The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yun Q. Shi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Guorong Xuan, Jidong Chen, Jiang Zhu, Yun Q. Shi, Zhicheng Ni, Wei Su
    Lossless data hiding based on integer wavelet transform. [Citation Graph (0, 0)][DBLP]
    IEEE Workshop on Multimedia Signal Processing, 2002, pp:312-315 [Conf]
  2. Haiping Lu, Xuxia Shi, Yun Q. Shi, Alex C. Kot, Lihui Chen
    Watermark embedding in DC components of DCT for binary images. [Citation Graph (0, 0)][DBLP]
    IEEE Workshop on Multimedia Signal Processing, 2002, pp:300-303 [Conf]
  3. Hai Liu, Nirwan Ansari, Yun Q. Shi
    MPEG Video Traffic Models: Sequentially Modulated Self-Similar Processes. [Citation Graph (0, 0)][DBLP]
    Broadband Communications, 1999, pp:63-72 [Conf]
  4. Jiwu Huang, Junquan Hu, Daren Huang, Yun Q. Shi
    Improve security of fragile watermarking via parameterized wavelet. [Citation Graph (0, 0)][DBLP]
    ICIP, 2004, pp:721-724 [Conf]
  5. Xiangui Kang, Jiwu Huang, Yun Q. Shi
    Improve robustness of image watermarking via adaptive receiving. [Citation Graph (0, 0)][DBLP]
    ICIP, 2004, pp:2343-2346 [Conf]
  6. J. N. Pan, Yun Q. Shi, Chang-Qing Shu
    A Kalman Filter in Motion Analysis from Stereo Image Sequences. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 1994, pp:63-67 [Conf]
  7. George F. Elmasry, Yun Q. Shi
    2-D Interleaving for Enhancing the Robustness of Watermark Signals Embedded in Still Images. [Citation Graph (0, 0)][DBLP]
    IEEE International Conference on Multimedia and Expo (II), 2000, pp:731-734 [Conf]
  8. George F. Elmasry, Yun Q. Shi
    3-D Interleaving for Enhancing the Robustness of Watermark Signals Embedded in Video Sequences. [Citation Graph (0, 0)][DBLP]
    IEEE International Conference on Multimedia and Expo (II), 2000, pp:1037-0 [Conf]
  9. Hai Liu, Nirwan Ansari, Yun Q. Shi
    A Simple Model for MPEG Video Traffic. [Citation Graph (0, 0)][DBLP]
    IEEE International Conference on Multimedia and Expo (I), 2000, pp:553-556 [Conf]
  10. Zhicheng Ni, Yun Q. Shi, Nirwan Ansari, Wei Su, Qibin Sun, Xiao Lin
    Robust lossless image data hiding. [Citation Graph (0, 0)][DBLP]
    ICME, 2004, pp:2199-2202 [Conf]
  11. Zhicheng Ni, Eric Sung, Yun Q. Shi
    Enhancing Robustness of Digital Watermarking Against Geometric Attack based on Fractal Transform. [Citation Graph (0, 0)][DBLP]
    IEEE International Conference on Multimedia and Expo (II), 2000, pp:1033-1036 [Conf]
  12. Zhishou Zhang, Gang Qiu, Qibin Sun, Xiao Lin, Zhicheng Ni, Yun Q. Shi
    A unified authentication framework for JPEG2000. [Citation Graph (0, 0)][DBLP]
    ICME, 2004, pp:915-918 [Conf]
  13. Haiping Lu, Jian Wang, Alex C. Kot, Yun Q. Shi
    An Objective Distortion Measure for Binary Document Images Based on Human Visual Perceptio. [Citation Graph (0, 0)][DBLP]
    ICPR (4), 2002, pp:239-242 [Conf]
  14. Guorong Xuan, Peiqi Chai, Xiuming Zhu, Qiuming Yao, Cong Huang, Yun Q. Shi, Dongdong Fu
    A Novel Pattern Classification Scheme: Classwise Non-Principal Component Analysis (CNPCA). [Citation Graph (0, 0)][DBLP]
    ICPR (3), 2006, pp:320-323 [Conf]
  15. Guorong Xuan, Xiuming Zhu, Peiqi Chai, Zhenping Zhang, Yun Q. Shi, Dongdong Fu
    Feature Selection based on the Bhattacharyya Distance. [Citation Graph (0, 0)][DBLP]
    ICPR (3), 2006, pp:1232-1235 [Conf]
  16. Guorong Xuan, Xiuming Zhu, Peiqi Chai, Zhenping Zhang, Yun Q. Shi, Dongdong Fu
