Search the dblp DataBase
Yun Q. Shi :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Guorong Xuan , Jidong Chen , Jiang Zhu , Yun Q. Shi , Zhicheng Ni , Wei Su Lossless data hiding based on integer wavelet transform. [Citation Graph (0, 0)][DBLP ] IEEE Workshop on Multimedia Signal Processing, 2002, pp:312-315 [Conf ] Haiping Lu , Xuxia Shi , Yun Q. Shi , Alex C. Kot , Lihui Chen Watermark embedding in DC components of DCT for binary images. [Citation Graph (0, 0)][DBLP ] IEEE Workshop on Multimedia Signal Processing, 2002, pp:300-303 [Conf ] Hai Liu , Nirwan Ansari , Yun Q. Shi MPEG Video Traffic Models: Sequentially Modulated Self-Similar Processes. [Citation Graph (0, 0)][DBLP ] Broadband Communications, 1999, pp:63-72 [Conf ] Jiwu Huang , Junquan Hu , Daren Huang , Yun Q. Shi Improve security of fragile watermarking via parameterized wavelet. [Citation Graph (0, 0)][DBLP ] ICIP, 2004, pp:721-724 [Conf ] Xiangui Kang , Jiwu Huang , Yun Q. Shi Improve robustness of image watermarking via adaptive receiving. [Citation Graph (0, 0)][DBLP ] ICIP, 2004, pp:2343-2346 [Conf ] J. N. Pan , Yun Q. Shi , Chang-Qing Shu A Kalman Filter in Motion Analysis from Stereo Image Sequences. [Citation Graph (0, 0)][DBLP ] ICIP (3), 1994, pp:63-67 [Conf ] George F. Elmasry , Yun Q. Shi 2-D Interleaving for Enhancing the Robustness of Watermark Signals Embedded in Still Images. [Citation Graph (0, 0)][DBLP ] IEEE International Conference on Multimedia and Expo (II), 2000, pp:731-734 [Conf ] George F. Elmasry , Yun Q. Shi 3-D Interleaving for Enhancing the Robustness of Watermark Signals Embedded in Video Sequences. [Citation Graph (0, 0)][DBLP ] IEEE International Conference on Multimedia and Expo (II), 2000, pp:1037-0 [Conf ] Hai Liu , Nirwan Ansari , Yun Q. Shi A Simple Model for MPEG Video Traffic. [Citation Graph (0, 0)][DBLP ] IEEE International Conference on Multimedia and Expo (I), 2000, pp:553-556 [Conf ] Zhicheng Ni , Yun Q. Shi , Nirwan Ansari , Wei Su , Qibin Sun , Xiao Lin Robust lossless image data hiding. [Citation Graph (0, 0)][DBLP ] ICME, 2004, pp:2199-2202 [Conf ] Zhicheng Ni , Eric Sung , Yun Q. Shi Enhancing Robustness of Digital Watermarking Against Geometric Attack based on Fractal Transform. [Citation Graph (0, 0)][DBLP ] IEEE International Conference on Multimedia and Expo (II), 2000, pp:1033-1036 [Conf ] Zhishou Zhang , Gang Qiu , Qibin Sun , Xiao Lin , Zhicheng Ni , Yun Q. Shi A unified authentication framework for JPEG2000. [Citation Graph (0, 0)][DBLP ] ICME, 2004, pp:915-918 [Conf ] Haiping Lu , Jian Wang , Alex C. Kot , Yun Q. Shi An Objective Distortion Measure for Binary Document Images Based on Human Visual Perceptio. [Citation Graph (0, 0)][DBLP ] ICPR (4), 2002, pp:239-242 [Conf ] Guorong Xuan , Peiqi Chai , Xiuming Zhu , Qiuming Yao , Cong Huang , Yun Q. Shi , Dongdong Fu A Novel Pattern Classification Scheme: Classwise Non-Principal Component Analysis (CNPCA). [Citation Graph (0, 0)][DBLP ] ICPR (3), 2006, pp:320-323 [Conf ] Guorong Xuan , Xiuming Zhu , Peiqi Chai , Zhenping Zhang , Yun Q. Shi , Dongdong Fu Feature Selection based on the Bhattacharyya