Shuowang's Pro Page


- P. Zhang, S. Wang, Fast Prediction of Scatered Sound Field Based on Fourier Diffraction Theorem under Second-Order Born Approximation, Acoustical Physics, 60(4), 2014: 379-386 PDF
- P. Zhang, S. Wang, R. Wang, Y. Chen, L. Wang, Modification to First-Order Boen Approximation for Improved Prediction of Scattered Sound from Weakly Scattering Objects, Chinese Journal of Acoustics, 39(3), 2014: 228-238 PDF
- 张培珍,王朔中,王润田,陈云飞,王露贤,修正一阶Born近似改进水中弱散射目标的散射声场预报,声学学报,39(3), 2014: 331-338 PDF
- Z. Qian, X. Zhang, S. Wang, Reversible Data Hiding in Encrypted JPEG Bitstream, IEEE Transactions on Multimedia, 16(5), 2014: 1486-1491 PDF
- S. Wang, Z. Qian, L. Wang, Recognition of Layered Structure Using Phase-Frequency Characteristics of Reflected Sound Waves, 20th International Congress on Sound and Vibration 2013, ICSV 2013, Bangkok, Thailand, July, 2013: 1633-1637 PDF
- S. Wang, G. Feng, T. Zou, Z. Qian, Robust Audio Watermarking Capable of Surviving Play-Record Process Based on Chroma Features, 20th International Congress on Sound and Vibration 2013, ICSV 2013, Bangkok, Thailand, July, 2013: 1504-1509 PDF
- Y. Zhao, S. Wang, X. Zhang, and H. Yao, Robust Hashing for Image Authentication Using Zernike Moments and Local Features, IEEE Transactions on Information Forensics and Security, 8(1), 2013: 55-63 PDF
- 倪丽佳, 王朔中, 吴酋珉, 裴蓓, 对局部内容篡改敏感的感知图像散列, 通信学报, 33(9), 2012: 177-184 PDF
- P. Zhang, S. Wang, and R. Wang, Reducing Frequncy-domain Artifacts of Binary Image Due to Coarse Sampling by Repeated Interpolation and Smoothing of Radon Projections, Journal of Visual Communication and Image Representation, 23, 2012: 697-740 PDF
- H. Yao, S. Wang, Y. Zhao, and X. Zhang, Detecting Image Forgery Using Perspective Constraints, IEEE Signal Processing Letters, 19(3), 2012: 123-126 PDF
- C. Qin, S. Wang, and X. Zhang, Simultaneous Inpainting for Image Structure and Texture Using Anisotropic Heat Transfer Model, Multimedia Tools and Applications, 56(3), 2012: 469-483 PDF
- X. Zhang, and S. Wang, Efficient Data Hiding with Histogram-Preserving Property, Telecommunication Systems, 49(2), 2012: 179-185 PDF
- 张培珍, 王朔中, 声散射预报中目标断面图像的快速旋转, 声学技术, 30(4), 2011: 340-344 PDF
- Q. Wu, S. Wang, and X. Zhang, Log-Polar Based Scheme for Revealing Duplicated Regions in Digital Images, IEEE Signal Processing Letters, 18(10), 2011: 559-562 PDF
- X. Zhang, S. Wang, and G. Feng, Reversible Visible Watermarking with Lossless Data Embedding Based on Difference Value Shift, Intelligent Automation and Soft Computing, 17(2), 2011: 233-243 PDF
- X. Zhang, S. Wang, Z. Qian, and G. Feng, Self-Embedding Watermark with Flexible Restoration Quality, Multimedia Tools and Applications, 54, 2011: 385-395 PDF
- Z. Tang, S.Wang, X. Zhang, W. Wei, Y. Zhao, Lexicographical Framework for Image Hashing with Implementation Based on DCT and NMF, Multimedia Tools and Applications, 52, 2011: 325-345 PDF
- Z. Tang, S. Wang, X. Zhang, W. Wei, Structural Feature-Based Image Hashing and Similarity Metric for Tampering Detection, Fundamenta Informaticae, 106(1), 2011: 75-91 PDF
- X. Zhang, S. Wang, Z. Qian, and G. Feng, Reference Sharing Mechanism for Watermark Self-Embedding, IEEE Transactions on Image Processing, 20(2), 2011: 485-495 PDF
- Y. Zhao, S. Wang, G. Feng, and Z. Tang, A Robust Image Hashing Method Based on Zernike Moments, Journal of Computational Information Systems, 6(3), 2010: 717-725 PDF
- X. Zhang, S. Wang, Z. Qian, and G. Feng, Reversible Fragile Watermarking for Locating Tampered Blocks in JPEG Images, Signal Processing, 90(12), 2010: 3026-3036 PDF
- Shuozhong Wang, Passive Detection of Digital Image Forgery, Keynote Speech, Second International Conference of Computational Collective Intelligence, Kaohsiung, Taiwan, November 10-12, 2010 PDF
- 王朔中, 吴酋珉, 真伪之辨-数字图像的防伪认证, 自然杂志, 32(5), 2010: 281-287 PDF
- T. Liu, S. Wang, X. Zhang, Z. Yu, Extraction of Color-Intensity Feature towards Image Authentication, Journal of Shanghai University, 14(5), 2010: 337-342 PDF
- 秦运龙, 孙广玲, 王朔中, 张新鹏, 根据GOP异常进行视频序列剪辑篡改的盲检测, 电子学报, 38(7), 2010: 1597-1602 PDF
- W. Wei, S. Wang, X. Zhang, and Z. Tang, Estimation of Image Rotation Angle Using Interpolation-Related Spectral Signatures with Application to Blind Detection of Image Forgery, IEEE Transactions on Information Forensics and Security, 5(3), 2010: 507-517 PDF
- S. Wang, Prediction of Scattered Sound Field Based on the Reversal of Acoustic Diffraction Tomography, 17th International Congress on Sound and Vibration (ICSV17), Cairo, Egypt, July 2010 PDF
- W. Zhang, X. Zhang, and S. Wang, Near-Optimal Codes for Information Embedding in Gray-Scale Signals, IEEE Transactions on Information Theory, 56(3), 2010: 1262-1270 PDF
- 王朔中, 方针, 声衍射层析成像研究进展, 声学技术, 29(2), 2010: 117-122 PDF
- S. Wang, S. Huang, X. Zhang, and W. Wu, Hologram-Based Watermarking Capable of Surviving Print-Scan Process, Applied Optics, 49(7), 2010: 1170-1178 PDF
- 王朔中, 张新鹏, 张卫明, 以数字图像为载体的隐写分析研究进展, 计算机学报, 32(7), 2009: 1247-1263 PDF
- X. Zhang, S. Wang, Fragile Watermarking Scheme Using a Hierarchical Mechanism, Signal Processing, 89(4), 2009: 675-679 PDF
- 黄素娟, 王朔中, 于瀛洁, 共轭对称延拓傅里叶计算全息, 物理学报, 58(2), 2009: 952-958 PDF
- X. Zhang and S. Wang, Fragile Watermarking with Error-Free Restoration Capability, IEEE Transactions on Multimedia, 10(8), 2008: 1490-1499 PDF
- W. Zhang, X. Zhang, S. Wang, Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes, Proceedings of IH 2008, Lecture Notes in Computer Science, 5284, 2008: 60-71 PDF
- Z. Tang, S. Wang, X. Zhang, W. Wei, S. Su, Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization, Journal of Ubiquitous Convergence Technology, 2(1), 2008: 18-26 PDF
- X. Zhang, S. Wang, and Zhenyu Zhou, Multibit Assignment Steganography in Palette Images, IEEE Signal Processing Letters, 15, 2008: 553-556 PDF
- X. Zhang, and S. Wang, Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels, IEEE Signal Processing Letters, 14(10), 2007: 727-730 PDF
- 张新鹏, 王朔中, 基于稀疏表示的密写编码, 电子学报, 35(10), 2007: 1892-1896 PDF
- W. Zhang, S. Wang, and X. Zhang, Improving Embedding Efficiency of Covering Codes for Applications in Steganography, IEEE Communications Letters, 11(8), 2007: 680-682 PDF
- W. Zhang, X. Zhang, and S. Wang, A Double Layered “Plus-Minus One” Data Embedding Scheme, IEEE Signal Processing Letters, 14(11), 2007: 848-851 PDF
- X. Zhang, W. Zhang, and S. Wang, Efficient Double-Layered Steganographic Embedding, Electronics Letters, 43(8), 2007: 482-483 PDF
- X. Zhang, W. Zhang, and S. Wang, Integrated Encoding with High Efficiency for Digital Steganography, Electronics Letters, 43(22), 2007: 1191-1192 PDF
- X. Zhang, and S. Wang, Watermarking Scheme Capable of Resisting Sensitivity Attack, IEEE Signal Processing Letters, 14(2), 2007: 125-128 PDF
- X. Zhang, and S. Wang, Efficient Steganographic Embedding by Exploiting Modification Direction, IEEE Communications Letters, 10(11), 2006: 781-783 PDF
- X. Zhang, and S. Wang, Image Restoration Using Truncated SVD Filter Bank Based on an Energy Criterion, IEE Proceedings - Vision, Image and Signal Processing, 153(6), Dec 2006: 825-836 PDF
- X. Zhang, and S. Wang, Dynamical Running Coding in Digital Steganography, IEEE Signal Processing Letters, 13(3), 2006: 165-168 PDF
- S. Wang, C. Chen, and X. Zhang, Undercover Communication Using Image and Text as Disguise and Countermeasures, Journal of Shanghai University, 10(1), 2006: 33-43 PDF
- 秦川, 王朔中, 张新鹏, 一种基于视觉特性的图像摘要算法, 中国图像图形学报, 11(11), 2006: 1678-1681 PDF
- 徐伟, 王朔中, 基于视频图像Harris角点检测的车辆测速, 中国图像图形学报, 11(11), 2006: 1650-1652 PDF
- 陈超, 王朔中, 张新鹏, 应用TeX控制功能和图像检测的文本密写, 应用科学学报, 24(2), 2006: 115-119 PDF
- 张新鹏, 王朔中, 对空域BPCS密写的统计分析, 计算机辅助设计与图形学学报, 17(7), 2005: 1626-1629 (X. Zhang, and S. Wang, Statistical Analysis against Spatial BPCS Steganography, Journal of Computer-Aided Design and Computer Graphics, 17(7), 2005: 1626-1629) PDF
- X. Zhang and S. Wang, Stego-Encoding with Error Correction Capability, IEICE Transactions on Fundamentals, E88-A(12), 2005: 3663-3667 PDF
- 俞一彪, 王朔中, 文本无关说话人识别的全特征矢量集模型及互信息评估方法, 声学学报, 30(6), 2005: 536-341 PDF
- X. Zhang and S. Wang, Watermarking Protocol Compatible with Secret Algorithms for Resisting Invertibility Attack, Knowledge-Based Intelligent Information and Engineering Systems, Lecture Notes in Artificial Intelligence, 3682, Springer-Verlag, 2005: 1134-1144 PDF
- X. Zhang and S. Wang, Analysis of Parity Assignment Steganography in Palette Images, Knowledge-Based Intelligent Information and Engineering Systems, Lecture Notes in Artificial Intelligence, 3683, Springer-Verlag, 2005: 1025-1031 PDF
- X. Zhang, and S. Wang, Steganography Using Multiple-Base Notational System and Human Vision Sensitivity, IEEE Signal Processing Letters, 12(1), 2005: 67-70 PDF
- H. Wang, and S. Wang, Cyber Warfare: Steganography vs. Steganalysis, Communications of the ACM, 47(10), 2004: 76-82 PDF
- X. Zhang, and S. Wang, Invertibility Attack against Watermarking Based on Forged Algorithm and a Countermeasure, Pattern Recognition Letters, 25, 2004: 967-973 PDF
- S. Wang, X. Zhang, and K. Zhang, Data Hiding in Digital Audio by Frequency Domain Dithering, Lecture Notes in Computer Science, 2776, 2003: 383-394 PDF
- X. Zhang, S. Wang, and Kaiwen Zhang, Steganography with Least Histogram Abnormality, Lecture Notes in Computer Science, 2776, 2003: 395-406 PDF
