The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Qibin Sun: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Qibin Sun, Qi Tian, Shih-Fu Chang
    A robust and secure media signature scheme for JPEG images. [Citation Graph (0, 0)][DBLP]
    IEEE Workshop on Multimedia Signal Processing, 2002, pp:296-299 [Conf]
  2. Qibin Sun
    Towards Media Semantics: An I2R Perspective. [Citation Graph (0, 0)][DBLP]
    CIVR, 2005, pp:60- [Conf]
  3. Qibin Sun, Weimin Huang, Jiankang Wu
    Face Detection Based on Color and Local Symmetry Information. [Citation Graph (0, 0)][DBLP]
    FG, 1998, pp:130-135 [Conf]
  4. Junli Yuan, Chi-Hung Chi, Qibin Sun
    Exploiting Fine Grained Parallelism for Acceleration of Web Retrieval. [Citation Graph (0, 0)][DBLP]
    Human.Society@Internet, 2005, pp:125-134 [Conf]
  5. Zhi Li, Qibin Sun, Yong Lian, Daniele D. Giusto
    A Secure Image-Based Authentication Scheme for Mobile Devices. [Citation Graph (0, 0)][DBLP]
    ICIC (2), 2005, pp:751-760 [Conf]
  6. Dajun He, Qibin Sun
    A RST resilient object-based video watermarking scheme. [Citation Graph (0, 0)][DBLP]
    ICIP, 2004, pp:737-740 [Conf]
  7. Qibin Sun, Shih-Fu Chang
    Semi-fragile image authentication using generic wavelet domain features and ECC. [Citation Graph (0, 0)][DBLP]
    ICIP (2), 2002, pp:901-904 [Conf]
  8. Qibin Sun, Shih-Fu Chang, Kurato Maeno, Masayuki Suto
    A quantitative semi-fragile JPEG2000 image authentication system. [Citation Graph (0, 0)][DBLP]
    ICIP (2), 2002, pp:921-924 [Conf]
  9. Shuiming Ye, Qibin Sun, Ee-Chien Chang
    Edge directed filter based error concealment for wavelet-based images. [Citation Graph (0, 0)][DBLP]
    ICIP, 2004, pp:809-812 [Conf]
  10. Zhishou Zhang, Qibin Sun, Wai-Choong Wong
    A novel lossy-to-lossless watermarking scheme for JEPG2000 images. [Citation Graph (0, 0)][DBLP]
    ICIP, 2004, pp:573-576 [Conf]
  11. Dajun He, Qibin Sun
    A practical print-scan resilient watermarking scheme. [Citation Graph (0, 0)][DBLP]
    ICIP (1), 2005, pp:257-260 [Conf]
  12. Rong Zhang, Qibin Sun, Wai-Choong Wong
    A BPGC-based scalable image entropy coder resilient to errors. [Citation Graph (0, 0)][DBLP]
    ICIP (2), 2005, pp:742-745 [Conf]
  13. Zixiang Yang, Wei Tsang Ooi, Qibin Sun
    Hierarchical, non-uniform locality sensitive hashing and its application to video identification. [Citation Graph (0, 0)][DBLP]
    ICME, 2004, pp:743-746 [Conf]
  14. Zhicheng Ni, Yun Q. Shi, Nirwan Ansari, Wei Su, Qibin Sun, Xiao Lin
    Robust lossless image data hiding. [Citation Graph (0, 0)][DBLP]
    ICME, 2004, pp:2199-2202 [Conf]
  15. Qibin Sun, Shuiming Ye, Ching-Yung Lin, Shih-Fu Chang
    A crypto signature scheme for image authentication over wireless channel. [Citation Graph (0, 0)][DBLP]
    ICME, 2004, pp:1931-1934 [Conf]
  16. Zhishou Zhang, Gang Qiu, Qibin Sun, Xiao Lin, Zhicheng Ni, Yun Q. Shi
    A unified authentication framework for JPEG2000. [Citation Graph (0, 0)][DBLP]
    ICME, 2004, pp:915-918 [Conf]
  17. Shuiming Ye, Qibin Sun, Ee-Chien Chang
    Error concealment for JPEG2000 images based on orthogonal edge directed filters. [Citation Graph (0, 0)][DBLP]
    ICME, 2004, pp:1663-1666 [Conf]
  18. Gang Qiu, Pina Marziliano, Anthony T. S. Ho, Dajun He, Qibin Sun
    A Hybrid Watermarking Scheme for H.264/AVC Video. [Citation Graph (0, 0)][DBLP]
    ICPR (4), 2004, pp:865-869 [Conf]
  19. Dajun He, Zhiyong Huang, Ruihua Ma, Qibin Sun
    Feature difference analysis in video authentication system. [Citation Graph (0, 0)][DBLP]
    ISCAS (5), 2004, pp:716-719 [Conf]
  20. Dajun He, Qibin Sun, Qi Tian
    A semi-fragile object based video authentication system. [Citation Graph (0, 0)][DBLP]
    ISCAS (3), 2003, pp:814-817 [Conf]
  21. Tian-Tsong Ng, Shih-Fu Chang, Qibin Sun
    Blind detection of photomontage using higher order statistics. [Citation Graph (0, 0)][DBLP]
    ISCAS (5), 2004, pp:688-691 [Conf]
  22. Shuiming Ye, Xinggang Lin, Qibin Sun
    Content based error detection and concealment for image transmission over wireless channel. [Citation Graph (0, 0)][DBLP]
    ISCAS (2), 2003, pp:368-371 [Conf]
  23. Shuiming Ye, Qibin Sun, Ee-Chien Chang