Distance. [Citation Graph (0, 0)][DBLP ] ICPR (3), 2006, pp:1232-1235 [Conf ] Guorong Xuan , Xiuming Zhu , Peiqi Chai , Zhenping Zhang , Yun Q. Shi , Dongdong Fu Feature Selection based on the Bhattacharyya Distance. [Citation Graph (0, 0)][DBLP ] ICPR (4), 2006, pp:957- [Conf ] Guorong Xuan , Yun Q. Shi , Jianjiong Gao , Dekun Zou , Chengyun Yang , Zhenping Zhang , Peiqi Chai , Chunhua Chen , Wen Chen Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2005, pp:262-277 [Conf ] Yanmei Fang , Jiwu Huang , Yun Q. Shi Image watermarking algorithm applying CDMA. [Citation Graph (0, 0)][DBLP ] ISCAS (2), 2003, pp:948-951 [Conf ] Limin Gu , Jiwu Huang , Yun Q. Shi Analysis of the role played by error correcting coding in robust watermarking. [Citation Graph (0, 0)][DBLP ] ISCAS (3), 2003, pp:798-801 [Conf ] Hongmei Liu , Zhang Zhefeng , Jiwu Huang , Huang Xialing , Yun Q. Shi A high capacity distortion-free data hiding algorithm for palette image. [Citation Graph (0, 0)][DBLP ] ISCAS (2), 2003, pp:916-919 [Conf ] Zhicheng Ni , Yun Q. Shi , Nirwan Ansari , Wei Su Reversible data hiding. [Citation Graph (0, 0)][DBLP ] ISCAS (2), 2003, pp:912-915 [Conf ] J. N. Pan , Yun Q. Shi , Chang-Qing Shu Correlation-feedback Approach to Computation of Optical Flow. [Citation Graph (0, 0)][DBLP ] ISCAS, 1994, pp:33-36 [Conf ] Yun Q. Shi , Zhicheng Ni , Nirwan Ansari , Jiwu Huang 2-D and 3-D successive packing interleaving techniques and their applications to image and video data hiding. [Citation Graph (0, 0)][DBLP ] ISCAS (2), 2003, pp:924-927 [Conf ] Shaoquan Wu , Jiwu Huang , Daren Huang , Yun Q. Shi Self-synchronized audio watermark in DWT domain. [Citation Graph (0, 0)][DBLP ] ISCAS (5), 2004, pp:712-715 [Conf ] Zaihe Yu , Yun Q. Shi , Wei Su Symbol-rate estimation based on filter bank. [Citation Graph (0, 0)][DBLP ] ISCAS (2), 2005, pp:1437-1440 [Conf ] Dekun Zou , Yun Q. Shi Formatted text document data hiding robust to printing, copying and scanning. [Citation Graph (0, 0)][DBLP ] ISCAS (5), 2005, pp:4971-4974 [Conf ] Jiwu Huang , Yun Q. Shi Embedding gray level images. [Citation Graph (0, 0)][DBLP ] ISCAS (5), 2001, pp:239-242 [Conf ] Yun Q. Shi , Zhicheng Ni , Dekun Zou , Changyin Liang , Guorong Xuan Lossless data hiding: fundamentals, algorithms and applications. [Citation Graph (0, 0)][DBLP ] ISCAS (2), 2004, pp:33-36 [Conf ] Guorong Xuan , Yun Q. Shi , Zhicheng Ni , Jidong Chen , Chengyun Yang , Yizhan Zhen , Junxiang Zheng High capacity lossless data hiding based on integer wavelet transform. [Citation Graph (0, 0)][DBLP ] ISCAS (2), 2004, pp:29-32 [Conf ] X. Zhang , Yun Q. Shi , Hangjun Chen , Alexander M. Haimovich , Anthony Vetro , Huifang Sun Successive packing based interleaver design for turbo codes. [Citation Graph (0, 0)][DBLP ] ISCAS (1), 2002, pp:17-20 [Conf ] Hai Liu , Nirwan Ansari , Yun Q. Shi Dynamic Bandwidth Allocation for VBR Video Traffic Based on Scene Change Identification. [Citation Graph (0, 0)][DBLP ] ITCC, 2000, pp:284-288 [Conf ] Hai Liu , Nirwan Ansari , Yun Q. Shi On-Line Dynamic Bandwidth Allocation For Vbr Video Transmission. [Citation Graph (0, 0)][DBLP ] ITCC, 2001, pp:354-358 [Conf ] Yun Q. Shi , Guorong Xuan , Chengyun Yang , Jianjiong Gao , Zhenping Zhang , Peiqi Chai , Dekun Zou , Chunhua Chen , Wen Chen Effective Steganalysis Based on Statistical Moments of Wavelet Characteristic Function. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:768-773 [Conf ] Hong Zhao , Nirwan Ansari , Yun Q. Shi A Fast Non-Linear Adaptive Algorithm for Video Traffic Prediction. [Citation Graph (0, 0)][DBLP ] ITCC, 2002, pp:54-58 [Conf ] Hong Zhao , Nirwan Ansari , Yun Q. Shi Self-similar Traffic Prediction Using Least Mean Kurtosis. [Citation Graph (0, 0)][DBLP ] ITCC, 2003, pp:352-355 [Conf ] Hong Zhao , Nirwan Ansari , Yun Q. Shi Layered MPEG Video Transmission over IP DiffServ. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:63-67 [Conf ] Dongdong Fu , Yun Q. Shi , Wei Su Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:177-187 [Conf ] Junquan Hu , Jiwu Huang , Daren Huang , Yun Q. Shi A DWT-Based Fragile Watermarking Tolerant of JPEG Compression. [Citation Graph (0, 0)][DBLP ] IWDW, 2002, pp:179-188 [Conf ] Yun Q. Shi Reversible Data Hiding. [Citation Graph (0, 0)][DBLP ] IWDW, 2004, pp:1-12 [Conf ] Xiangui Kang , Jiwu Huang , Yun Q. Shi An Image Watermarking Algorithm Robust to Geometric Distortion. [Citation Graph (0, 0)][DBLP ] IWDW, 2002, pp:212-223 [Conf ] Xiangui Kang , Jiwu Huang , Yun Q. Shi , Jianxiang Zhu Robust Watermarking with Adaptive Receiving. [Citation Graph (0, 0)][DBLP ] IWDW, 2003, pp:396-407 [Conf ] Xiangui Kang , Yun Q. Shi , Jiwu Huang , Wenjun Zeng Multi-band Wavelet Based Digital Watermarking Using Principal Component Analysis. [Citation Graph (0, 0)][DBLP ] IWDW, 2005, pp:139-146 [Conf ] Guorong Xuan , Yun Q. Shi , Cong Huang , Dongdong Fu , Xiuming Zhu , Peiqi Chai , Jianjiong Gao Steganalysis Using High-Dimensional Features Derived from Co-occurrence Matrix and Class-Wise Non-Principal Components Analysis (CNPCA). [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:49-60 [Conf ] Guorong Xuan , Qiuming Yao , Chengyun Yang , Jianjiong Gao , Peiqi Chai , Yun Q. Shi , Zhicheng Ni Lossless Data Hiding Using Histogram Shifting Method Based on Integer Wavelets. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:323-332 [Conf ] Guorong Xuan , Chengyun Yang , Yizhan Zhen , Yun Q. Shi , Zhicheng Ni Reversible Data Hiding Using Integer Wavelet Transform and Companding Technique. [Citation Graph (0, 0)][DBLP ] IWDW, 2004, pp:115-124 [Conf ] Guorong Xuan , Junxiang Zheng , Chengyun Yang , Yun Q. Shi , Dekun Zou , Liu Liansheng , Bai Weichao A Secure Internet-Based Personal Identity Verification System Using Lossless Watermarking and Fingerprint Recognition. [Citation Graph (0, 0)][DBLP ] IWDW, 2004, pp:55-65 [Conf ] Hongmei Liu , Jiwu Huang , Yun Q. Shi Dwt-Based Video Data Hiding Robust To Mpeg Compression And Frame Loss. [Citation Graph (0, 0)][DBLP ] Int. J. Image Graphics, 2005, v:5, n:1, pp:111-134 [Journal ] Haiping Lu , Yun Q. Shi , Alex C. Kot , Lihui Chen Binary Image Watermarking Through Blurring, Biased Binarization. [Citation Graph (0, 0)][DBLP ] Int. J. Image Graphics, 2005, v:5, n:1, pp:67-88 [Journal ] Xi Min