Yun-Qing Shi - Publications

Affiliations: 
New Jersey Institute of Technology, Newark, NJ, United States 
Area:
Electronics and Electrical Engineering

77 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2021 Lu W, Zhang Q, Luo S, Zhou Y, Huang J, Shi YQ. Robust Estimation of Upscaling Factor on Double JPEG Compressed Images. Ieee Transactions On Cybernetics. PMID 33878009 DOI: 10.1109/TCYB.2021.3069999  0.393
2020 Wang J, Huang L, Zhang Y, Zhu Y, Ni J, Shi Y. An Effective Steganalysis Algorithm for Histogram-shifting Based Reversible Data Hiding Cmc-Computers Materials & Continua. 64: 325-344. DOI: 10.32604/Cmc.2020.09784  0.305
2020 Xia Z, Yuan C, Lv R, Sun X, Xiong NN, Shi Y. A Novel Weber Local Binary Descriptor for Fingerprint Liveness Detection Ieee Transactions On Systems, Man, and Cybernetics. 50: 1526-1536. DOI: 10.1109/Tsmc.2018.2874281  0.409
2020 Yang J, Ruan D, Huang J, Kang X, Shi Y. An Embedding Cost Learning Framework Using GAN Ieee Transactions On Information Forensics and Security. 15: 839-851. DOI: 10.1109/Tifs.2019.2922229  0.367
2020 Wang J, Wang H, Li J, Luo X, Shi Y, Jha SK. Detecting Double JPEG Compressed Color Images With the Same Quantization Matrix in Spherical Coordinates Ieee Transactions On Circuits and Systems For Video Technology. 30: 2736-2749. DOI: 10.1109/TCSVT.2019.2922309  0.335
2020 Yeung Y, Lu W, Xue Y, Huang J, Shi Y. Secure Binary Image Steganography With Distortion Measurement Based on Prediction Ieee Transactions On Circuits and Systems For Video Technology. 30: 1423-1434. DOI: 10.1109/TCSVT.2019.2903432  0.334
2020 Li Q, Wang X, Wang X, Ma B, Wang C, Xian Y, Shi Y. A Novel Grayscale Image Steganography Scheme Based on Chaos Encryption and Generative Adversarial Networks Ieee Access. 8: 168166-168176. DOI: 10.1109/ACCESS.2020.3021103  0.361
2019 Chen BJ, Gao Y, Xu LZ, Hong XP, Zheng YH, Shi YQ. Color image splicing localization algorithm by quaternion fully convolutional networks and superpixel-enhanced pairwise conditional random field. Mathematical Biosciences and Engineering : Mbe. 16: 6907-6922. PMID 31698595 DOI: 10.3934/mbe.2019346  0.31
2019 Liu L, Wang L, Shi Y, Chang C. Separable Data-Hiding Scheme for Encrypted Image to Protect Privacy of User in Cloud Symmetry. 11: 82. DOI: 10.3390/sym11010082  0.405
2019 Ma B, Li B, Wang X, Wang C, Li J, Shi Y. Code Division Multiplexing and Machine Learning Based Reversible Data Hiding Scheme for Medical Image Security and Communication Networks. 2019: 1-9. DOI: 10.1155/2019/4732632  0.412
2019 Wang J, Li T, Luo X, Shi Y, Jha SK. Identifying Computer Generated Images Based on Quaternion Central Moments in Color Quaternion Wavelet Domain Ieee Transactions On Circuits and Systems For Video Technology. 29: 2775-2785. DOI: 10.1109/TCSVT.2018.2867786  0.323
2019 Wang J, Mao N, Chen X, Ni J, Wang C, Shi Y. Multiple histograms based reversible data hiding by using FCM clustering Signal Processing. 159: 193-203. DOI: 10.1016/J.Sigpro.2019.02.013  0.456
2019 Xuan G, Li X, Shi Y. Minimum entropy and histogram-pair based JPEG image reversible data hiding Journal of Information Security and Applications. 45: 1-9. DOI: 10.1016/J.JISA.2018.12.007  0.4
2019 Ma B, li B, Wang X, Wang C, Li J, Shi Y. A code division multiplexing and block classification-based real-time reversible data-hiding algorithm for medical images Journal of Real-Time Image Processing. 16: 857-869. DOI: 10.1007/s11554-019-00884-9  0.316
