The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Xiangwei Kong: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xiangwei Kong, Rufeng Chu, Xiaohui Ba, Ting Zhang, Deli Yang
    A Perception Evaluation Scheme for Steganography. [Citation Graph (0, 0)][DBLP]
    IDEAL, 2003, pp:426-430 [Conf]
  2. Huajian Liu, Xiangwei Kong, Xiangdong Kong, Yu Liu
    Content based color image adaptive watermarking scheme. [Citation Graph (0, 0)][DBLP]
    ISCAS (2), 2001, pp:41-44 [Conf]
  3. Xiangwei Kong, Chen Feishi, Liu Zhiyuan, Zong Shaoxiang
    Estimation of Sea Ice Movement Using Locally Parallel Matching Model. [Citation Graph (0, 0)][DBLP]
    KES, 2003, pp:638-645 [Conf]
  4. Xiangwei Kong, Yu Liu, Huajian Liu
    Adaptive Video Watermarking Scheme. [Citation Graph (0, 0)][DBLP]
    IEEE Pacific Rim Conference on Multimedia, 2001, pp:933-938 [Conf]
  5. Xiangwei Kong, Ting Zhang, Xingang You, Deli Yang
    A New Steganalysis Approach Based on Both Complexity Estimate and Statistical Filter. [Citation Graph (0, 0)][DBLP]
    IEEE Pacific Rim Conference on Multimedia, 2002, pp:434-441 [Conf]
  6. Yanqing Guo, Weiwei Quan, Yanwu Zhu, Xingang You, Xiangwei Kong
    Effects on Statistical Features for Image by Quantization. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:631-634 [Conf]
  7. Xiangwei Kong, Yu Liu, Huajian Liu, Deli Yang
    Object watermarks for digital images and video. [Citation Graph (0, 0)][DBLP]
    Image Vision Comput., 2004, v:22, n:8, pp:583-595 [Journal]
  8. Xiangwei Kong, Renying Wang, Guoping Li
    Fuzzy clustering algorithms based on resolution and their application in image compression. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 2002, v:35, n:11, pp:2439-2444 [Journal]

  9. Detecting Image Tampering Using Feature Fusion. [Citation Graph (, )][DBLP]


  10. Printer forensics based on page document's geometric distortion. [Citation Graph (, )][DBLP]


  11. A New Feature-Based Method for Source Camera Identification. [Citation Graph (, )][DBLP]


  12. Biometrics-based identifiers for digital identity management. [Citation Graph (, )][DBLP]


  13. Information Security Game Analysis with Penalty Parameter. [Citation Graph (, )][DBLP]


  14. Information Security Problem Research Based on Game Theory. [Citation Graph (, )][DBLP]


  15. A Task-Role Based Access Control Model with Multi-Constraints. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002