    Feature Selection based on the Bhattacharyya Distance. [Citation Graph (0, 0)][DBLP]
    ICPR (4), 2006, pp:957- [Conf]
  17. Guorong Xuan, Yun Q. Shi, Jianjiong Gao, Dekun Zou, Chengyun Yang, Zhenping Zhang, Peiqi Chai, Chunhua Chen, Wen Chen
    Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2005, pp:262-277 [Conf]
  18. Yanmei Fang, Jiwu Huang, Yun Q. Shi
    Image watermarking algorithm applying CDMA. [Citation Graph (0, 0)][DBLP]
    ISCAS (2), 2003, pp:948-951 [Conf]
  19. Limin Gu, Jiwu Huang, Yun Q. Shi
    Analysis of the role played by error correcting coding in robust watermarking. [Citation Graph (0, 0)][DBLP]
    ISCAS (3), 2003, pp:798-801 [Conf]
  20. Hongmei Liu, Zhang Zhefeng, Jiwu Huang, Huang Xialing, Yun Q. Shi
    A high capacity distortion-free data hiding algorithm for palette image. [Citation Graph (0, 0)][DBLP]
    ISCAS (2), 2003, pp:916-919 [Conf]
  21. Zhicheng Ni, Yun Q. Shi, Nirwan Ansari, Wei Su
    Reversible data hiding. [Citation Graph (0, 0)][DBLP]
    ISCAS (2), 2003, pp:912-915 [Conf]
  22. J. N. Pan, Yun Q. Shi, Chang-Qing Shu
    Correlation-feedback Approach to Computation of Optical Flow. [Citation Graph (0, 0)][DBLP]
    ISCAS, 1994, pp:33-36 [Conf]
  23. Yun Q. Shi, Zhicheng Ni, Nirwan Ansari, Jiwu Huang
    2-D and 3-D successive packing interleaving techniques and their applications to image and video data hiding. [Citation Graph (0, 0)][DBLP]
    ISCAS (2), 2003, pp:924-927 [Conf]
  24. Shaoquan Wu, Jiwu Huang, Daren Huang, Yun Q. Shi
    Self-synchronized audio watermark in DWT domain. [Citation Graph (0, 0)][DBLP]
    ISCAS (5), 2004, pp:712-715 [Conf]
  25. Zaihe Yu, Yun Q. Shi, Wei Su
    Symbol-rate estimation based on filter bank. [Citation Graph (0, 0)][DBLP]
    ISCAS (2), 2005, pp:1437-1440 [Conf]
  26. Dekun Zou, Yun Q. Shi
    Formatted text document data hiding robust to printing, copying and scanning. [Citation Graph (0, 0)][DBLP]
    ISCAS (5), 2005, pp:4971-4974 [Conf]
  27. Jiwu Huang, Yun Q. Shi
    Embedding gray level images. [Citation Graph (0, 0)][DBLP]
    ISCAS (5), 2001, pp:239-242 [Conf]
  28. Yun Q. Shi, Zhicheng Ni, Dekun Zou, Changyin Liang, Guorong Xuan
    Lossless data hiding: fundamentals, algorithms and applications. [Citation Graph (0, 0)][DBLP]
    ISCAS (2), 2004, pp:33-36 [Conf]
  29. Guorong Xuan, Yun Q. Shi, Zhicheng Ni, Jidong Chen, Chengyun Yang, Yizhan Zhen, Junxiang Zheng
    High capacity lossless data hiding based on integer wavelet transform. [Citation Graph (0, 0)][DBLP]
    ISCAS (2), 2004, pp:29-32 [Conf]
  30. X. Zhang, Yun Q. Shi, Hangjun Chen, Alexander M. Haimovich, Anthony Vetro, Huifang Sun
    Successive packing based interleaver design for turbo codes. [Citation Graph (0, 0)][DBLP]
    ISCAS (1), 2002, pp:17-20 [Conf]
  31. Hai Liu, Nirwan Ansari, Yun Q. Shi
    Dynamic Bandwidth Allocation for VBR Video Traffic Based on Scene Change Identification. [Citation Graph (0, 0)][DBLP]
    ITCC, 2000, pp:284-288 [Conf]
  32. Hai Liu, Nirwan Ansari, Yun Q. Shi
    On-Line Dynamic Bandwidth Allocation For Vbr Video Transmission. [Citation Graph (0, 0)][DBLP]
    ITCC, 2001, pp:354-358 [Conf]
  33. Yun Q. Shi, Guorong Xuan, Chengyun Yang, Jianjiong Gao, Zhenping Zhang, Peiqi Chai, Dekun Zou, Chunhua Chen, Wen Chen
    Effective Steganalysis Based on Statistical Moments of Wavelet Characteristic Function. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:768-773 [Conf]
