default search action
Shuozhong Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [j39]Heng Yao, Shuozhong Wang, Xinpeng Zhang, Chuan Qin, Jinwei Wang:
Detecting Image Splicing Based on Noise Level Inconsistency. Multim. Tools Appl. 76(10): 12457-12479 (2017) - 2015
- [j38]Yanli Ren, Shuozhong Wang, Xinpeng Zhang, Min-Shiang Hwang:
An Efficient Batch Verifying Scheme for Detecting Illegal Signatures. Int. J. Netw. Secur. 17(4): 463-470 (2015) - 2014
- [j37]Zhenxing Qian, Xinpeng Zhang, Shuozhong Wang:
Reversible Data Hiding in Encrypted JPEG Bitstream. IEEE Trans. Multim. 16(5): 1486-1491 (2014) - 2013
- [j36]Yanli Ren, Shuozhong Wang, Xinpeng Zhang:
Practical parallel key-insulated encryption with multiple helper keys. Comput. Math. Appl. 65(9): 1403-1412 (2013) - [j35]Yan Zhao, Shuozhong Wang, Xinpeng Zhang, Heng Yao:
Robust Hashing for Image Authentication Using Zernike Moments and Local Features. IEEE Trans. Inf. Forensics Secur. 8(1): 55-63 (2013) - [c23]Peizhen Zhang, Shuozhong Wang, Dongyang Fu:
Blind Estimation of Blur Parameters by 2D-DFT on Polar Coordinate System Presented on Rectangular Grids. ICIG 2013: 95-98 - 2012
- [j34]Peizhen Zhang, Shuozhong Wang, Runtian Wang:
Reducing frequency-domain artifacts of binary image due to coarse sampling by repeated interpolation and smoothing of Radon projections. J. Vis. Commun. Image Represent. 23(5): 697-704 (2012) - [j33]Chuan Qin, Shuozhong Wang, Xinpeng Zhang:
Simultaneous inpainting for image structure and texture using anisotropic heat transfer model. Multim. Tools Appl. 56(3): 469-483 (2012) - [j32]Duyao Wang, Sujuan Huang, Guorui Feng, Shuozhong Wang:
Perceptual differential energy watermarking for H.264/AVC. Multim. Tools Appl. 60(3): 537-550 (2012) - [j31]Heng Yao, Shuozhong Wang, Yan Zhao, Xinpeng Zhang:
Detecting Image Forgery Using Perspective Constraints. IEEE Signal Process. Lett. 19(3): 123-126 (2012) - [j30]Xinpeng Zhang, Shuozhong Wang:
Efficient data hiding with histogram-preserving property. Telecommun. Syst. 49(2): 179-185 (2012) - [c22]Yanli Ren, Shuozhong Wang, Xinpeng Zhang:
Anonymous Hierarchical Identity-Based Encryption in Prime Order Groups. ICDKE 2012: 230-242 - [c21]Yanli Ren, Shuozhong Wang, Xinpeng Zhang:
Non-interactive Dynamic Identity-Based Broadcast Encryption without Random Oracles. ICICS 2012: 479-487 - 2011
- [j29]Zhenxing Qian, Guorui Feng, Xinpeng Zhang, Shuozhong Wang:
Image self-embedding with high-quality restoration capability. Digit. Signal Process. 21(2): 278-286 (2011) - [j28]Zhenjun Tang, Shuozhong Wang, Xinpeng Zhang, Weimin Wei:
Structural Feature-Based Image Hashing and Similarity Metric for Tampering Detection. Fundam. Informaticae 106(1): 75-91 (2011) - [j27]Xinpeng Zhang, Shuozhong Wang, Guorui Feng:
Reversible Visible Watermarhing with Lossless Data Embedding Based on Difference Value Shift. Intell. Autom. Soft Comput. 17(2): 233-243 (2011) - [j26]Zhenjun Tang, Shuozhong Wang, Xinpeng Zhang, Weimin Wei, Yan Zhao:
Lexicographical framework for image hashing with implementation based on DCT and NMF. Multim. Tools Appl. 52(2-3): 325-345 (2011) - [j25]Xinpeng Zhang, Shuozhong Wang, Zhenxing Qian, Guorui Feng:
Self-embedding watermark with flexible restoration quality. Multim. Tools Appl. 54(2): 385-395 (2011) - [j24]Qiumin Wu, Shuozhong Wang, Xinpeng Zhang:
