dblp.uni-trier.dewww.uni-trier.de

Guorong Xuan

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
27EEWen Chen, Yun Q. Shi, Guorong Xuan, Wei Su: Computer graphics identification using genetic algorithm. ICPR 2008: 1-4
26EEGuorong Xuan, Yun Q. Shi, Peiqi Chai, Xuefeng Tong, Jianzhong Teng, Jue Li: Reversible binary image data hiding by run-length histogram modification. ICPR 2008: 1-4
2007
25EEGuorong Xuan, Xiuming Zhu, Yun Q. Shi, Peiqi Chai, Xia Cui, Jue Li: A Novel Bayesian Classifier with Smaller Eigenvalues Reset by Threshold Based on Given Database. ICIAR 2007: 375-386
24EEGuorong Xuan, Yun Q. Shi, Zhicheng Ni, Peiqi Chai, Xia Cui, Xuefeng Tong: Reversible Data Hiding for JPEG Images Based on Histogram Pairs. ICIAR 2007: 715-727
23EEChunhua Chen, Yun Q. Shi, Guorong Xuan: Steganalyzing Texture Images. ICIP (2) 2007: 153-156
22EEWen Chen, Yun Q. Shi, Guorong Xuan: Identifying Computer Graphics using HSV Color Model and Statistical Moments of Characteristic Functions. ICME 2007: 1123-1126
21EEGuorong Xuan, Xia Cui, Yun Q. Shi, Wen Chen, Xuefeng Tong, Cong Huang: JPEG Steganalysis Based on Classwise Non-Principal Components Analysis and Multi-Directional Markov Model. ICME 2007: 903-906
20EEYun Q. Shi, Chunhua Chen, Guorong Xuan, Wei Su: Steganalysis Versus Splicing Detection. IWDW 2007: 158-172
19EEGuorong Xuan, Yun Q. Shi, Peiqi Chai, Xia Cui, Zhicheng Ni, Xuefeng Tong: Optimum Histogram Pair Based Image Lossless Data Embedding. IWDW 2007: 264-278
2006
18EEChunhua Chen, Yun Q. Shi, Wen Chen, Guorong Xuan: Statistical Moments Based Universal Steganalysis using JPEG 2-D Array and 2-D Characteristic Function. ICIP 2006: 105-108
17EEDekun Zou, Yun Q. Shi, Wei Su, Guorong Xuan: Steganalysis based on Markov Model of Thresholded Prediction-Error Image. ICME 2006: 1365-1368
16EEGuorong Xuan, Xiuming Zhu, Peiqi Chai, Zhenping Zhang, Yun Q. Shi, Dongdong Fu: Feature Selection based on the Bhattacharyya Distance. ICPR (3) 2006: 1232-1235
15EEGuorong Xuan, Peiqi Chai, Xiuming Zhu, Qiuming Yao, Cong Huang, Yun Q. Shi, Dongdong Fu: A Novel Pattern Classification Scheme: Classwise Non-Principal Component Analysis (CNPCA). ICPR (3) 2006: 320-323
14EEGuorong Xuan, Xiuming Zhu, Peiqi Chai, Zhenping Zhang, Yun Q. Shi, Dongdong Fu: Feature Selection based on the Bhattacharyya Distance. ICPR (4) 2006: 957
13EEGuorong Xuan, Qiuming Yao, Chengyun Yang, Jianjiong Gao, Peiqi Chai, Yun Q. Shi, Zhicheng Ni: Lossless Data Hiding Using Histogram Shifting Method Based on Integer Wavelets. IWDW 2006: 323-332
12EEGuorong Xuan, Yun Q. Shi, Cong Huang, Dongdong Fu, Xiuming Zhu, Peiqi Chai, Jianjiong Gao: Steganalysis Using High-Dimensional Features Derived from Co-occurrence Matrix and Class-Wise Non-Principal Components Analysis (CNPCA). IWDW 2006: 49-60
2005
11EEGuorong Xuan, Yun Q. Shi, Chengyun Yang, Yizhan Zhen, Dekun Zou, Peiqi Chai, Peiqi Chai: Lossless Data Hiding Using Integer Wavelet Transform and Threshold Embedding Technique. ICME 2005: 1520-1523
10EEYun Q. Shi, Guorong Xuan, Dekun Zou, Jianjiong Gao, Chengyun Yang, Zhenping Zhang, Peiqi Chai, Wen Chen, Chunhua Chen: Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network. ICME 2005: 269-272
9EEYun Q. Shi, Guorong Xuan, Chengyun Yang, Jianjiong Gao, Zhenping Zhang, Peiqi Chai, Dekun Zou, Chunhua Chen, Wen Chen: Effective Steganalysis Based on Statistical Moments of Wavelet Characteristic Function. ITCC (1) 2005: 768-773
8EEGuorong Xuan, Yun Q. Shi, Jianjiong Gao, Dekun Zou, Chengyun Yang, Zhenping Zhang, Peiqi Chai, Chunhua Chen, Wen Chen: Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions. Information Hiding 2005: 262-277
2004
7 Guorong Xuan, Yun Q. Shi, Zhicheng Ni, Jidong Chen, Chengyun Yang, Yizhan Zhen, Junxiang Zheng: High capacity lossless data hiding based on integer wavelet transform. ISCAS (2) 2004: 29-32
6 Yun Q. Shi, Zhicheng Ni, Dekun Zou, Changyin Liang, Guorong Xuan: Lossless data hiding: fundamentals, algorithms and applications. ISCAS (2) 2004: 33-36
5EEGuorong Xuan, Chengyun Yang, Yizhan Zhen, Yun Q. Shi, Zhicheng Ni: Reversible Data Hiding Using Integer Wavelet Transform and Companding Technique. IWDW 2004: 115-124
4EEGuorong Xuan, Junxiang Zheng, Chengyun Yang, Yun Q. Shi, Dekun Zou, Liu Liansheng, Bai Weichao: A Secure Internet-Based Personal Identity Verification System Using Lossless Watermarking and Fingerprint Recognition. IWDW 2004: 55-65
2002
3 Guorong Xuan, Jidong Chen, Jiang Zhu, Yun Q. Shi, Zhicheng Ni, Wei Su: Lossless data hiding based on integer wavelet transform. IEEE Workshop on Multimedia Signal Processing 2002: 312-315
2001
2EEGuorong Xuan, Wei Zhang, Peiqi Chai: EM algorithms of Gaussian mixture model and hidden Markov model. ICIP (1) 2001: 145-148
1994
1EEWeixin Xia, Guorong Xuan, Peiqi Chai: Periodic pattern graphics. Computers & Graphics 18(1): 81-86 (1994)

Coauthor Index

1Peiqi Chai [1] [2] [8] [9] [10] [11] [12] [13] [14] [15] [16] [19] [24] [25] [26]
2Chunhua Chen [8] [9] [10] [18] [20] [23]
3Jidong Chen [3] [7]
4Wen Chen [8] [9] [10] [18] [21] [22] [27]
5Xia Cui [19] [21] [24] [25]
6Dongdong Fu [12] [14] [15] [16]
7Jianjiong Gao [8] [9] [10] [12] [13]
8Cong Huang [12] [15] [21]
9Jue Li [25] [26]
10Changyin Liang [6]
11Liu Liansheng [4]
12Zhicheng Ni [3] [5] [6] [7] [13] [19] [24]
13Yun Q. Shi (Yun-Qing Shi) [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] [25] [26] [27]
14Wei Su [3] [17] [20] [27]
15Jianzhong Teng [26]
16Xuefeng Tong [19] [21] [24] [26]
17Bai Weichao [4]
18Weixin Xia [1]
19Chengyun Yang [4] [5] [7] [8] [9] [10] [11] [13]
20Qiuming Yao [13] [15]
21Wei Zhang [2]
22Zhenping Zhang [8] [9] [10] [14] [16]
23Yizhan Zhen [5] [7] [11]
24Junxiang Zheng [4] [7]
25Jiang Zhu [3]
26Xiuming Zhu [12] [14] [15] [16] [25]
27Dekun Zou [4] [6] [8] [9] [10] [11] [17]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)