  34. Hong Zhao, Nirwan Ansari, Yun Q. Shi
    A Fast Non-Linear Adaptive Algorithm for Video Traffic Prediction. [Citation Graph (0, 0)][DBLP]
    ITCC, 2002, pp:54-58 [Conf]
  35. Hong Zhao, Nirwan Ansari, Yun Q. Shi
    Self-similar Traffic Prediction Using Least Mean Kurtosis. [Citation Graph (0, 0)][DBLP]
    ITCC, 2003, pp:352-355 [Conf]
  36. Hong Zhao, Nirwan Ansari, Yun Q. Shi
    Layered MPEG Video Transmission over IP DiffServ. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:63-67 [Conf]
  37. Dongdong Fu, Yun Q. Shi, Wei Su
    Detection of Image Splicing Based on Hilbert-Huang Transform and Moments of Characteristic Functions with Wavelet Decomposition. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:177-187 [Conf]
  38. Junquan Hu, Jiwu Huang, Daren Huang, Yun Q. Shi
    A DWT-Based Fragile Watermarking Tolerant of JPEG Compression. [Citation Graph (0, 0)][DBLP]
    IWDW, 2002, pp:179-188 [Conf]
  39. Yun Q. Shi
    Reversible Data Hiding. [Citation Graph (0, 0)][DBLP]
    IWDW, 2004, pp:1-12 [Conf]
  40. Xiangui Kang, Jiwu Huang, Yun Q. Shi
    An Image Watermarking Algorithm Robust to Geometric Distortion. [Citation Graph (0, 0)][DBLP]
    IWDW, 2002, pp:212-223 [Conf]
  41. Xiangui Kang, Jiwu Huang, Yun Q. Shi, Jianxiang Zhu
    Robust Watermarking with Adaptive Receiving. [Citation Graph (0, 0)][DBLP]
    IWDW, 2003, pp:396-407 [Conf]
  42. Xiangui Kang, Yun Q. Shi, Jiwu Huang, Wenjun Zeng
    Multi-band Wavelet Based Digital Watermarking Using Principal Component Analysis. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:139-146 [Conf]
  43. Guorong Xuan, Yun Q. Shi, Cong Huang, Dongdong Fu, Xiuming Zhu, Peiqi Chai, Jianjiong Gao
    Steganalysis Using High-Dimensional Features Derived from Co-occurrence Matrix and Class-Wise Non-Principal Components Analysis (CNPCA). [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:49-60 [Conf]
  44. Guorong Xuan, Qiuming Yao, Chengyun Yang, Jianjiong Gao, Peiqi Chai, Yun Q. Shi, Zhicheng Ni
    Lossless Data Hiding Using Histogram Shifting Method Based on Integer Wavelets. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:323-332 [Conf]
  45. Guorong Xuan, Chengyun Yang, Yizhan Zhen, Yun Q. Shi, Zhicheng Ni
    Reversible Data Hiding Using Integer Wavelet Transform and Companding Technique. [Citation Graph (0, 0)][DBLP]
    IWDW, 2004, pp:115-124 [Conf]
  46. Guorong Xuan, Junxiang Zheng, Chengyun Yang, Yun Q. Shi, Dekun Zou, Liu Liansheng, Bai Weichao
    A Secure Internet-Based Personal Identity Verification System Using Lossless Watermarking and Fingerprint Recognition. [Citation Graph (0, 0)][DBLP]
    IWDW, 2004, pp:55-65 [Conf]
  47. Hongmei Liu, Jiwu Huang, Yun Q. Shi
    Dwt-Based Video Data Hiding Robust To Mpeg Compression And Frame Loss. [Citation Graph (0, 0)][DBLP]
    Int. J. Image Graphics, 2005, v:5, n:1, pp:111-134 [Journal]
  48. Haiping Lu, Yun Q. Shi, Alex C. Kot, Lihui Chen
    Binary Image Watermarking Through Blurring, Biased Binarization. [Citation Graph (0, 0)][DBLP]
    Int. J. Image Graphics, 2005, v:5, n:1, pp:67-88 [Journal]
  49. Xi Min Zhang, Yan Qiu Chen, Nirwan Ansari, Yun Q. Shi
    Mini-max initialization for function approximation. [Citation Graph (0, 0)][DBLP]
    Neurocomputing, 2004, v:57, n:, pp:389-409 [Journal]
  50. Yun Q. Shi, Chang-Qing Shu, J. N. Pan
    Unified optical flow field approach to motion analysis from a sequence of stereo images. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 1994, v:27, n:12, pp:1577-1590 [Journal]
