modulated Self-Similar Processes. Broadband Communications 1999: 63-72 - [c10]Hai Liu, Nirwan Ansari, Yun Q. Shi:
Modeling VBR video traffic by Markov-modulated self-similar processes. MMSP 1999: 363-368 - [c9]George F. Elmasry, Yun-Qing Shi:
Maximum-likelihood sequence decoding of digital image watermarking. Security and Watermarking of Multimedia Contents 1999: 425-436 - [c8]George F. Elmasry, Yun Q. Shi:
MAP symbol decoding of arithmetic coding with embedded channel coding. WCNC 1999: 988-992 - 1998
- [j11]Yun Q. Shi:
Guest Editorial. Int. J. Imaging Syst. Technol. 9(4): 189-191 (1998) - [j10]Yun Q. Shi, S. Lin, Ya-Qin Zhang:
Optical flow-based motion compensation algorithm for very low-bit-rate video coding. Int. J. Imaging Syst. Technol. 9(4): 230-237 (1998) - [j9]J. N. Pan, Yun Q. Shi, Chang-Qing Shu:
Correlation-feedback technique in optical flow determination. IEEE Trans. Image Process. 7(7): 1061-1067 (1998) - [c7]Jiwu Huang, George F. Elmasry, Yun Q. Shi:
Power constrained multiple signaling in digital image watermarking. MMSP 1998: 388-393 - 1997
- [j8]Yun-Qing Shi, X. Xia:
A thresholding multiresolution block matching algorithm. IEEE Trans. Circuits Syst. Video Technol. 7(2): 437-440 (1997) - [c6]Shu Lin, Yun Q. Shi, Ya-Qin Zhang:
An optical flow based motion compensation algorithm for very low bit-rate video coding. ICASSP 1997: 2869-2872 - [c5]Shu Lin, Yun Q. Shi:
Region-based adaptive DWT video coding using dense motion field. MMSP 1997: 175-180 - 1994
- [j7]Yun Q. Shi, Chang-Qing Shu, J. N. Pan:
Unified optical flow field approach to motion analysis from a sequence of stereo images. Pattern Recognit. 27(12): 1577-1590 (1994) - [j6]Boris T. Polyak, Yakov Z. Tsypkin, Yunqing Shi, K. K. Yen, C. M. Chen:
Comments on "Two necessary conditions for a complex polynomial to be strictly Hurwitz and their applications in robust stability analysis" [with reply]. IEEE Trans. Autom. Control. 39(5): 1147-1148 (1994) - [c4]J. N. Pan, Yun Q. Shi, Chang-Qing Shu:
A Kalman Filter in Motion Analysis from Stereo Image Sequences. ICIP (3) 1994: 63-67 - [c3]J. N. Pan, Yun Q. Shi, Chang-Qing Shu:
Correlation-feedback Approach to Computation of Optical Flow. ISCAS 1994: 33-36 - 1993
- [j5]Chang-Qing Shu, Yun Q. Shi:
Direct recovering of Nth order surface structure using unified optical flow field. Pattern Recognit. 26(8): 1137-1148 (1993) - [j4]Yunqing Shi, K. K. Yen, C. M. Chen:
Two necessary conditions for a complex polynomial to be strictly Hurwitz and their applications in robust stability analysis. IEEE Trans. Autom. Control. 38(1): 125-128 (1993) - 1991
- [j3]Yun Qing Shi:
Comments on 'Boundary implications of stability and positivity properties of multidimensional systems' by S. Basu. Proc. IEEE 79(12): 1769-1770 (1991) - [j2]Chang-Qing Shu, Yun Q. Shi:
On unified optical flow field. Pattern Recognit. 24(6): 579-586 (1991)
1980 – 1989
- 1988
- [j1]Nirmal Kumar Bose, Yun-Qing Shi:
2-D Wilson spectral factorization. IEEE Trans. Acoust. Speech Signal Process. 36(1): 125-128 (1988) - [c2]Yun Q. Shi, Nirmal Kumar Bose:
Nonnegativity constrained spectral factorization for image reconstruction from autocorrelation data. ICASSP 1988: 1766-1769 - 1987
- [c1]Nirmal Kumar Bose, Yun Q. Shi:
Iterative schemes for two-dimensional spectral factorization. ICASSP 1987: 1985-1986
Coauthor Index
aka: Hyoung-Joong Kim
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 20:06 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint