dblp.uni-trier.dewww.uni-trier.de

Shuozhong Wang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
14EEXinpeng Zhang, Shuozhong Wang: Fragile watermarking scheme using a hierarchical mechanism. Signal Processing 89(4): 675-679 (2009)
2008
13EEWeiming Zhang, Xinpeng Zhang, Shuozhong Wang: Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes. Information Hiding 2008: 60-71
2006
12EEXinpeng Zhang, Shuozhong Wang: Information capacity of quantization steganography in the presence of active attack. MMM 2006
2005
11EEXinpeng Zhang, Shuozhong Wang: Watermarking Protocol Compatible with Secret Algorithms for Resisting Invertibility Attack. KES (2) 2005: 1134-1144
10EEXinpeng Zhang, Shuozhong Wang: Analysis of Parity Assignment Steganography in Palette Images. KES (3) 2005: 1025-1031
9EEXinpeng Zhang, Shuozhong Wang: Stego-Encoding with Error Correction Capability. IEICE Transactions 88-A(12): 3663-3667 (2005)
2004
8EEHuaiqing Wang, Shuozhong Wang: Cyber warfare: steganography vs. steganalysis. Commun. ACM 47(10): 76-82 (2004)
7EEXinpeng Zhang, Shuozhong Wang: Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recognition Letters 25(3): 331-339 (2004)
6EEXinpeng Zhang, Shuozhong Wang: Invertibility attack against watermarking based on forged algorithm and a countermeasure. Pattern Recognition Letters 25(8): 967-973 (2004)
2003
5EEKaiwen Zhang, Shuozhong Wang, Xinpeng Zhang: Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation. MMM-ACNS 2003: 360-370
4EEShuozhong Wang, Xinpeng Zhang, Kaiwen Zhang: Data Hiding in Digital Audio by Frequency Domain Dithering. MMM-ACNS 2003: 383-394
3EEXinpeng Zhang, Shuozhong Wang, Kaiwen Zhang: Steganography with Least Histogram Abnormality. MMM-ACNS 2003: 395-406
2EEXinpeng Zhang, Shuozhong Wang, Kaiwen Zhang: Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences. MMM-ACNS 2003: 407-418
2002
1EEXinpeng Zhang, Shuozhong Wang: Watermarking scheme capable of resisting attacks based on availability of inserter. Signal Processing 82(11): 1801-1804 (2002)

Coauthor Index

1Huaiqing Wang [8]
2Kaiwen Zhang [2] [3] [4] [5]
3Weiming Zhang [13]
4Xinpeng Zhang [1] [2] [3] [4] [5] [6] [7] [9] [10] [11] [12] [13] [14]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)