  51. Chang-Qing Shu, Yun Q. Shi
    On unified optical flow field. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 1991, v:24, n:6, pp:579-586 [Journal]
  52. Chang-Qing Shu, Yun Q. Shi
    Direct recovering of Nth order surface structure using unified optical flow field. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 1993, v:26, n:8, pp:1137-1148 [Journal]
  53. Jiwu Huang, Yun Q. Shi
    Reliable information bit hiding. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Circuits Syst. Video Techn., 2002, v:12, n:10, pp:916-0 [Journal]
  54. Xiangui Kang, Jiwu Huang, Yun Q. Shi, Yan Lin
    A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Circuits Syst. Video Techn., 2003, v:13, n:8, pp:776-786 [Journal]
  55. Jiwu Huang, Yun Q. Shi, Yi Shi
    Embedding image watermarks in dc components. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Circuits Syst. Video Techn., 2000, v:10, n:6, pp:974-979 [Journal]
  56. Xi Min Zhang, Anthony Vetro, Yun Q. Shi, Huifang Sun
    Constant quality constrained rate allocation for FGS-coded video. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Circuits Syst. Video Techn., 2003, v:13, n:2, pp:121-130 [Journal]
  57. J. N. Pan, Yun Q. Shi, Chang-Qing Shu
    Correlation-feedback technique in optical flow determination. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 1998, v:7, n:7, pp:1061-1067 [Journal]
  58. Hui Cheng, Xi Min Zhang, Yun Q. Shi, Anthony Vetro, Huifang Sun
    Constant quality rate allocation for FGS coding using composite R-D analysis. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Multimedia, 2006, v:8, n:2, pp:405-407 [Journal]
  59. Guorong Xuan, Yun Q. Shi, Zhicheng Ni, Peiqi Chai, Xia Cui, Xuefeng Tong
    Reversible Data Hiding for JPEG Images Based on Histogram Pairs. [Citation Graph (0, 0)][DBLP]
    ICIAR, 2007, pp:715-727 [Conf]
  60. Guorong Xuan, Xiuming Zhu, Yun Q. Shi, Peiqi Chai, Xia Cui, Jue Li
    A Novel Bayesian Classifier with Smaller Eigenvalues Reset by Threshold Based on Given Database. [Citation Graph (0, 0)][DBLP]
    ICIAR, 2007, pp:375-386 [Conf]
  61. Chunhua Chen, Yun Q. Shi, Wen Chen, Guorong Xuan
    Statistical Moments Based Universal Steganalysis using JPEG 2-D Array and 2-D Characteristic Function. [Citation Graph (0, 0)][DBLP]
    ICIP, 2006, pp:105-108 [Conf]
  62. Shunquan Tan, Jiwu Huang, Zhihua Yang, Yun Q. Shi
    Steganalysis of JPEG2000 Lazy-Mode Steganography using the Hilbert-Huang Transform Based Sequential Analysis. [Citation Graph (0, 0)][DBLP]
    ICIP, 2006, pp:101-104 [Conf]
  63. Yun Q. Shi, Chunhua Chen, Wen Chen
    A Markov Process Based Approach to Effective Attacking JPEG Steganography. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:249-264 [Conf]
  64. Yun Q. Shi, Chunhua Chen, Wen Chen, Maala P. Kaundinya
    Effect of Recompression on Attacking JPEG Steganographic Schemes An Experimental Study. [Citation Graph (0, 0)][DBLP]
    ISCAS, 2007, pp:1265-1268 [Conf]
  65. Yun Q. Shi, Chunhua Chen, Wen Chen
    A natural image model approach to splicing detection. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:51-62 [Conf]
  66. Dekun Zou, Yun Q. Shi, Zhicheng Ni, Wei Su
    A Semi-Fragile Lossless Digital Watermarking Scheme Based on Integer Wavelet Transform. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Circuits Syst. Video Techn., 2006, v:16, n:10, pp:1294-1300 [Journal]

