1 |
Structural Feature-Based Image Hashing and Similarity Metric for Tampering Detection
|
期刊论文 |
Tang, Zhenjun|Wang, Shuozhong|Zhang, Xinpeng|Wei, Weimin| |
2 |
一种连续型多进制条码的编码方法及其解码方法
|
专利 |
|
3 |
频闪场景的图像拍摄方法及对该方法获得的频闪图像的处理方法
|
专利 |
|
4 |
Blind detection of video sequence montage based on GOP abnormality
|
期刊论文 |
Qin, Yun-Long1|Sun, Guang-Ling1|Wang, Shuo-Zhong1|Zhang, Xin-Peng1| |
5 |
A novel bayes'; theorem-based saliency detection model
|
期刊论文 |
He X.|Jing H.|Han Q.|Niu X.| |
6 |
A NOVEL IRIS LOCATION ALGORITHM
|
期刊论文 |
Wang, Zhifang|Han, Qi| |
7 |
基于像素分组策略的可逆数据隐藏方法
|
专利 |
|
8 |
A novel nonparametric approach for saliency detection using multiple features
|
期刊论文 |
He, Xin1|Jing, Huiyun1|Han, Qi1|Niu, Xiamu1| |
9 |
Streaming Media Architectures, Techniques, and Applications: Recent Advances
|
专著 |
朱策|李岳楠|牛夏牧| |
10 |
Reversible Data Hiding in Encrypted Image
|
期刊论文 |
Zhang, Xinpeng| |
11 |
A Multi-Scale Structural Degradation Metric for Perceptual Evaluation of 3D Mesh Simplification
|
期刊论文 |
Shi, Zhenfeng|Niu, Xiamu|Yu, Liyang| |
12 |
Robust Image Hashing Based on Random Gabor Filtering and Dithered Lattice Vector Quantization
|
期刊论文 |
Li, Yuenan|Lu, Zheming|Zhu, Ce|Niu, Xiamu| |
13 |
Image hashing framework for tampering localization in distorted images
|
期刊论文 |
Hu, Yuan-Yuan|Luo, Hao|Niu, Xia-Mu| |
14 |
一种改进Floyd-Steinberg算法的彩色图像处理方法
|
专利 |
|
15 |
Motion vector based information hiding algorithm for H.264/AVC against motion vector steganalysis
|
期刊论文 |
Jing H.|He X.|Han Q.|Niu X.| |
16 |
Inpainting assisted self recovery with decreased embedding data
|
期刊论文 |
Qian Z.|Guorui F.| |
17 |
Lossy compression and iterative reconstruction for encrypted image
|
期刊论文 |
Zhang X.| |
18 |
Region Diversity Based Saliency Density Maximization for Salient Object Detection
|
期刊论文 |
He, Xin|Jing, Huiyun|Han, Qi|Niu, Xiamu| |
19 |
PERCEPTUAL SPEECH HASHING AND PERFORMANCE EVALUATION
|
期刊论文 |
Jiao, Yuhua|Ji, Liping|Niu, Xiamu| |
20 |
Image perceptual hashing based on human visual system
|
期刊论文 |
Zhang H.|Zhang H.-B.|Li Q.|Niu X.-M.| |
21 |
一种图像毛刺去除的方法
|
专利 |
|
22 |
基于Android智能手机的应用程序行为状态转换模式识别方法
|
专利 |
|
23 |
A kinematics significance based Skeleton Map for rapid viewpoint selection
|
期刊论文 |
Shi, Zhenfeng1, 2|Yu, Liyang1|Abd El-Latif, Ahmed A.1|Le, Dan1|Niu, Xiamu1| |
24 |
HIERARCHICAL IDENTITY-BASED PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLES
|
期刊论文 |
Ren, Yanli|Gu, Dawu|Wang, Shuozhong|Zhang, Xinpengu| |
25 |
Self-embedding watermark with flexible restoration quality
|
期刊论文 |
Zhang, Xinpeng|Wang, Shuozhong|Qian, Zhenxing|Feng, Guorui| |
26 |
An affine transformation based image steganography approach
