Skip to main content

previous disabled Page of 3
and
  1. Article

    Open Access

    Recognition of printed small texture modules based on dictionary learning

    Quick Response (QR) codes are designed for information storage and high-speed reading applications. To store additional information, Two-Level QR (2LQR) codes replace black modules in standard QR codes with sp...

    Lifang Yu, Gang Cao, Huawei Tian, Peng Cao in EURASIP Journal on Image and Video Process… (2021)

  2. No Access

    Article

    A multi-purpose image forensic method using densely connected convolutional neural networks

    Multi-purpose forensics is attracting increasing attention worldwide. In this paper, we propose a multi-purpose method based on densely connected convolutional neural networks (CNNs) for simultaneous detection...

    Yifang Chen, **angui Kang, Yun Q. Shi in Journal of Real-Time Image Processing (2019)

  3. No Access

    Chapter and Conference Paper

    Optimal Histogram-Pair and Prediction-Error Based Reversible Data Hiding for Medical Images

    In recent years, with the development of application research on medical images and medical documents, it is urgent to embed data, such as patient’s personal information, diagnostic information and verificatio...

    Xuefeng Tong, **n Wang, Guorong Xuan, Shumeng Li in Digital-Forensics and Watermarking (2016)

  4. No Access

    Book

  5. No Access

    Book

  6. No Access

    Chapter and Conference Paper

    Non-uniform Quantization in Breaking HUGO

    In breaking HUGO (Highly Undetectable Stegonagraphy), an advanced steganographic scheme recently developed for uncompressed images, the research on steganalysis has made rapid progress recently. That is, more ...

    Licong Chen, Yun Q. Shi, Patchara Sutthiwan in Digital-Forensics and Watermarking (2014)

  7. No Access

    Book and Conference Proceedings

    The International Workshop on Digital Forensics and Watermarking 2012

    11th International Workshop, IWDW 2012, Shanghai, China, October 31 – November 3, 2012, Revised Selected Papers

    Yun Q. Shi, Hyoung-Joong Kim in Lecture Notes in Computer Science (2013)

  8. Chapter and Conference Paper

    Erratum to: The International Workshop on Digital Forensics and Watermarking 2012

    In the original version, the booktitle is wrong. The correct title is given below:

    Yun Q. Shi, Hyoung-Joong Kim in The International Workshop on Digital Fore… (2013)

  9. No Access

    Chapter and Conference Paper

    Textural Features for Steganalysis

    It is observed that the co-occurrence matrix, one kind of textural features proposed by Haralick et al., has played a very critical role in steganalysis. On the other hand, the data hidden in the image texture...

    Yun Q. Shi, Patchara Sutthiwan, Licong Chen in Information Hiding (2013)

  10. No Access

    Chapter and Conference Paper

    A Novel Map** Scheme for Steganalysis

    Recently the research on steganalysis for breaking HUGO has been further moved ahead. A novel map** scheme is reported in this paper. Through a Huffman coding like procedure, this scheme can lower the featur...

    Licong Chen, Yun Q. Shi, Patchara Sutthiwan in The International Workshop on Digital Fore… (2013)

  11. Article

    Open Access

    Detection of tampered region for JPEG images by using mode-based first digit features

    With the widespread availability of image editing software, digital images have been becoming easy to manipulate and edit even for non-professional users. For a tampered Joint Photographic Experts Group (JPEG)...

    **ang Hua Li, Yu Qian Zhao, Miao Liao in EURASIP Journal on Advances in Signal Proc… (2012)

  12. No Access

    Book and Conference Proceedings

  13. No Access

    Book and Conference Proceedings

  14. No Access

    Chapter and Conference Paper

    A Drift Compensation Algorithm for H.264/AVC Video Robust Watermarking Scheme

    A novel drift compensation algorithm for robust H.264/AVC video watermarking scheme is proposed. The drift compensation algorithm is implemented to reduce the visual distortion, which includes the reduction of...

    **nghao Jiang, Tanfeng Sun, Yue Zhou, Yun Q. Shi in Digital Forensics and Watermarking (2012)

  15. No Access

    Chapter and Conference Paper

    Anti-Forensics of Double JPEG Compression Detection

    In this paper, a simple yet effective anti-forensic scheme capable of misleading double JPEG compression detection techniques is proposed. Based on image resizing with bilinear interpolation, the proposed oper...

    Patchara Sutthiwan, Yun Q. Shi in Digital Forensics and Watermarking (2012)

  16. No Access

    Chapter and Conference Paper

    Steganography in Streaming Multimedia over Networks

    This paper presents steganography methods to covertly transmit data via RTP (Real-time Transport Protocol) header and RTP payload in multimedia streaming over networks. The proposed covert channels do not chan...

    Hong Zhao, Yun Q. Shi, Nirwan Ansari in Transactions on Data Hiding and Multimedia… (2012)

  17. No Access

    Book and Conference Proceedings

  18. No Access

    Chapter and Conference Paper

    Passive Detection of Paint-Doctored JPEG Images

    Image painting is an image doctoring method to remove particular objects. In this paper, a novel passive detection method for paint-doctored JPEG images is proposed when the doctored image is saved in an uncom...

    Yu Qian Zhao, Frank Y. Shih, Yun Q. Shi in Digital Watermarking (2011)

  19. No Access

    Chapter and Conference Paper

    Markovian Rake Transform for Digital Image Tampering Detection

    An effective framework for passive-blind color image tampering detection is presented in this paper. The proposed image statistical features are generated by applying Markovian rake transform to image luminanc...

    Patchara Sutthiwan, Yun Q. Shi, Hong Zhao in Transactions on Data Hiding and Multimedia… (2011)

  20. No Access

    Book

previous disabled Page of 3