  67. Hiding Data in Multimedia Streaming over Networks. [Citation Graph (, )][DBLP]


  68. Data Mining of Modulation Types Using Cyclostationarity-Based Decision Tree. [Citation Graph (, )][DBLP]


  69. Steganalyzing Texture Images. [Citation Graph (, )][DBLP]


  70. A study on security performance of YASS. [Citation Graph (, )][DBLP]


  71. Steganalysis based on Markov Model of Thresholded Prediction-Error Image. [Citation Graph (, )][DBLP]


  72. Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network. [Citation Graph (, )][DBLP]


  73. Lossless Data Hiding Using Integer Wavelet Transform and Threshold Embedding Technique. [Citation Graph (, )][DBLP]


  74. JPEG Steganalysis Based on Classwise Non-Principal Components Analysis and Multi-Directional Markov Model. [Citation Graph (, )][DBLP]


  75. Identifying Computer Graphics using HSV Color Model and Statistical Moments of Characteristic Functions. [Citation Graph (, )][DBLP]


  76. A high-performance YASS-like scheme using randomized big-blocks. [Citation Graph (, )][DBLP]


  77. Rake transform and edge statistics for image forgery detection. [Citation Graph (, )][DBLP]


  78. Computer graphics identification using genetic algorithm. [Citation Graph (, )][DBLP]


  79. Reversible binary image data hiding by run-length histogram modification. [Citation Graph (, )][DBLP]


  80. A machine learning based scheme for double JPEG compression detection. [Citation Graph (, )][DBLP]


  81. JPEG image steganalysis utilizing both intrablock and interblock correlations. [Citation Graph (, )][DBLP]


  82. First Digit Law and Its Application to Digital Forensics. [Citation Graph (, )][DBLP]


  83. Steganalysis Versus Splicing Detection. [Citation Graph (, )][DBLP]


  84. Optimum Histogram Pair Based Image Lossless Data Embedding. [Citation Graph (, )][DBLP]


  85. Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis. [Citation Graph (, )][DBLP]


  86. Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis. [Citation Graph (, )][DBLP]


  87. An Enhanced Statistical Approach to Identifying Photorealistic Images. [Citation Graph (, )][DBLP]


  88. Detection of Double MPEG Compression Based on First Digit Statistics. [Citation Graph (, )][DBLP]


  89. Run-Length and Edge Statistics Based Approach for Image Splicing Detection. [Citation Graph (, )][DBLP]


  90. A Novel Multi-size Block Benford's Law Scheme for Printer Identification. [Citation Graph (, )][DBLP]


  91. Steganalysis of YASS. [Citation Graph (, )][DBLP]


  92. Detecting doubly compressed JPEG images by using Mode Based First Digit Features. [Citation Graph (, )][DBLP]


  93. Detecting double compression of audio signal. [Citation Graph (, )][DBLP]


Search in 0.023secs, Finished in 0.028secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002