Log-Polar Based Scheme for Revealing Duplicated Regions in Digital Images. IEEE Signal Process. Lett. 18(10): 559-562 (2011) - [j23]Xinpeng Zhang, Shuozhong Wang, Zhenxing Qian, Guorui Feng:
Reference Sharing Mechanism for Watermark Self-Embedding. IEEE Trans. Image Process. 20(2): 485-495 (2011) - 2010
- [j22]Hyoung Joong Kim, Cheonshik Kim, YongSoo Choi, Shuozhong Wang, X. Zhang:
Improved modification direction methods. Comput. Math. Appl. 60(2): 319-325 (2010) - [j21]Yanli Ren, Dawu Gu, Shuozhong Wang, Xinpeng Zhang:
Hierarchical Identity-Based Proxy Re-Encryption without Random Oracles. Int. J. Found. Comput. Sci. 21(6): 1049-1063 (2010) - [j20]Yanli Ren, Dawu Gu, Shuozhong Wang, Xinpeng Zhang:
New Fuzzy Identity-Based Encryption in the Standard Model. Informatica 21(3): 393-407 (2010) - [j19]Xinpeng Zhang, Shuozhong Wang, Zhenxing Qian, Guorui Feng:
Reversible fragile watermarking for locating tampered blocks in JPEG images. Signal Process. 90(12): 3026-3036 (2010) - [j18]Weimin Wei, Shuozhong Wang, Xinpeng Zhang, Zhenjun Tang:
Estimation of image rotation angle using interpolation-related spectral signatures with application to blind detection of image forgery. IEEE Trans. Inf. Forensics Secur. 5(3): 507-517 (2010) - [j17]Weiming Zhang, Xinpeng Zhang, Shuozhong Wang:
Near-optimal codes for information embedding in gray-scale signals. IEEE Trans. Inf. Theory 56(3): 1262-1270 (2010) - [c20]Qiumin Wu, Shuozhong Wang, Xinpeng Zhang:
Detection of Image Region-Duplication with Rotation and Scaling Tolerance. ICCCI (1) 2010: 100-108
2000 – 2009
- 2009
- [j16]Xinpeng Zhang, Shuozhong Wang, Weiming Zhang:
Steganography Combining Data Decomposition Mechanism and Stego-coding Method. Informatica (Slovenia) 33(1): 41-48 (2009) - [j15]Xinpeng Zhang, Shuozhong Wang:
Fragile watermarking scheme using a hierarchical mechanism. Signal Process. 89(4): 675-679 (2009) - [c19]Zhenxing Qian, Xinpeng Zhang, Shuozhong Wang:
Matrix Selection in High Payload Embedding. IIH-MSP 2009: 328-331 - [c18]Xinpeng Zhang, Shuozhong Wang, Guorui Feng:
Fragile Watermarking Scheme with Extensive Content Restoration Capability. IWDW 2009: 268-278 - [c17]Zhenjun Tang, Shuozhong Wang, Xinpeng Zhang, Weimin Wei:
Perceptual Similarity Metric Resilient to Rotation for Application in Robust Image Hashing. MUE 2009: 183-188 - 2008
- [j14]Xinpeng Zhang, Shuozhong Wang, Zhenyu Zhou:
Multibit Assignment Steganography in Palette Images. IEEE Signal Process. Lett. 15: 553-556 (2008) - [j13]Xinpeng Zhang, Shuozhong Wang:
Fragile Watermarking With Error-Free Restoration Capability. IEEE Trans. Multim. 10(8): 1490-1499 (2008) - [c16]Weiming Zhang, Xinpeng Zhang, Shuozhong Wang:
Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes. Information Hiding 2008: 60-71 - [c15]Chuan Qin, Shuozhong Wang, Xinpeng Zhang:
Image Editing without Color Inconsistency Using Modified Poisson Equation. IIH-MSP 2008: 397-401 - [c14]Weiming Zhang, Xinpeng Zhang, Shuozhong Wang:
Twice Gric Colorings in Steganography. IIH-MSP 2008: 1301-1304 - 2007
- [j12]Weiming Zhang, Shuozhong Wang, Xinpeng Zhang:
Improving Embedding Efficiency of Covering Codes for Applications in Steganography. IEEE Commun. Lett. 11(8): 680-682 (2007) - [j11]Xinpeng Zhang, Shuozhong Wang:
Watermarking Scheme Capable of Resisting Sensitivity Attack. IEEE Signal Process. Lett. 14(2): 125-128 (2007) - [j10]Xinpeng Zhang, Shuozhong Wang:
Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels. IEEE Signal Process. Lett. 14(10): 727-730 (2007) - [j9]Weiming Zhang, Xinpeng Zhang, Shuozhong Wang:
A Double Layered "Plus-Minus One" Data Embedding Scheme. IEEE Signal Process. Lett. 14(11): 848-851 (2007) - 2006
- [j8]Xinpeng Zhang, Shuozhong Wang:
Efficient Steganographic Embedding by Exploiting Modification Direction. IEEE Commun. Lett. 10(11): 781-783 (2006) - [j7]Xinpeng Zhang, Shuozhong Wang:
Dynamical running coding in digital steganography. IEEE Signal Process. Lett. 13(3): 165-168 (2006) - [c13]Chuan Qin, Wei-Bin Lee, Xinpeng Zhang, Shuozhong Wang:
Copyright Management Using Progressive Image Delivery, Visible Watermarking and Robust Fingerprinting. ICARCV 2006: 1-4 - [c12]Peimin Yan, Shuozhong Wang:
Iterative Image Resolution Enhancement Using MAP Estimator. ICARCV 2006: 1-3 - [c11]Chao Chen, Shuozhong Wang, Xinpeng Zhang:
Information Hiding in Text Using Typesetting Tools with Stego-Encoding. ICICIC (1) 2006: 459-462 - [c10]Shrestha Kedar, Qian Li, Shuozhong Wang:
Replacement of Image Patches with Rugged Soft Boundary Using Texture Synthesis. ICICIC (1) 2006: 648-651 - [c9]Xinpeng Zhang, Shuozhong Wang:
Information capacity of quantization steganography in the presence of active attack. MMM 2006 - [c8]Xuli Shi, Guang Xiao, Shuozhong Wang, Zhaoyang Zhang, Ping An:
Moving traffic object retrieval in H.264/MPEG compressed video. Visual Information Processing 2006: 62460O - 2005
- [j6]Xinpeng Zhang, Shuozhong Wang:
Stego-Encoding with Error Correction Capability. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(12): 3663-3667 (2005) - [j5]Xinpeng Zhang, Shuozhong Wang:
Steganography using multiple-base notational system and human vision sensitivity. IEEE Signal Process. Lett. 12(1): 67-70 (2005) - [c7]Xinpeng Zhang, Shuozhong Wang:
Analysis of Parity Assignment Steganography in Palette Images. KES (3) 2005: 1025-1031 - [c6]Xinpeng Zhang, Shuozhong Wang:
Watermarking Protocol Compatible with Secret Algorithms for Resisting Invertibility Attack. KES (2) 2005: 1134-1144 - 2004
- [j4]Huaiqing Wang, Shuozhong Wang:
Cyber warfare: steganography vs. steganalysis. Commun. ACM 47(10): 76-82 (2004) - [j3]Xinpeng Zhang, Shuozhong Wang:
Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recognit. Lett. 25(3): 331-339 (2004) - [j2]Xinpeng Zhang, Shuozhong Wang:
Invertibility attack against watermarking based on forged algorithm and a countermeasure. Pattern Recognit. Lett. 25(8): 967-973 (2004) - [c5]Xinpeng Zhang, Shuozhong Wang:
A new watermarking scheme against inserter-based attacks suitable for digital media with moderate size. InfoSecu 2004: 247-248 - 2003
- [c4]Kaiwen Zhang, Shuozhong Wang, Xinpeng Zhang:
Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation. MMM-ACNS 2003: 360-370 - [c3]Shuozhong Wang, Xinpeng Zhang, Kaiwen Zhang:
Data Hiding in Digital Audio by Frequency Domain Dithering. MMM-ACNS 2003: 383-394 - [c2]Xinpeng Zhang, Shuozhong Wang, Kaiwen Zhang:
Steganography with Least Histogram Abnormality. MMM-ACNS 2003: 395-406 - [c1]Xinpeng Zhang, Shuozhong Wang, Kaiwen Zhang:
Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences. MMM-ACNS 2003: 407-418 - 2002
- [j1]Xinpeng Zhang, Shuozhong Wang:
Watermarking scheme capable of resisting attacks based on availability of inserter. Signal Process. 82(11): 1801-1804 (2002)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-26 18:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint