default search action
Xiangui Kang
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j40]Jicheng Li, Yongjian Hu, Beibei Liu, Zhaolong Gong, Xiangui Kang:
Boosting Deepfake Feature Extractors Using Unsupervised Domain Adaptation. IEEE Signal Process. Lett. 31: 2010-2014 (2024) - [j39]Yuewang He, Xiangui Kang, Qiben Yan, Enping Li:
ResNeXt+: Attention Mechanisms Based on ResNeXt for Malware Detection and Classification. IEEE Trans. Inf. Forensics Secur. 19: 1142-1155 (2024) - [j38]Anwei Luo, Chenqi Kong, Jiwu Huang, Yongjian Hu, Xiangui Kang, Alex C. Kot:
Beyond the Prior Forgery Knowledge: Mining Critical Clues for General Face Forgery Detection. IEEE Trans. Inf. Forensics Secur. 19: 1168-1182 (2024) - [c69]Kangze Xu, Ziqiang He, Xiangui Kang, Z. Jane Wang:
Transferable and high-quality adversarial example generation leveraging diffusion model. ICME 2024: 1-6 - [i8]Yingxin Lai, Zitong Yu, Jing Yang, Bin Li, Xiangui Kang, Linlin Shen:
GM-DF: Generalized Multi-Scenario Deepfake Detection. CoRR abs/2406.20078 (2024) - [i7]Chao Zhou, Yuan-Gen Wang, Zi-jia Wang, Xiangui Kang:
Lp-norm Distortion-Efficient Adversarial Attack. CoRR abs/2407.03115 (2024) - 2023
- [j37]Fei Shang, Yuhang Lan, Jianhua Yang, Enping Li, Xiangui Kang:
Robust data hiding for JPEG images with invertible neural network. Neural Networks 163: 219-232 (2023) - [j36]Bingyuan Huang, Sanshuai Cui, Jiwu Huang, Xiangui Kang:
Discriminative Frequency Information Learning for End-to-End Speech Anti-Spoofing. IEEE Signal Process. Lett. 30: 185-189 (2023) - [j35]Jie Wang, Xuemei Yin, Yifang Chen, Jiwu Huang, Xiangui Kang:
An Adaptive IPM-Based HEVC Video Steganography via Minimizing Non-Additive Distortion. IEEE Trans. Dependable Secur. Comput. 20(4): 2896-2912 (2023) - [c68]Yuhang Lan, Fei Shang, Jianhua Yang, Xiangui Kang, Enping Li:
Robust Image Steganography: Hiding Messages in Frequency Coefficients. AAAI 2023: 14955-14963 - [c67]Xiangui Kang, Pengcheng Su, Zisheng Huang, Yifang Chen, Jie Wang:
Double Compression Detection Based on the De-Blocking Filtering of HEVC Videos. ICASSP 2023: 1-5 - [c66]Anjie Peng, Zhi Lin, Hui Zeng, Wenxin Yu, Xiangui Kang:
Boosting Transferability of Adversarial Example via an Enhanced Euler's Method. ICASSP 2023: 1-5 - [c65]Bingyuan Huang, Sanshuai Cui, Xiangui Kang, Enping Li:
Transferable Waveform-level Adversarial Attack against Speech Anti-spoofing Models. ICME 2023: 2315-2320 - [c64]Pengcheng Su, Rongxin Tu, Hongmei Liu, Yue Qing, Xiangui Kang:
Adversarial Attacks on Generated Text Detectors. ICME 2023: 2849-2854 - [i6]Anwei Luo, Chenqi Kong, Jiwu Huang, Yongjian Hu, Xiangui Kang, Alex C. Kot:
Beyond the Prior Forgery Knowledge: Mining Critical Clues for General Face Forgery Detection. CoRR abs/2304.12489 (2023) - [i5]Anwei Luo, Rizhao Cai, Chenqi Kong, Xiangui Kang, Jiwu Huang, Alex C. Kot:
Forgery-aware Adaptive Vision Transformer for Face Forgery Detection. CoRR abs/2309.11092 (2023) - 2022
- [j34]Jianyuan Wu, Tianyao Tong, Yifang Chen, Xiangui Kang, Wei Sun:
An adversarial learning framework with cross-domain loss for median filtered image restoration and anti-forensics. Comput. Secur. 112: 102497 (2022) - [j33]Sanshuai Cui, Bingyuan Huang, Jiwu Huang, Xiangui Kang:
Synthetic Speech Detection Based on Local Autoregression and Variance Statistics. IEEE Signal Process. Lett. 29: 1462-1466 (2022) - [j32]Da Lin, Yuan-Gen Wang, Weixuan Tang, Xiangui Kang:
Boosting Query Efficiency of Meta Attack With Dynamic Fine-Tuning. IEEE Signal Process. Lett. 29: 2557-2561 (2022) - [c63]Jiangqun Ni, Yichen Tong, Xianglei Hu, Wenkang Su, Xiangui Kang:
Spatial Image Steganography Using a Correlational Model. ICAIS (3) 2022: 400-411 - 2021
- [j31]Jianyuan Wu, Xiangui Kang, Jianhua Yang, Wei Sun:
A framework of generative adversarial networks with novel loss for JPEG restoration and anti-forensics. Multim. Syst. 27(6): 1075-1089 (2021) - [j30]Jian Yu, Yuewang He, Qiben Yan, Xiangui Kang:
SpecView: Malware Spectrum Visualization Framework With Singular Spectrum Transformation. IEEE Trans. Inf. Forensics Secur. 16: 5093-5107 (2021) - [c62]Zhenhua Qu, Ziqiang He, Xiangui Kang:
Deriving a Compact Analytical Model for Camera Response Functions with Application to Chartless Radiometric Calibration. APSIPA ASC 2021: 1858-1864 - [c61]Xiaoqing Jia, Jie Wang, Yongliang Liu, Xiangui Kang, Yun-Qing Shi:
A Layered Embedding-Based Scheme to Cope with Intra-Frame Distortion Drift In IPM-Based HEVC Steganography. ICASSP 2021: 2720-2724 - [c60]Anwei Luo, Enlei Li, Yongliang Liu, Xiangui Kang, Z. Jane Wang:
A Capsule Network Based Approach for Detection of Audio Spoofing Attacks. ICASSP 2021: 6359-6363 - [c59]Yingbin Zhou, Anwei Luo, Xiangui Kang, Siwei Lyu:
Face Forgery Detection Based On Segmentation Network. ICIP 2021: 3597-3601 - [i4]Jianhua Yang, Yi Liao, Fei Shang, Xiangui Kang, Yun Qing Shi:
JPEG Steganography with Embedding Cost Learning and Side-Information Estimation. CoRR abs/2107.13151 (2021) - 2020
- [j29]Yifang Chen, Zheng Wang, Z. Jane Wang, Xiangui Kang:
Automated Design of Neural Network Architectures With Reinforcement Learning for Detection of Global Manipulations. IEEE J. Sel. Top. Signal Process. 14(5): 997-1011 (2020) - [j28]Chaowei Hu, Yunong Zhang, Xiangui Kang:
General and Improved Five-Step Discrete-Time Zeroing Neural Dynamics Solving Linear Time-Varying Matrix Equation with Unknown Transpose. Neural Process. Lett. 51(2): 1715-1730 (2020) - [j27]Jianhua Yang, Danyang Ruan, Jiwu Huang, Xiangui Kang, Yun-Qing Shi:
An Embedding Cost Learning Framework Using GAN. IEEE Trans. Inf. Forensics Secur. 15: 839-851 (2020) - [c58]Zheng Wang, Sanshuai Cui, Xiangui Kang, Wei Sun, Zhonghua Li:
Densely Connected Convolutional Network for Audio Spoofing Detection. APSIPA 2020: 1352-1360 - [c57]Jianyuan Wu, Li Liu, Xiangui Kang, Wei Sun:
A Generative Adversarial Network Framework for JPEG Anti-Forensics. APSIPA 2020: 1442-1447 - [c56]Zhenyu Li, Min Yang, Yunong Zhang, Chaowei Hu, Xiangui Kang:
Zhang Neural Dynamics (ZND) Tracking Control of Multiple Integrator Systems with Noise Disturbances: Theoretical and Simulative Results. ICACI 2020: 1-7 - [c55]Jianhua Yang, Huilin Zheng, Xiangui Kang, Yun-Qing Shi:
Approaching Optimal Embedding In Audio Steganography With GAN. ICASSP 2020: 2827-2831 - [c54]Hui Zeng, Anjie Peng, Xiangui Kang:
Hiding Traces of Camera Anonymization by Poisson Blending. ICAIS (2) 2020: 98-108 - [c53]Sanshuai Cui, Enlei Li, Xiangui Kang:
Autoregressive Model Based Smoothing Forensics Of Very Short Speech Clips. ICME 2020: 1-6 - [c52]Yujun Wei, Yifang Chen, Xiangui Kang, Z. Jane Wang, Liang Xiao:
Auto-Generating Neural Networks with Reinforcement Learning for Multi-Purpose Image Forensics. ICME 2020: 1-6 - [c51]Maoyu Mao, Zhongcheng Xiao, Xiangui Kang, Xiang Li, Liang Xiao:
Electric Network Frequency Based Audio Forensics Using Convolutional Neural Networks. IFIP Int. Conf. Digital Forensics 2020: 253-270 - [c50]Jianhua Yang, Beiling Lu, Liang Xiao, Xiangui Kang, Yunqing Shi:
Reinforcement Learning Aided Network Architecture Generation for JPEG Image Steganalysis. IH&MMSec 2020: 23-32
2010 – 2019
- 2019
- [j26]Shenghai Luo, Anjie Peng, Hui Zeng, Xiangui Kang, Li Liu:
Deep Residual Learning Using Data Augmentation for Median Filtering Forensics of Digital Images. IEEE Access 7: 80614-80621 (2019) - [j25]Jie Wang, Xiaoqing Jia, Xiangui Kang, Yun-Qing Shi:
A Cover Selection HEVC Video Steganography Based on Intra Prediction Mode. IEEE Access 7: 119393-119402 (2019) - [j24]Anjie Peng, Gao Yu, Yadong Wu, Qiong Zhang, Xiangui Kang:
A Universal Image Forensics of Smoothing Filtering. Int. J. Digit. Crime Forensics 11(1): 18-28 (2019) - [j23]Yifang Chen, Xiangui Kang, Yun Q. Shi, Z. Jane Wang:
A multi-purpose image forensic method using densely connected convolutional neural networks. J. Real Time Image Process. 16(3): 725-740 (2019) - [j22]Jianhua Yang, Xiangui Kang, Edward K. Wong, Yun-Qing Shi:
JPEG steganalysis with combined dense connected CNNs and SCA-GFR. Multim. Tools Appl. 78(7): 8481-8495 (2019) - [c49]Jianyuan Wu, Zheng Wang, Hui Zeng, Xiangui Kang:
Multiple-Operation Image Anti-Forensics with WGAN-GP Framework. APSIPA 2019: 1303-1307 - [c48]Xiao Liu, Chaowei Hu, Xiangui Kang, Mingzhi Mao, Yunong Zhang, Binbin Qiu:
New 5-Step Discrete-Time Zeroing Neuronet for Time-Dependent Matrix Square Root Finding. ICSAI 2019: 943-949 - [c47]Jianhua Yang, Danyang Ruan, Xiangui Kang, Yun-Qing Shi:
Towards Automatic Embedding Cost Learning for JPEG Steganography. IH&MMSec 2019: 37-46 - [c46]Zhongliang Yang, Ke Wang, Sai Ma, Yongfeng Huang, Xiangui Kang, Xianfeng Zhao:
IStego100K: Large-Scale Image Steganalysis Dataset. IWDW 2019: 352-364 - [c45]Yifang Chen, Feng Peng, Xiangui Kang, Z. Jane Wang:
Depthwise Separable Convolutional Neural Network for Image Forensics. VCIP 2019: 1-4 - [i3]Zhongliang Yang, Ke Wang, Sai Ma, Yongfeng Huang, Xiangui Kang, Xianfeng Zhao:
IStego100K: Large-scale Image Steganalysis Dataset. CoRR abs/1911.05542 (2019) - 2018
- [j21]Hui Zeng, Jingjing Yu, Xiangui Kang, Siwei Lyu:
Countering JPEG anti-forensics based on noise level estimation. Sci. China Inf. Sci. 61(3): 032103:1-032103:14 (2018) - [j20]Chaowei Hu, Xiangui Kang, Yunong Zhang:
Three-step general discrete-time Zhang neural network design and application to time-variant matrix inversion. Neurocomputing 306: 108-118 (2018) - [j19]Xiaodan Lin, Xiangui Kang:
Robust Electric Network Frequency Estimation with Rank Reduction and Linear Prediction. ACM Trans. Multim. Comput. Commun. Appl. 14(4): 84:1-84:13 (2018) - [c44]Hanqi Zi, Qiong Zhang, Jianhua Yang, Xiangui Kang:
Steganography with Convincing Normal Image from A Joint Generative Adversarial Framework. APSIPA 2018: 526-532 - [c43]Jianhua Yang, Xiangui Kang, Edward K. Wong, Yun-Qing Shi:
Deep Learning with Feature Reuse for JPEG Image Steganalysis. APSIPA 2018: 533-538 - [c42]Yingmin Luo, Hanqi Zi, Qiong Zhang, Xiangui Kang:
Anti-Forensics of JPEG Compression Using Generative Adversarial Networks. EUSIPCO 2018: 952-956 - [c41]Yifang Chen, Zi Xian Lyu, Xiangui Kang, Z. Jane Wang:
A Rotation-Invariant Convolutional Neural Network for Image Enhancement Forensics. ICASSP 2018: 2111-2115 - [c40]Yifang Chen, Xiangui Kang, Z. Jane Wang, Qiong Zhang:
Densely Connected Convolutional Neural Network for Multi-purpose Image Forensics under Anti-forensic Attacks. IH&MMSec 2018: 91-96 - [c39]Huilin Zheng, Xuan Li, Danyang Ruan, Xiangui Kang, Yun-Qing Shi:
Comparison of DCT and Gabor Filters in Residual Extraction of CNN Based JPEG Steganalysis. IWDW 2018: 29-39 - [c38]Lihua Wang, Huixin Liang, Xiaodan Lin, Xiangui Kang:
Revealing the processing history of pitch-shifted voice using CNNs. WIFS 2018: 1-7 - [i2]Jianhua Yang, Kai Liu, Xiangui Kang, Edward K. Wong, Yun-Qing Shi:
Spatial Image Steganography Based on Generative Adversarial Network. CoRR abs/1804.07939 (2018) - 2017
- [j18]Anjie Peng, Yadong Wu, Xiangui Kang:
Revealing Traces of Image Resampling and Resampling Antiforensics. Adv. Multim. 2017: 7130491:1-7130491:13 (2017) - [j17]Xiaodan Lin, Xiangui Kang:
Exposing speech tampering via spectral phase analysis. Digit. Signal Process. 60: 63-74 (2017) - [j16]Hui Zeng, Yifeng Zhan, Xiangui Kang, Xiaodan Lin:
Image splicing localization using PCA-based noise level estimation. Multim. Tools Appl. 76(4): 4783-4799 (2017) - [j15]Hui Zeng, Jingxian Liu, Jingjing Yu, Xiangui Kang, Yun Qing Shi, Z. Jane Wang:
A Framework of Camera Source Identification Bayesian Game. IEEE Trans. Cybern. 47(7): 1757-1768 (2017) - [c37]Kai Liu, Xuan Li, Qiong Zhang, Xiangui Kang:
Multi-channel neural network for steganalysis. APSIPA 2017: 1210-1213 - [c36]Huixin Liang, Xiaodan Lin, Qiong Zhang, Xiangui Kang:
Recognition of spoofed voice using convolutional neural networks. GlobalSIP 2017: 293-297 - [c35]Xiaodan Lin, Xiangui Kang:
Supervised audio tampering detection using an autoregressive model. ICASSP 2017: 2142-2146 - [c34]Chaowei Hu, Dongsheng Guo, Xiangui Kang, Yunong Zhang:
Zhang dynamics tracking control of varactor system with stability analysis. ICNC-FSKD 2017: 166-171 - [c33]Yifeng Zhan, Yifang Chen, Qiong Zhang, Xiangui Kang:
Image Forensics Based on Transfer Learning and Convolutional Neural Network. IH&MMSec 2017: 165-170 - [c32]Jianhua Yang, Kai Liu, Xiangui Kang, Edward K. Wong, Yunqing Shi:
Steganalysis Based on Awareness of Selection-Channel and Deep Learning. IWDW 2017: 263-272 - [c31]Kai Liu, Jianhua Yang, Xiangui Kang:
Ensemble of CNN and rich model for steganalysis. IWSSIP 2017: 1-5 - [i1]Jianhua Yang, Yun-Qing Shi, Edward K. Wong, Xiangui Kang:
JPEG Steganalysis Based on DenseNet. CoRR abs/1711.09335 (2017) - 2016
- [j14]Hui Zeng, Xiangui Kang, Anjie Peng:
A Multi-purpose countermeasure against image anti-forensics using autoregressive model. Neurocomputing 189: 117-122 (2016) - [j13]Xiangui Kang, Jingxian Liu, Hongmei Liu, Z. Jane Wang:
Forensics and counter anti-forensics of video inter-frame forgery. Multim. Tools Appl. 75(21): 13833-13853 (2016) - [j12]Xiaodan Lin, Jingxian Liu, Xiangui Kang:
Audio Recapture Detection With Convolutional Neural Networks. IEEE Trans. Multim. 18(8): 1480-1487 (2016) - [c30]Jingxian Liu, Xiangui Kang:
Exposing heterogeneous chain of video recompression. APSIPA 2016: 1-6 - [c29]Gongbo Liang, Qi Li, Xiangui Kang:
Pedestrian detection via a leg-driven physiology framework. ICIP 2016: 2926-2930 - [c28]Jingjing Yu, Yifeng Zhan, Jianhua Yang, Xiangui Kang:
A Multi-purpose Image Counter-anti-forensic Method Using Convolutional Neural Networks. IWDW 2016: 3-15 - 2015
- [j11]Jiansheng Chen, Xiangui Kang, Ye Liu, Z. Jane Wang:
Median Filtering Forensics Based on Convolutional Neural Networks. IEEE Signal Process. Lett. 22(11): 1849-1853 (2015) - [c27]Xiangui Kang, Tengfei Qin, Hui Zeng:
Countering median filtering anti-forensics and performance evaluation of forensics against intentional attacks. ChinaSIP 2015: 483-487 - [c26]Hui Zeng, Jiansheng Chen, Xiangui Kang, Wenjun Zeng:
Removing camera fingerprint to disguise photograph source. ICIP 2015: 1687-1691 - [c25]Anjie Peng, Hui Zeng, Xiaodan Lin, Xiangui Kang:
Countering anti-forensics of image resampling. ICIP 2015: 3595-3599 - 2014
- [j10]Xiangui Kang, Jiansheng Chen, Kerui Lin, Anjie Peng:
A context-adaptive SPN predictor for trustworthy source camera identification. EURASIP J. Image Video Process. 2014: 19 (2014) - [c24]Hui Zeng, Tengfei Qin, Xiangui Kang, Li Liu:
Countering anti-forensics of median filtering. ICASSP 2014: 2704-2708 - [c23]Chaowei Hu, Ying Wang, Xiangui Kang, Dongsheng Guo, Yunong Zhang:
ZG trajectory generation of Van der Pol oscillator in affine-control form with division-by-zero problem handled. ICNC 2014: 1082-1087 - 2013
- [j9]Xiangui Kang, Anjie Peng, Xianyu Xu, Xiaochun Cao:
Performing scalable lossy compression on pixel encrypted images. EURASIP J. Image Video Process. 2013: 32 (2013) - [j8]Xiangui Kang, Matthew C. Stamm, Anjie Peng, K. J. Ray Liu:
Robust Median Filtering Forensics Using an Autoregressive Model. IEEE Trans. Inf. Forensics Secur. 8(9): 1456-1468 (2013) - [c22]Yunwen Jiang, Hui Zeng, Xiangui Kang, Li Liu:
The game of countering JPEG anti-forensics based on the noise level estimation. APSIPA 2013: 1-9 - [c21]Hui Zeng, Yunwen Jiang, Xiangui Kang, Li Liu:
Game theoretic analysis of camera source identification. APSIPA 2013: 1-9 - [c20]Xiaochun Cao, Siyuan Li, Feng Jiang, Hua Zhang, Ling Du, Xiangui Kang:
Device identification based on H.264 cues. ChinaSIP 2013: 452-455 - [c19]Zhenhua Qu, Xiangui Kang, Jiwu Huang, Yinxiang Li:
Forensic sensor pattern noise extraction from large image data set. ICASSP 2013: 3023-3027 - [c18]Hui Zeng, Xiangui Kang, Jiwu Huang:
Mixed-strategy Nash equilibrium in the camera source identification game. ICIP 2013: 4472-4476 - [c17]Hui Zeng, Xiangui Kang:
Camera Source Identification Game with Incomplete Information. IWDW 2013: 192-204 - 2012
- [j7]Xiangui Kang, Yinxiang Li, Zhenhua Qu, Jiwu Huang:
Enhancing Source Camera Identification Performance With a Camera Reference Phase Sensor Pattern Noise. IEEE Trans. Inf. Forensics Secur. 7(2): 393-402 (2012) - [c16]Xiangui Kang, Matthew C. Stamm, Anjie Peng, K. J. Ray Liu:
Robust median filtering forensics based on the autoregressive model of median filtered residual. APSIPA 2012: 1-9 - [c15]Xiangui Kang, Xianyu Xu, Anjie Peng, Wenjun Zeng:
Scalable Lossy Compression for Pixel-Value Encrypted Images. DCC 2012: 400 - [c14]Guangdong Wu, Xiangui Kang, K. J. Ray Liu:
A context adaptive predictor of sensor pattern noise for camera source identification. ICIP 2012: 237-240 - [c13]Anjie Peng, Xiangui Kang:
Robust Median Filtering Detection Based on Filtered Residual. IWDW 2012: 344-357 - 2011
- [j6]Xiangui Kang, Rui Yang, Jiwu Huang:
Geometric Invariant Audio Watermarking Based on an LCM Feature. IEEE Trans. Multim. 13(2): 181-190 (2011) - [c12]Xiangui Kang, Yinxiang Li, Zhenhua Qu, Jiwu Huang:
Enhancing ROC performance of trustworthy camera source identification. Media Forensics and Security 2011: 788009 - 2010
- [j5]Xiangui Kang, Jiwu Huang, Wenjun Zeng:
Efficient general print-scanning resilient data hiding based on uniform log-polar mapping. IEEE Trans. Inf. Forensics Secur. 5(1): 1-12 (2010)
2000 – 2009
- 2009
- [j4]Xiangui Kang, Jiwu Huang, Wenjun Zeng, Yun Q. Shi:
Non-ambiguity of blind watermarking: a revisit with analytical resolution. Sci. China Ser. F Inf. Sci. 52(2): 276-285 (2009) - 2008
- [j3]Xiangui Kang, Wenjun Zeng, Jiwu Huang:
A Multi-band Wavelet Watermarking Scheme. Int. J. Netw. Secur. 6(2): 121-126 (2008) - [j2]Xiangui Kang, Jiwu Huang, Wenjun Zeng:
Improving Robustness of Quantization-Based Image Watermarking via Adaptive Receiver. IEEE Trans. Multim. 10(6): 953-959 (2008) - [c11]Xiangui Kang, Xiong Zhong, Jiwu Huang, Wenjun Zeng:
An efficient print-scanning resilient data hiding scheme based on a novel LPM. ICIP 2008: 2080-2083 - [c10]Yongping Zhang, Xiangui Kang, Philipp Zhang:
A Practical Print-and-Scan Resilient Watermarking for High Resolution Images. IWDW 2008: 103-112 - [c9]Rui Yang, Xiangui Kang, Jiwu Huang:
Robust Audio Watermarking Based on Log-Polar Frequency Index. IWDW 2008: 124-138 - 2007
- [c8]Xiangui Kang, Chunhui Liu, Wenjun Zeng, Jiwu Huang, Congbai Liu:
Fast and automatic watermark resynchronization based on zernike moments. Security, Steganography, and Watermarking of Multimedia Contents 2007: 65050E - 2006
- [c7]Xiangui Kang, Junqiang Lan, Li Liu, Xinhua Zhuang:
SNR-Based Bit Allocation in Video Quality Smoothing. PCM 2006: 989-998 - [c6]Xiangui Kang, Yun Q. Shi, Jiwu Huang:
Achieving non-ambiguity of quantization-based watermarking. Security, Steganography, and Watermarking of Multimedia Contents 2006: 60720F - 2005
- [c5]Xiangui Kang, Yun Q. Shi, Jiwu Huang, Wenjun Zeng:
Multi-band Wavelet Based Digital Watermarking Using Principal Component Analysis. IWDW 2005: 139-146 - [c4]Xinhua Zhuang, Xiangui Kang, Li Liu, Junqiang Lan, Guang Zhou, Guangdong Wu:
SNR-Based Frame-Level Video Bit Rate Allocation. MMSP 2005: 1-4 - 2004
- [c3]Xiangui Kang, Jiwu Huang, Yun Q. Shi:
Improve robustness of image watermarking via adaptive receiving. ICIP 2004: 2343-2346 - 2003
- [j1]Xiangui Kang, Jiwu Huang, Yun Q. Shi, Yan Lin:
A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Trans. Circuits Syst. Video Technol. 13(8): 776-786 (2003) - [c2]Xiangui Kang, Jiwu Huang, Yun Q. Shi, Jianxiang Zhu:
Robust Watermarking with Adaptive Receiving. IWDW 2003: 396-407 - 2002
- [c1]Xiangui Kang, Jiwu Huang, Yun Q. Shi:
An Image Watermarking Algorithm Robust to Geometric Distortion. IWDW 2002: 212-223
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint