The SCEAS System
| |||||||

## Search the dblp DataBase
Guorong Xuan:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Guorong Xuan, Jidong Chen, Jiang Zhu, Yun Q. Shi, Zhicheng Ni, Wei Su
**Lossless data hiding based on integer wavelet transform.**[Citation Graph (0, 0)][DBLP] IEEE Workshop on Multimedia Signal Processing, 2002, pp:312-315 [Conf] - Guorong Xuan, Wei Zhang, Peiqi Chai
**EM algorithms of Gaussian mixture model and hidden Markov model.**[Citation Graph (0, 0)][DBLP] ICIP (1), 2001, pp:145-148 [Conf] - Guorong Xuan, Peiqi Chai, Xiuming Zhu, Qiuming Yao, Cong Huang, Yun Q. Shi, Dongdong Fu
**A Novel Pattern Classification Scheme: Classwise Non-Principal Component Analysis (CNPCA).**[Citation Graph (0, 0)][DBLP] ICPR (3), 2006, pp:320-323 [Conf] - Guorong Xuan, Xiuming Zhu, Peiqi Chai, Zhenping Zhang, Yun Q. Shi, Dongdong Fu
**Feature Selection based on the Bhattacharyya Distance.**[Citation Graph (0, 0)][DBLP] ICPR (3), 2006, pp:1232-1235 [Conf] - Guorong Xuan, Xiuming Zhu, Peiqi Chai, Zhenping Zhang, Yun Q. Shi, Dongdong Fu
**Feature Selection based on the Bhattacharyya Distance.**[Citation Graph (0, 0)][DBLP] ICPR (4), 2006, pp:957- [Conf] - Guorong Xuan, Yun Q. Shi, Jianjiong Gao, Dekun Zou, Chengyun Yang, Zhenping Zhang, Peiqi Chai, Chunhua Chen, Wen Chen
**Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions.**[Citation Graph (0, 0)][DBLP] Information Hiding, 2005, pp:262-277 [Conf] - Yun Q. Shi, Zhicheng Ni, Dekun Zou, Changyin Liang, Guorong Xuan
**Lossless data hiding: fundamentals, algorithms and applications.**[Citation Graph (0, 0)][DBLP] ISCAS (2), 2004, pp:33-36 [Conf] - Guorong Xuan, Yun Q. Shi, Zhicheng Ni, Jidong Chen, Chengyun Yang, Yizhan Zhen, Junxiang Zheng
**High capacity lossless data hiding based on integer wavelet transform.**[Citation Graph (0, 0)][DBLP] ISCAS (2), 2004, pp:29-32 [Conf] - Yun Q. Shi, Guorong Xuan, Chengyun Yang, Jianjiong Gao, Zhenping Zhang, Peiqi Chai, Dekun Zou, Chunhua Chen, Wen Chen
**Effective Steganalysis Based on Statistical Moments of Wavelet Characteristic Function.**[Citation Graph (0, 0)][DBLP] ITCC (1), 2005, pp:768-773 [Conf] - Guorong Xuan, Yun Q. Shi, Cong Huang, Dongdong Fu, Xiuming Zhu, Peiqi Chai, Jianjiong Gao
**Steganalysis Using High-Dimensional Features Derived from Co-occurrence Matrix and Class-Wise Non-Principal Components Analysis (CNPCA).**[Citation Graph (0, 0)][DBLP] IWDW, 2006, pp:49-60 [Conf] - Guorong Xuan, Qiuming Yao, Chengyun Yang, Jianjiong Gao, Peiqi Chai, Yun Q. Shi, Zhicheng Ni
**Lossless Data Hiding Using Histogram Shifting Method Based on Integer Wavelets.**[Citation Graph (0, 0)][DBLP] IWDW, 2006, pp:323-332 [Conf] - Guorong Xuan, Chengyun Yang, Yizhan Zhen, Yun Q. Shi, Zhicheng Ni
**Reversible Data Hiding Using Integer Wavelet Transform and Companding Technique.**[Citation Graph (0, 0)][DBLP] IWDW, 2004, pp:115-124 [Conf] - Guorong Xuan, Junxiang Zheng, Chengyun Yang, Yun Q. Shi, Dekun Zou, Liu Liansheng, Bai Weichao
**A Secure Internet-Based Personal Identity Verification System Using Lossless Watermarking and Fingerprint Recognition.**[Citation Graph (0, 0)][DBLP] IWDW, 2004, pp:55-65 [Conf] - Weixin Xia, Guorong Xuan, Peiqi Chai
**Periodic pattern graphics.**[Citation Graph (0, 0)][DBLP] Computers & Graphics, 1994, v:18, n:1, pp:81-86 [Journal] - Guorong Xuan, Yun Q. Shi, Zhicheng Ni, Peiqi Chai, Xia Cui, Xuefeng Tong
**Reversible Data Hiding for JPEG Images Based on Histogram Pairs.**[Citation Graph (0, 0)][DBLP] ICIAR, 2007, pp:715-727 [Conf] - Guorong Xuan, Xiuming Zhu, Yun Q. Shi, Peiqi Chai, Xia Cui, Jue Li
**A Novel Bayesian Classifier with Smaller Eigenvalues Reset by Threshold Based on Given Database.**[Citation Graph (0, 0)][DBLP] ICIAR, 2007, pp:375-386 [Conf] - Chunhua Chen, Yun Q. Shi, Wen Chen, Guorong Xuan
**Statistical Moments Based Universal Steganalysis using JPEG 2-D Array and 2-D Characteristic Function.**[Citation Graph (0, 0)][DBLP] ICIP, 2006, pp:105-108 [Conf] **Steganalyzing Texture Images.**[Citation Graph (, )][DBLP]**Steganalysis based on Markov Model of Thresholded Prediction-Error Image.**[Citation Graph (, )][DBLP]**Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network.**[Citation Graph (, )][DBLP]**Lossless Data Hiding Using Integer Wavelet Transform and Threshold Embedding Technique.**[Citation Graph (, )][DBLP]**JPEG Steganalysis Based on Classwise Non-Principal Components Analysis and Multi-Directional Markov Model.**[Citation Graph (, )][DBLP]**Identifying Computer Graphics using HSV Color Model and Statistical Moments of Characteristic Functions.**[Citation Graph (, )][DBLP]**Computer graphics identification using genetic algorithm.**[Citation Graph (, )][DBLP]**Reversible binary image data hiding by run-length histogram modification.**[Citation Graph (, )][DBLP]**Steganalysis Versus Splicing Detection.**[Citation Graph (, )][DBLP]**Optimum Histogram Pair Based Image Lossless Data Embedding.**[Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.004secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |