Yun-Qing Shi
Yun-Qing Shi
Professor of Electrical and Computer Engineering, New Jersey Institute of Technology
Verified email at - Homepage
Cited by
Cited by
Reversible data hiding
Z Ni, YQ Shi, N Ansari, W Su
IEEE Transactions on circuits and systems for video technology 16 (3), 354-362, 2006
Image and video compression for multimedia engineering: Fundamentals, algorithms, and standards
YQ Shi, H Sun
CRC press, 1999
Reversible watermarking algorithm using sorting and prediction
V Sachnev, HJ Kim, J Nam, S Suresh, YQ Shi
IEEE Transactions on Circuits and Systems for Video Technology 19 (7), 989-999, 2009
Efficient steganographic embedding by exploiting modification direction
X Zhang, S Wang
IEEE Communications Letters 10 (11), 781-783, 2006
DCT-based watermark recovering without resorting to the uncorrupted original image
A Piva, M Barni, F Bartolini, V Cappellini
Proceedings of international conference on image processing 1, 520-523, 1997
A survey on image steganography and steganalysis
B Li, J He, J Huang, YQ Shi
Journal of Information Hiding and Multimedia Signal Processing 2 (2), 142-172, 2011
A Markov process based approach to effective attacking JPEG steganography
YQ Shi, C Chen, W Chen
International Workshop on Information Hiding, 249-264, 2006
Embedding image watermarks in DC components
J Huang, YQ Shi, Y Shi
IEEE transactions on circuits and systems for video technology 10 (6), 974-979, 2000
A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression
X Kang, J Huang, YQ Shi, Y Lin
IEEE transactions on circuits and systems for video technology 13 (8), 776-786, 2003
Steganalysis of LSB matching using differences between nonadjacent pixels
Z Xia, X Wang, X Sun, Q Liu, N Xiong
Multimedia Tools and Applications 75 (4), 1947-1962, 2016
A novel difference expansion transform for reversible data embedding
HJ Kim, V Sachnev, YQ Shi, J Nam, HG Choo
IEEE Transactions on Information Forensics and Security 3 (3), 456-465, 2008
Distortionless data hiding based on integer wavelet transform
G Xuan, J Zhu, J Chen, YQ Shi, Z Ni, W Su
Electronics Letters 38 (25), 1646-1648, 2002
Efficiently self-synchronized audio watermarking for assured audio data transmission
S Wu, J Huang, D Huang, YQ Shi
IEEE Transactions on Broadcasting 51 (1), 69-76, 2005
Pairwise prediction-error expansion for efficient reversible data hiding
B Ou, X Li, Y Zhao, R Ni, YQ Shi
IEEE Transactions on Image Processing 22 (12), 5010-5021, 2013
A generalized Benford’s law for JPEG coefficients and its applications in image forensics
D Fu, YQ Shi, W Su
Security, Steganography, and Watermarking of Multimedia Contents IX 6505, 65051L, 2007
DCT 域图像水印: 嵌入对策和算法
黄继武, 程卫东
电子学报 28 (4), 57-60, 2000
JPEG image steganalysis utilizing both intrablock and interblock correlations
C Chen, YQ Shi
2008 IEEE International Symposium on Circuits and Systems, 3029-3032, 2008
Structural design of convolutional neural networks for steganalysis
G Xu, HZ Wu, YQ Shi
IEEE Signal Processing Letters 23 (5), 708-712, 2016
Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions
G Xuan, YQ Shi, J Gao, D Zou, C Yang, Z Zhang, P Chai, C Chen, ...
International Workshop on Information Hiding, 262-277, 2005
Robust lossless image data hiding designed for semi-fragile image authentication
Z Ni, YQ Shi, N Ansari, W Su, Q Sun, X Lin
IEEE Transactions on circuits and systems for video technology 18 (4), 497-509, 2008
The system can't perform the operation now. Try again later.
Articles 1–20