2019 Yang J, Kang X, Wong EK, Shi YQ. JPEG steganalysis with combined dense connected CNNs and SCA-GFR Multimedia Tools and Applications. 78: 8481-8495. DOI: 10.1007/S11042-018-6878-4  0.311
2019 Ding F, Shi Y, Zhu G, Shi Y. Smoothing identification for digital image forensics Multimedia Tools and Applications. 78: 8225-8245. DOI: 10.1007/S11042-018-6807-6  0.529
2018 Wang YG, Zhu G, Shi YQ. Transportation Spherical Watermarking. Ieee Transactions On Image Processing : a Publication of the Ieee Signal Processing Society. PMID 29994181 DOI: 10.1109/Tip.2018.2795745  0.387
2018 Yao Y, Hu W, Zhang W, Wu T, Shi YQ. Distinguishing Computer-Generated Graphics from Natural Images Based on Sensor Pattern Noise and Deep Learning. Sensors (Basel, Switzerland). 18. PMID 29690629 DOI: 10.3390/s18041296  0.41
2018 Hu X, Ni J, Shi Y. Efficient JPEG Steganography Using Domain Transformation of Embedding Entropy Ieee Signal Processing Letters. 25: 773-777. DOI: 10.1109/Lsp.2018.2818674  0.375
2018 Chang C, Li C, Shi Y. Privacy-Aware Reversible Watermarking in Cloud Computing Environments Ieee Access. 6: 70720-70733. DOI: 10.1109/Access.2018.2880904  0.371
2018 Ding F, Zhu G, Dong W, Shi Y. An efficient weak sharpening detection method for image forensics Journal of Visual Communication and Image Representation. 50: 93-99. DOI: 10.1016/J.Jvcir.2017.11.009  0.51
2018 Ye J, Shen Z, Behrani P, Ding F, Shi Y. Detecting USM image sharpening by using CNN Signal Processing-Image Communication. 68: 258-264. DOI: 10.1016/J.Image.2018.04.016  0.53
2018 Wu H, Tang S, Huang J, Shi Y. A novel reversible data hiding method with image contrast enhancement Signal Processing-Image Communication. 62: 64-73. DOI: 10.1016/J.Image.2017.12.006  0.504
2018 Xiong L, Xu Z, Shi Y. An integer wavelet transform based scheme for reversible data hiding in encrypted images Multidimensional Systems and Signal Processing. 29: 1191-1202. DOI: 10.1007/S11045-017-0497-5  0.459
2018 Yang J, Ren H, Zhu G, Huang J, Shi Y. Detecting median filtering via two-dimensional AR models of multiple filtered residuals Multimedia Tools and Applications. 77: 7931-7953. DOI: 10.1007/S11042-017-4691-0  0.357
2017 Wang YG, Zhu G, Kwong S, Shi YQ. A Study on the Security Levels of Spread-Spectrum Embedding Schemes in the WOA Framework. Ieee Transactions On Cybernetics. PMID 28841562 DOI: 10.1109/Tcyb.2017.2735989  0.34
2017 Ni J, Chen C, Shen Z, Shi YQ. Blind Forensics of Successive Geometric Transformations in Digital Images using Spectral Method: Theory and Applications. Ieee Transactions On Image Processing : a Publication of the Ieee Signal Processing Society. PMID 28320664 DOI: 10.1109/TIP.2017.2682963  0.352
2017 Wu H, Shi Y, Wang H, Zhou L. Separable Reversible Data Hiding for Encrypted Palette Images With Color Partitioning and Flipping Verification Ieee Transactions On Circuits and Systems For Video Technology. 27: 1620-1631. DOI: 10.1109/TCSVT.2016.2556585  0.38
2017 Chen B, Qi X, Sun X, Shi Y. Quaternion pseudo-Zernike moments combining both of RGB information and depth information for color image splicing detection Journal of Visual Communication and Image Representation. 49: 283-290. DOI: 10.1016/J.Jvcir.2017.08.011  0.479
2017 Xu Y, Gong J, Xiong L, Xu Z, Wang J, Shi Y. A privacy-preserving content-based image retrieval method in cloud environment Journal of Visual Communication and Image Representation. 43: 164-172. DOI: 10.1016/J.Jvcir.2017.01.006  0.519
2017 Xia Z, Lv R, Zhu Y, Ji P, Sun H, Shi Y. Erratum to: Fingerprint liveness detection using gradient-based texture features Signal, Image and Video Processing. 11: 389-389. DOI: 10.1007/S11760-016-0968-4  0.317
2016 Yang J, Zhu G, Shi YQ. Analyzing the Effect of JPEG Compression on Local Variance of Image Intensity. Ieee Transactions On Image Processing : a Publication of the Ieee Signal Processing Society. PMID 27093626 DOI: 10.1109/Tip.2016.2553521  0.461
2016 Wang J, Ni J, Zhang X, Shi YQ. Rate and Distortion Optimization for Reversible Data Hiding Using Multiple Histogram Shifting. Ieee Transactions On Cybernetics. PMID 26829812 DOI: 10.1109/Tcyb.2015.2514110  0.439
2016 Huang F, Huang J, Shi Y. New Framework for Reversible Data Hiding in Encrypted Domain Ieee Transactions On Information Forensics and Security. 11: 2777-2789. DOI: 10.1109/Tifs.2016.2598528  0.459
2016 Xu G, Wu HZ, Shi YQ. Structural design of convolutional neural networks for steganalysis Ieee Signal Processing Letters. 23: 708-712. DOI: 10.1109/Lsp.2016.2548421  0.351
2016 Shi Y, Li X, Zhang X, Wu H, Ma B. Reversible Data Hiding: Advances in the Past Two Decades Ieee Access. 4: 3210-3237. DOI: 10.1109/Access.2016.2573308  0.45
2016 Feng B, Lu W, Sun W, Huang J, Shi YQ. Robust image watermarking based on Tucker decomposition and Adaptive-Lattice Quantization Index Modulation Signal Processing: Image Communication. 41: 1-14. DOI: 10.1016/j.image.2015.10.007  0.359
2016 Xia Z, Lv R, Zhu Y, Ji P, Sun H, Shi YQ. Fingerprint liveness detection using gradient-based texture features Signal, Image and Video Processing. 1-8. DOI: 10.1007/S11760-016-0936-Z  0.385
2016 Wang J, Li T, Shi Y, Lian S, Ye J. Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics Multimedia Tools and Applications. 76: 23721-23737. DOI: 10.1007/s11042-016-4153-0  0.322
2016 Ding F, Dong W, Zhu G, Shi YQ. An advanced texture analysis method for image sharpening detection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9569: 72-82. DOI: 10.1007/978-3-319-31960-5_7  0.433
2016 Tong X, Wang X, Xuan G, Li S, Shi YQ. Optimal histogram-pair and prediction-error based reversible data hiding for medical images Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9569: 378-391. DOI: 10.1007/978-3-319-31960-5_31  0.346
2015 Guo L, Ni J, Su W, Tang C, Shi YQ. Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited Ieee Transactions On Information Forensics and Security. 10: 2669-2680. DOI: 10.1109/Tifs.2015.2473815  0.455
2015 Gao G, Shi YQ. Reversible Data Hiding Using Controlled Contrast Enhancement and Integer Wavelet Transform Ieee Signal Processing Letters. 22: 2078-2082. DOI: 10.1109/Lsp.2015.2459055  0.45
2015 Ding F, Zhu G, Yang J, Xie J, Shi Y. Edge Perpendicular Binary Coding for USM Sharpening Detection Ieee Signal Processing Letters. 22: 327-331. DOI: 10.1109/Lsp.2014.2359033  0.494
2015 Wu H, Dugelay J, Shi Y. Reversible Image Data Hiding with Contrast Enhancement Ieee Signal Processing Letters. 22: 81-85. DOI: 10.1109/Lsp.2014.2346989  0.509
2015 Wu HT, Huang J, Shi YQ. A reversible data hiding method with contrast enhancement for medical images Journal of Visual Communication and Image Representation. 31: 146-153. DOI: 10.1016/J.Jvcir.2015.06.010  0.47