Zhang , Yan Qiu Chen , Nirwan Ansari , Yun Q. Shi Mini-max initialization for function approximation. [Citation Graph (0, 0)][DBLP ] Neurocomputing, 2004, v:57, n:, pp:389-409 [Journal ] Yun Q. Shi , Chang-Qing Shu , J. N. Pan Unified optical flow field approach to motion analysis from a sequence of stereo images. [Citation Graph (0, 0)][DBLP ] Pattern Recognition, 1994, v:27, n:12, pp:1577-1590 [Journal ] Chang-Qing Shu , Yun Q. Shi On unified optical flow field. [Citation Graph (0, 0)][DBLP ] Pattern Recognition, 1991, v:24, n:6, pp:579-586 [Journal ] Chang-Qing Shu , Yun Q. Shi Direct recovering of Nth order surface structure using unified optical flow field. [Citation Graph (0, 0)][DBLP ] Pattern Recognition, 1993, v:26, n:8, pp:1137-1148 [Journal ] Jiwu Huang , Yun Q. Shi Reliable information bit hiding. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Circuits Syst. Video Techn., 2002, v:12, n:10, pp:916-0 [Journal ] Xiangui Kang , Jiwu Huang , Yun Q. Shi , Yan Lin A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Circuits Syst. Video Techn., 2003, v:13, n:8, pp:776-786 [Journal ] Jiwu Huang , Yun Q. Shi , Yi Shi Embedding image watermarks in dc components. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Circuits Syst. Video Techn., 2000, v:10, n:6, pp:974-979 [Journal ] Xi Min Zhang , Anthony Vetro , Yun Q. Shi , Huifang Sun Constant quality constrained rate allocation for FGS-coded video. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Circuits Syst. Video Techn., 2003, v:13, n:2, pp:121-130 [Journal ] J. N. Pan , Yun Q. Shi , Chang-Qing Shu Correlation-feedback technique in optical flow determination. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Image Processing, 1998, v:7, n:7, pp:1061-1067 [Journal ] Hui Cheng , Xi Min Zhang , Yun Q. Shi , Anthony Vetro , Huifang Sun Constant quality rate allocation for FGS coding using composite R-D analysis. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Multimedia, 2006, v:8, n:2, pp:405-407 [Journal ] Guorong Xuan , Yun Q. Shi , Zhicheng Ni , Peiqi Chai , Xia Cui , Xuefeng Tong Reversible Data Hiding for JPEG Images Based on Histogram Pairs. [Citation Graph (0, 0)][DBLP ] ICIAR, 2007, pp:715-727 [Conf ] Guorong Xuan , Xiuming Zhu , Yun Q. Shi , Peiqi Chai , Xia Cui , Jue Li A Novel Bayesian Classifier with Smaller Eigenvalues Reset by Threshold Based on Given Database. [Citation Graph (0, 0)][DBLP ] ICIAR, 2007, pp:375-386 [Conf ] Chunhua Chen , Yun Q. Shi , Wen Chen , Guorong Xuan Statistical Moments Based Universal Steganalysis using JPEG 2-D Array and 2-D Characteristic Function. [Citation Graph (0, 0)][DBLP ] ICIP, 2006, pp:105-108 [Conf ] Shunquan Tan , Jiwu Huang , Zhihua Yang , Yun Q. Shi Steganalysis of JPEG2000 Lazy-Mode Steganography using the Hilbert-Huang Transform Based Sequential Analysis. [Citation Graph (0, 0)][DBLP ] ICIP, 2006, pp:101-104 [Conf ] Yun Q. Shi , Chunhua Chen , Wen Chen A Markov Process Based Approach to Effective Attacking JPEG Steganography. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2006, pp:249-264 [Conf ] Yun Q. Shi , Chunhua Chen , Wen Chen , Maala P. Kaundinya Effect of Recompression on Attacking JPEG Steganographic Schemes An Experimental Study. [Citation Graph (0, 0)][DBLP ] ISCAS, 2007, pp:1265-1268 [Conf ] Yun Q. Shi , Chunhua Chen , Wen Chen A natural image model approach to splicing detection. [Citation Graph (0, 0)][DBLP ] MM&Sec, 2007, pp:51-62 [Conf ] Dekun Zou , Yun Q. Shi , Zhicheng Ni , Wei Su A Semi-Fragile Lossless Digital Watermarking Scheme Based on Integer Wavelet Transform. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Circuits Syst. Video Techn., 2006, v:16, n:10, pp:1294-1300 [Journal ] Hiding Data in Multimedia Streaming over Networks. [Citation Graph (, )][DBLP ] Data Mining of Modulation Types Using Cyclostationarity-Based Decision Tree. [Citation Graph (, )][DBLP ] Steganalyzing Texture Images. [Citation Graph (, )][DBLP ] A study on security performance of YASS. [Citation Graph (, )][DBLP ] Steganalysis based on Markov Model of Thresholded Prediction-Error Image. [Citation Graph (, )][DBLP ] Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network. [Citation Graph (, )][DBLP ] Lossless Data Hiding Using Integer Wavelet Transform and Threshold Embedding Technique. [Citation Graph (, )][DBLP ] JPEG Steganalysis Based on Classwise Non-Principal Components Analysis and Multi-Directional Markov Model. [Citation Graph (, )][DBLP ] Identifying Computer Graphics using HSV Color Model and Statistical Moments of Characteristic Functions. [Citation Graph (, )][DBLP ] A high-performance YASS-like scheme using randomized big-blocks. [Citation Graph (, )][DBLP ] Rake transform and edge statistics for image forgery detection. [Citation Graph (, )][DBLP ] Computer graphics identification using genetic algorithm. [Citation Graph (, )][DBLP ] Reversible binary image data hiding by run-length histogram modification. [Citation Graph (, )][DBLP ] A machine learning based scheme for double JPEG compression detection. [Citation Graph (, )][DBLP ] JPEG image steganalysis utilizing both intrablock and interblock correlations. [Citation Graph (, )][DBLP ] First Digit Law and Its Application to Digital Forensics. [Citation Graph (, )][DBLP ] Steganalysis Versus Splicing Detection. [Citation Graph (, )][DBLP ] Optimum Histogram Pair Based Image Lossless Data Embedding. [Citation Graph (, )][DBLP ] Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis. [Citation Graph (, )][DBLP ] Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis. [Citation Graph (, )][DBLP ] An Enhanced Statistical Approach to Identifying Photorealistic Images. [Citation Graph (, )][DBLP ] Detection of Double MPEG Compression Based on First Digit Statistics. [Citation Graph (, )][DBLP ] Run-Length and Edge Statistics Based Approach for Image Splicing Detection. [Citation Graph (, )][DBLP ] A Novel Multi-size Block Benford's Law Scheme for Printer Identification. [Citation Graph (, )][DBLP ] Steganalysis of YASS. [Citation Graph (, )][DBLP ] Detecting doubly compressed JPEG images by using Mode Based First Digit Features. [Citation Graph (, )][DBLP ] Detecting double compression of audio signal. [Citation Graph (, )][DBLP ] Search in 0.006secs, Finished in 0.457secs