    Error resilient content-based image authentication over wireless channel. [Citation Graph (0, 0)][DBLP]
    ISCAS (3), 2005, pp:2707-2710 [Conf]
  24. Junli Yuan, Qibin Sun
    An Efficient Mechanism for Video Streaming over Wide-Area Networks. [Citation Graph (0, 0)][DBLP]
    ISM, 2006, pp:465-474 [Conf]
  25. Junli Yuan, Chi-Hung Chi, Qibin Sun
    Modeling Retrieval Parallelism in Web Content Delivery. [Citation Graph (0, 0)][DBLP]
    ISWS, 2005, pp:45-51 [Conf]
  26. Qibin Sun, Peirong Feng, Robert H. Deng
    An Optical Watermarking Solution for Authenticating Printed Documents. [Citation Graph (0, 0)][DBLP]
    ITCC, 2001, pp:65-70 [Conf]
  27. Shuiming Ye, Qibin Sun, Ee-Chien Chang
    Error Resilient Image Authentication Using Feature Statistical and Spatial Properties. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:461-472 [Conf]
  28. Yongwei Zhu, Kai Chen, Qibin Sun
    Multimodal content-based structure analysis of karaoke music. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 2005, pp:638-647 [Conf]
  29. Chuohao Yeo, Yong-Wei Zhu, Qibin Sun, Shih-Fu Chang
    A Framework for Sub-Window Shot Detection. [Citation Graph (0, 0)][DBLP]
    MMM, 2005, pp:84-91 [Conf]
  30. Junli Yuan, Hung Chi, Qibin Sun
    A more precise model for web retrieval. [Citation Graph (0, 0)][DBLP]
    WWW (Special interest tracks and posters), 2005, pp:926-927 [Conf]
  31. Qibin Sun
    Understanding Multimedia Security. [Citation Graph (0, 0)][DBLP]
    IEEE MultiMedia, 2005, v:12, n:4, pp:88-89 [Journal]
  32. Qibin Sun, Shuiming Ye, Ching-Yung Lin, Shih-Fu Chang
    A Crypto Signature Scheme For Image Authentication Over Wireless Channel. [Citation Graph (0, 0)][DBLP]
    Int. J. Image Graphics, 2005, v:5, n:1, pp:135-148 [Journal]
  33. Kurato Maeno, Qibin Sun, Shih-Fu Chang, Masayuki Suto
    New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Multimedia, 2006, v:8, n:1, pp:32-45 [Journal]
  34. Qibin Sun, Shih-Fu Chang
    A secure and robust digital signature scheme for JPEG2000 image authentication. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Multimedia, 2005, v:7, n:3, pp:480-494 [Journal]
  35. Sheng Gao, Qibin Sun
    A Generalized Discriminative Muitiple Instance Learning for Multimedia Semantic Concept Detection. [Citation Graph (0, 0)][DBLP]
    ICIP, 2006, pp:2901-2904 [Conf]
  36. Zhishou Zhang, Qibin Sun, Wai-Choong Wong, John G. Apostolopoulos, Susie Wee
    Rate-Distortion Optimized Streaming of Authenticated Video. [Citation Graph (0, 0)][DBLP]
    ICIP, 2006, pp:1661-1664 [Conf]
  37. Qibin Sun, Zhi Li, Yong Lian, Chang Wen Chen
    Joint Source-Channel-Authentication Resource Allocation for Multimedia overWireless Networks. [Citation Graph (0, 0)][DBLP]
    ISCAS, 2007, pp:3471-3474 [Conf]
  38. Zhi Li, Qibin Sun, Yong Lian
    Unequal authenticity protection (UAP) for rate-distortion-optimized secure streaming of multimedia over wireless networks. [Citation Graph (0, 0)][DBLP]
    ISCAS, 2006, pp:- [Conf]
  39. John G. Apostolopoulos, Susie Wee, Frédéric Dufaux, Touradj Ebrahimi, Qibin Sun, Zhishou Zhang
    The emerging JPEG-2000 security (JPSEC) standard. [Citation Graph (0, 0)][DBLP]
    ISCAS, 2006, pp:- [Conf]
  40. Sheng Gao, Joo-Hwee Lim, Qibin Sun
    An integrated statistical model for multimedia evidence combination. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 2007, pp:872-881 [Conf]
  41. Zhishou Zhang, Qibin Sun, Wai-Choong Wong, John G. Apostolopoulos, Susie Wee
    Rate-Distortion-Authentication Optimized Streaming of Authenticated Video. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Circuits Syst. Video Techn., 2007, v:17, n:5, pp:544-557 [Journal]
  42. Qibin Sun, Dajun He, Qi Tian
    A Secure and Robust Authentication Scheme for Video Transcoding. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Circuits Syst. Video Techn., 2006, v:16, n:10, pp:1232-1244 [Journal]
  43. Shuiming Ye, Qibin Sun, Ee-Chien Chang
    Statistics- and Spatiality-Based Feature Distance Measure for Error Resilient Image Authentication. [Citation Graph (0, 0)][DBLP]
    T. Data Hiding and Multimedia Security, 2007, v:2, n:, pp:48-67 [Journal]

