Some Publications and Patents on Data Hiding, Steganalysis, Forensics and Security Yun Q. Shi 25 December, 2008
|
|
|
- Elfreda O’Brien’
- 9 years ago
- Views:
Transcription
1 Some Publications and Patents on Data Hiding, Steganalysis, Forensics and Security Yun Q. Shi 25 December, 2008 Data hiding: strategy and robustness Book chapter 1. X. Kang, J. Huang and Y. Q. Shi, DWT Based Digital Watermarking Robust to Geometric Distortion, in Multimedia Security Handbook, Chapter 15, pp , Editors: B. Furht and D. Kirovski, Publisher: CRC Press, Boca Raton, FL, December Journal paper 1. J. Huang, Y. Q. Shi and Y. Shi, Embedding image watermarks in DC component, IEEE Transactions on Circuits and Systems for Video Technology, vol. 10, no. 6, pp , September J. Huang and Y. Q. Shi, Reliability issue of information bits hiding, IEEE Transactions on Circuits and Systems for Video Technology, vol. 12, no. 10, pp , October X. Kang, J. Huang, Y. Q. Shi and Y. Lin, A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression, IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp , August J. Huang and Y. Q. Shi, An adaptive image watermarking scheme based on visual masking, IEE Electronic Letters, vol. 34, no. 8, pp , April H. Liu, J. Huang, and Y. Q. Shi, DWT-based video data hiding robust to MPEG compression and frame loss, International Journal of Image and Graphics, vol. 5, no. 1, pp , January X. Kang, J. Huang, Y. Q. Shi, Robust quantization-based image watermarking with adaptive receiving, IEEE International Conference on Image Processing (ICIP04), October X. Kang, J. Huang, Y. Q. Shi, J. Zhu, Robust watermarking with adaptive receiving, Proceedings of International Workshop on Digital Watermarking (IWDW03), 2003, T. Kalkar, J. Cox and Y. M. Ro Edited, Lecture Notes in Computer Science, vol. 2939, pp , Heidelberg, Germany. 3. L. Gu, J. Huang and Y. Q. Shi, Analysis of the role played by error correcting coding in robust watermarking, IEEE International Symposium on Circuits and Systems (ISCAS03), Bangkok, Thailand, May H. Liu, N. Chen, J. Huang, X. Huang and Y. Q. Shi, A robust DWT-based video watermarking algorithm, IEEE International Symposium on Circuits and Systems (ISCAS02), Scottsdale, AZ, May Z. Ni, Y. Q. Shi and E. Sung, Enhancing robustness of digital watermarking against geometric attack based on fractal, Proceedings of IEEE International Conference of Multimedia and Expo (ICME00), New York City, July 31 to August 2, Y. Q. Shi, Z. Ni and N. Ansari, StirMark attack resistant fractal transform-based information hiding, The Seventh International Conference on Distributed Multimedia Systems, Taipei, Taiwan, September 26-18,
2 7. J. Huang, G. Elmasry and Y. Q. Shi, Power constrained multiple signaling in digital image watermarking, Proceedings of 1998 IEEE Workshop on Multimedia Signal Processing (MMSP98), pp , Los Angeles, CA, USA, December S. Wu, J. Huang, D. Huang and Y. Q. Shi, Self-synchronized audio watermarking in DWT domain, IEEE International Symposium on Circuits and Systems, vol. 5, pp , Vancouver, Canada, May Multidimensional interleaving and its application to combat bursts of errors Book chapter 1. Y. Q. Shi, J. Huang and H. K. Lee, Spread Spectrum Video Data Hiding, Interleaving and Synchronization, in Intelligent Watermarking Techniques, Chapter 18, pp , Editors: J. S. Pan, H. C. Huang and L. Jain, Publisher: World Scientific Publishing Co., Singapore, 2004 (ISBN: ). Journal papers 1. Y. Q. Shi and X. M. Zhang, A new two-dimensional interleaving technique using successive packing, IEEE Transactions on Circuits and Systems, Part I: Fundamental Theory and Application, Special Issue on Multidimensional Signals and Systems, vol. 49, no. 6, pp , June Y. Q. Shi, X. M. Zhang, Z. Ni and N. Ansari, Interleaving for combating bursts of errors, IEEE Circuits and Systems Magazine, vol. 4, no. 1, pp.29-42, First Quarter, F. Elmasry and Y. Q. Shi, 2-D interleaving for enhancing the robustness of watermarking signals embedded in still images, Proceedings of IEEE International Conference on Multimedia & Expo (ICME00), New York, July 31 to August 2, F. Elmasry and Y. Q. Shi, 3-D interleaving for enhancing the robustness of watermarking signals embedded in video sequences, Proceedings of IEEE International Conference on Multimedia & Expo (ICME00), New York, July 31 to August 2, Reversible data hiding Book chapter 1. Y. Q. Shi, G. Xuan and W. Su, Lossless Data Hiding: Fundamentals, Algorithms and Applications, in Multimedia Security Handbook, Chapter 17, pp , Editors: B. Furht and D. Kirovski, Publisher: CRC Press, Boca Raton, FL, December Y. Q. Shi, Reversible data hiding, invited key-note speech, Proceedings of International Workshop on Digital Watermarking (IWDW04), Korea, October Y. Q. Shi, Z. Ni, D. Zou, C. Liang and G. Xuan, Lossless data hiding: Fundamentals, algorithms and applications, Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS04), vol. II, pp , Vancouver, Canada, May
3 Fragile reversible data hiding Journal paper 1. G. Xuan, J. Zhu, J. Chen, Y. Q. Shi, Z. Ni and W. Su, Distortionless data hiding based on integer wavelet transform, IEE Electronics Letters, vol. 38, no. 25, pp , December Z. Ni, Y. Q. Shi, N. Ansari and W. Su, Reversible data hiding, IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 3, pp , March H. J. Kim, V. Sachnev, Y. Q. Shi, J. Nam, H. G. Choo, A novel difference expansion transform for reversible data embedding, IEEE Transactions on Information Forensics and Security, vol. 3, issue 3, pp , September V. Sachnev, H. J. Kim, J. Nam, S. Suresh, Y. Q. Shi, Reversible watermarking algorithm using sorting and prediction, IEEE Transactions on Circuits and Systems for Video Technology, (accepted July 2008) 1. G. Xuan, J. Chen, J. Zhu, Y. Q. Shi, Z. Ni and W. Su, Lossless data hiding based on integer wavelet transform, Proceedings of IEEE International Workshop on Multimedia Signal Processing (MMSP02), St. Thomas, US Virgin Islands, December Z. Ni, Y. Q. Shi, N. Ansari and W. Su, Reversible data hiding, IEEE International Symposium on Circuits and Systems (ISCAS03), May 2003, Bangkok, Thailand. 