|
期刊论文 |
Wang, Shen1|Song, Xianhua1, 2|Niu, Xiamu1| |
27 |
结合空间分布和全局对比的显著区域检测方法
|
专利 |
|
28 |
Perpetual image hashing based on conformal mapping and Zernike moments
|
期刊论文 |
Zhao, Yan1, 2|Wang, Shuo-Zhong1|Yao, Heng1|Wu, Wei1| |
29 |
Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction
|
期刊论文 |
Zhang X.|Qian Z.|Ren Y.|Feng G.| |
30 |
Efficient data hiding with plus-minus one or two
|
期刊论文 |
Zhang X.| |
31 |
一种用于CAD文档的签章水印系统
|
专利 |
|
32 |
机密信息的游动编码隐藏方法
|
专利 |
|
33 |
A new image encryption scheme for secure digital images based on combination of polynomial chaotic maps
|
期刊论文 |
Abd El-Latif, Ahmed A.1|Li, Li2|Wang, Ning1|Peng, Jia-Liang1|Shi, Zhenfeng1|Niu, Xiamu1, 2| |
34 |
Detecting image forgery using perspective constraints
|
期刊论文 |
Yao H.|Wang S.|Zhao Y.|Zhang X.| |
35 |
Spectrum-estimation based lossless information recovery for sparse array patterns
|
期刊论文 |
Feng, Guorui|Qian, Zhenxing|Zhang, Xinpeng| |
36 |
Digital image encryption scheme based on multiple chaotic systems
|
期刊论文 |
Abd El-Latif, Ahmed A.1, 2|Li, Li3|Zhang, Tiejun1|Wang, Ning1|Song, Xianhua1|Niu, Xiamu1, 3| |
37 |
Hiding traces of the inconsistent block artifact grid in jpeg images
|
期刊论文 |
Wang, Shen1|Yang, Bian1|Niu, Xiamu1| |
38 |
A unified 3D mesh segmentation framework based on markov random field
|
期刊论文 |
Shi, Z.F.1, 2|Lu, L.Y.1|Le, D.1|Niu, X.M.1| |
39 |
Perceptual differential energy watermarking for H.264/AVC
|
期刊论文 |
Wang, Duyao|Huang, Sujuan|Feng, Guorui|Wang, Shuozhong| |
40 |
Robust speech hashing for content authentication
|
期刊论文 |
Jiao Y.|Ji L.|Niu X.| |
41 |
Scalable Coding of Encrypted Images
|
期刊论文 |
Zhang, Xinpeng|Feng, Guorui|Ren, Yanli|Qian, Zhenxing| |
42 |
连续型大容量多进制条码显示与解析方法
|
专利 |
|
43 |
Simultaneous inpainting for image structure and texture using anisotropic heat transfer model
|
期刊论文 |
Qin, Chuan|Wang, Shuozhong|Zhang, Xinpeng| |
44 |
Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images
|
期刊论文 |
Li, Li|Abd El-Latif, Ahmed A.|Niu, Xiamu| |
45 |
A novel image hash algorithm resistant to print-scan
|
期刊论文 |
Wu D.|Zhou X.|Niu X.| |
46 |
Saliency-based structural degradation evaluation of 3D mesh simplification
|
期刊论文 |
Shi, Zhenfeng|Luo, Hao|Niu, Xiamu| |
47 |
A hybrid chaotic system and cyclic elliptic curve for image encryption
|
期刊论文 |
Abd El-Latif A.A.|Niu X.| |
48 |
Efficient data hiding with histogram-preserving property
|
期刊论文 |
Zhang, Xinpeng|Wang, Shuozhong| |
49 |
A face region hierarchical encryption algorithm for palette images
|
期刊论文 |
Han, Qi1|Wang, Zhi-Fang1|Niu, Xia-Mu1|Li, Qiong1| |
50 |
3D Mesh Segmentation Based on Markov Random Fields and Graph Cuts