  44. Robust Hash for Detecting and Localizing Image Tampering. [Citation Graph (, )][DBLP]


  45. Stream Authentication Based on Generlized Butterfly Graph. [Citation Graph (, )][DBLP]


  46. Propagating Image-Level Part Statistics to Enhance Object Detection. [Citation Graph (, )][DBLP]


  47. Performance analysis of locality preserving image hash. [Citation Graph (, )][DBLP]


  48. Recaptured photo detection using specularity distribution. [Citation Graph (, )][DBLP]


  49. Rate-Distortion-Authentication optimized streaming with Generalized Butterfly Graph authentication. [Citation Graph (, )][DBLP]


  50. Authenticating Multimedia Transmitted Over Wireless Networks: A Content-Aware Stream-Level Approach. [Citation Graph (, )][DBLP]


  51. Classifier Optimization for Multimedia Semantic Concept Detection. [Citation Graph (, )][DBLP]


  52. A Content-Aware Stream Authentication Scheme Optimized for Distortion and Overhead. [Citation Graph (, )][DBLP]


  53. Detecting Musical Sounds in Broadcast Audio Based on Pitch Tuning Analysis. [Citation Graph (, )][DBLP]


  54. An adaptive scalable watermark scheme for high-quality audio archiving and streaming applications. [Citation Graph (, )][DBLP]


  55. Watermarking based Image Authentication using Feature Amplification. [Citation Graph (, )][DBLP]


  56. A New Bit-Plane Entropy Coder for Scalable Image Coding. [Citation Graph (, )][DBLP]


  57. A proposal of butterfly-graph based stream authentication over lossy networks. [Citation Graph (, )][DBLP]


  58. An Association-Based Graphical Password Design Resistant to Shoulder-Surfing Attack. [Citation Graph (, )][DBLP]


  59. Constructing Secure Content-Dependent Watermarking Scheme using Homomorphic Encryption. [Citation Graph (, )][DBLP]


  60. Detecting Digital Image Forgeries by Measuring Inconsistencies of Blocking Artifact. [Citation Graph (, )][DBLP]


  61. Hidden Maximum Entropy Approach for Visual Concept Modeling. [Citation Graph (, )][DBLP]


  62. A joint ECC based media error and authentication protection scheme. [Citation Graph (, )][DBLP]


  63. An interactive and secure user authentication scheme for mobile devices. [Citation Graph (, )][DBLP]


  64. Multi-strategy object tracking in complex situation for video surveillance. [Citation Graph (, )][DBLP]


  65. Exploiting Concept Association to Boost Multimedia Semantic Concept Detection. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.463secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002