The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Dekun Zou: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Constantine N. Manikopoulos, Yun-Qing Shi, Sui Song, Zheng Zhang, Zhicheng Ni, Dekun Zou
    Detection of block DCT-based steganography in gray-scale images. [Citation Graph (0, 0)][DBLP]
    IEEE Workshop on Multimedia Signal Processing, 2002, pp:355-358 [Conf]
  2. Guorong Xuan, Yun Q. Shi, Jianjiong Gao, Dekun Zou, Chengyun Yang, Zhenping Zhang, Peiqi Chai, Chunhua Chen, Wen Chen
    Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2005, pp:262-277 [Conf]
  3. Dekun Zou, Yun Q. Shi
    Formatted text document data hiding robust to printing, copying and scanning. [Citation Graph (0, 0)][DBLP]
    ISCAS (5), 2005, pp:4971-4974 [Conf]
  4. Yun Q. Shi, Zhicheng Ni, Dekun Zou, Changyin Liang, Guorong Xuan
    Lossless data hiding: fundamentals, algorithms and applications. [Citation Graph (0, 0)][DBLP]
    ISCAS (2), 2004, pp:33-36 [Conf]
  5. Yun Q. Shi, Guorong Xuan, Chengyun Yang, Jianjiong Gao, Zhenping Zhang, Peiqi Chai, Dekun Zou, Chunhua Chen, Wen Chen
    Effective Steganalysis Based on Statistical Moments of Wavelet Characteristic Function. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:768-773 [Conf]
  6. Guorong Xuan, Junxiang Zheng, Chengyun Yang, Yun Q. Shi, Dekun Zou, Liu Liansheng, Bai Weichao
    A Secure Internet-Based Personal Identity Verification System Using Lossless Watermarking and Fingerprint Recognition. [Citation Graph (0, 0)][DBLP]
    IWDW, 2004, pp:55-65 [Conf]
  7. Dekun Zou, Jun Tian, Jeffrey Bloom, Jiefu Zhai
    Data Hiding in Film Grain. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:197-211 [Conf]
  8. Dekun Zou, Yun Q. Shi, Zhicheng Ni, Wei Su
    A Semi-Fragile Lossless Digital Watermarking Scheme Based on Integer Wavelet Transform. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Circuits Syst. Video Techn., 2006, v:16, n:10, pp:1294-1300 [Journal]

  9. Steganalysis based on Markov Model of Thresholded Prediction-Error Image. [Citation Graph (, )][DBLP]


  10. Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network. [Citation Graph (, )][DBLP]


  11. Lossless Data Hiding Using Integer Wavelet Transform and Threshold Embedding Technique. [Citation Graph (, )][DBLP]


  12. Compressed video stream watermarking for peer-to-peer based content distribution network. [Citation Graph (, )][DBLP]


  13. H.264 stream replacement watermarking with CABAC encoding. [Citation Graph (, )][DBLP]


  14. H.264/AVC stream replacement technique for video watermarking. [Citation Graph (, )][DBLP]


  15. H.264/AVC substitution watermarking: a CAVLC example. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002