|
Search the dblp DataBase
Xiangwei Kong:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Xiangwei Kong, Rufeng Chu, Xiaohui Ba, Ting Zhang, Deli Yang
A Perception Evaluation Scheme for Steganography. [Citation Graph (0, 0)][DBLP] IDEAL, 2003, pp:426-430 [Conf]
- Huajian Liu, Xiangwei Kong, Xiangdong Kong, Yu Liu
Content based color image adaptive watermarking scheme. [Citation Graph (0, 0)][DBLP] ISCAS (2), 2001, pp:41-44 [Conf]
- Xiangwei Kong, Chen Feishi, Liu Zhiyuan, Zong Shaoxiang
Estimation of Sea Ice Movement Using Locally Parallel Matching Model. [Citation Graph (0, 0)][DBLP] KES, 2003, pp:638-645 [Conf]
- Xiangwei Kong, Yu Liu, Huajian Liu
Adaptive Video Watermarking Scheme. [Citation Graph (0, 0)][DBLP] IEEE Pacific Rim Conference on Multimedia, 2001, pp:933-938 [Conf]
- Xiangwei Kong, Ting Zhang, Xingang You, Deli Yang
A New Steganalysis Approach Based on Both Complexity Estimate and Statistical Filter. [Citation Graph (0, 0)][DBLP] IEEE Pacific Rim Conference on Multimedia, 2002, pp:434-441 [Conf]
- Yanqing Guo, Weiwei Quan, Yanwu Zhu, Xingang You, Xiangwei Kong
Effects on Statistical Features for Image by Quantization. [Citation Graph (0, 0)][DBLP] IIH-MSP, 2006, pp:631-634 [Conf]
- Xiangwei Kong, Yu Liu, Huajian Liu, Deli Yang
Object watermarks for digital images and video. [Citation Graph (0, 0)][DBLP] Image Vision Comput., 2004, v:22, n:8, pp:583-595 [Journal]
- Xiangwei Kong, Renying Wang, Guoping Li
Fuzzy clustering algorithms based on resolution and their application in image compression. [Citation Graph (0, 0)][DBLP] Pattern Recognition, 2002, v:35, n:11, pp:2439-2444 [Journal]
Detecting Image Tampering Using Feature Fusion. [Citation Graph (, )][DBLP]
Printer forensics based on page document's geometric distortion. [Citation Graph (, )][DBLP]
A New Feature-Based Method for Source Camera Identification. [Citation Graph (, )][DBLP]
Biometrics-based identifiers for digital identity management. [Citation Graph (, )][DBLP]
Information Security Game Analysis with Penalty Parameter. [Citation Graph (, )][DBLP]
Information Security Problem Research Based on Game Theory. [Citation Graph (, )][DBLP]
A Task-Role Based Access Control Model with Multi-Constraints. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|