2014 Yang J, Xie J, Zhu G, Kwong S, Shi Y. An Effective Method for Detecting Double JPEG Compression With the Same Quantization Matrix Ieee Transactions On Information Forensics and Security. 9: 1933-1942. DOI: 10.1109/Tifs.2014.2359368  0.498
2014 Tong X, Xuan G, Shen G, Huan X, Shi YQ. Using RZL coding to enhance histogram-pair based image reversible data hiding Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8389: 153-166. DOI: 10.1007/978-3-662-43886-2_11  0.391
2013 Ou B, Li X, Zhao Y, Ni R, Shi YQ. Pairwise prediction-error expansion for efficient reversible data hiding. Ieee Transactions On Image Processing : a Publication of the Ieee Signal Processing Society. 22: 5010-21. PMID 24043388 DOI: 10.1109/Tip.2013.2281422  0.309
2013 Zhao H, Shi Y. Detecting Covert Channels in Computer Networks Based on Chaos Theory Ieee Transactions On Information Forensics and Security. 8: 273-282. DOI: 10.1109/Tifs.2012.2231861  0.368
2013 Zhao YQ, Liao M, Shih FY, Shi YQ. Tampered region detection of inpainting JPEG images Optik. 124: 2487-2492. DOI: 10.1016/J.Ijleo.2012.08.018  0.428
2013 Xuan G, Tong X, Teng J, Zhang X, Shi YQ. Optimal histogram-pair and prediction-error based image reversible data hiding Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7809: 368-383. DOI: 10.1007/978-3-642-40099-5_31  0.423
2013 Li Z, Zhang Z, Shi Y. Distinguishing computer graphics from photographic images using a multiresolution approach based on local binary patterns Security and Communication Networks. 7: 2153-2159. DOI: 10.1002/sec.929  0.307
2012 Li XH, Zhao YQ, Liao M, Shih FY, Shi YQ. Detection of tampered region for JPEG images by using mode-based first digit features Eurasip Journal On Advances in Signal Processing. 2012. DOI: 10.1186/1687-6180-2012-190  0.383
2012 Huang F, Huang J, Shi Y. New Channel Selection Rule for JPEG Steganography Ieee Transactions On Information Forensics and Security. 7: 1181-1191. DOI: 10.1109/Tifs.2012.2198213  0.308
2012 Li X, Zhao Y, Liao M, Shih FY, Shi YQ. Passive detection of copy-paste forgery between JPEG images Journal of Central South University. 19: 2839-2851. DOI: 10.1007/S11771-012-1350-5  0.438
2011 Fallahpour M, Megias D, Shi YQ. Lossless image data embedding in plain areas Proceedings of Spie - the International Society For Optical Engineering. 7880. DOI: 10.1117/12.877009  0.436
2011 Zhao YQ, Shih FY, Shi YQ. Passive detection of paint-doctored JPEG images Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6526: 1-11. DOI: 10.1007/978-3-642-18405-5-1  0.413
2010 Zhao X, Ho ATS, Shi YQ. Image Forensics Using Generalised Benford's Law for Improving Image Authentication Detection Rates in Semi-Fragile Watermarking International Journal of Digital Crime and Forensics. 2: 1-20. DOI: 10.4018/jdcf.2010040101  0.439
2010 Wen X, Tong X, Xuan G, Liu L, Liu H, Teng J, Shi Y. Lossless data hiding for images based on integer wavelet optimum histogram pair: Lossless data hiding for images based on integer wavelet optimum histogram pair Journal of Computer Applications. 30: 2679-2683. DOI: 10.3724/Sp.J.1087.2010.02679  0.492
2010 Bai J, Ng TT, Gao X, Shi YQ. Is physics-based liveness detection truly possible with a single image? Iscas 2010 - 2010 Ieee International Symposium On Circuits and Systems: Nano-Bio Circuit Fabrics and Systems. 3425-3428. DOI: 10.1109/ISCAS.2010.5537866  0.416
