The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Guorong Xuan: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Guorong Xuan, Jidong Chen, Jiang Zhu, Yun Q. Shi, Zhicheng Ni, Wei Su
    Lossless data hiding based on integer wavelet transform. [Citation Graph (0, 0)][DBLP]
    IEEE Workshop on Multimedia Signal Processing, 2002, pp:312-315 [Conf]
  2. Guorong Xuan, Wei Zhang, Peiqi Chai
    EM algorithms of Gaussian mixture model and hidden Markov model. [Citation Graph (0, 0)][DBLP]
    ICIP (1), 2001, pp:145-148 [Conf]
  3. Guorong Xuan, Peiqi Chai, Xiuming Zhu, Qiuming Yao, Cong Huang, Yun Q. Shi, Dongdong Fu
    A Novel Pattern Classification Scheme: Classwise Non-Principal Component Analysis (CNPCA). [Citation Graph (0, 0)][DBLP]
    ICPR (3), 2006, pp:320-323 [Conf]
  4. Guorong Xuan, Xiuming Zhu, Peiqi Chai, Zhenping Zhang, Yun Q. Shi, Dongdong Fu
    Feature Selection based on the Bhattacharyya Distance. [Citation Graph (0, 0)][DBLP]
    ICPR (3), 2006, pp:1232-1235 [Conf]
  5. Guorong Xuan, Xiuming Zhu, Peiqi Chai, Zhenping Zhang, Yun Q. Shi, Dongdong Fu
    Feature Selection based on the Bhattacharyya Distance. [Citation Graph (0, 0)][DBLP]
    ICPR (4), 2006, pp:957- [Conf]
  6. Guorong Xuan, Yun Q. Shi, Jianjiong Gao, Dekun Zou, Chengyun Yang, Zhenping Zhang, Peiqi Chai, Chunhua Chen, Wen Chen
    Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2005, pp:262-277 [Conf]
  7. Yun Q. Shi, Zhicheng Ni, Dekun Zou, Changyin Liang, Guorong Xuan
    Lossless data hiding: fundamentals, algorithms and applications. [Citation Graph (0, 0)][DBLP]
    ISCAS (2), 2004, pp:33-36 [Conf]
  8. Guorong Xuan, Yun Q. Shi, Zhicheng Ni, Jidong Chen, Chengyun Yang, Yizhan Zhen, Junxiang Zheng
    High capacity lossless data hiding based on integer wavelet transform. [Citation Graph (0, 0)][DBLP]
    ISCAS (2), 2004, pp:29-32 [Conf]
  9. Yun Q. Shi, Guorong Xuan, Chengyun Yang, Jianjiong Gao, Zhenping Zhang, Peiqi Chai, Dekun Zou, Chunhua Chen, Wen Chen
    Effective Steganalysis Based on Statistical Moments of Wavelet Characteristic Function. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:768-773 [Conf]
  10. Guorong Xuan, Yun Q. Shi, Cong Huang, Dongdong Fu, Xiuming Zhu, Peiqi Chai, Jianjiong Gao
    Steganalysis Using High-Dimensional Features Derived from Co-occurrence Matrix and Class-Wise Non-Principal Components Analysis (CNPCA). [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:49-60 [Conf]
  11. Guorong Xuan, Qiuming Yao, Chengyun Yang, Jianjiong Gao, Peiqi Chai, Yun Q. Shi, Zhicheng Ni
    Lossless Data Hiding Using Histogram Shifting Method Based on Integer Wavelets. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:323-332 [Conf]
  12. Guorong Xuan, Chengyun Yang, Yizhan Zhen, Yun Q. Shi, Zhicheng Ni
    Reversible Data Hiding Using Integer Wavelet Transform and Companding Technique. [Citation Graph (0, 0)][DBLP]
    IWDW, 2004, pp:115-124 [Conf]
  13. Guorong Xuan, Junxiang Zheng, Chengyun Yang, Yun Q. Shi, Dekun Zou, Liu Liansheng, Bai Weichao
    A Secure Internet-Based Personal Identity Verification System Using Lossless Watermarking and Fingerprint Recognition. [Citation Graph (0, 0)][DBLP]
    IWDW, 2004, pp:55-65 [Conf]
  14. Weixin Xia, Guorong Xuan, Peiqi Chai
    Periodic pattern graphics. [Citation Graph (0, 0)][DBLP]
    Computers & Graphics, 1994, v:18, n:1, pp:81-86 [Journal]
  15. Guorong Xuan, Yun Q. Shi, Zhicheng Ni, Peiqi Chai, Xia Cui, Xuefeng Tong
    Reversible Data Hiding for JPEG Images Based on Histogram Pairs. [Citation Graph (0, 0)][DBLP]
    ICIAR, 2007, pp:715-727 [Conf]
  16. Guorong Xuan, Xiuming Zhu, Yun Q. Shi, Peiqi Chai, Xia Cui, Jue Li
    A Novel Bayesian Classifier with Smaller Eigenvalues Reset by Threshold Based on Given Database. [Citation Graph (0, 0)][DBLP]
    ICIAR, 2007, pp:375-386 [Conf]
  17. Chunhua Chen, Yun Q. Shi, Wen Chen, Guorong Xuan
    Statistical Moments Based Universal Steganalysis using JPEG 2-D Array and 2-D Characteristic Function. [Citation Graph (0, 0)][DBLP]
    ICIP, 2006, pp:105-108 [Conf]

  18. Steganalyzing Texture Images. [Citation Graph (, )][DBLP]


  19. Steganalysis based on Markov Model of Thresholded Prediction-Error Image. [Citation Graph (, )][DBLP]


  20. Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network. [Citation Graph (, )][DBLP]


  21. Lossless Data Hiding Using Integer Wavelet Transform and Threshold Embedding Technique. [Citation Graph (, )][DBLP]


  22. JPEG Steganalysis Based on Classwise Non-Principal Components Analysis and Multi-Directional Markov Model. [Citation Graph (, )][DBLP]


  23. Identifying Computer Graphics using HSV Color Model and Statistical Moments of Characteristic Functions. [Citation Graph (, )][DBLP]


  24. Computer graphics identification using genetic algorithm. [Citation Graph (, )][DBLP]


  25. Reversible binary image data hiding by run-length histogram modification. [Citation Graph (, )][DBLP]


  26. Steganalysis Versus Splicing Detection. [Citation Graph (, )][DBLP]


  27. Optimum Histogram Pair Based Image Lossless Data Embedding. [Citation Graph (, )][DBLP]


Search in 0.031secs, Finished in 0.033secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002