Follow
Yun-Qing Shi
Yun-Qing Shi
Professor of Electrical and Computer Engineering, New Jersey Institute of Technology
Verified email at njit.edu - Homepage
Title
Cited by
Cited by
Year
Reversible data hiding
Z Ni, YQ Shi, N Ansari, W Su
IEEE Transactions on circuits and systems for video technology 16 (3), 354-362, 2006
36712006
Reversible watermarking algorithm using sorting and prediction
V Sachnev, HJ Kim, J Nam, S Suresh, YQ Shi
IEEE Transactions on Circuits and Systems for Video Technology 19 (7), 989-999, 2009
10322009
Image and video compression for multimedia engineering: Fundamentals, algorithms, and standards
YQ Shi, H Sun
CRC press, 2019
9042019
Structural design of convolutional neural networks for steganalysis
G Xu, HZ Wu, YQ Shi
IEEE Signal Processing Letters 23 (5), 708-712, 2016
7522016
Reversible data hiding: Advances in the past two decades
YQ Shi, X Li, X Zhang, HT Wu, B Ma
IEEE access 4, 3210-3237, 2016
5852016
Pairwise prediction-error expansion for efficient reversible data hiding
B Ou, X Li, Y Zhao, R Ni, YQ Shi
IEEE Transactions on image processing 22 (12), 5010-5021, 2013
5482013
A Markov process based approach to effective attacking JPEG steganography
YQ Shi, C Chen, W Chen
Information Hiding: 8th International Workshop, IH 2006, Alexandria, VA, USA …, 2007
5212007
A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression
X Kang, J Huang, YQ Shi, Y Lin
IEEE transactions on circuits and systems for video technology 13 (8), 776-786, 2003
4982003
Embedding image watermarks in DC components
J Huang, YQ Shi, Y Shi
IEEE transactions on circuits and systems for video technology 10 (6), 974-979, 2000
4942000
A novel difference expansion transform for reversible data embedding
HJ Kim, V Sachnev, YQ Shi, J Nam, HG Choo
IEEE Transactions on Information Forensics and Security 3 (3), 456-465, 2008
4572008
A generalized Benford’s law for JPEG coefficients and its applications in image forensics
D Fu, YQ Shi, W Su
Security, Steganography, and Watermarking of Multimedia Contents IX 6505 …, 2007
4022007
Distortionless data hiding based on integer wavelet transform
G Xuan, J Zhu, J Chen, YQ Shi, Z Ni, W Su
Electronics Letters 38 (25), 1646-1648, 2002
3932002
Efficiently self-synchronized audio watermarking for assured audio data transmission
S Wu, J Huang, D Huang, YQ Shi
IEEE Transactions on Broadcasting 51 (1), 69-76, 2005
3812005
Uniform embedding for efficient JPEG steganography
L Guo, J Ni, YQ Shi
IEEE transactions on Information Forensics and Security 9 (5), 814-825, 2014
3472014
JPEG image steganalysis utilizing both intrablock and interblock correlations
C Chen, YQ Shi
2008 IEEE International Symposium on Circuits and Systems (ISCAS), 3029-3032, 2008
3472008
DCT 域图像水印: 嵌入对策和算法
黄继武, 程卫东
电子学报 28 (4), 57-60, 2000
3212000
Using statistical image model for JPEG steganography: Uniform embedding revisited
L Guo, J Ni, W Su, C Tang, YQ Shi
IEEE Transactions on Information Forensics and Security 10 (12), 2669-2680, 2015
3142015
Distance-reciprocal distortion measure for binary document images
H Lu, AC Kot, YQ Shi
IEEE Signal Processing Letters 11 (2), 228-231, 2004
3022004
A natural image model approach to splicing detection
YQ Shi, C Chen, W Chen
Proceedings of the 9th workshop on Multimedia & security, 51-62, 2007
2952007
Robust lossless image data hiding designed for semi-fragile image authentication
Z Ni, YQ Shi, N Ansari, W Su, Q Sun, X Lin
IEEE Transactions on circuits and systems for video technology 18 (4), 497-509, 2008
2872008
The system can't perform the operation now. Try again later.
Articles 1–20