2010 Xuan G, Shi YQ, Teng J, Tong X, Chai P. Double-threshold reversible data hiding Iscas 2010 - 2010 Ieee International Symposium On Circuits and Systems: Nano-Bio Circuit Fabrics and Systems. 1129-1132. DOI: 10.1109/ISCAS.2010.5537323  0.435
2009 Xu D, Tong X, Xuan G, Teng J, Shi Y. Reversible binary image data hiding by histogram modification: Reversible binary image data hiding by histogram modification Journal of Computer Applications. 29: 1651-1653. DOI: 10.3724/Sp.J.1087.2009.01651  0.465
2009 Zhao X, Ho AT, Shi YQ. Image forensics using generalised benford's law for accurate detection of unknown JPEG compression in watermarked images Dsp 2009: 16th International Conference On Digital Signal Processing, Proceedings. DOI: 10.1109/ICDSP.2009.5201261  0.449
2008 Ni Z, Shi YQ, Ansari N, Su W, Sun Q, Lin X. Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication Ieee Transactions On Circuits and Systems For Video Technology. 18: 497-509. DOI: 10.1109/Tcsvt.2008.918761  0.449
2008 Shi YQ, Chen C, Xuan G, Su W. Steganalysis versus splicing detection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5041: 158-172. DOI: 10.1007/978-3-540-92238-4_13  0.411
2007 Chen C, Shi YQ, Xuan G. Steganalyzing texture images Proceedings - International Conference On Image Processing, Icip. 2. DOI: 10.1109/ICIP.2007.4379115  0.45
2006 Ni Z, Shi Y, Ansari N, Su W. Reversible data hiding Ieee Transactions On Circuits and Systems For Video Technology. 16: 354-362. DOI: 10.1109/Tcsvt.2006.869964  0.44
2006 Xuan G, Gao J, Shi YQ, Zou D. Image steganalysis based on statistical moments of wavelet subband histograms in DFT domain 2005 Ieee 7th Workshop On Multimedia Signal Processing. DOI: 10.1109/MMSP.2005.248584  0.341
2006 Zou D, Shi YQ, Su W, Xuan G. Steganalysis based on Markov model of thresholded prediction-error image 2006 Ieee International Conference On Multimedia and Expo, Icme 2006 - Proceedings. 2006: 1365-1368. DOI: 10.1109/ICME.2006.262792  0.385
2006 Chen C, Shi YQ, Chen W, Xuan G. Statistical moments based universal steganalysis using JPEG 2-D array and 2-D characteristic function Proceedings - International Conference On Image Processing, Icip. 105-108. DOI: 10.1109/ICIP.2006.312383  0.316
2005 LIU H, HUANG J, SHI YQ. DWT-BASED VIDEO DATA HIDING ROBUST TO MPEG COMPRESSION AND FRAME LOSS International Journal of Image and Graphics. 5: 111-133. DOI: 10.1142/S0219467805001689  0.356
2005 LU H, SHI YQ, KOT AC, CHEN L. BINARY IMAGE WATERMARKING THROUGH BLURRING AND BIASED BINARIZATION International Journal of Image and Graphics. 5: 67-87. DOI: 10.1142/S0219467805001665  0.368
2004 Lu H, Kot A, Shi Y. Distance-Reciprocal Distortion Measure for Binary Document Images Ieee Signal Processing Letters. 11: 228-231. DOI: 10.1109/LSP.2003.821748  0.319
2003 Zou D, Wu CW, Xuan G, Shi YQ. A content-based image authentication system with lossless data hiding Proceedings - Ieee International Conference On Multimedia and Expo. 2: II213-II216. DOI: 10.1109/ICME.2003.1221591  0.443
2002 Xuan G, Chen J, Zhu J, Shi YQ, Ni Z, Su W. Lossless data hiding based on integer wavelet transform Proceedings of 2002 Ieee Workshop On Multimedia Signal Processing, Mmsp 2002. 312-315. DOI: 10.1109/MMSP.2002.1203308  0.386
1998 Huang J, Shi YQ. Adaptive image watermarking scheme based on visual masking Electronics Letters. 34: 748. DOI: 10.1049/EL:19980545  0.343
Show low-probability matches.