|
期刊论文 |
Shi, Zhenfeng|Le, Dan|Yu, Liyang|Niu, Xiamu| |
51 |
Salient region detection combining spatial distribution and global contrast
|
期刊论文 |
He, Xin|Jing, Huiyun|Han, Qi|Niu, Xiamu| |
52 |
Hiding traces of double compression in JPEG images based on Tabu Search
|
期刊论文 |
Wang S.|Niu X.| |
53 |
New Fuzzy Identity-Based Encryption in the Standard Model
|
期刊论文 |
Ren, Yanli|Gu, Dawu|Wang, Shuozhong|Zhang, Xinpeng| |
54 |
REVERSIBLE VISIBLE WATERMARKING WITH LOSSLESS DATA EMBEDDING BASED ON DIFFERENCE VALUE SHIFT
|
期刊论文 |
Zhang, Xinpeng|Wang, Shuozhong|Feng, Guorui| |
55 |
Lexicographical framework for image hashing with implementation based on DCT and NMF
|
期刊论文 |
Tang, Zhenjun|Wang, Shuozhong|Zhang, Xinpeng|Wei, Weimin|Zhao, Yan| |
56 |
Feature-level fusion of Iris and face for personal identification
|
期刊论文 |
Wang, Zhifang1|Han, Qi1|Niu, Xiamu1|Busch, Christoph2| |
57 |
Reversible watermarking via extreme learning machine prediction
|
期刊论文 |
Feng, Guorui|Qian, Zhenxing|Dai, Ningjie| |
58 |
Image saliency detection based on contrast features and local sharpness
|
期刊论文 |
Yu, Zhi-Ming1|Wang, Shuo-Zhong1|Zhang, Xin-Peng1|Liu, Ting-Ting1| |
59 |
Reference Sharing Mechanism for Watermark Self-Embedding
|
期刊论文 |
Zhang, Xinpeng|Wang, Shuozhong|Qian, Zhenxing|Feng, Guorui| |
60 |
Overview of perceptual hashing
|
期刊论文 |
Niu, Xia-Mu|Jiao, Yu-Hua| |
61 |
计算机与移动存储设备的敏感数据交换控制模块及方法
|
专利 |
|
62 |
Adaptive parameterization and reconstruction of 3D face images using partial differential equations
|
期刊论文 |
Wang, Chuanjun1|Shi, Zhenfeng2|Li, Li3|Niu, Xiamu4| |
63 |
A Fully Automatic Player Detection Method Based on One-Class SVM
|
期刊论文 |
Bai, Xuefeng|Zhang, Tiejun|Wang, Chuanjun|Niu, Xiamu| |
64 |
CBRISK: Colored Binary Robust Invariant Scalable Keypoints
|
期刊论文 |
Jing, Huiyun|He, Xin|Han, Qi|Niu, Xiamu| |
65 |
A novel coding method for multiple system barcode based on QR code
|
期刊论文 |
Niu, Xiamu1|Shuai, Zhongwei1|Lin, Yongqiang1|Yan, Xuehu1| |
66 |
Image self-embedding with high-quality restoration capability
|
期刊论文 |
Qian, Zhenxing|Feng, Guorui|Zhang, Xinpeng|Wang, Shuozhong| |
67 |
A fast SVD based video watermarking algorithm compatible with MPEG2 Standard
|
期刊论文 |
Wu, Di|Kong, Wenhai|Yang, Bian|Niu, Xiamu| |
68 |
A new loss-tolerant image encryption scheme based on secret sharing and two chaotic systems
|
期刊论文 |
Li, Li1|Abd El-Latif, Ahmed A.2|Shi, Zhenfeng2|Niu, Xiamu1, 2| |
69 |
一种基于Opentype矢量轮廓字体的文档水印版权信息保护装置
|
专利 |
|
70 |
一种基于压缩域的视频序列Copy-Move篡改检测方法
|
专利 |
|
71 |
Fast video shot boundary detection framework employing pre-processing techniques
|
期刊论文 |
