The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Shuozhong Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xinpeng Zhang, Shuozhong Wang
    Analysis of Parity Assignment Steganography in Palette Images. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1025-1031 [Conf]
  2. Xinpeng Zhang, Shuozhong Wang
    Watermarking Protocol Compatible with Secret Algorithms for Resisting Invertibility Attack. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1134-1144 [Conf]
  3. Xinpeng Zhang, Shuozhong Wang
    Information capacity of quantization steganography in the presence of active attack. [Citation Graph (0, 0)][DBLP]
    MMM, 2006, pp:- [Conf]
  4. Shuozhong Wang, Xinpeng Zhang, Kaiwen Zhang
    Data Hiding in Digital Audio by Frequency Domain Dithering. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:383-394 [Conf]
  5. Kaiwen Zhang, Shuozhong Wang, Xinpeng Zhang
    Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:360-370 [Conf]
  6. Xinpeng Zhang, Shuozhong Wang, Kaiwen Zhang
    Steganography with Least Histogram Abnormality. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:395-406 [Conf]
  7. Xinpeng Zhang, Shuozhong Wang, Kaiwen Zhang
    Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:407-418 [Conf]
  8. Huaiqing Wang, Shuozhong Wang
    Cyber warfare: steganography vs. steganalysis. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:10, pp:76-82 [Journal]
  9. Xinpeng Zhang, Shuozhong Wang
    Invertibility attack against watermarking based on forged algorithm and a countermeasure. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition Letters, 2004, v:25, n:8, pp:967-973 [Journal]
  10. Xinpeng Zhang, Shuozhong Wang
    Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition Letters, 2004, v:25, n:3, pp:331-339 [Journal]
  11. Xinpeng Zhang, Shuozhong Wang
    Watermarking scheme capable of resisting attacks based on availability of inserter. [Citation Graph (0, 0)][DBLP]
    Signal Processing, 2002, v:82, n:11, pp:1801-1804 [Journal]

  12. Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes. [Citation Graph (, )][DBLP]


  13. Fragile Watermarking Scheme with Extensive Content Restoration Capability. [Citation Graph (, )][DBLP]


  14. Perceptual Similarity Metric Resilient to Rotation for Application in Robust Image Hashing. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002