Search Results - "Shenghe Sun"
-
1
Print-and-scan model and the watermarking countermeasure
Published in Image and vision computing (01-09-2005)“…With multimedia developing rapidly, copyright protection and authentication is more and more important. Digital watermark is one of the most efficient methods…”
Get full text
Journal Article -
2
Multiresolution watermarking for video based on gray-level digital watermark
Published in IEEE transactions on consumer electronics (01-05-2000)“…A method of embedding a digital watermark image in video is proposed in this paper. By two-dimensional and three-dimensional multiresolution signal…”
Get full text
Journal Article -
3
Analysis on the characteristics of phase difference sequence in super wide coverage multi-beam echo sounder
Published in Proceedings of OCEANS 2005 MTS/IEEE (2005)“…The ocean is much more than 70% of the surface on the Earth, many kinds of mineral resources and natural gas exist under seafloor. Before mining for them we…”
Get full text
Conference Proceeding -
4
Image Authentication in Print-and-scan Scenario
Published in Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007) (01-11-2007)“…The process of printing and scanning is one of the most difficult problems not to be solved in the field of image authentication, because of lack knowledge of…”
Get full text
Conference Proceeding -
5
Resolutions of some overlap signals based on MUSIC algorithm
Published in The 2010 IEEE International Conference on Information and Automation (01-06-2010)“…In order to reduce resolution angle in direction finding system, a method based on MUSIC algorithm is proposed. According to the receiving characteristic of…”
Get full text
Conference Proceeding -
6
Analysis of second-order harmonic distortion of ADC using bispectrum
Published in IEEE transactions on instrumentation and measurement (01-02-1996)“…This paper presents a new frequency-domain approach to test the second-order harmonic distortion of an analog-to-digital converter (ADC). It uses triple…”
Get full text
Journal Article -
7
The application research of chaotic stream cipher in aircraft co-operation data classified transmission system
Published in 2009 9th International Conference on Electronic Measurement & Instruments (01-08-2009)“…The co-operation data classified transmission system which is embedded, autonomous, highly reliable, strongly real-time and highly secure, is special for the…”
Get full text
Conference Proceeding -
8
Analysis of Anonymity on the Signatures of Knowledge
Published in 2006 International Conference on Intelligent Information Hiding and Multimedia (01-12-2006)“…The anonymity is the most important property of group signature schemes. Traditional schemes suppose that a signer is reluctant to leak his identity to a…”
Get full text
Conference Proceeding -
9
Covert Communication Based on Subliminal Channel in Broadcast Multi Signature
Published in 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (01-08-2008)“…The subliminal channel is a covert communication channel constructed in public correspondence pattern. As a kind of the modern information hiding technology,…”
Get full text
Conference Proceeding -
10
Information Hiding Using Secret Sharing Scheme
Published in First International Conference on Innovative Computing, Information and Control - Volume I (ICICIC'06) (2006)“…In traditional information hiding schemes, such as watermarking, the hiding information was embedded into the covermessage to form stegomessage directly. The…”
Get full text
Conference Proceeding -
11
A Method of Big Prime Number Generator Based on NTL
Published in 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (01-08-2008)“…NTL (number theory library) is a C++ library, which is developed and maintained by New York University's Victor Shoup. It provides a number of algorithms about…”
Get full text
Conference Proceeding -
12
An ID-Based Blind Multisignature Scheme
Published in 2008 3rd International Conference on Innovative Computing Information and Control (01-06-2008)“…This paper presents an identity-based blind multisignature from bilinear pairings with the idea of broadcasting multi-signature. The scheme uses identity-based…”
Get full text
Conference Proceeding -
13
An ID-based Multi-signature Scheme
Published in Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007) (01-11-2007)“…This paper presents an identity-based multi- signature scheme, including the signature protocol and the verification algorithm. Key feature of the proposed…”
Get full text
Conference Proceeding -
14
Spectrum Shaped Dither Modulation Watermarking for Correlated Host Signal
Published in 2007 IEEE International Conference on Multimedia and Expo (01-07-2007)“…Spectrum shaping of watermark is necessary when the host signal is colored. This paper proposes a spectrum shaped dither modulation watermarking scheme. The…”
Get full text
Conference Proceeding -
15
A PCB Component Location Method Based on Image Hashing
Published in 2007 8th International Conference on Electronic Measurement and Instruments (01-08-2007)“…A novel method based on image hashing is proposed to locate the acquired component from a CCD DSC camera in this paper. Image hash is extracted resistant to…”
Get full text
Conference Proceeding -
16
3D Texture Classification Using 3D Texture Histogram Model and SVM
Published in 2007 8th International Conference on Electronic Measurement and Instruments (01-08-2007)“…A 3D texture classification method based on support vector machines (SVM) and histogram model is proposed in this paper. We compute the bidirectional histogram…”
Get full text
Conference Proceeding -
17
A non-interactive modular verifiable secret sharing scheme
Published in Proceedings. 2005 International Conference on Communications, Circuits and Systems, 2005 (2005)“…We prove that the verifiable secret sharing scheme of C. Asmuth and J. Bloom (see IEEE Trans. Inform. Theory, vol.IT-29.547, p.208-10, 1983) is not realizable…”
Get full text
Conference Proceeding -
18
Reversible image watermarking by histogram modification for integer DCT coefficients
Published in IEEE 6th Workshop on Multimedia Signal Processing, 2004 (2004)“…We present a reversible watermarking scheme which achieves perfect restoration of both the embedded watermark and the original image during extraction. The…”
Get full text
Conference Proceeding -
19
A novel equivalent sampling method using in the digital storage oscilloscopes
Published in Conference Proceedings. 10th Anniversary. IMTC/94. Advanced Technologies in I & M. 1994 IEEE Instrumentation and Measurement Technolgy Conference (Cat. No.94CH3424-9) (1994)“…The random equivalent sampling and sequential equivalent sampling are two equivalent sampling methods widely used in the Digital Storage Oscilloscopes. A novel…”
Get full text
Conference Proceeding -
20
The effect of sampling noise on band-limited periodic signal measurement
Published in Conference Proceedings. 10th Anniversary. IMTC/94. Advanced Technologies in I & M. 1994 IEEE Instrumentation and Measurement Technolgy Conference (Cat. No.94CH3424-9) (1994)“…In this paper, the effects of superposing and multiplying sampling noise on band-limited periodic signal measurements are investigated as viewed from spectrum…”
Get full text
Conference Proceeding