Li, Y. -N.|Lu, Z. -M.|Niu, X. -M.| |
72 |
A new image cipher in time and frequency domains
|
期刊论文 |
Abd El-Latif, Ahmed A.|Niu, Xiamu|Amin, Mohamed| |
73 |
Reversible data hiding of high payload using local edge sensing prediction
|
期刊论文 |
Feng G.|Fan L.| |
74 |
A novel kinematics significance based skeleton map for 3D mesh segmentation using markov random field
|
期刊论文 |
Shi, Zhenfeng1, 2|Yu, Liyang1|Le, Dan1|Niu, Xiamu1| |
75 |
Log-Polar Based Scheme for Revealing Duplicated Regions in Digital Images
|
期刊论文 |
Wu, Qiumin|Wang, Shuozhong|Zhang, Xinpeng| |
76 |
Fragile Watermarking With Error-Free Restoration Capability
|
期刊论文 |
Zhang, Xinpeng|Wang, Shuozhong| |
77 |
Skeleton Modulated Topological Perception Map for Rapid Viewpoint Selection
|
期刊论文 |
Shi, Zhenfeng|Yu, Liyang|El-Latif, Ahmed A. Abd|Niu, Xiamu| |
78 |
用于图像共享的基于EC-ElGamal算法的同态图像加密和解密方法
|
专利 |
|
79 |
基于连“1”特性的JPEG图像再次编码检测方法
|
专利 |
|
80 |
Fragile watermarking scheme with extensive content restoration capability
|
期刊论文 |
Zhang, Xinpeng1|Wang, Shuozhong1|Feng, Guorui1| |
81 |
An improved additively homomorphic image encryption scheme based on elliptic curve elgamal
|
期刊论文 |
Li, Li1|El-Latif, Ahmed A. Abd2|Han, Qi2|Niu, Xiamu1, 2| |
82 |
Reversible fragile watermarking for locating tampered blocks in JPEG images
|
期刊论文 |
Zhang X.|Wang S.|Qian Z.|Feng G.| |
83 |
面向流媒体数字水印传输的速率控制方法
|
专利 |
|
84 |
Efficient image inpainting using adaptive edge-preserving propagation
|
期刊论文 |
Qin, C.|Cao, F.|Zhang, X. P.| |
85 |
Estimation of Image Rotation Angle Using Interpolation-Related Spectral Signatures With Application to Blind Detection of Image Forgery
|
期刊论文 |
Wei, Weimin|Wang, Shuozhong|Zhang, Xinpeng|Tang, Zhenjun| |
86 |
Improved Hierarchical Identity-Based Parallel Key-Insulated Encryption
|
期刊论文 |
Ren, Yanli|Wang, Shuozhong|Zhang, Xinpeng| |
87 |
Complex common vector for multimodal biometric recognition
|
期刊论文 |
Wang, Z. F.|Han, Q.|Li, Q.|Niu, X. M.|Busch, C.| |
88 |
一种嵌入数字水印的视频流媒体传输信道的差错控制方法
|
专利 |
|
89 |
数字图像缩放因子的盲检测方法
|
专利 |
|
90 |
A Countermeasure against Double Compression Based Image Forensic
|
期刊论文 |
Wang, Shen|Niu, Xiamu| |
91 |
A saliency detection model based on local and global kernel density estimation
|
期刊论文 |
Jing, Huiyun1|He, Xin1|Han, Qi1|Niu, Xiamu1| |
92 |
Adaptive image inpainting using anisotropic heat transfer model
|
期刊论文 |
Qin, Chuan1|Wang, Shuozhong2|Zhang, Xinpeng2| |
93 |
Hologram-based watermarking capable of surviving print-scan process
|
期刊论文 |
Wang, Shuozhong|Huang, Sujuan|Zhang, Xinpeng|Wu, Wei| |
94 |
Scalable Coding of Encrypted Images
|
期刊论文 |
Zhang, Xinpeng|Feng, Guorui|Ren, Yanli|Qian, Zhenxing| |