Skip to main content

and
  1. No Access

    Article

    Extraction of color-intensity feature towards image authentication

    A color-intensity feature extraction method is proposed aimed at supplementing conventional image hashing algorithms that only consider intensity of the image. An image is mapped to a set of blocks represented...

    Ting-ting Liu 刘婷婷, Shuo-zhong Wang 王朔中 in Journal of Shanghai University (English Ed… (2010)

  2. No Access

    Article

    Parallel computation of unified finite-difference time-domain for underwater sound scattering

    In this work, we treat scattering objects, water, surface and bottom in a truly unified manner in a parallel finite-difference time-domain (FDTD) scheme, which is suitable for distributed parallel computing in...

    Yu-tian Feng 冯玉田, Shuo-zhong Wang 王朔中 in Journal of Shanghai University (English Edition) (2008)

  3. No Access

    Article

    Layered image inpainting based on image decomposition

    We propose a layered image inpainting scheme based on image decomposition. The damaged image is first decomposed into three layers: cartoon, edge, and texture. The cartoon and edge layers are repaired using an...

    Shrestha Kedar, Chuan Qin 秦川 in Journal of Shanghai University (English Ed… (2007)

  4. No Access

    Article

    Recent development of perceptual image hashing

    The easy generation, storage, transmission and reproduction of digital images have caused serious abuse and security problems. Assurance of the rightful ownership, integrity, and authenticity is a major concer...

    Wang Shuo-zhong PhD 王朔中, Zhang **n-peng 张新鹏 in Journal of Shanghai University (English Ed… (2007)

  5. No Access

    Article

    Steganography in binary image by checking data-carrying eligibility of boundary pixels

    We present a novel scheme for embedding secret data into a binary image without introducing noticeable artifacts. Unlike some block-based methods, the proposed scheme encodes the secret bits directly into boun...

    Guang-lan Liang 梁光岚, Shuo-zhong Wang 王朔中 in Journal of Shanghai University (English Ed… (2007)

  6. No Access

    Article

    Image block feature vectors based on a singular-value information metric and color-texture description

    In this work, image feature vectors are formed for blocks containing sufficient information, which are selected using a singular-value criterion. When the ratio between the first two SVs are below a given thre...

    Shuo-zhong Wang 王朔中, **ng Lu 路兴 in Journal of Shanghai University (English Ed… (2007)

  7. No Access

    Article

    Electrical impedance tomography using adaptive mesh refinement

    In electrical impedance tomography (EFT), distribution of the internal resistivity or conductivity of an unknown object is estimated using measured boundary voltage data induced by different current patterns w...

    Pei-min Yan Ph. D., Shuo-zhong Wang Ph. D. in Journal of Shanghai University (English Ed… (2006)

  8. No Access

    Article

    Undercover communication using image and text as disguise and countermeasures

    A brief survey of some representative techniques of steganography and steganalysis is presented. Various methods developed in the authors’ laboratory are introduced, including symmetric LSB embedding, secure s...

    Shuo-zhong Wang Ph. D., Chao Chen in Journal of Shanghai University (English Ed… (2006)

  9. No Access

    Article

    Spatial domain technique for visible watermarking

    A new technique for embedding visible watermarks into a digital image is described in this paper, which uses statistical properties of each pixel and its immediate surrounding pixels in the host image, and als...

    Peter Adjei Fordjour, Shuo-Zhong Wang Ph. D. in Journal of Shanghai University (English Ed… (2003)

  10. No Access

    Article

    Watermarking capable of identifying embedding order based on an arithmetic mechanism

    A digital watermark as a means for copyright protection may be crippled when a fake mark is embedded on top of it since both watermarks are detectable. In dealing with this problem, a watermarking scheme that ...

    **n-Peng Zhang Ph. D. Candidate in Journal of Shanghai University (English Ed… (2003)

  11. No Access

    Article

    Speaker identification based on fractal dimensions

    This paper discusses application of fractal dimensions to speech processing. Generalized dimensions of arbitrary orders and associated fractal parameters are used in speaker identification. A characteristic va...

    Li-Min Hou M.Sc., Shuo-Zhong Wang in Journal of Shanghai University (English Edition) (2003)

  12. No Access

    Article

    Steganographic technique capable of withstanding RQP analysis

    A new steganographic approach for 24-bit color images that can resist the RQP(raw-quick-pairs) steganalysis is described. The technique is based on modification of color triplets such that the existing color p...

    Shuo-Zhong Wang Ph. D., **n-Peng Zhang in Journal of Shanghai University (English Ed… (2002)

  13. No Access

    Article

    Error reduction for visible watermarking in still images

    Different digital watermarking techniques and their applications are briefly reviewed. Solution to a practical problem with visible image marking is presented, together with experimental results and discussion...

    Ljubisa Radunovic M. Eng. in Journal of Shanghai University (English Ed… (2002)

  14. No Access

    Article

    Spectral analysis of stock data series and evidence of day-of-the-week effects

    Daily return series of Dow Jones Industrial Average Index (DJIA) and Shanghai Conposite Index are investigated using spectral analysis methods. The day-of-the-week effect is found in the frequency domain in bo...

    Wei-Hua, Li, Shuo-Zhong Wang Ph. D. in Journal of Shanghai University (English Edition) (2002)

  15. No Access

    Article

    Hurst exponent analysis of financial time series

    Statistical properties of stock market time series and the implication of their Hurst exponents are discussed. Hurst exponents of DJIA (Dow Jones Industrial Average) components are tested using re-scaled range...

    Hong-wei SANG Ph. D. Candidate, Tian Ma in Journal of Shanghai University (English Ed… (2001)

  16. No Access

    Article

    Evolutionary computation for image feature extraction

    Modifications to an image feature extraction approach involving evolutionary computation and autonomous agents are proposed. The described algorithm allows extraction of features with certain specified charact...

    Radunovic Ljubisa, Shuo-zhong Wang in Journal of Shanghai University (English Edition) (2000)

  17. No Access

    Article

    Watermarking based on principal component analysis

    A new watermarking scheme using principal component analysis (PCA) is described. The proposed method inserts highly robust watermarks into still images without degrading their visual quality. Experimental resu...

    Shuo-zhong Wang in Journal of Shanghai University (English Edition) (2000)

  18. No Access

    Article

    Simulation of radio path strength for multipath propagation in land mobile communications

    Based on the characteristics of the radio propagation in land mobile communications environment, a theoretical model for the reflecting (scattering) number of each radio path is derived firstly. This model can...

    Shichang Gao Ph. D., Changyin Jiang, Jun Li in Journal of Shanghai University (English Ed… (1998)