- X. Zhang, and S. Wang, Vulnerability of Pixel-Value Differencing Steganography to Histogram Analysis and Modification for Enhanced Security, Pattern Recognition Letters, 25, 2004: 331-339 PDF
- K. Zhang, S. Wang, and X. Zhang, Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation, Lecture Notes in Computer Science, 2776, 2003: 360-370 PDF
- S. Wang, and X. Zhang, Least Square Based Convolution Mask for Image Restoration, Journal of the Imaging Society of Japan, 41(4), 2002: 392-397 PDF
- X. Zhang, and S. Wang, Watermarking Scheme Capable of Resisting Attacks Based on Availability of Inserter, Signal Processing, 82(11), 2002: 1801-1804 PDF
- S. Wang, X. Zhang, and T. Ma, Image Watermarking Using Dither Modulation in Dual-Transform Domain, Journal of the Imaging Society of Japan, 41(4), 2002: 398-402 PDF
- K. Zhang, S. Wang, and X. Zhang, A New Metric for Quality Assessment of Digital Images Based on Weighted-Mean Square Error, Proceedings of SPIE, 4875, 2002 PDF
- S. Wang, X. Zhang, and K. Zhang, Steganographic Technique Capable of Withstanding RQP Analysis, Journal of Shanghai University, 6(4), 2002: 273-277 PDF
- 王朔中,基于OFDM的数字音频水印,中国学术期刊文摘, 7(11), 2001: 1456-1459 PDF
- S. Wang, Watermarking Based on Principal Component Analysis, Journal of Shanghai University, 4(1), 2000: 22-26 PDF
- S. Wang, R. Wang, and Z. Fang, Calculation of Sound Scattering from Elastic Targets Using Unified FDTD Formulae, Journal of the Acoustical Society of America, 104(3), pt.2, 1998: 1755 PDF
- S. Wang, Finite-Difference Time-Domain Approach to Underwater Acoustic Scattering Problems, Journal of the Acoustical Society of America, 99(4), pt.1, 1996: 1924-1931 PDF
- S. Wang, and T. G. Birdsall, Computer Simulation of Tidal Signal Prediction in Long Range Ocean Acoustic Travel Time Measurements, Chinese Journal of Acoustics, 15(1), 1996: 39-51 PDF
- M. L. Grabb, S. Wang, and T. G. Birdsall, Deterministic Three-Dimensional Analysis of Long-Range Sound Sound Propagation through Internal-Wave Fields, IEEE Journal of Oceanic Engineering, 21(3), 1996: 260-272 PDF
- 王朔中, 声学中用于时域有限差分法的一种高效吸收边界, 声学学报, 21(6), 1996: 11-21 [Wang Shuozhong, An Efficient Absorbing Boundary for Finite-Difference Time-Domain Field Modeling in Acoustics, Chinese Journal of Acoustics, 16(2), 1997: 121-134] PDF
- S. Wang, M. L. Grabb, and T. G. Birdsall, Design of Periodic Signals Using FM Sweeps and Amplitude Modulation for Ocean Acoustic Travel-Time Measurements, IEEE Journal of Oceanic Engineering, 19(4), 1994: 611-618 PDF
- 王朔中, 数字化连续波声呐中的分段相关器, 声学学报, 13(5), 1988: 349-355 PDF
- 王朔中,有限声阻抗半无限薄板的衍射:对一个经验公式的改进, 声学学报, 9(5), 1984: 333-337 [S. Wang, Diffraction by Half Screen with Finite Acoustic Impedance - A Modification to an Empirical Formula, Chinese Journal of Acoustics, 4(3), 1985: 279-284] PDF
- 王朔中, 尖劈边缘附近的衍射声场, 声学学报, 10(4), 1985: 247-256 [S. Wang, Diffracted Acoustic Field around a Wedge, Chinese Journal of Acoustics, 3(2), 1984: 121-132] PDF
- S. Wang An Application of Diffraction Theory to Echo Formation, Chinese Journal of Acoustics, 2(4), 1983: 273-292 [王朔中,衍射理论在回声形成中的应用, 声学学报, 10(5), 1985: 302-318] PDF