The SCEAS System
Navigation Menu

Search the dblp DataBase


Sheng-He Sun: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. J. S. Pan, Z. M. Lu, S. H. Sun
    VQ Image Coding Using Sub-Vector Techniques. [Citation Graph (0, 0)][DBLP]
    ICIP, 2000, pp:- [Conf]
  2. Yu-Long Qiao, Jeng-Shyang Pan, Sheng-He Sun
    Improved partial distance search for k nearest-neighbor classification. [Citation Graph (0, 0)][DBLP]
    ICME, 2004, pp:1275-1278 [Conf]
  3. Qiong Li, Xiamu Niu, Zhifang Wang, Yuhua Jiao, Sheng-He Sun
    A Verifiable Fingerprint Vault Scheme. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1072-1078 [Conf]
  4. Wang Liu, Sheng-He Sun
    A Robust and Invisible Watermarking of 3D Triangle Meshes. [Citation Graph (0, 0)][DBLP]
    KES (4), 2005, pp:881-888 [Conf]
  5. Yu-Long Qiao, Jeng-Shyang Pan, Sheng-He Sun
    An Experimental Comparison on Gabor Wavelet and Wavelet Frame Based Features for Image Retrieval. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:353-358 [Conf]
  6. Hao-Xian Wang, Yue-Nan Li, Zhe-Ming Lu, Sheng-He Sun
    Compressed Domain Video Watermarking in Motion Vector. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:580-586 [Conf]
  7. Longjiang Yu, Xiamu Niu, Sheng-He Sun
    SVG-Based Countermeasure to Geometric Attack. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1129-1133 [Conf]
  8. Bin Yan, Zhe-Ming Lu, Sheng-He Sun, Jeng-Shyang Pan
    Speech Authentication by Semi-fragile Watermarking. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:497-504 [Conf]
  9. Xin-guang Zou, Qiong Li, Sheng-He Sun, Xiamu Niu
    The Research on Information Hiding Based on Command Sequence of FTP Protocol. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1079-1085 [Conf]
  10. J. S. Pan, Z. M. Lu, S. H. Sun
    Image Coding Using SMVQ with Two-level Block Classifier. [Citation Graph (0, 0)][DBLP]
    ISMSE, 2000, pp:276-282 [Conf]
  11. Bian Yang, Martin Schmucker, Wolfgang Funk, Christoph Busch, Sheng-He Sun
    Integer DCT-based reversible watermarking for images using companding technique. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:405-415 [Conf]
  12. Bian Yang, Martin Schmucker, Xiamu Niu, Christoph Busch, Sheng-He Sun
    Integer-DCT-based reversible image watermarking by adaptive coefficient modification. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:218-229 [Conf]
  13. Longjiang Yu, Martin Schmucker, Christoph Busch, Sheng-He Sun
    Cumulant-based image fingerprints. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:68-75 [Conf]
  14. Xin-guang Zou, Sheng-He Sun
    Information Hiding Using Secret Sharing Scheme. [Citation Graph (0, 0)][DBLP]
    ICICIC (1), 2006, pp:484-487 [Conf]
  15. Wang Liu, Sheng-He Sun
    Rotation, Scaling and Translation Invariant Blind Digital Watermarking for 3D Mesh Models. [Citation Graph (0, 0)][DBLP]
    ICICIC (3), 2006, pp:463-466 [Conf]
  16. Yu-Long Qiao, Meng Li, Zhe-Ming Lu, Sheng-He Sun
    Gabor Filter Based Text Extraction from Digital Document Images. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:297-300 [Conf]
  17. Xin-guang Zou, Sheng-He Sun
    Analysis of Anonymity on the Signatures of Knowledge. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:621-624 [Conf]
  18. Longjiang Yu, Sheng-He Sun
    Image Robust Hashing Based on DCT Sign. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:131-134 [Conf]
  19. Longjiang Yu, Sheng-He Sun
    Slantlet transform-based image fingerprints. [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:41-43 [Conf]
  20. Zhe-Ming Lu, Bin Yan, Sheng-He Sun
    Watermarking Combined with CELP Speech Coding for Authentication. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:2, pp:330-334 [Journal]
  21. Longjiang Yu, Xiamu Niu, Sheng-He Sun
    Print-and-scan model and the watermarking countermeasure. [Citation Graph (0, 0)][DBLP]
    Image Vision Comput., 2005, v:23, n:9, pp:807-814 [Journal]
  22. Tsong-Yi Chen, Xiao-Dan Mei, Jeng-Shyang Pan, Sheng-He Sun
    Optimization of HMM by the Tabu Search Algorithm. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2004, v:20, n:5, pp:949-957 [Journal]
  23. Zhe-Ming Lu, Dian-guo Xu, Sheng-He Sun
    Multipurpose image watermarking algorithm based on multistage vector quantization. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 2005, v:14, n:6, pp:822-831 [Journal]
  24. Jeng-Shyang Pan, Zhe-Ming Lu, Sheng-He Sun
    An efficient encoding algorithm for vector quantization based on subvector technique. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 2003, v:12, n:3, pp:265-270 [Journal]
  25. Hsiang-Cheh Huang, Jeng-Shyang Pan, Zhe-Ming Lu, Sheng-He Sun, Hsueh-Ming Hang
    Vector quantization based on genetic simulated annealing. [Citation Graph (0, 0)][DBLP]
    Signal Processing, 2001, v:81, n:7, pp:1513-1523 [Journal]
  26. Zhao-Li Zhang, Sheng-He Sun, Fu-Chun Zheng
    Image fusion based on median filters and SOFM neural networks: : a three-step scheme. [Citation Graph (0, 0)][DBLP]
    Signal Processing, 2001, v:81, n:6, pp:1325-1330 [Journal]
  27. Bian Yang, Martin Schmucker, Christoph Busch, Xiamu Niu, Sheng-He Sun
    Approaching optimal value expansion for reversible watermarking. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2005, pp:95-102 [Conf]

  28. Research on Video Watermarking Scheme Based on Chaos, DWT and JND Model. [Citation Graph (, )][DBLP]

  29. 3D Digital Patching Using Height-Map of Broken Surface. [Citation Graph (, )][DBLP]

  30. 3D Laser Scanning Data Segmentation Based on Region Dilation Strategy. [Citation Graph (, )][DBLP]

  31. Spectrum Shaped Dither Modulation Watermarking for Correlated Host Signal. [Citation Graph (, )][DBLP]

  32. Non-redundant VQ channel coding using modified tabu search approach with simulated annealing. [Citation Graph (, )][DBLP]

  33. A fast image coding algorithm using variable-rate mean-match correlation vector quantization. [Citation Graph (, )][DBLP]

  34. A Fractal Watermarking Scheme for Image in DWT Domain. [Citation Graph (, )][DBLP]

  35. A Robust 3D Model Watermarking Scheme Based on Feature Recognition. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002