Y.Q. Shi

ORCID: 0009-0001-6813-0309
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Steganography and Watermarking Techniques
  • Chaos-based Image/Signal Encryption
  • Advanced Vision and Imaging
  • Digital Media Forensic Detection
  • Network Traffic and Congestion Control
  • Advanced Image Processing Techniques
  • Advanced Data Compression Techniques
  • Image and Video Quality Assessment
  • Optical measurement and interference techniques
  • Peer-to-Peer Network Technologies
  • Image Processing Techniques and Applications
  • Advanced Wireless Network Optimization
  • Stability and Control of Uncertain Systems
  • Advanced Numerical Analysis Techniques
  • Robotics and Sensor-Based Localization
  • Electrical and Bioimpedance Tomography
  • Flow Measurement and Analysis
  • 3D Shape Modeling and Analysis
  • Advanced X-ray Imaging Techniques
  • Control Systems and Identification
  • Wireless Signal Modulation Classification
  • Medical Imaging Techniques and Applications
  • Blind Source Separation Techniques
  • Advanced Control Systems Optimization
  • Advanced Measurement and Metrology Techniques

Ministry of Education
2023

Inner Mongolia University
2023

Wuhu Hit Robot Technology Research Institute
2023

China Automotive Engineering Research Institute
2023

Purdue University West Lafayette
2012

New Jersey Institute of Technology
1989-2005

Sun Yat-sen University
2003

Shantou University
2002

In this letter, we present a novel objective distortion measure for binary document images. This is based on the reciprocal of distance that straightforward to calculate. Our results show proposed matches well subjective evaluation by human visual perception.

10.1109/lsp.2003.821748 article EN IEEE Signal Processing Letters 2004-02-01

In this paper, a general blind image steganalysis system is proposed, in which the statistical moments of characteristic functions prediction-error image, test and their wavelet subbands are selected as features. Artificial neural network utilized classifier. The performance proposed significantly superior to prior arts.

10.1109/icme.2005.1521412 article EN 2005-10-24

In this paper, we propose a DWT-based video watermarking algorithm. It embeds multiple information bits into uncompressed sequences. Its features include: i) embedding data in the LL subband; ii) reducing error probabilities of detection by exploiting BCH code; iii) combating bursts errors using novel 3-D interleaving technique; iv) developing an effective temporal synchronization technique (compared with sliding correlation proposed Hartung and Girod, our is more advance); v) valid secure...

10.1109/iscas.2002.1010303 article EN 2003-06-25

This paper proposes a novel approach to high capacity lossless data hiding based on integer wavelet transform, which embeds into the most insensitive bit-planes of coefficients. Specifically, three methods, namely A, B and C are proposed. Method A is traditional technique, can losslessly recover original image. The reach 1/10 volume that image occupies histogram modification used prevent over/underflow. not technique. It only pre-processed instead However, 1/2 occupies. has better visual...

10.1109/iscas.2004.1329200 article EN 2004-10-04

A novel formatted text document data hiding algorithm, called inter-word space modulation (ISM) scheme, is proposed in which the spaces between neighboring words are modulated to hide data. In contrast prior arts, this method does not require original documents for hidden extraction. The robust printing, copying and scanning. Our experiments show that after ten times of repeated copying, followed by scanning, can still be extracted without a single bit error. It expected it find wide...

10.1109/iscas.2005.1465749 article EN 1993 IEEE International Symposium on Circuits and Systems 2005-07-27

The watermark embedding strategy is one of factors that affect the robustness watermark. In this paper, a new based on discrete wavelet transform (DWT) proposed. Different from existing schemes DWT which have explicitly excluded LL subband coefficients embedding, we claim watermarks should be embedded in first, and then high frequency subbands according to visual significance subbands. We compared performance our with commonly used ones, confirming superiority proposed strategy. Based...

10.1109/iscas.2002.1011442 article EN 2003-06-25

Hiding a gray scale image encounters some difficulties. In this paper, DCT-based hiding algorithm is proposed. The bit rate of the hidden reduced by applying an compression technique. To extract data from corrupted watermarked image, BCH coding and matched filtering are applied. With proposed algorithm, we hide 64/spl times/64/spl times/8 in 512/spl times/512/spl times/8. experimental results demonstrated that embedded can be extracted reliably noisy images.

10.1109/iscas.2001.922029 article EN 2002-11-13

A watermark signal, which is a unique sequence of random variables, by itself does not give decisive indication ownership. This work addresses the need to include meaningful information such that string English characters, numbers, and punctuation embedded within while signal remains variables. We attempt provide answers for (1) maximum number symbols can carry, (2) most practical reliable way implement this. approached this problem as power constrained multiple signaling over an AWGN channel.

