2006 |
8 | EE | Guorong Xuan,
Qiuming Yao,
Chengyun Yang,
Jianjiong Gao,
Peiqi Chai,
Yun Q. Shi,
Zhicheng Ni:
Lossless Data Hiding Using Histogram Shifting Method Based on Integer Wavelets.
IWDW 2006: 323-332 |
2005 |
7 | EE | Guorong Xuan,
Yun Q. Shi,
Chengyun Yang,
Yizhan Zhen,
Dekun Zou,
Peiqi Chai,
Peiqi Chai:
Lossless Data Hiding Using Integer Wavelet Transform and Threshold Embedding Technique.
ICME 2005: 1520-1523 |
6 | EE | Yun Q. Shi,
Guorong Xuan,
Dekun Zou,
Jianjiong Gao,
Chengyun Yang,
Zhenping Zhang,
Peiqi Chai,
Wen Chen,
Chunhua Chen:
Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network.
ICME 2005: 269-272 |
5 | EE | Yun Q. Shi,
Guorong Xuan,
Chengyun Yang,
Jianjiong Gao,
Zhenping Zhang,
Peiqi Chai,
Dekun Zou,
Chunhua Chen,
Wen Chen:
Effective Steganalysis Based on Statistical Moments of Wavelet Characteristic Function.
ITCC (1) 2005: 768-773 |
4 | EE | Guorong Xuan,
Yun Q. Shi,
Jianjiong Gao,
Dekun Zou,
Chengyun Yang,
Zhenping Zhang,
Peiqi Chai,
Chunhua Chen,
Wen Chen:
Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions.
Information Hiding 2005: 262-277 |
2004 |
3 | | Guorong Xuan,
Yun Q. Shi,
Zhicheng Ni,
Jidong Chen,
Chengyun Yang,
Yizhan Zhen,
Junxiang Zheng:
High capacity lossless data hiding based on integer wavelet transform.
ISCAS (2) 2004: 29-32 |
2 | EE | Guorong Xuan,
Chengyun Yang,
Yizhan Zhen,
Yun Q. Shi,
Zhicheng Ni:
Reversible Data Hiding Using Integer Wavelet Transform and Companding Technique.
IWDW 2004: 115-124 |
1 | EE | Guorong Xuan,
Junxiang Zheng,
Chengyun Yang,
Yun Q. Shi,
Dekun Zou,
Liu Liansheng,
Bai Weichao:
A Secure Internet-Based Personal Identity Verification System Using Lossless Watermarking and Fingerprint Recognition.
IWDW 2004: 55-65 |