Follow
Yun-Qing Shi
Yun-Qing Shi
Professor of Electrical and Computer Engineering, New Jersey Institute of Technology
Verified email at njit.edu - Homepage
Title
Cited by
Cited by
Year
Reversible data hiding
Z Ni, YQ Shi, N Ansari, W Su
IEEE Transactions on circuits and systems for video technology 16 (3), 354-362, 2006
36202006
Reversible watermarking algorithm using sorting and prediction
V Sachnev, HJ Kim, J Nam, S Suresh, YQ Shi
IEEE Transactions on Circuits and Systems for Video Technology 19 (7), 989-999, 2009
10162009
Image and video compression for multimedia engineering: Fundamentals, algorithms, and standards
YQ Shi, H Sun
CRC press, 2019
9002019
Structural design of convolutional neural networks for steganalysis
G Xu, HZ Wu, YQ Shi
IEEE Signal Processing Letters 23 (5), 708-712, 2016
7272016
Reversible data hiding: Advances in the past two decades
YQ Shi, X Li, X Zhang, HT Wu, B Ma
IEEE access 4, 3210-3237, 2016
5692016
Pairwise prediction-error expansion for efficient reversible data hiding
B Ou, X Li, Y Zhao, R Ni, YQ Shi
IEEE Transactions on image processing 22 (12), 5010-5021, 2013
5352013
A Markov process based approach to effective attacking JPEG steganography
YQ Shi, C Chen, W Chen
Information Hiding: 8th International Workshop, IH 2006, Alexandria, VA, USA …, 2007
5172007
A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression
X Kang, J Huang, YQ Shi, Y Lin
IEEE transactions on circuits and systems for video technology 13 (8), 776-786, 2003
4952003
Embedding image watermarks in DC components
J Huang, YQ Shi, Y Shi
IEEE transactions on circuits and systems for video technology 10 (6), 974-979, 2000
4902000
A novel difference expansion transform for reversible data embedding
HJ Kim, V Sachnev, YQ Shi, J Nam, HG Choo
IEEE Transactions on Information Forensics and Security 3 (3), 456-465, 2008
4562008
A generalized Benford’s law for JPEG coefficients and its applications in image forensics
D Fu, YQ Shi, W Su
Security, Steganography, and Watermarking of Multimedia Contents IX 6505 …, 2007
3972007
Distortionless data hiding based on integer wavelet transform
G Xuan, J Zhu, J Chen, YQ Shi, Z Ni, W Su
Electronics Letters 38 (25), 1646-1648, 2002
3912002
Efficiently self-synchronized audio watermarking for assured audio data transmission
S Wu, J Huang, D Huang, YQ Shi
IEEE Transactions on Broadcasting 51 (1), 69-76, 2005
3762005
JPEG image steganalysis utilizing both intrablock and interblock correlations
C Chen, YQ Shi
2008 IEEE International Symposium on Circuits and Systems (ISCAS), 3029-3032, 2008
3432008
Uniform embedding for efficient JPEG steganography
L Guo, J Ni, YQ Shi
IEEE transactions on Information Forensics and Security 9 (5), 814-825, 2014
3342014
DCT 域图像水印: 嵌入对策和算法
黄继武, 程卫东
电子学报 28 (4), 57-60, 2000
3212000
Using statistical image model for JPEG steganography: Uniform embedding revisited
L Guo, J Ni, W Su, C Tang, YQ Shi
IEEE Transactions on Information Forensics and Security 10 (12), 2669-2680, 2015
3032015
Distance-reciprocal distortion measure for binary document images
H Lu, AC Kot, YQ Shi
IEEE Signal Processing Letters 11 (2), 228-231, 2004
3032004
A natural image model approach to splicing detection
YQ Shi, C Chen, W Chen
Proceedings of the 9th workshop on Multimedia & security, 51-62, 2007
2902007
Robust lossless image data hiding designed for semi-fragile image authentication
Z Ni, YQ Shi, N Ansari, W Su, Q Sun, X Lin
IEEE Transactions on circuits and systems for video technology 18 (4), 497-509, 2008
2842008
The system can't perform the operation now. Try again later.
Articles 1–20