Reversible data hiding Z Ni, YQ Shi, N Ansari, W Su IEEE Transactions on circuits and systems for video technology 16 (3), 354-362, 2006 | 3680 | 2006 |
Reversible watermarking algorithm using sorting and prediction V Sachnev, HJ Kim, J Nam, S Suresh, YQ Shi IEEE Transactions on Circuits and Systems for Video Technology 19 (7), 989-999, 2009 | 1034 | 2009 |
Image and video compression for multimedia engineering: Fundamentals, algorithms, and standards YQ Shi, H Sun CRC press, 2019 | 905 | 2019 |
Structural design of convolutional neural networks for steganalysis G Xu, HZ Wu, YQ Shi IEEE Signal Processing Letters 23 (5), 708-712, 2016 | 760 | 2016 |
Reversible data hiding: Advances in the past two decades YQ Shi, X Li, X Zhang, HT Wu, B Ma IEEE access 4, 3210-3237, 2016 | 591 | 2016 |
Pairwise prediction-error expansion for efficient reversible data hiding B Ou, X Li, Y Zhao, R Ni, YQ Shi IEEE Transactions on image processing 22 (12), 5010-5021, 2013 | 549 | 2013 |
A Markov process based approach to effective attacking JPEG steganography YQ Shi, C Chen, W Chen Information Hiding: 8th International Workshop, IH 2006, Alexandria, VA, USA …, 2007 | 521 | 2007 |
A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression X Kang, J Huang, YQ Shi, Y Lin IEEE transactions on circuits and systems for video technology 13 (8), 776-786, 2003 | 499 | 2003 |
Embedding image watermarks in DC components J Huang, YQ Shi, Y Shi IEEE transactions on circuits and systems for video technology 10 (6), 974-979, 2000 | 494 | 2000 |
A novel difference expansion transform for reversible data embedding HJ Kim, V Sachnev, YQ Shi, J Nam, HG Choo IEEE Transactions on Information Forensics and Security 3 (3), 456-465, 2008 | 457 | 2008 |
A generalized Benford’s law for JPEG coefficients and its applications in image forensics D Fu, YQ Shi, W Su Security, Steganography, and Watermarking of Multimedia Contents IX 6505 …, 2007 | 403 | 2007 |
Distortionless data hiding based on integer wavelet transform G Xuan, J Zhu, J Chen, YQ Shi, Z Ni, W Su Electronics Letters 38 (25), 1646-1648, 2002 | 393 | 2002 |
Efficiently self-synchronized audio watermarking for assured audio data transmission S Wu, J Huang, D Huang, YQ Shi IEEE Transactions on Broadcasting 51 (1), 69-76, 2005 | 382 | 2005 |
Uniform embedding for efficient JPEG steganography L Guo, J Ni, YQ Shi IEEE transactions on Information Forensics and Security 9 (5), 814-825, 2014 | 347 | 2014 |
JPEG image steganalysis utilizing both intrablock and interblock correlations C Chen, YQ Shi 2008 IEEE International Symposium on Circuits and Systems (ISCAS), 3029-3032, 2008 | 347 | 2008 |
DCT 域图像水印: 嵌入对策和算法 黄继武, 程卫东 电子学报 28 (4), 57-60, 2000 | 321 | 2000 |
Using statistical image model for JPEG steganography: Uniform embedding revisited L Guo, J Ni, W Su, C Tang, YQ Shi IEEE Transactions on Information Forensics and Security 10 (12), 2669-2680, 2015 | 315 | 2015 |
Distance-reciprocal distortion measure for binary document images H Lu, AC Kot, YQ Shi IEEE Signal Processing Letters 11 (2), 228-231, 2004 | 303 | 2004 |
A natural image model approach to splicing detection YQ Shi, C Chen, W Chen Proceedings of the 9th workshop on Multimedia & security, 51-62, 2007 | 296 | 2007 |
Robust lossless image data hiding designed for semi-fragile image authentication Z Ni, YQ Shi, N Ansari, W Su, Q Sun, X Lin IEEE Transactions on circuits and systems for video technology 18 (4), 497-509, 2008 | 288 | 2008 |