default search action
Shijun Xiang
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j43]Xingyuan Liang, Shijun Xiang:
Robust reversible watermarking of JPEG images. Signal Process. 224: 109582 (2024) - [j42]Xingyuan Liang, Shijun Xiang:
General Distortion Metric Based Histogram Shifting for Reversible Data Hiding. IEEE Signal Process. Lett. 31: 2420-2424 (2024) - [j41]Xiang Li, Mengyao Xiao, Xiaolong Li, Shijun Xiang, Yao Zhao:
Matrix Embedding Based Multiple Histograms Modification for Efficient Reversible Data Hiding. IEEE Signal Process. Lett. 31: 2555-2559 (2024) - [j40]Yuhong Wu, Runwen Hu, Shijun Xiang:
PVO-Based Reversible Data Hiding Using Global Sorting and Fixed 2D Mapping Modification. IEEE Trans. Circuits Syst. Video Technol. 34(1): 618-631 (2024) - [j39]Junren Qin, Shanxiang Lyu, Jiarui Deng, Xingyuan Liang, Shijun Xiang, Hao Chen:
A Lattice-Based Embedding Method for Reversible Audio Watermarking. IEEE Trans. Dependable Secur. Comput. 21(4): 2619-2630 (2024) - [j38]Yichao Tang, Chuntao Wang, Shijun Xiang, Yiu-Ming Cheung:
A Robust Reversible Watermarking Scheme Using Attack-Simulation-Based Adaptive Normalization and Embedding. IEEE Trans. Inf. Forensics Secur. 19: 4114-4129 (2024) - 2023
- [j37]Ziquan Huang, Bingwen Feng, Shijun Xiang:
Robust reversible image watermarking scheme based on spread spectrum. J. Vis. Commun. Image Represent. 93: 103808 (2023) - [j36]Shiwei Zhu, Shijun Xiang:
Multiscale residual gradient attention for face anti-spoofing. J. Vis. Commun. Image Represent. 95: 103886 (2023) - [j35]Runwen Hu, Shijun Xiang:
Efficient 2D Mapping for Reversible Data Hiding. IEEE Signal Process. Lett. 30: 329-333 (2023) - [j34]Xingyuan Liang, Shijun Xiang:
Reversible Data Hiding of Grayscale Images Using General Distortion Metric. IEEE Signal Process. Lett. 30: 1527-1531 (2023) - [j33]Yichao Tang, Shuai Wang, Chuntao Wang, Shijun Xiang, Yiu-Ming Cheung:
A Highly Robust Reversible Watermarking Scheme Using Embedding Optimization and Rounded Error Compensation. IEEE Trans. Circuits Syst. Video Technol. 33(4): 1593-1609 (2023) - [c16]Mingjin Wu, Shijun Xiang:
An Efficient CNN-based Prediction for Reversible Data Hiding. MMAsia 2023: 86:1-86:5 - 2022
- [j32]Minghui Huang, Shijun Xiang:
Image interpolation by direct cross downsampling. Digit. Signal Process. 132: 103782 (2022) - [j31]Shijun Xiang, Guanqi Ruan, Hao Li, Jiayong He:
Robust watermarking of databases in order-preserving encrypted domain. Frontiers Comput. Sci. 16(2): 162804 (2022) - [j30]Runwen Hu, Shijun Xiang:
Reversible Data Hiding By Using CNN Prediction and Adaptive Embedding. IEEE Trans. Pattern Anal. Mach. Intell. 44(12): 10196-10208 (2022) - [j29]Jingxuan Li, Shijun Xiang:
Audio-lossless robust watermarking against desynchronization attacks. Signal Process. 198: 108561 (2022) - [j28]Shijun Xiang, Guanqi Ruan:
Efficient PVO-Based Reversible Data Hiding by Selecting Blocks With Full-Enclosing Context. IEEE Trans. Circuits Syst. Video Technol. 32(5): 2868-2880 (2022) - [j27]Qiaoyi Liang, Shijun Xiang:
Invertible Color-to-Grayscale Conversion Using Lossy Compression and High-Capacity Data Hiding. IEEE Trans. Circuits Syst. Video Technol. 32(11): 7373-7385 (2022) - [i2]Junren Qin, Shanxiang Lyu, Jiarui Deng, Xingyuan Liang, Shijun Xiang, Hao Chen:
A Lattice-Based Embedding Method for Reversible Audio Watermarking. CoRR abs/2209.07066 (2022) - 2021