3. G. Xuan, Y. Q. Shi, D. Zou, A secure internet-based personal identity verification system using lossless watermarking and fingerprint recognition, Proceedings of International Workshop on Digital Watermarking (IWDW04), Korea, October G. Xuan, Y. Q. Shi, Z. Ni, Lossless data hiding using integer wavelet transform and spread spectrum, IEEE International Workshop on Multimedia Signal Processing (MMSP04), Siena, Italy, September G. Xuan, Y. Q. Shi, Z. Ni, Reversible data hiding using integer wavelet transform and companding technique, Proceedings of International Workshop on Digital Watermarking (IWDW04), Korea, October G. Xuan, Y. Q. Shi, D. Zou, A secure internet-based personal identity verification system using lossless watermarking and fingerprint recognition, IWDW04, Korea, October G. Xuan, C. Yang, Y. Q. Shi, Z. Ni, High capacity lossless data hiding algorithms, IEEE International Symposium on Circuits and Systems (ISCAS04), Vancouver, Canada, May G. Xuan, Y. Q. Shi, C. Yang, Y. Zheng, D. Zou, P. Chai, Lossless data hiding using integer wavelet transform and threshold embedding technique, IEEE International Conference on Multimedia and Expo, Amsterdam, Netherlands, July, G. Xuan, Q. Yao, C. Yang, J. Gao, P. Chai, Y. Q. Shi, Z. Ni Lossless data hiding using histogram shifting method based on integer wavelets, International Workshop on Digital Watermarking (IWDW), November 2006, Jeju, Korea. 10. G. Xuan, Y. Q. Shi, Z. Ni, P. Chai, X. Cui and X. Tong, Reversible data hiding for JPEG images based on histogram pairs, International Conference on Image Analysis and Recognition (ICIAR07), August 22-24, 2007, Montreal, Canada. 11. G. Xuan, Y. Q. Shi, P. Chai, X. Cui, Z. Ni and X. Tong, Optimum histogram pair based image lossless data embedding, International Workshop on Digital Watermarking (IWDW07), Guangzhou, China, December
4 12. G. Xuan, Y. Q. Shi, P. Chai, X. Tong, J. Teng, J. Li, Reversible binary image data hiding by run-length histogram modification, IEEE International Conference on pattern Recognition, ICPR08, Florida, USA, December Patent 1. G. Xuan and Y. Q. Shi, Method and Apparatus for Distotionless Data Hiding based on Integer Wavelet Transform, US patent pending, S/N 10/737, Y. Q. Shi, Z. C. Ni and N. Ansari, Method and Apparatus for Lossless Data Hiding through Histogram Modification Implemented in Spatial Domain US patent pending, S/N 10/823,086, also filed for PCT international patent protection PCT/US2004/ G. Xuan, and Y. Q. Shi, IWT-based Lossless Data Hiding Using Companding Technique, US patent pending, S/N 11/252,155, also filed for PCT international patent protection PCT/US2005/ G. Xuan and Y. Q. Shi, IWT-based Lossless Data Hiding Using Spread-Spectrum Technique, US patent pending, S/N 11/068,063, also filed for PCT international patent protection PCT/US2005/ G. Xuan and Y. Q. Shi, Lossless data hiding using histogram shifting in integer wavelet transform domain, US Non-provisional patent serial no.: 11/418,821 and PCT patent (field May 5, 2006). 6. G. Xuan and Y. Q. Shi, An apparatus and method for reversible data hiding for JPEG images, US patent 11/ filed on February 19, G. Xuan and Y. Q. Shi, Histogram-pair based lossless data hiding for binary text images and binary image, US Provisional patent 61/063,241 filed on February 1, Semi-fragile reversible data hiding Journal paper 1. D. Zou, Y. Q. Shi, Z. Ni and W. Su. A semi-fragile lossless digital watermarking scheme based on integer wavelet transform, IEEE Transactions on Circuits and Systems for Video Technology, vol.16, no. 10, pp , October Z. Ni, Y. Q. Shi, N. Ansari, W. Su, Q. Sun and X. Lin, Robust lossless image data hiding designed for semi-fragile image authentication, IEEE Transactions on Circuits and Systems for Video Technology, vol.18, no. 4, pp , April D. Zou, Y. Q. Shi, Z. Ni, A semi-fragile lossless digital Watermarking scheme based on integer wavelet transform, IEEE International Workshop on Multimedia Signal Processing (MMSP04), Siena, Italy, September Z. Ni, Y. Q. Shi, N. Ansari, W. Su, Q. Sun and X. Lin, Robust lossless data hiding, IEEE International Conference on Multimedia and Expo (ICME04), Taipei, Taiwan, June Patent 1. Y. Q. Shi, Z. C. Ni and N. Ansari, Systems and Methods for Robust Reversible Data Hiding and Data Recovery in the Spatial Domain, US Non-Provisional Patent S/N 11/004,041, also filed for PCT international patent protection PCT/US2004/040441, 4
5 December 3, Y. Q. Shi, D. K. Zou and Z. C. Ni, System and Method for Robust Lossless Data Hiding and Recovering from the Integer Wavelet Domain, US Non-Provisional Patent S/N 11/004,040, also filed for PCT international patent protection PCT/US2004/040442, December 3, Standardization activity Two developed semi-fragile reversible data hiding schemes have been utilized in a unified authentication framework for JPEG2000 images, that has been jointly proposed by Institute of Inforcomm Research at Singapore and New Jersey Institute of Technology, and has been has been included into the Security JPEG2000 (JPSEC), an ISO Standard, JPSEC (ISO/IEC :2007), Text document image data hiding Journal paper 1. H. P. Lu, A. C. Kot and Y. Q. Shi, Distance-reciprocal distortion measure for binary document images, IEEE Signal Processing Letters, vol. 11, no. 2, pp , February H. P. Lu, Y. Q. Shi, A. Kot and L. Chen, Binary image watermarking through blurring and biased binarization, International Journal of Image and Graphics, vol. 5, no. 1, pp , January H. Lu, J. Wang, A. C. Kot and Y. Q. Shi, "An objective distortion measure for binary document images based on human visual perception", in Proceedings of International Conference on Pattern Recognition (ICPR02), vol. IV, pp , Quebec, Canada August H. Lu, X. Shi, Y. Q. Shi, A. C. Kot and L. Chen, Watermark embedding in DC components of DCT for binary images, Proceedings of IEEE International Workshop on Multimedia Signal Processing (MMSP02), pp , St. Thomas, US Virgin Islands, December D. Zou and Y. Q. Shi, Formatted Text Document Data Hiding Robust to Printing, Copying and Scanning, IEEE International Symposium on Circuits and Systems, Kobe, Japan, May Patent 1. Y. Q. Shi and D. K. Zou, System and Method For Data Hiding Using Inter-Word Space Modulation, US patent pending, S/N 60/641,127 Secure data hiding 1. J. Huang, J. Hu, D. Huang, Y. Q. Shi, A secure fragile watermarking using parameterized integer wavelet transform, IEEE International Conference on Image Processing (ICIP04), October
6 2. X. Kang, Y. Q. Shi and J. Huang, Achieving non-ambiguity of quantization based watermarking, SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, January Audio data hiding Journal papers 1. S. Wu, J. Huang, D. Huang, Y. Q. Shi, Efficiently self-synchronized audio watermarking for assured audio data, IEEE Transmissions on Broadcasting, vol. 51, no. 1, pp , March J. Huang, Y. Wang and Y. Q. Shi, A blind audio watermarking algorithm with selfsynchronization, IEEE International Symposium on Circuits and Systems (ISCAS02), Scottsdale, AZ, May S. Wu, J. Huang, D. Huang and Y. Q. Shi, Self-synchronized audio watermarking in DWT domain, IEEE International Symposium on Circuits and Systems (ISCAS04), vol. 5, pp , Vancouver, Canada, May Identity verification using data hiding 1. G. Xuan, D. Jiang, H. Ji, Y. Q. Shi, D. Zou, L. Liu and H. Liu, Identity verification system using data hiding and fingerprint recognition, IEEE International Workshop on Multimedia Signal Processing (MMSP05), Shanghai, China, October Authentication Journal paper 1. J. Hu, J. Huang, D. Huang and Y. Q. Shi, Image fragile watermarking based on fusion of multi-resolution tamper detection, IEE Electronic Letters, vol. 38, no. 24, pp , November, Z. Zhang, Q. Sun, X. Lin, Y. Q. Shi and Z. Ni, A unified authentication framework for JPEG2000 images, IEEE International Conference and Expo (ICME04), Taipei, Taiwan, June D. Zou, C. W. Wu, G. Xuan and Y. Q. Shi, A content-based image authentication system with lossless data hiding, IEEE International Conference on Multimedia and Expo (ICME03), July 2003, Baltimore, Maryland. Standardization activity A unified authentication framework for JPEG2000 images has been jointly proposed by Institute of Inforcomm Research at Singapore and New Jersey Institute of Technology, and has been included into the Security JPEG2000 (JPSEC), an ISO Standard, JPSEC (ISO/IEC :2007),
7 Steganalysis 1. Y. Q. Shi, G. Xuan, C. Yang, J. Gao, Z. Zhang, P. Chai, D. Zou, C. Chen, W. Chen, Effective steganalysis based on statistical moments of wavelet characteristic function, IEEE Conference on Information Technology: Coding and Computation (ITCC05), Las Vegas, Nevada, USA, April 4-6, G. Xuan, Y. Q. Shi, J. Gao, D. Zou, C. Yang, Z. Zhang, P. Chai, C. Chen, W. Chen, Steganalysis Based on multiple features formed by statistical moments of wavelet characteristic functions, Information Hiding Workshop (IHW05), June Y. Q. Shi, G. Xuan, D. Zou, J. Gao, C. Yang, Z. Zhang, P. Chai, W. Chen, C. Chen, Steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network, IEEE International Conference on Multimedia and Expo (ICME05), Amsterdam, Netherlands, July, G. Xuan, J. Gao, Y. Q. Shi and D. Zou, Image steganalysis based on statistical moments of wavelet subband histograms in DFT domain, IEEE International Workshop on Multimedia Signal Processing, Shanghai, China, October D. Zou, Y. Q. Shi, W. Su and G. Xuan, Steganalysis based on Markov model of thresholded prediction-error image, IEEE International Conference on Multimedia and Expo (ICME06), Toronto, Canada, Netherlands, July (Accepted) 6. Y. Q. Shi, C. Chen and W. Chen, A Markov process based approach to effective attacking JEPG steganography, Information Hiding Workshop (IH06), Old Town Alexandria, Virginia, USA, July D. Fu, Y. Q. Shi, D. Zou and G. Xuan, JPEG Steganalysis Based on Empirical Transition Matrix in DCT Domain, IEEE MMSP06, October 2006, Victoria, Canada. 8. C. Chen, Y. Q. Shi, W. Chen and G. Xuan, Statistical moments based universal steganalysis using JPEG 2-D array, and 2-D characteristics function, IEEE International Conference on Image Processing (ICIP06), Atlanta, Georgia, October (Best student paper award) 9. G. Xuan, Y. Q. Shi, C. Huang, D. Fu, X. Zhu, P. Chai, and J. Gao, Steganalysis Using High-Dimensional Features Derived from Co-Occurrence Matrix and Class-wise Non-Principal Components Analysis (CNPCA), International Workshop on Digital Watermarking (IWDW), November 2006, Jeju, Korea. 10. G. Xuan, Y. Q. Shi, X. Cui, W. Chen, X. Tong, C. Huang, JPEG steganalysis based on classwise non-principal components analysis and multi-directional Markov model, IEEE International Conference on Multimedia and Expo (ICME07), Beijing, China, July C. Chen, Y. Q. Shi, G. Xuan, Steganalyzing texture images, IEEE International Conference on Image Processing (ICIP07), Texas, US, September Y. Q. Shi, C. Chen, G. Xuan, W. Su, Steganalysis versus splicing detection, International Workshop on Digital Watermarking (IWDW07), Guangzhou, China, December B. Li, F. Huang, S. Tan, J. Huang, Y. Q. Shi, Effect of different coding patterns on compressed frequency domain based universal JPEG steganalysis, International Workshop on Digital Watermarking (IWDW07), Guangzhou, China, December
