2008 |
12 | | Haifeng Xiao,
Chunhua Chen,
Wei Su,
John A. Kosinski,
Yun Q. Shi:
Data Mining of Modulation Types Using Cyclostationarity-Based Decision Tree.
DMIN 2008: 3-9 |
11 | EE | Chunhua Chen,
Yun Q. Shi,
Wei Su:
A machine learning based scheme for double JPEG compression detection.
ICPR 2008: 1-4 |
10 | EE | Chunhua Chen,
Yun Q. Shi:
JPEG image steganalysis utilizing both intrablock and interblock correlations.
ISCAS 2008: 3029-3032 |
2007 |
9 | EE | Chunhua Chen,
Yun Q. Shi,
Guorong Xuan:
Steganalyzing Texture Images.
ICIP (2) 2007: 153-156 |
8 | EE | Yun Q. Shi,
Chunhua Chen,
Wen Chen,
Maala P. Kaundinya:
Effect of Recompression on Attacking JPEG Steganographic Schemes An Experimental Study.
ISCAS 2007: 1265-1268 |
7 | EE | Yun Q. Shi,
Chunhua Chen,
Guorong Xuan,
Wei Su:
Steganalysis Versus Splicing Detection.
IWDW 2007: 158-172 |
6 | EE | Yun Q. Shi,
Chunhua Chen,
Wen Chen:
A natural image model approach to splicing detection.
MM&Sec 2007: 51-62 |
2006 |
5 | EE | Chunhua Chen,
Yun Q. Shi,
Wen Chen,
Guorong Xuan:
Statistical Moments Based Universal Steganalysis using JPEG 2-D Array and 2-D Characteristic Function.
ICIP 2006: 105-108 |
4 | EE | Yun Q. Shi,
Chunhua Chen,
Wen Chen:
A Markov Process Based Approach to Effective Attacking JPEG Steganography.
Information Hiding 2006: 249-264 |
2005 |
3 | EE | Yun Q. Shi,
Guorong Xuan,
Dekun Zou,
Jianjiong Gao,
Chengyun Yang,
Zhenping Zhang,
Peiqi Chai,
Wen Chen,
Chunhua Chen:
Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network.
ICME 2005: 269-272 |
2 | EE | Yun Q. Shi,
Guorong Xuan,
Chengyun Yang,
Jianjiong Gao,
Zhenping Zhang,
Peiqi Chai,
Dekun Zou,
Chunhua Chen,
Wen Chen:
Effective Steganalysis Based on Statistical Moments of Wavelet Characteristic Function.
ITCC (1) 2005: 768-773 |
1 | EE | Guorong Xuan,
Yun Q. Shi,
Jianjiong Gao,
Dekun Zou,
Chengyun Yang,
Zhenping Zhang,
Peiqi Chai,
Chunhua Chen,
Wen Chen:
Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions.
Information Hiding 2005: 262-277 |