- [j26]Runwen Hu, Shijun Xiang:
Lossless robust image watermarking by using polar harmonic transform. Signal Process. 179: 107833 (2021) - [j25]Xingyuan Liang, Shijun Xiang, Le Yang, Jingxuan Li:
Robust and reversible image watermarking in homomorphic encrypted domain. Signal Process. Image Commun. 99: 116462 (2021) - [j24]Runwen Hu, Shijun Xiang:
CNN Prediction Based Reversible Data Hiding. IEEE Signal Process. Lett. 28: 464-468 (2021) - [j23]Runwen Hu, Shijun Xiang:
Cover-Lossless Robust Image Watermarking Against Geometric Deformations. IEEE Trans. Image Process. 30: 318-331 (2021) - [c15]Qiaoyi Liang, Runwen Hu, Shijun Xiang:
Invertible Color-to-Grayscale Conversion by Using Clustering and Reversible Watermarking. ICME 2021: 1-6 - 2020
- [j22]Xingyuan Liang, Shijun Xiang:
Robust reversible audio watermarking based on high-order difference statistics. Signal Process. 173: 107584 (2020) - [j21]Wanling Zhang, Shijun Xiang:
Face anti-spoofing detection based on DWT-LBP-DCT features. Signal Process. Image Commun. 89: 115990 (2020)
2010 – 2019
- 2019
- [j20]Jingxuan Li, Xingyuan Liang, Ceyu Dai, Shijun Xiang:
Reversible Data Hiding Algorithm in Fully Homomorphic Encrypted Domain. Entropy 21(7): 625 (2019) - [j19]Xinchao Huang, Zihan Liu, Wei Lu, Hongmei Liu, Shijun Xiang:
Fast and Effective Copy-Move Detection of Digital Audio Based on Auto Segment. Int. J. Digit. Crime Forensics 11(2): 47-62 (2019) - [j18]Hongchang Zheng, Chuntao Wang, Junxiang Wang, Shijun Xiang:
A new reversible watermarking scheme using the content-adaptive block size for prediction. Signal Process. 164: 74-83 (2019) - 2018
- [j17]Shijun Xiang, Jiayong He:
Database authentication watermarking scheme in encrypted domain. IET Inf. Secur. 12(1): 42-51 (2018) - [j16]Ruxin Wang, Wei Lu, Jixian Li, Shijun Xiang, Xianfeng Zhao, Jinwei Wang:
Digital Image Splicing Detection Based on Markov Features in QDCT and QWT Domain. Int. J. Digit. Crime Forensics 10(4): 90-107 (2018) - [j15]Shijun Xiang, Xinrong Luo:
Reversible Data Hiding in Homomorphic Encrypted Domain by Mirroring Ciphertext Group. IEEE Trans. Circuits Syst. Video Technol. 28(11): 3099-3110 (2018) - 2017
- [j14]Shijun Xiang, Le Yang, Yi Wang:
Robust and Reversible Audio Watermarking by Modifying Statistical Features in Time Domain. Adv. Multim. 2017: 8492672:1-8492672:10 (2017) - [j13]Shijun Xiang, Zihao Li:
Reversible audio data hiding algorithm using noncausal prediction of alterable orders. EURASIP J. Audio Speech Music. Process. 2017: 4 (2017) - [j12]Shijun Xiang, Xinrong Luo:
Efficient reversible data hiding in encrypted image with public key cryptosystem. EURASIP J. Adv. Signal Process. 2017: 59 (2017) - 2016
- [j11]Jiaorong Chen, Shijun Xiang, Hongbin Huang, Weiping Liu:
Detecting and locating digital audio forgeries based on singularity analysis with wavelet packet. Multim. Tools Appl. 75(4): 2303-2325 (2016) - [c14]Ye Tian, Shijun Xiang:
Detection of Video-Based Face Spoofing Using LBP and Multiscale DCT. IWDW 2016: 16-28 - 2015
- [j10]Shijun Xiang, Yi Wang:
Non-integer expansion embedding techniques for reversible image watermarking. EURASIP J. Adv. Signal Process. 2015: 56 (2015) - [c13]Shijun Xiang, Yi Wang:
Distortion-Free Robust Reversible Watermarking by Modifying and Recording IWT Means of Image Blocks. IWDW 2015: 337-349 - 2014
- [c12]Shangyi Liu, Shijun Xiang:
