| Publication | Date of Publication | Type |
|---|
scientific article; zbMATH DE number 7618720 (Why is no real title available?) | 2022-11-17 | Paper |
scientific article; zbMATH DE number 7618721 (Why is no real title available?) | 2022-11-17 | Paper |
Efficient Encrypted Images Filtering and Transform Coding With Walsh-Hadamard Transform and Parallelization IEEE Transactions on Image Processing | 2019-02-06 | Paper |
Multi-Scale Fusion for Improved Localization of Malicious Tampering in Digital Images IEEE Transactions on Image Processing | 2019-02-04 | Paper |
Statistical Model of JPEG Noises and Its Application in Quantization Step Estimation IEEE Transactions on Image Processing | 2019-01-31 | Paper |
Geometric invariant features in the Radon transform domain for near-duplicate image detection Pattern Recognition | 2017-11-10 | Paper |
Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach IEEE Transactions on Image Processing | 2017-10-27 | Paper |
Discrete Wavelet Transform and Data Expansion Reduction in Homomorphic Encrypted Domain IEEE Transactions on Image Processing | 2017-10-27 | Paper |
A geometrically invariant robust image watermarking based on a deformable multi-scale transform Acta Automatica Sinica | 2012-10-05 | Paper |
Random Gray code and its performance analysis for image hashing Signal Processing | 2011-08-02 | Paper |
Audio watermarking scheme robust against desynchronization based on the dyadic wavelet transform EURASIP Journal on Advances in Signal Processing | 2011-02-08 | Paper |
Calibration based universal JPEG steganalysis Science in China. Series F | 2010-02-26 | Paper |
Non-ambiguity of blind watermarking: a revisit with analytical resolution Science in China. Series F | 2010-02-26 | Paper |
Discriminating between photorealistic computer graphics and natural images using fractal geometry Science in China. Series F | 2010-02-26 | Paper |
Audio watermarking robust against time-scale modification and MP3 compression Signal Processing | 2009-01-20 | Paper |
Efficient Tate pairing computation using double-base chains Science in China. Series F | 2008-11-10 | Paper |
Survey of information security Science in China. Series F | 2007-10-12 | Paper |
A novel algorithm of singular points detection for fingerprint images | 2007-05-11 | Paper |
Cryptology and Network Security Lecture Notes in Computer Science | 2006-11-14 | Paper |
Steganalysis of stochastic modulation steganography Science in China. Series F | 2006-10-11 | Paper |
A semi-fragile image watermarking resisting to JPEG | 2006-05-19 | Paper |
Information Security and Cryptology - ICISC 2003 Lecture Notes in Computer Science | 2005-12-27 | Paper |
Information Security and Cryptology - ICISC 2003 Lecture Notes in Computer Science | 2005-12-27 | Paper |
Information Security Practice and Experience Lecture Notes in Computer Science | 2005-09-13 | Paper |
scientific article; zbMATH DE number 2202213 (Why is no real title available?) | 2005-09-05 | Paper |
scientific article; zbMATH DE number 2144118 (Why is no real title available?) | 2005-03-11 | Paper |
scientific article; zbMATH DE number 2114149 (Why is no real title available?) | 2004-11-05 | Paper |
scientific article; zbMATH DE number 2042809 (Why is no real title available?) | 2004-02-15 | Paper |
scientific article; zbMATH DE number 1958200 (Why is no real title available?) | 2003-07-31 | Paper |
scientific article; zbMATH DE number 1958197 (Why is no real title available?) | 2003-07-31 | Paper |
scientific article; zbMATH DE number 1310968 (Why is no real title available?) | 2000-02-16 | Paper |