8 14. S. Tan, J. Huang, Y. Q. Shi, Steganalysis of enhanced BPCS steganography with the Hilbert-Huang transform based sequential analysis, International Workshop on Digital Watermarking (IWDW07), Guangzhou, China, December C. Chen and Y. Q. Shi, JPEG image steganalysis utilizing both intrablock and interblock correlations, IEEE International Symposium on Circuits and Systems (ISCAS08), Seattle, WA, May B. Li, Y. Q. Shi and J. Huang, Steganalysis of YASS, ACM Workshop on Multimedia Security, Oxford, UK, September, F. Huang, Y. Q. Shi, J. Huang, A study on security performance of YASS, IEEE International Conference on Image Processing, San Diego, California, USA, October Patent 1. Y. Q. Shi and G. Xuan, Steganalysis Based on Statistical Moments of Characteristic Functions of Prediction-Error Image, Test Image and Their Wavelet Subbands, US patent pending, S/N 11/340,419, also filed for PCT international patent protection PCT/US2006/ 2. Y. Q. Shi and D. K. Zou, Method for Identifying Marked Content, US Non-provisional patent S/N 11/331,688, also filed for PCT international patent protection PCT/US2006/. 3. Y. Q. Shi and C. H. Chen, Method for Identifying Marked Images Using Statistical Moments Based at Least in Part on a JPEG Array, US Non-provisional patent S/N 11/331,766, also filed for PCT international patent protection PCT/US2006/. 4. Y. Q. Shi and C. H. Chen, Method for Identifying Marked Image Using Based at Least in Part on Fequency Domain Coefficient Differences, US Non-provisional patent S/N 11/331,767, also filed for PCT international patent protection PCT/US2006/. 5. G. Xuan and Y. Q. Shi, Method for identifying marked content, such as using a classwise non-principal component approach, US Non-provisional patent serial no.: 11/418,820 and PCT patent (filed May 5, 2006) 6. Y. Q. Shi and C. H. Chen, Steganalyzing texture images, 11/624816, filed January 19, 2007) 7. B. Li and Y. Q. Shi, Steganalysis of YASS, US Provisional patent 61/044,595 (filed on 4/14/2008). Digital data forensics s 1) D. Fu, Y. Q. Shi and W. Su, Detection of image splicing based on Hilbert-Huang transform and moments of characteristic functions with wavelet decomposition, International Workshop on Digital Watermarking (IWDW06), November 2006, Jeju, Korea. 2) D. Fu, Y. Q. Shi and W. Su, A generalized Benford s law for JPEG coefficients and its applications in image forensics, SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, January ) W. Chen, Y. Q. Shi, and W. Su, Image splicing detection using 2-D phase congruency and statistical moments of characteristic function, SPIE Electronic 8
9 Imaging: Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, January ) W. Chen and Y. Q. Shi, Identifying computer graphics using HSV color model and statistical moments of characteristic function, IEEE International Conference on Multimedia and Expo (ICME07), Beijing, China, July ) Y. Q. Shi, C. Chen, W. Chen, A natural image model approach to splicing detection, ACM Workshop on Multimedia Security, Dallas, Texas, September ) Y. Q. Shi, C. Chen, G. Xuan, Steganalysis versus splicing detection, International Workshop on Digital Watermarking (IWDW07), Guangzhou, China, December ) B. Li, Y. Q. Shi and J. Huang, Detecting double compressed JPEG Image by using mode based first digit features, IEEE International Workshop on Multimedia Signal Processing (MMSP08), Queensland, Australia, October ) W. Chen and Y. Q. Shi, Detection of double MPEG video compression using first digits statistics, International Workshop on Digital Watermarking (IWDW08), Busan, Korea, November ) C. Chen, Y. Q. Shi, W. Su, A machine learning based scheme for double JPEG compression detection, IEEE International Conference on pattern Recognition (ICPR08), Tampa, Florida, USA, December ) W. Chen, Y. Q. Shi, G. Xuan, W. Su, Computer graphics identification using genetic algorithm, IEEE International Conference on pattern Recognition (ICPR08), Tampa, Florida, USA, December Patent 1) Y. Q. Shi and D. D. Fu, Systems and/or method for image tampering detection, US Non-provisional patent serial no.: 11/418,822 (filed May 5, 2006) 2) Y. Q. Shi and W. Chen, Tampering detection using high-order statistics of wavelet characteristic functions and phase congruency, US patent serial no.: 60/806,277 (filed July 2006) 3) Y. Q. Shi and D. D. Fu, A generalized Benford s law for JPEG coefficients and some of its potential applications, US patent serial no.: 60/806,281 (filed July 2006) 4) Y. Q. Shi and W. Chen, Identifying computer graphics from digital photographs using HSV color model and statistical moments of characteristic functions, 11/624595, filed on 1/18/07. 5) Y. Q. Shi and C. Chen, A method and apparatus for a natural image model based approach to image splicing/tampering detection, 11/673529, (filed on Feb ). 6) C. Chen and Y. Q. Chen, Markov Process Approach to Identifying Double JPEG Compression, US Provisional patent 61/044,598 (filed on April 14, 2008). 7) W. Chen and Y. Q. Shi, Detection of Double MPEG Video Compression Using First Digit Statistics, US provisional patent 61/044,590 (filed on April 14, 2008). 8) B. Li and Y. Q. Shi, Detecting Double JPEG Compressed Images by Using Mode Based First Digit Features, US Provisional patent 61/045,753 (filed on 4/17/2008). 9
10 Other topics Journal papers 1. M. Sun, Y. Q. Shi, Q. Liu, and R. J. Sclabassi, Sample domain integration of medical data for multimedia diagnosis, Journal of VLSI Signal Processing Systems. 2. N. Ansari, P. Sakarindr, E. Haghani, C. Zhang, A. K. Jain, and Y. Q. Shi, Evaluating electronic voting systems equipped with voter-verified paper records, IEEE Security and Privacy Magazine, vol.6, no.3, pp , May/June, J. Huang and Y. Q. Shi, Embedding gray level images, IEEE International Symposium on Circuits and Systems (ISCAS01), Sydney, Australia, May J. Hu, J. Huang, D. Huang and Y. Q. Shi, A DWT-based fragile watermarking tolerant to JPEG compression, International Workshop on Digital Watermarking (IWDW02), November 2002, Seoul, Korea. 5. M. Sun, Y. Q. Shi, Q. Liu, and R. J. Sclabassi, Sample domain integration of medical data for multimedia diagnosis, Proceedings of IEEE International Workshop on Multimedia Signal Processing (MMSP02), St. Thomas, US Virgin Islands, December Y. Fang, J. Huang and Y. Q. Shi, Image watermarking algorithm applying CDMA, IEEE International Symposium on Circuits and Systems (ISCAS03), Bangkok, Thailand, May IEEE CASS Distinguished Lecturer Program Serve as an IEEE CASS Distinguished Lecturer ( ). The following topics were provided. 1. Robustness Issue in Multimedia Watermarking 2. A New Approach to 2-D/3-D Interleaving and Its Application in Digital Image/Video Watermarking 3. Reversible Data Hiding Three-hour Tutorials 1. Y. Q. Shi, tutorial, Lossless data hiding, IEEE International Symposium on Circuits and Systems (ISCAS), Bangkok, Thailand, May Y. Q. Shi, tutorial, Steganography and steganalysis, IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), France, May Y. Q. Shi, tutorial, Steganography and steganalysis, IEEE International Conference on Multimedia and Expo (ICME), Toronto, Canada, July Y. Q. Shi, tutorial, Digital Image Forensics, IEEE International Conference on Image Processing (ICIP), San Antonio, Texas, September Y.Q. Shi, Digital data forensics, Pacific-Rim Conference of Multimedia (PCM), Tainan, Taiwan, December
11 Invited Speeches 1. Y. Q. Shi, Reversible data hiding, invited opening lecture, International Workshop on Digital Watermarking (IWDW04), Seoul, Korea, October Y. Q. Shi, Digital data forensics, invited opening key-note speech, IEEE Intelligence Information Hiding and Multimedia Signal Processing (IIT-MSP), Pasadena, California, December 18, Y. Q. Shi, Multimedia forensics, invited Sterling Hou Lecture in University of Missouri at Columbia, March 14, Y. Q. Shi, Digital image forensics, invited opening speech, China Information Hiding Workshop (CIHW07), Nanjing, China, November 12, Y. Q. Shi, First digit law and its application to digital forensics, invited opening lecture, International Workshop on Digital Watermarking (IWDW08), Busan, Korea, November
Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm
Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc 5775 Morehouse Dr, Sam Diego, CA 92122. USA [email protected] K.
2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India
Integrity Preservation and Privacy Protection for Digital Medical Images M.Krishna Rani Dr.S.Bhargavi IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Abstract- In medical treatments, the integrity
Combating Anti-forensics of Jpeg Compression
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 3, November 212 ISSN (Online): 1694-814 www.ijcsi.org 454 Combating Anti-forensics of Jpeg Compression Zhenxing Qian 1, Xinpeng
WATERMARKING FOR IMAGE AUTHENTICATION
WATERMARKING FOR IMAGE AUTHENTICATION Min Wu Bede Liu Department of Electrical Engineering Princeton University, Princeton, NJ 08544, USA Fax: +1-609-258-3745 {minwu, liu}@ee.princeton.edu ABSTRACT A data
Internet Video Streaming and Cloud-based Multimedia Applications. Outline
Internet Video Streaming and Cloud-based Multimedia Applications Yifeng He, [email protected] Ling Guan, [email protected] 1 Outline Internet video streaming Overview Video coding Approaches for video
Reversible Data Hiding for Security Applications
Reversible Data Hiding for Security Applications Baig Firdous Sulthana, M.Tech Student (DECS), Gudlavalleru engineering college, Gudlavalleru, Krishna (District), Andhra Pradesh (state), PIN-521356 S.
A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques
A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques Vineela Behara,Y Ramesh Department of Computer Science and Engineering Aditya institute of Technology and
A Digital Audio Watermark Embedding Algorithm
Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin Xianghong Tang, Yamei Niu, Hengli Yue, Zhongke Yin School of Communication Engineering, Hangzhou Dianzi University, Hangzhou, Zhejiang, 3008, China [email protected],
CHAPTER 7 CONCLUSION AND FUTURE WORK
158 CHAPTER 7 CONCLUSION AND FUTURE WORK The aim of this thesis was to present robust watermarking techniques for medical image. Section 7.1, consolidates the contributions made by the researcher and Section
Study and Implementation of Video Compression Standards (H.264/AVC and Dirac)
Project Proposal Study and Implementation of Video Compression Standards (H.264/AVC and Dirac) Sumedha Phatak-1000731131- [email protected] Objective: A study, implementation and comparison of
Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment
Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Isinkaye F. O*. and Aroge T. K. Department of Computer Science and Information Technology University of Science and
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
Image Authentication Scheme using Digital Signature and Digital Watermarking
www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for
ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security
I.J. Modern Education and Computer Science, 2014, 10, 40-48 Published Online October 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2014.10.06 ROI Based Medical Image Watermarking with Zero
Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet
DICTA2002: Digital Image Computing Techniques and Applications, 21--22 January 2002, Melbourne, Australia Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet K. Ramkishor James. P. Mammen
A Dynamic Approach to Extract Texts and Captions from Videos
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
CHAPTER 2 LITERATURE REVIEW
11 CHAPTER 2 LITERATURE REVIEW 2.1 INTRODUCTION Image compression is mainly used to reduce storage space, transmission time and bandwidth requirements. In the subsequent sections of this chapter, general
Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique
Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique B.Sai Kiran M.Tech (VLSI), CMR Institute of Technology. Mr.Shahbaz Khan Associate Professor, CMR Institute of Technology.
Dynamic Binary Location based Multi-watermark Embedding Algorithm in DWT
Dynamic Binary Location based Multi-watermark Embedding Algorithm in DWT Ammar Jameel Hussein, Seda Yuksel, and Ersin Elbasi Abstract In order to achieve a good imperceptibility and robustness, using 4-level
Multimedia Document Authentication using On-line Signatures as Watermarks
Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824
Steganalysis of JPEG images using rich models
Jan Kodovský, Jessica ridrich January 23, 2012 / PIE 1 / 14 Two building blocks eature based steganalysis eature space representation of digital images Binary classifier trained on examples of cover and
C U R R I C U L U M V I T A E T R I V A N L E
C U R R I C U L U M V I T A E T R I V A N L E Department of Computer Science, 253 Love Building Florida State University, Tallahassee, Florida 32306-4530, USA. Phone: (850) 345-6468, Fax: (850) 644-0058.
Turgut Ozal University. Computer Engineering Department. TR-06010 Ankara, Turkey
Dr. YILDIRAY YALMAN Associate Professor CONTACT INFORMATION Turgut Ozal University Computer Engineering Department TR-06010 Ankara, Turkey Phone: +90 (0)312-5515437 E-mail: [email protected] RESEARCH
DCT-JPEG Image Coding Based on GPU
, pp. 293-302 http://dx.doi.org/10.14257/ijhit.2015.8.5.32 DCT-JPEG Image Coding Based on GPU Rongyang Shan 1, Chengyou Wang 1*, Wei Huang 2 and Xiao Zhou 1 1 School of Mechanical, Electrical and Information
9700 South Cass Avenue, Lemont, IL 60439 URL: www.mcs.anl.gov/ fulin
Fu Lin Contact information Education Work experience Research interests Mathematics and Computer Science Division Phone: (630) 252-0973 Argonne National Laboratory E-mail: [email protected] 9700 South
Friendly Medical Image Sharing Scheme
Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Frily Medical Image Sharing Scheme Hao-Kuan Tso Department of Computer
Research on the UHF RFID Channel Coding Technology based on Simulink
Vol. 6, No. 7, 015 Research on the UHF RFID Channel Coding Technology based on Simulink Changzhi Wang Shanghai 0160, China Zhicai Shi* Shanghai 0160, China Dai Jian Shanghai 0160, China Li Meng Shanghai
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms Dr. Mohammad V. Malakooti Faculty and Head of Department of Computer Engineering, Islamic Azad University, UAE
INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010
Lossless Medical Image Security Shrikhande Rohini 1, Vinayak Bairagi 2 1 Researcher, Electronics & Telecommunication Department, Sinhgad Academy Of Engg. 2 Assistant Professor, Electronics & Telecommunication
Online Word of Mouth; Economics of Information Systems; Information Systems and Marketing; Pricing and Competitive Strategies
EMPLOYMENT XINXIN LI Associate Professor Operations and Information Management Phone: (860) 486-3062 Email: [email protected] Associate Professor Operations and Information Management, August 2013
How to Send Video Images Through Internet
Transmitting Video Images in XML Web Service Francisco Prieto, Antonio J. Sierra, María Carrión García Departamento de Ingeniería de Sistemas y Automática Área de Ingeniería Telemática Escuela Superior
Keywords Android, Copyright Protection, Discrete Cosine Transform (DCT), Digital Watermarking, Discrete Wavelet Transform (DWT), YCbCr.
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Based Novel
3rd Party Audited Cloud Infrastructure SOC 1, Type II SOC 2, Type II ISO 27001. Annual 3rd party application Pen Tests.
THE BRIGHTIDEA CLOUD INFRASTRUCTURE INTRODUCTION Brightidea s world-class cloud infrastructure is designed and certified to handle the most stringent security, reliability, scalability, and performance
Semantic Video Annotation by Mining Association Patterns from Visual and Speech Features
Semantic Video Annotation by Mining Association Patterns from and Speech Features Vincent. S. Tseng, Ja-Hwung Su, Jhih-Hong Huang and Chih-Jen Chen Department of Computer Science and Information Engineering
Department of Electronic Information Engineering, Beihang Univerisity Specialization: Electrical Engineering, Completion: July 2004
Jin Kocsis (Jin Wei) CURRICULUM VITAE Assistant Professor Department of Electrical and Computer Engineering Auburn Science and Engineering Center, Room 554 The University of Akron Akron, OH, 44325-3905
Study and Implementation of Video Compression standards (H.264/AVC, Dirac)
Study and Implementation of Video Compression standards (H.264/AVC, Dirac) EE 5359-Multimedia Processing- Spring 2012 Dr. K.R Rao By: Sumedha Phatak(1000731131) Objective A study, implementation and comparison
An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP
An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP Rui Miao Department of Electronic Engineering, Tsinghua University, Beijing, China [email protected] Yongfeng
Hybrid Lossless Compression Method For Binary Images
M.F. TALU AND İ. TÜRKOĞLU/ IU-JEEE Vol. 11(2), (2011), 1399-1405 Hybrid Lossless Compression Method For Binary Images M. Fatih TALU, İbrahim TÜRKOĞLU Inonu University, Dept. of Computer Engineering, Engineering
Security and protection of digital images by using watermarking methods
Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking
AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES
AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES S.NANDHINI PG SCHOLAR NandhaEngg. College Erode, Tamilnadu, India. Dr.S.KAVITHA M.E.,Ph.d PROFESSOR
XIAOBAI (BOB) LI ACADEMIC EXPERIENCE RESEARCH HIGHLIGHTS TEACHING HIGHLIGHTS
XIAOBAI (BOB) LI Department of Operations & Information Systems Manning School of Business One University Ave., Lowell, MA 01854 Phone: 978-934-2707 Email: [email protected] ACADEMIC EXPERIENCE 2011-present
International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, Volume 2, Issue 9, September 2012)
Authentication of Medical Images using Integer Transforms A.Kannammal 1, Dr.S.Subha Rani 2 1 Assistant professor, 2 Professor and Head, ECE Department, PSG College of Technology, Peelamedu, Coimbatore
SOURCE SCANNER IDENTIFICATION FOR SCANNED DOCUMENTS. Nitin Khanna and Edward J. Delp
SOURCE SCANNER IDENTIFICATION FOR SCANNED DOCUMENTS Nitin Khanna and Edward J. Delp Video and Image Processing Laboratory School of Electrical and Computer Engineering Purdue University West Lafayette,
Teaching in School of Electronic, Information and Electrical Engineering
Introduction to Teaching in School of Electronic, Information and Electrical Engineering Shanghai Jiao Tong University Outline Organization of SEIEE Faculty Enrollments Undergraduate Programs Sample Curricula
Open Access A Facial Expression Recognition Algorithm Based on Local Binary Pattern and Empirical Mode Decomposition
Send Orders for Reprints to [email protected] The Open Electrical & Electronic Engineering Journal, 2014, 8, 599-604 599 Open Access A Facial Expression Recognition Algorithm Based on Local Binary
Text Localization & Segmentation in Images, Web Pages and Videos Media Mining I
Text Localization & Segmentation in Images, Web Pages and Videos Media Mining I Multimedia Computing, Universität Augsburg [email protected] www.multimedia-computing.{de,org} PSNR_Y
How To Filter Spam Image From A Picture By Color Or Color
Image Content-Based Email Spam Image Filtering Jianyi Wang and Kazuki Katagishi Abstract With the population of Internet around the world, email has become one of the main methods of communication among
Source Class Identification for DSLR and Compact Cameras
Source Class Identification for DSLR and Compact Cameras Yanmei Fang #,, Ahmet Emir Dirik #2, Xiaoxi Sun #, Nasir Memon #3 # Dept. of Computer & Information Science Polytechnic Institute of New York University,
Yong Lu, Ph.D. Email: [email protected] Phone: (570)972-1985
Yong Lu, Ph.D. Email: [email protected] Phone: (570)972-1985 卢 勇 博 士, 毕 业 于 西 南 财 经 大 学 (1994), 俄 亥 俄 大 学 (2006) 现 任 教 于 宾 夕 法 尼 亚 州 立 大 学 研 究 兴 趣 包 括 社 会 网 络 分 析, 机 构 投 资 者 社 会 网 络, 和 公 司 治 理 他 已 经 在 管 理
CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES
CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES 1 MYOUNGJIN KIM, 2 CUI YUN, 3 SEUNGHO HAN, 4 HANKU LEE 1,2,3,4 Department of Internet & Multimedia Engineering,
PULLING OUT OPINION TARGETS AND OPINION WORDS FROM REVIEWS BASED ON THE WORD ALIGNMENT MODEL AND USING TOPICAL WORD TRIGGER MODEL
Journal homepage: www.mjret.in ISSN:2348-6953 PULLING OUT OPINION TARGETS AND OPINION WORDS FROM REVIEWS BASED ON THE WORD ALIGNMENT MODEL AND USING TOPICAL WORD TRIGGER MODEL Utkarsha Vibhute, Prof. Soumitra
SU Qiang Professor ---------------------------------------------------------------------------------------------------------------------------------
SU Qiang Professor PhD Advisor Department: Department of Management Science and Engineering Email: [email protected] Office Phone: +86-21-65981443 ---------------------------------------------------------------------------------------------------------------------------------
Estimating the Redundancy Factor for RA-encoded sequences and also Studying Steganalysis Performance of YASS
Estimating the Redundancy Factor for RA-encoded sequences and also Studying Steganalysis Performance of YASS Anindya Sarkar, Upamanyu Madhow and B. S. Manjunath, Department of Electrical and Computer Engineering,
Performance Analysis of Interleaving Scheme in Wideband VoIP System under Different Strategic Conditions
Performance Analysis of Scheme in Wideband VoIP System under Different Strategic Conditions Harjit Pal Singh 1, Sarabjeet Singh 1 and Jasvir Singh 2 1 Dept. of Physics, Dr. B.R. Ambedkar National Institute
Sachin Dhawan Deptt. of ECE, UIET, Kurukshetra University, Kurukshetra, Haryana, India
Abstract Image compression is now essential for applications such as transmission and storage in data bases. In this paper we review and discuss about the image compression, need of compression, its principles,
SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING
SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING 1 Maulik Srivastava, 2 Anuradha Sharma 1,2 Department of Computer Science & Engineering, Amity University, Uttar Pradesh Abstract: As we all know
Topics in Security: Forensic Signal Analysis
Topics in Security: Forensic Signal Analysis Fact or fiction? Markus Kuhn, Andrew Lewis Computer Laboratory http://www.cl.cam.ac.uk/teaching/0910/r08/ Michaelmas 2009 MPhil ACS Hans D. Baumann, DOCMA 3
H.264/MPEG-4 AVC Video Compression Tutorial
Introduction The upcoming H.264/MPEG-4 AVC video compression standard promises a significant improvement over all previous video compression standards. In terms of coding efficiency, the new standard is
Generating Robust Digital Signature for Image/Video Authentication
Generating Robust Digital Signature for Image/Video Authentication Ching-Yung Lin and Shih-Fu Chang Department of Electrical Engineering and New Media Technology Center Columbia University New York, NY
RESEARCH INTERESTS: Computer, Networking and Information Security; Digital topology and image processing
Jianhua Yang Ph.D. Professor TSYS School of Computer Science, Columbus State University 4225 University Ave., Columbus, GA 31907 706-507-8180(office) [email protected], [email protected]
MEDICAL IMAGE COMPRESSION USING HYBRID CODER WITH FUZZY EDGE DETECTION
MEDICAL IMAGE COMPRESSION USING HYBRID CODER WITH FUZZY EDGE DETECTION K. Vidhya 1 and S. Shenbagadevi Department of Electrical & Communication Engineering, College of Engineering, Anna University, Chennai,
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION Saurabh Asija 1, Rakesh Singh 2 1 Research Scholar (Computer Engineering Department), Punjabi University, Patiala. 2 Asst.
Video Coding Basics. Yao Wang Polytechnic University, Brooklyn, NY11201 [email protected]
Video Coding Basics Yao Wang Polytechnic University, Brooklyn, NY11201 [email protected] Outline Motivation for video coding Basic ideas in video coding Block diagram of a typical video codec Different
Multi-factor Authentication in Banking Sector
Multi-factor Authentication in Banking Sector Tushar Bhivgade, Mithilesh Bhusari, Ajay Kuthe, Bhavna Jiddewar,Prof. Pooja Dubey Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering
Annotated bibliographies for presentations in MUMT 611, Winter 2006
Stephen Sinclair Music Technology Area, McGill University. Montreal, Canada Annotated bibliographies for presentations in MUMT 611, Winter 2006 Presentation 4: Musical Genre Similarity Aucouturier, J.-J.
T&E. Where Business Travelers Spend Money
T&E Where Business Travelers Spend Money Contents Introduction 3 Key Findings 4 Top Expensive Cities for Business Travel 5 International 5 U.S. 5 Top 10 Spend Categories 6 International 6 U.S. 7 Most Visited
AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY
AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY Chandan Mohapatra 1, Manajusha Pandey 2 1 PG Student in Computer Science Dept., KIIT University, Bhubaneswar,
The 2014-2016 Board of Directors
The 2014-2016 Board of Directors President Yang, Honggang, Ph.D. 杨 红 钢 Dean, School of Humanities and Social Sciences Nova Southeastern University [email protected] Vice President Chen, Jie, Ph.D. 陈 捷 Dean,
A comprehensive survey on various ETC techniques for secure Data transmission
A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and
Florida International University - University of Miami TRECVID 2014
Florida International University - University of Miami TRECVID 2014 Miguel Gavidia 3, Tarek Sayed 1, Yilin Yan 1, Quisha Zhu 1, Mei-Ling Shyu 1, Shu-Ching Chen 2, Hsin-Yu Ha 2, Ming Ma 1, Winnie Chen 4,
ISSCC 2003 / SESSION 4 / CLOCK RECOVERY AND BACKPLANE TRANSCEIVERS / PAPER 4.7
ISSCC 2003 / SESSION 4 / CLOCK RECOVERY AND BACKPLANE TRANSCEIVERS / PAPER 4.7 4.7 A 2.7 Gb/s CDMA-Interconnect Transceiver Chip Set with Multi-Level Signal Data Recovery for Re-configurable VLSI Systems
Curriculum Vitae July 2011 Shu Fan
Curriculum Vitae July 2011 Shu Fan General Information Current Position: Senior Research Fellow (Level C) Affiliation: Office: Telephone: +61 3 9905 5843 Fax: +61 3 9905 5474 Email: WWW: Research Interests
Signal and Information Processing
The Fu Foundation School of Engineering and Applied Science Department of Electrical Engineering COLUMBIA UNIVERSITY IN THE CITY OF NEW YORK Signal and Information Processing Prof. John Wright SIGNAL AND
Mike Perkins, Ph.D. [email protected]
Mike Perkins, Ph.D. [email protected] Summary More than 28 years of experience in research, algorithm development, system design, engineering management, executive management, and Board of Directors
Simultaneous Gamma Correction and Registration in the Frequency Domain
Simultaneous Gamma Correction and Registration in the Frequency Domain Alexander Wong [email protected] William Bishop [email protected] Department of Electrical and Computer Engineering University
Analysis of Color Visualization in High Dynamic Range Image
in High Dynamic Range Image Yong-Hwan Lee 1 and Youngseop Kim 2 1 Far East University, Chungbuk, Korea [email protected] 2 Dankook University, Chungnam, Korea [email protected] Abstract Tone mapping
Research and Professional Activities. Dr. Mitra Basu
Research and Professional Activities Dr. Mitra Basu Personal Information: Address Computer Science Department Computer Science Department United States Naval Academy Johns Hopkins University Annapolis,
Reversible Data Hiding and Reversible Authentication Watermarking for Binary Images
Reversible Data Hiding and Reversible Authentication Watermarking for Binary Images Sergio Vicente D. Pamboukian 1, Hae Yong Kim 2 1 Universidade Presbiteriana Mackenzie, Brazil. 2 Universidade de São
RESEARCH INTERESTS Modeling and Simulation, Complex Systems, Biofabrication, Bioinformatics
FENG GU Assistant Professor of Computer Science College of Staten Island, City University of New York 2800 Victory Boulevard, Staten Island, NY 10314 Doctoral Faculty of Computer Science Graduate Center
Generation of Cloud-free Imagery Using Landsat-8
Generation of Cloud-free Imagery Using Landsat-8 Byeonghee Kim 1, Youkyung Han 2, Yonghyun Kim 3, Yongil Kim 4 Department of Civil and Environmental Engineering, Seoul National University (SNU), Seoul,
Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation
Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation Sunil Karthick.M PG Scholar Department of ECE Kongu Engineering College Perundurau-638052 Venkatachalam.S Assistant Professor
Comparison of different image compression formats. ECE 533 Project Report Paula Aguilera
Comparison of different image compression formats ECE 533 Project Report Paula Aguilera Introduction: Images are very important documents nowadays; to work with them in some applications they need to be
DR. YUEXIAO DONG. Department of Statistics Fox School of Business Temple University 1810 N. 13th Street Philadelphia, PA 19122
Department of Statistics Fox School of Business Temple University 1810 N. 13th Street Philadelphia, PA 19122 Phone: (1-)215-204-0670 Email: [email protected] http://astro.temple.edu/ ydong/index.html Employment
Best Poster Award: International Congress on Child and Adolescent Psychiatry 2012
EDUCATION Ph.D. Computer Engineering University of Southern California 1999 MS Computer Engineering University of Southern California 1994 B.S. Electrical Engineering Tehran University 1988 AWARDS & FELLOWSHIPS