Non-integer Expansion Embedding for Prediction-Based Reversible Watermarking. IWDW 2014: 535-543 - 2013
- [c11]Jiaorong Chen, Shijun Xiang, Weiping Liu, Hongbin Huang:
Exposing digital audio forgeries in time domain by using singularity analysis with wavelets. IH&MMSec 2013: 149-158 - 2012
- [j9]Shijun Xiang, Jianquan Yang, Jiwu Huang:
Perceptual video hashing robust against geometric distortions. Sci. China Inf. Sci. 55(7): 1520-1527 (2012) - [j8]Shijun Xiang, Jianquan Yang:
Block-based image hashing with restricted blocking strategy for rotational robustness. EURASIP J. Adv. Signal Process. 2012: 77 (2012) - [j7]Shijun Xiang:
On invariance analysis of Zernike moments in the presence of rotation with crop and loose modes. Multim. Tools Appl. 57(1): 29-48 (2012) - [c10]Shijun Xiang:
Non-Integer Expansion Embedding for Prediction-Based Reversible Watermarking. Information Hiding 2012: 224-239 - [c9]Quan Chen, Shijun Xiang, Xinrong Luo:
Reversible Watermarking for Audio Authentication Based on Integer DCT and Expansion Embedding. IWDW 2012: 395-409 - 2011
- [j6]Shijun Xiang:
Audio watermarking robust against D/A and A/D conversions. EURASIP J. Adv. Signal Process. 2011: 3 (2011) - [j5]Shijun Xiang, Hyoung-Joong Kim:
Histogram-Based Image Hashing for Searching Content-Preserving Copies. Trans. Data Hiding Multim. Secur. 6: 83-108 (2011) - 2010
- [c8]Shijun Xiang:
Robust Audio Watermarking by Using Low-Frequency Histogram. IWDW 2010: 134-147
2000 – 2009
- 2008
- [j4]Shijun Xiang, Hyoung-Joong Kim, Jiwu Huang:
Audio watermarking robust against time-scale modification and MP3 compression. Signal Process. 88(10): 2372-2387 (2008) - [j3]Shijun Xiang, Hyoung-Joong Kim, Jiwu Huang:
Invariant Image Watermarking Based on Statistical Features in the Low-Frequency Domain. IEEE Trans. Circuits Syst. Video Technol. 18(6): 777-790 (2008) - 2007
- [j2]Shijun Xiang, Jiwu Huang:
Histogram-Based Audio Watermarking Against Time-Scale Modification and Cropping Attacks. IEEE Trans. Multim. 9(7): 1357-1372 (2007) - [c7]Vasiliy Sachnev, Hyoung-Joong Kim, Shijun Xiang, Jeho Nam:
An Improved Reversible Difference Expansion Watermarking Algorithm. IWDW 2007: 254-263 - [c6]Shijun Xiang, Hyoung-Joong Kim, Jiwu Huang:
Histogram-based image hashing scheme robust against geometric deformations. MM&Sec 2007: 121-128 - [c5]Hyoung Joong Kim, Vasiliy Sachnev, Su-Jeong Choi, Shijun Xiang:
An Innocuous Visual Cryptography Scheme. WIAMIS 2007: 65 - [c4]Shijun Xiang, Hyoung-Joong Kim:
Geometrically Invariant Image Watermarking in the DWT Domain. WISA 2007: 76-90 - [i1]Shijun Xiang, Jiwu Huang:
Robust Audio Watermarking Against the D/A and A/D conversions. CoRR abs/0707.0397 (2007) - 2006
- [j1]Shijun Xiang, Jiwu Huang:
Analysis of Quantization-based Audio Watermarking to D/A and A/D Conversions. Int. J. Netw. Secur. 3(3): 230-238 (2006) - [c3]Shijun Xiang, Jiwu Huang, Rui Yang:
Time-Scale Invariant Audio Watermarking Based on the Statistical Features in Time Domain. Information Hiding 2006: 93-108 - [c2]Shijun Xiang, Jiwu Huang, Rui Yang, Chuntao Wang, Hongmei Liu:
Robust Audio Watermarking Based on Low-Order Zernike Moments. IWDW 2006: 226-240 - 2005
- [c1]Shijun Xiang, Jiwu Huang, Xiaoyun Feng:
Analysis of Quantization-Based Audio Watermarking in DA/AD Conversions. KES (2) 2005: 587-592
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 21:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint