Year |
Citation |
Score |
2021 |
Lu W, Zhang Q, Luo S, Zhou Y, Huang J, Shi YQ. Robust Estimation of Upscaling Factor on Double JPEG Compressed Images. Ieee Transactions On Cybernetics. PMID 33878009 DOI: 10.1109/TCYB.2021.3069999 |
0.393 |
|
2020 |
Wang J, Huang L, Zhang Y, Zhu Y, Ni J, Shi Y. An Effective Steganalysis Algorithm for Histogram-shifting Based Reversible Data Hiding Cmc-Computers Materials & Continua. 64: 325-344. DOI: 10.32604/Cmc.2020.09784 |
0.305 |
|
2020 |
Xia Z, Yuan C, Lv R, Sun X, Xiong NN, Shi Y. A Novel Weber Local Binary Descriptor for Fingerprint Liveness Detection Ieee Transactions On Systems, Man, and Cybernetics. 50: 1526-1536. DOI: 10.1109/Tsmc.2018.2874281 |
0.409 |
|
2020 |
Yang J, Ruan D, Huang J, Kang X, Shi Y. An Embedding Cost Learning Framework Using GAN Ieee Transactions On Information Forensics and Security. 15: 839-851. DOI: 10.1109/Tifs.2019.2922229 |
0.367 |
|
2020 |
Wang J, Wang H, Li J, Luo X, Shi Y, Jha SK. Detecting Double JPEG Compressed Color Images With the Same Quantization Matrix in Spherical Coordinates Ieee Transactions On Circuits and Systems For Video Technology. 30: 2736-2749. DOI: 10.1109/TCSVT.2019.2922309 |
0.335 |
|
2020 |
Yeung Y, Lu W, Xue Y, Huang J, Shi Y. Secure Binary Image Steganography With Distortion Measurement Based on Prediction Ieee Transactions On Circuits and Systems For Video Technology. 30: 1423-1434. DOI: 10.1109/TCSVT.2019.2903432 |
0.334 |
|
2020 |
Li Q, Wang X, Wang X, Ma B, Wang C, Xian Y, Shi Y. A Novel Grayscale Image Steganography Scheme Based on Chaos Encryption and Generative Adversarial Networks Ieee Access. 8: 168166-168176. DOI: 10.1109/ACCESS.2020.3021103 |
0.361 |
|
2019 |
Chen BJ, Gao Y, Xu LZ, Hong XP, Zheng YH, Shi YQ. Color image splicing localization algorithm by quaternion fully convolutional networks and superpixel-enhanced pairwise conditional random field. Mathematical Biosciences and Engineering : Mbe. 16: 6907-6922. PMID 31698595 DOI: 10.3934/mbe.2019346 |
0.31 |
|
2019 |
Liu L, Wang L, Shi Y, Chang C. Separable Data-Hiding Scheme for Encrypted Image to Protect Privacy of User in Cloud Symmetry. 11: 82. DOI: 10.3390/sym11010082 |
0.405 |
|
2019 |
Ma B, Li B, Wang X, Wang C, Li J, Shi Y. Code Division Multiplexing and Machine Learning Based Reversible Data Hiding Scheme for Medical Image Security and Communication Networks. 2019: 1-9. DOI: 10.1155/2019/4732632 |
0.412 |
|
2019 |
Wang J, Li T, Luo X, Shi Y, Jha SK. Identifying Computer Generated Images Based on Quaternion Central Moments in Color Quaternion Wavelet Domain Ieee Transactions On Circuits and Systems For Video Technology. 29: 2775-2785. DOI: 10.1109/TCSVT.2018.2867786 |
0.323 |
|
2019 |
Wang J, Mao N, Chen X, Ni J, Wang C, Shi Y. Multiple histograms based reversible data hiding by using FCM clustering Signal Processing. 159: 193-203. DOI: 10.1016/J.Sigpro.2019.02.013 |
0.456 |
|
2019 |
Xuan G, Li X, Shi Y. Minimum entropy and histogram-pair based JPEG image reversible data hiding Journal of Information Security and Applications. 45: 1-9. DOI: 10.1016/J.JISA.2018.12.007 |
0.4 |
|
2019 |
Ma B, li B, Wang X, Wang C, Li J, Shi Y. A code division multiplexing and block classification-based real-time reversible data-hiding algorithm for medical images Journal of Real-Time Image Processing. 16: 857-869. DOI: 10.1007/s11554-019-00884-9 |
0.316 |
|
2019 |
Yang J, Kang X, Wong EK, Shi YQ. JPEG steganalysis with combined dense connected CNNs and SCA-GFR Multimedia Tools and Applications. 78: 8481-8495. DOI: 10.1007/S11042-018-6878-4 |
0.311 |
|
2019 |
Ding F, Shi Y, Zhu G, Shi Y. Smoothing identification for digital image forensics Multimedia Tools and Applications. 78: 8225-8245. DOI: 10.1007/S11042-018-6807-6 |
0.529 |
|
2018 |
Wang YG, Zhu G, Shi YQ. Transportation Spherical Watermarking. Ieee Transactions On Image Processing : a Publication of the Ieee Signal Processing Society. PMID 29994181 DOI: 10.1109/Tip.2018.2795745 |
0.387 |
|
2018 |
Yao Y, Hu W, Zhang W, Wu T, Shi YQ. Distinguishing Computer-Generated Graphics from Natural Images Based on Sensor Pattern Noise and Deep Learning. Sensors (Basel, Switzerland). 18. PMID 29690629 DOI: 10.3390/s18041296 |
0.41 |
|
2018 |
Hu X, Ni J, Shi Y. Efficient JPEG Steganography Using Domain Transformation of Embedding Entropy Ieee Signal Processing Letters. 25: 773-777. DOI: 10.1109/Lsp.2018.2818674 |
0.375 |
|
2018 |
Chang C, Li C, Shi Y. Privacy-Aware Reversible Watermarking in Cloud Computing Environments Ieee Access. 6: 70720-70733. DOI: 10.1109/Access.2018.2880904 |
0.371 |
|
2018 |
Ding F, Zhu G, Dong W, Shi Y. An efficient weak sharpening detection method for image forensics Journal of Visual Communication and Image Representation. 50: 93-99. DOI: 10.1016/J.Jvcir.2017.11.009 |
0.51 |
|
2018 |
Ye J, Shen Z, Behrani P, Ding F, Shi Y. Detecting USM image sharpening by using CNN Signal Processing-Image Communication. 68: 258-264. DOI: 10.1016/J.Image.2018.04.016 |
0.53 |
|
2018 |
Wu H, Tang S, Huang J, Shi Y. A novel reversible data hiding method with image contrast enhancement Signal Processing-Image Communication. 62: 64-73. DOI: 10.1016/J.Image.2017.12.006 |
0.504 |
|
2018 |
Xiong L, Xu Z, Shi Y. An integer wavelet transform based scheme for reversible data hiding in encrypted images Multidimensional Systems and Signal Processing. 29: 1191-1202. DOI: 10.1007/S11045-017-0497-5 |
0.459 |
|
2018 |
Yang J, Ren H, Zhu G, Huang J, Shi Y. Detecting median filtering via two-dimensional AR models of multiple filtered residuals Multimedia Tools and Applications. 77: 7931-7953. DOI: 10.1007/S11042-017-4691-0 |
0.357 |
|
2017 |
Wang YG, Zhu G, Kwong S, Shi YQ. A Study on the Security Levels of Spread-Spectrum Embedding Schemes in the WOA Framework. Ieee Transactions On Cybernetics. PMID 28841562 DOI: 10.1109/Tcyb.2017.2735989 |
0.34 |
|
2017 |
Ni J, Chen C, Shen Z, Shi YQ. Blind Forensics of Successive Geometric Transformations in Digital Images using Spectral Method: Theory and Applications. Ieee Transactions On Image Processing : a Publication of the Ieee Signal Processing Society. PMID 28320664 DOI: 10.1109/TIP.2017.2682963 |
0.352 |
|
2017 |
Wu H, Shi Y, Wang H, Zhou L. Separable Reversible Data Hiding for Encrypted Palette Images With Color Partitioning and Flipping Verification Ieee Transactions On Circuits and Systems For Video Technology. 27: 1620-1631. DOI: 10.1109/TCSVT.2016.2556585 |
0.38 |
|
2017 |
Chen B, Qi X, Sun X, Shi Y. Quaternion pseudo-Zernike moments combining both of RGB information and depth information for color image splicing detection Journal of Visual Communication and Image Representation. 49: 283-290. DOI: 10.1016/J.Jvcir.2017.08.011 |
0.479 |
|
2017 |
Xu Y, Gong J, Xiong L, Xu Z, Wang J, Shi Y. A privacy-preserving content-based image retrieval method in cloud environment Journal of Visual Communication and Image Representation. 43: 164-172. DOI: 10.1016/J.Jvcir.2017.01.006 |
0.519 |
|
2017 |
Xia Z, Lv R, Zhu Y, Ji P, Sun H, Shi Y. Erratum to: Fingerprint liveness detection using gradient-based texture features Signal, Image and Video Processing. 11: 389-389. DOI: 10.1007/S11760-016-0968-4 |
0.317 |
|
2016 |
Yang J, Zhu G, Shi YQ. Analyzing the Effect of JPEG Compression on Local Variance of Image Intensity. Ieee Transactions On Image Processing : a Publication of the Ieee Signal Processing Society. PMID 27093626 DOI: 10.1109/Tip.2016.2553521 |
0.461 |
|
2016 |
Wang J, Ni J, Zhang X, Shi YQ. Rate and Distortion Optimization for Reversible Data Hiding Using Multiple Histogram Shifting. Ieee Transactions On Cybernetics. PMID 26829812 DOI: 10.1109/Tcyb.2015.2514110 |
0.439 |
|
2016 |
Huang F, Huang J, Shi Y. New Framework for Reversible Data Hiding in Encrypted Domain Ieee Transactions On Information Forensics and Security. 11: 2777-2789. DOI: 10.1109/Tifs.2016.2598528 |
0.459 |
|
2016 |
Xu G, Wu HZ, Shi YQ. Structural design of convolutional neural networks for steganalysis Ieee Signal Processing Letters. 23: 708-712. DOI: 10.1109/Lsp.2016.2548421 |
0.351 |
|
2016 |
Shi Y, Li X, Zhang X, Wu H, Ma B. Reversible Data Hiding: Advances in the Past Two Decades Ieee Access. 4: 3210-3237. DOI: 10.1109/Access.2016.2573308 |
0.45 |
|
2016 |
Feng B, Lu W, Sun W, Huang J, Shi YQ. Robust image watermarking based on Tucker decomposition and Adaptive-Lattice Quantization Index Modulation Signal Processing: Image Communication. 41: 1-14. DOI: 10.1016/j.image.2015.10.007 |
0.359 |
|
2016 |
Xia Z, Lv R, Zhu Y, Ji P, Sun H, Shi YQ. Fingerprint liveness detection using gradient-based texture features Signal, Image and Video Processing. 1-8. DOI: 10.1007/S11760-016-0936-Z |
0.385 |
|
2016 |
Wang J, Li T, Shi Y, Lian S, Ye J. Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics Multimedia Tools and Applications. 76: 23721-23737. DOI: 10.1007/s11042-016-4153-0 |
0.322 |
|
2016 |
Ding F, Dong W, Zhu G, Shi YQ. An advanced texture analysis method for image sharpening detection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9569: 72-82. DOI: 10.1007/978-3-319-31960-5_7 |
0.433 |
|
2016 |
Tong X, Wang X, Xuan G, Li S, Shi YQ. Optimal histogram-pair and prediction-error based reversible data hiding for medical images Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9569: 378-391. DOI: 10.1007/978-3-319-31960-5_31 |
0.346 |
|
2015 |
Guo L, Ni J, Su W, Tang C, Shi YQ. Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited Ieee Transactions On Information Forensics and Security. 10: 2669-2680. DOI: 10.1109/Tifs.2015.2473815 |
0.455 |
|
2015 |
Gao G, Shi YQ. Reversible Data Hiding Using Controlled Contrast Enhancement and Integer Wavelet Transform Ieee Signal Processing Letters. 22: 2078-2082. DOI: 10.1109/Lsp.2015.2459055 |
0.45 |
|
2015 |
Ding F, Zhu G, Yang J, Xie J, Shi Y. Edge Perpendicular Binary Coding for USM Sharpening Detection Ieee Signal Processing Letters. 22: 327-331. DOI: 10.1109/Lsp.2014.2359033 |
0.494 |
|
2015 |
Wu H, Dugelay J, Shi Y. Reversible Image Data Hiding with Contrast Enhancement Ieee Signal Processing Letters. 22: 81-85. DOI: 10.1109/Lsp.2014.2346989 |
0.509 |
|
2015 |
Wu HT, Huang J, Shi YQ. A reversible data hiding method with contrast enhancement for medical images Journal of Visual Communication and Image Representation. 31: 146-153. DOI: 10.1016/J.Jvcir.2015.06.010 |
0.47 |
|
2014 |
Yang J, Xie J, Zhu G, Kwong S, Shi Y. An Effective Method for Detecting Double JPEG Compression With the Same Quantization Matrix Ieee Transactions On Information Forensics and Security. 9: 1933-1942. DOI: 10.1109/Tifs.2014.2359368 |
0.498 |
|
2014 |
Tong X, Xuan G, Shen G, Huan X, Shi YQ. Using RZL coding to enhance histogram-pair based image reversible data hiding Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8389: 153-166. DOI: 10.1007/978-3-662-43886-2_11 |
0.391 |
|
2013 |
Ou B, Li X, Zhao Y, Ni R, Shi YQ. Pairwise prediction-error expansion for efficient reversible data hiding. Ieee Transactions On Image Processing : a Publication of the Ieee Signal Processing Society. 22: 5010-21. PMID 24043388 DOI: 10.1109/Tip.2013.2281422 |
0.309 |
|
2013 |
Zhao H, Shi Y. Detecting Covert Channels in Computer Networks Based on Chaos Theory Ieee Transactions On Information Forensics and Security. 8: 273-282. DOI: 10.1109/Tifs.2012.2231861 |
0.368 |
|
2013 |
Zhao YQ, Liao M, Shih FY, Shi YQ. Tampered region detection of inpainting JPEG images Optik. 124: 2487-2492. DOI: 10.1016/J.Ijleo.2012.08.018 |
0.428 |
|
2013 |
Xuan G, Tong X, Teng J, Zhang X, Shi YQ. Optimal histogram-pair and prediction-error based image reversible data hiding Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7809: 368-383. DOI: 10.1007/978-3-642-40099-5_31 |
0.423 |
|
2013 |
Li Z, Zhang Z, Shi Y. Distinguishing computer graphics from photographic images using a multiresolution approach based on local binary patterns Security and Communication Networks. 7: 2153-2159. DOI: 10.1002/sec.929 |
0.307 |
|
2012 |
Li XH, Zhao YQ, Liao M, Shih FY, Shi YQ. Detection of tampered region for JPEG images by using mode-based first digit features Eurasip Journal On Advances in Signal Processing. 2012. DOI: 10.1186/1687-6180-2012-190 |
0.383 |
|
2012 |
Huang F, Huang J, Shi Y. New Channel Selection Rule for JPEG Steganography Ieee Transactions On Information Forensics and Security. 7: 1181-1191. DOI: 10.1109/Tifs.2012.2198213 |
0.308 |
|
2012 |
Li X, Zhao Y, Liao M, Shih FY, Shi YQ. Passive detection of copy-paste forgery between JPEG images Journal of Central South University. 19: 2839-2851. DOI: 10.1007/S11771-012-1350-5 |
0.438 |
|
2011 |
Fallahpour M, Megias D, Shi YQ. Lossless image data embedding in plain areas Proceedings of Spie - the International Society For Optical Engineering. 7880. DOI: 10.1117/12.877009 |
0.436 |
|
2011 |
Zhao YQ, Shih FY, Shi YQ. Passive detection of paint-doctored JPEG images Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6526: 1-11. DOI: 10.1007/978-3-642-18405-5-1 |
0.413 |
|
2010 |
Zhao X, Ho ATS, Shi YQ. Image Forensics Using Generalised Benford's Law for Improving Image Authentication Detection Rates in Semi-Fragile Watermarking International Journal of Digital Crime and Forensics. 2: 1-20. DOI: 10.4018/jdcf.2010040101 |
0.439 |
|
2010 |
Wen X, Tong X, Xuan G, Liu L, Liu H, Teng J, Shi Y. Lossless data hiding for images based on integer wavelet optimum histogram pair: Lossless data hiding for images based on integer wavelet optimum histogram pair Journal of Computer Applications. 30: 2679-2683. DOI: 10.3724/Sp.J.1087.2010.02679 |
0.492 |
|
2010 |
Bai J, Ng TT, Gao X, Shi YQ. Is physics-based liveness detection truly possible with a single image? Iscas 2010 - 2010 Ieee International Symposium On Circuits and Systems: Nano-Bio Circuit Fabrics and Systems. 3425-3428. DOI: 10.1109/ISCAS.2010.5537866 |
0.416 |
|
2010 |
Xuan G, Shi YQ, Teng J, Tong X, Chai P. Double-threshold reversible data hiding Iscas 2010 - 2010 Ieee International Symposium On Circuits and Systems: Nano-Bio Circuit Fabrics and Systems. 1129-1132. DOI: 10.1109/ISCAS.2010.5537323 |
0.435 |
|
2009 |
Xu D, Tong X, Xuan G, Teng J, Shi Y. Reversible binary image data hiding by histogram modification: Reversible binary image data hiding by histogram modification Journal of Computer Applications. 29: 1651-1653. DOI: 10.3724/Sp.J.1087.2009.01651 |
0.465 |
|
2009 |
Zhao X, Ho AT, Shi YQ. Image forensics using generalised benford's law for accurate detection of unknown JPEG compression in watermarked images Dsp 2009: 16th International Conference On Digital Signal Processing, Proceedings. DOI: 10.1109/ICDSP.2009.5201261 |
0.449 |
|
2008 |
Ni Z, Shi YQ, Ansari N, Su W, Sun Q, Lin X. Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication Ieee Transactions On Circuits and Systems For Video Technology. 18: 497-509. DOI: 10.1109/Tcsvt.2008.918761 |
0.449 |
|
2008 |
Shi YQ, Chen C, Xuan G, Su W. Steganalysis versus splicing detection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5041: 158-172. DOI: 10.1007/978-3-540-92238-4_13 |
0.411 |
|
2007 |
Chen C, Shi YQ, Xuan G. Steganalyzing texture images Proceedings - International Conference On Image Processing, Icip. 2. DOI: 10.1109/ICIP.2007.4379115 |
0.45 |
|
2006 |
Ni Z, Shi Y, Ansari N, Su W. Reversible data hiding Ieee Transactions On Circuits and Systems For Video Technology. 16: 354-362. DOI: 10.1109/Tcsvt.2006.869964 |
0.44 |
|
2006 |
Xuan G, Gao J, Shi YQ, Zou D. Image steganalysis based on statistical moments of wavelet subband histograms in DFT domain 2005 Ieee 7th Workshop On Multimedia Signal Processing. DOI: 10.1109/MMSP.2005.248584 |
0.341 |
|
2006 |
Zou D, Shi YQ, Su W, Xuan G. Steganalysis based on Markov model of thresholded prediction-error image 2006 Ieee International Conference On Multimedia and Expo, Icme 2006 - Proceedings. 2006: 1365-1368. DOI: 10.1109/ICME.2006.262792 |
0.385 |
|
2006 |
Chen C, Shi YQ, Chen W, Xuan G. Statistical moments based universal steganalysis using JPEG 2-D array and 2-D characteristic function Proceedings - International Conference On Image Processing, Icip. 105-108. DOI: 10.1109/ICIP.2006.312383 |
0.316 |
|
2005 |
LIU H, HUANG J, SHI YQ. DWT-BASED VIDEO DATA HIDING ROBUST TO MPEG COMPRESSION AND FRAME LOSS International Journal of Image and Graphics. 5: 111-133. DOI: 10.1142/S0219467805001689 |
0.356 |
|
2005 |
LU H, SHI YQ, KOT AC, CHEN L. BINARY IMAGE WATERMARKING THROUGH BLURRING AND BIASED BINARIZATION International Journal of Image and Graphics. 5: 67-87. DOI: 10.1142/S0219467805001665 |
0.368 |
|
2004 |
Lu H, Kot A, Shi Y. Distance-Reciprocal Distortion Measure for Binary Document Images Ieee Signal Processing Letters. 11: 228-231. DOI: 10.1109/LSP.2003.821748 |
0.319 |
|
2003 |
Zou D, Wu CW, Xuan G, Shi YQ. A content-based image authentication system with lossless data hiding Proceedings - Ieee International Conference On Multimedia and Expo. 2: II213-II216. DOI: 10.1109/ICME.2003.1221591 |
0.443 |
|
2002 |
Xuan G, Chen J, Zhu J, Shi YQ, Ni Z, Su W. Lossless data hiding based on integer wavelet transform Proceedings of 2002 Ieee Workshop On Multimedia Signal Processing, Mmsp 2002. 312-315. DOI: 10.1109/MMSP.2002.1203308 |
0.386 |
|
1998 |
Huang J, Shi YQ. Adaptive image watermarking scheme based on visual masking Electronics Letters. 34: 748. DOI: 10.1049/EL:19980545 |
0.343 |
|
Show low-probability matches. |