10.1109/mmsp.1998.738967 article EN 2002-11-27

Variable bit rate (VBR) video traffic exhibits high burstiness and long range dependence properties, which, in conjunction with the stringent quality of service (QoS) requirements, pose a great challenge transporting over communication network. The authors propose QoS guaranteed bandwidth allocation for given resource utilisation. Simulation analytical results demonstrate that this scheme provides delay achieves

10.1049/ip-com:20040550 article EN IEE Proceedings - Communications 2004-01-01

This paper introduces a new angle for enhancing the robustness of information symbols embedded in video sequences. The main idea is to apply 3D interleaving watermark signal. We first briefly explain technique used, then demonstrate increased signal as result interleaving. Simulation results are shown two types burst errors, error clusters and frame loss.

10.1109/icme.2000.871537 article EN 2002-11-07

Robustness is one of the fundamental requirements digital watermarking for some applications. By modeling as communications, many authors proposed to use error correcting coding (ECC) improve robustness. However, a fact has long been neglected. That is, due requirement imperceptibility watermarking, redundancy introduced by ECC will lead decrease watermark strength. Hence, question arises. Could effectively robustness watermark? This paper investigates this problem from both theoretical...

10.1109/iscas.2003.1205140 article EN 2003-11-21

A simple approach to model MPEG coded video traffic is proposed. The idea first decompose the into three components, corresponding I, P, and B frames, each modeled by a self-similar process. These processes are then structurally modulated in manner similar how frames grouped GOP (Group of Pictures) pattern. new shown be able capture statistical properties (both LRD SRD) traffic.

10.1109/icme.2000.869662 article EN 2002-11-07

Markov modulated self-similar processes are proposed to model MPEG video sequences that can capture the LRD (long range dependency) characteristics of ACF (auto-correlation function). An compressed sequence is decomposed into three parts according different motion/change complexity such each part individually be described by a process. Beta distribution used characterize marginal cumulative function (CDF) processes, and chain govern transition among these processes. Network cell loss rate...

10.1109/glocom.1999.829959 article EN 2003-01-22

The initial weld position of large complex components has the characteristics irregular shape and random spatial distribution. Traditional welding robots have technical bottlenecks such as low teaching programming efficiency difficulty in offline this application scenario. Therefore, at present, method "workers piling up" is used to components. To overcome these problems, it necessary urgent develop intelligent identification for based on machine vision. Firstly, theoretical background...

10.1145/3598151.3598173 article EN 2023-05-12

The Krascheninnikovia compacta community is primarily distributed in extremely cold and arid high-altitude environments typically inaccessible to humans.It represents the most common widely type of vegetation alpine deserts Qingzang Plateau.Most investigations into this take form qualitative descriptions, which fail provide precious sample data.In order generate a dataset K. compacta, paper recorded organized spatial distribution, characteristics structure, climate species based on field...

10.17520/biods.2023172 article EN Biodiversity Science 2023-01-01

In this paper, a Kalman filter-based algorithm for 3-D motion estimation from stereo image sequence using the unified temporal-spatial optical flow field (UOFF) has been proposed. The modeling problem is discussed first. More consideration given to determining covariance matrices system noise and sensor than previous works filtering in processing. newly visible areas, i.e., disocclusion issue, which have not considered most of works, are handled our by threshold method. Two experiments...

10.1109/icip.1994.413887 article EN 2002-12-17

Through a linear fractional transformation in the frequency domain, set of hyperellipsoids, containing only such points coefficient space which correspond to stable polynomials discrete-time systems, was obtained. Procedures for searching suitable transform parameter beta that will achieve possibly larger perturbation range (with guaranteed stability) than obtained by C.B. Soh et al. (1985) are presented. When =0, hyperellipsoid degenerates largest hypersphere. The result this work is,...

10.1109/41.103459 article EN IEEE Transactions on Industrial Electronics 1990-01-01

A method of automatically classifying fingerprints into three groups, whorl, loop, and arch is described. It can help medical scientists to study the relationship between fingerprint patterns disorders, such as breast cancer. In research, a frequency domain approach that uses feature Fourier spectrum was developed; is, prominent peaks in give principal direction patterns. Using above feature, authors obtain every subregion. The pattern whole image then be determined. allows one classify...

10.1109/nebc.1993.404366 article EN 2002-12-30

10.1016/0030-4018(88)90394-x article EN Optics Communications 1988-10-01

To guarantee quality of service (QoS), the requirements for video transmission, such as delay and cell loss rate (CLR), are very stringent. These constraints difficult to meet if high network utilization is desired. In this paper, online dynamic bandwidth allocation algorithms, in which adjusted based on current frame size, proposed improve utilization. When deviation large enough, a re-negotiation process triggered. Compared with constant bit-rate (CBR) service, can be improved...

10.1109/itcc.2001.918821 article EN 2002-11-13

Abstract In Jiang (1988), a condition is given which supposedly necessary and sufficient for the stability of interval matrices in discrete-time systems. We demonstrate, via counter-example, that is, fact, not sufficient.

10.1080/00207178908559689 article EN International Journal of Control 1989-03-01
Coming Soon ...