Shuowang's Pro Page
代表性论文

 
  1. P. Zhang, S. Wang, Fast Prediction of Scatered Sound Field Based on Fourier Diffraction Theorem under Second-Order Born Approximation, Acoustical Physics, 60(4), 2014: 379-386 PDF
  2. P. Zhang, S. Wang, R. Wang, Y. Chen, L. Wang, Modification to First-Order Boen Approximation for Improved Prediction of Scattered Sound from Weakly Scattering Objects, Chinese Journal of Acoustics, 39(3), 2014: 228-238 PDF
  3. 张培珍,王朔中,王润田,陈云飞,王露贤,修正一阶Born近似改进水中弱散射目标的散射声场预报,声学学报,39(3), 2014: 331-338 PDF
  4. Z. Qian, X. Zhang, S. Wang, Reversible Data Hiding in Encrypted JPEG Bitstream, IEEE Transactions on Multimedia, 16(5), 2014: 1486-1491 PDF
  5. S. Wang, Z. Qian, L. Wang, Recognition of Layered Structure Using Phase-Frequency Characteristics of Reflected Sound Waves, 20th International Congress on Sound and Vibration 2013, ICSV 2013, Bangkok, Thailand, July, 2013: 1633-1637 PDF
  6. S. Wang, G. Feng, T. Zou, Z. Qian, Robust Audio Watermarking Capable of Surviving Play-Record Process Based on Chroma Features, 20th International Congress on Sound and Vibration 2013, ICSV 2013, Bangkok, Thailand, July, 2013: 1504-1509 PDF
  7. Y. Zhao, S. Wang, X. Zhang, and H. Yao, Robust Hashing for Image Authentication Using Zernike Moments and Local Features, IEEE Transactions on Information Forensics and Security, 8(1), 2013: 55-63 PDF
  8. 倪丽佳, 王朔中, 吴酋珉, 裴蓓, 对局部内容篡改敏感的感知图像散列, 通信学报, 33(9), 2012: 177-184 PDF
  9. P. Zhang, S. Wang, and R. Wang, Reducing Frequncy-domain Artifacts of Binary Image Due to Coarse Sampling by Repeated Interpolation and Smoothing of Radon Projections, Journal of Visual Communication and Image Representation, 23, 2012: 697-740 PDF
  10. H. Yao, S. Wang, Y. Zhao, and X. Zhang, Detecting Image Forgery Using Perspective Constraints, IEEE Signal Processing Letters, 19(3), 2012: 123-126 PDF
  11. C. Qin, S. Wang, and X. Zhang, Simultaneous Inpainting for Image Structure and Texture Using Anisotropic Heat Transfer Model, Multimedia Tools and Applications, 56(3), 2012: 469-483 PDF
  12. X. Zhang, and S. Wang, Efficient Data Hiding with Histogram-Preserving Property, Telecommunication Systems, 49(2), 2012: 179-185 PDF
  13. 张培珍, 王朔中, 声散射预报中目标断面图像的快速旋转, 声学技术, 30(4), 2011: 340-344 PDF
  14. Q. Wu, S. Wang, and X. Zhang, Log-Polar Based Scheme for Revealing Duplicated Regions in Digital Images, IEEE Signal Processing Letters, 18(10), 2011: 559-562 PDF
  15. X. Zhang, S. Wang, and G. Feng, Reversible Visible Watermarking with Lossless Data Embedding Based on Difference Value Shift, Intelligent Automation and Soft Computing, 17(2), 2011: 233-243 PDF
  16. X. Zhang, S. Wang, Z. Qian, and G. Feng, Self-Embedding Watermark with Flexible Restoration Quality, Multimedia Tools and Applications, 54, 2011: 385-395 PDF
  17. Z. Tang, S.Wang, X. Zhang, W. Wei, Y. Zhao, Lexicographical Framework for Image Hashing with Implementation Based on DCT and NMF, Multimedia Tools and Applications, 52, 2011: 325-345 PDF
  18. Z. Tang, S. Wang, X. Zhang, W. Wei, Structural Feature-Based Image Hashing and Similarity Metric for Tampering Detection, Fundamenta Informaticae, 106(1), 2011: 75-91 PDF
  19. X. Zhang, S. Wang, Z. Qian, and G. Feng, Reference Sharing Mechanism for Watermark Self-Embedding, IEEE Transactions on Image Processing, 20(2), 2011: 485-495 PDF
  20. Y. Zhao, S. Wang, G. Feng, and Z. Tang, A Robust Image Hashing Method Based on Zernike Moments, Journal of Computational Information Systems, 6(3), 2010: 717-725 PDF
  21. X. Zhang, S. Wang, Z. Qian, and G. Feng, Reversible Fragile Watermarking for Locating Tampered Blocks in JPEG Images, Signal Processing, 90(12), 2010: 3026-3036 PDF
  22. Shuozhong Wang, Passive Detection of Digital Image Forgery, Keynote Speech, Second International Conference of Computational Collective Intelligence, Kaohsiung, Taiwan, November 10-12, 2010 PDF
  23. 王朔中, 吴酋珉, 真伪之辨-数字图像的防伪认证, 自然杂志, 32(5), 2010: 281-287 PDF
  24. T. Liu, S. Wang, X. Zhang, Z. Yu, Extraction of Color-Intensity Feature towards Image Authentication, Journal of Shanghai University, 14(5), 2010: 337-342 PDF
  25. 秦运龙, 孙广玲, 王朔中, 张新鹏, 根据GOP异常进行视频序列剪辑篡改的盲检测, 电子学报, 38(7), 2010: 1597-1602 PDF
  26. W. Wei, S. Wang, X. Zhang, and Z. Tang, Estimation of Image Rotation Angle Using Interpolation-Related Spectral Signatures with Application to Blind Detection of Image Forgery, IEEE Transactions on Information Forensics and Security, 5(3), 2010: 507-517 PDF
  27. S. Wang, Prediction of Scattered Sound Field Based on the Reversal of Acoustic Diffraction Tomography, 17th International Congress on Sound and Vibration (ICSV17), Cairo, Egypt, July 2010 PDF
  28. W. Zhang, X. Zhang, and S. Wang, Near-Optimal Codes for Information Embedding in Gray-Scale Signals, IEEE Transactions on Information Theory, 56(3), 2010: 1262-1270 PDF
  29. 王朔中, 方针, 声衍射层析成像研究进展, 声学技术, 29(2), 2010: 117-122 PDF
  30. S. Wang, S. Huang, X. Zhang, and W. Wu, Hologram-Based Watermarking Capable of Surviving Print-Scan Process, Applied Optics, 49(7), 2010: 1170-1178 PDF
  31. 王朔中, 张新鹏, 张卫明, 以数字图像为载体的隐写分析研究进展, 计算机学报, 32(7), 2009: 1247-1263 PDF
  32. X. Zhang, S. Wang, Fragile Watermarking Scheme Using a Hierarchical Mechanism, Signal Processing, 89(4), 2009: 675-679 PDF
  33. 黄素娟, 王朔中, 于瀛洁, 共轭对称延拓傅里叶计算全息, 物理学报, 58(2), 2009: 952-958 PDF
  34. X. Zhang and S. Wang, Fragile Watermarking with Error-Free Restoration Capability, IEEE Transactions on Multimedia, 10(8), 2008: 1490-1499 PDF
  35. W. Zhang, X. Zhang, S. Wang, Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes, Proceedings of IH 2008, Lecture Notes in Computer Science, 5284, 2008: 60-71 PDF
  36. Z. Tang, S. Wang, X. Zhang, W. Wei, S. Su, Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization, Journal of Ubiquitous Convergence Technology, 2(1), 2008: 18-26 PDF
  37. X. Zhang, S. Wang, and Zhenyu Zhou, Multibit Assignment Steganography in Palette Images, IEEE Signal Processing Letters, 15, 2008: 553-556 PDF
  38. X. Zhang, and S. Wang, Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels, IEEE Signal Processing Letters, 14(10), 2007: 727-730  PDF
  39. 张新鹏, 王朔中, 基于稀疏表示的密写编码, 电子学报, 35(10), 2007: 1892-1896 PDF
  40. W. Zhang, S. Wang, and X. Zhang, Improving Embedding Efficiency of Covering Codes for Applications in Steganography, IEEE Communications Letters, 11(8), 2007: 680-682  PDF
  41. W. Zhang, X. Zhang, and S. Wang, A Double Layered “Plus-Minus One” Data Embedding Scheme, IEEE Signal Processing Letters, 14(11), 2007: 848-851 PDF
  42. X. Zhang, W. Zhang, and S. Wang, Efficient Double-Layered Steganographic Embedding, Electronics Letters, 43(8), 2007: 482-483 PDF
  43. X. Zhang, W. Zhang, and S. Wang, Integrated Encoding with High Efficiency for Digital Steganography, Electronics Letters, 43(22), 2007: 1191-1192 PDF
  44. X. Zhang, and S. Wang, Watermarking Scheme Capable of Resisting Sensitivity Attack, IEEE Signal Processing Letters, 14(2), 2007: 125-128 PDF
  45. X. Zhang, and S. Wang, Efficient Steganographic Embedding by Exploiting Modification Direction, IEEE Communications Letters, 10(11), 2006: 781-783 PDF
  46. X. Zhang, and S. Wang, Image Restoration Using Truncated SVD Filter Bank Based on an Energy Criterion, IEE Proceedings - Vision, Image and Signal Processing, 153(6), Dec 2006: 825-836 PDF
  47. X. Zhang, and S. Wang, Dynamical Running Coding in Digital Steganography, IEEE Signal Processing Letters, 13(3), 2006: 165-168 PDF
  48. S. Wang, C. Chen, and X. Zhang, Undercover Communication Using Image and Text as Disguise and Countermeasures, Journal of Shanghai University, 10(1), 2006: 33-43 PDF
  49. 秦川, 王朔中, 张新鹏, 一种基于视觉特性的图像摘要算法, 中国图像图形学报, 11(11), 2006: 1678-1681 PDF
  50. 徐伟, 王朔中, 基于视频图像Harris角点检测的车辆测速, 中国图像图形学报, 11(11), 2006: 1650-1652 PDF
  51. 陈超, 王朔中, 张新鹏, 应用TeX控制功能和图像检测的文本密写, 应用科学学报, 24(2), 2006: 115-119 PDF
  52. 张新鹏, 王朔中, 对空域BPCS密写的统计分析, 计算机辅助设计与图形学学报, 17(7), 2005: 1626-1629  (X. Zhang, and S. Wang, Statistical Analysis against Spatial BPCS Steganography, Journal of Computer-Aided Design and Computer Graphics, 17(7), 2005: 1626-1629) PDF
  53. X. Zhang and S. Wang, Stego-Encoding with Error Correction Capability, IEICE Transactions on Fundamentals, E88-A(12), 2005: 3663-3667 PDF
  54. 俞一彪, 王朔中, 文本无关说话人识别的全特征矢量集模型及互信息评估方法, 声学学报, 30(6), 2005: 536-341 PDF
  55. X. Zhang and S. Wang, Watermarking Protocol Compatible with Secret Algorithms for Resisting Invertibility Attack, Knowledge-Based Intelligent Information and Engineering Systems, Lecture Notes in Artificial Intelligence, 3682, Springer-Verlag, 2005: 1134-1144 PDF
  56. X. Zhang and S. Wang, Analysis of Parity Assignment Steganography in Palette Images, Knowledge-Based Intelligent Information and Engineering Systems, Lecture Notes in Artificial Intelligence, 3683, Springer-Verlag, 2005: 1025-1031 PDF
  57. X. Zhang, and S. Wang, Steganography Using Multiple-Base Notational System and Human Vision Sensitivity, IEEE Signal Processing Letters, 12(1), 2005: 67-70 PDF
  58. H. Wang, and S. Wang, Cyber Warfare: Steganography vs. Steganalysis, Communications of the ACM, 47(10), 2004: 76-82 PDF
  59. X. Zhang, and S. Wang, Invertibility Attack against Watermarking Based on Forged Algorithm and a Countermeasure, Pattern Recognition Letters, 25, 2004: 967-973 PDF
  60. S. Wang, X. Zhang, and K. Zhang, Data Hiding in Digital Audio by Frequency Domain Dithering, Lecture Notes in Computer Science, 2776, 2003: 383-394 PDF
  61. X. Zhang, S. Wang, and Kaiwen Zhang, Steganography with Least Histogram Abnormality, Lecture Notes in Computer Science, 2776, 2003: 395-406 PDF
  62. X. Zhang, and S. Wang, Vulnerability of Pixel-Value Differencing Steganography to Histogram Analysis and Modification for Enhanced Security, Pattern Recognition Letters, 25, 2004: 331-339 PDF
  63. K. Zhang, S. Wang, and X. Zhang, Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation, Lecture Notes in Computer Science, 2776, 2003: 360-370 PDF
  64. S. Wang, and X. Zhang, Least Square Based Convolution Mask for Image Restoration, Journal of the Imaging Society of Japan, 41(4), 2002: 392-397 PDF
  65. X. Zhang, and S. Wang, Watermarking Scheme Capable of Resisting Attacks Based on Availability of Inserter, Signal Processing, 82(11), 2002: 1801-1804 PDF
  66. S. Wang, X. Zhang, and T. Ma, Image Watermarking Using Dither Modulation in Dual-Transform Domain, Journal of the Imaging Society of Japan, 41(4), 2002: 398-402 PDF
  67. K. Zhang, S. Wang, and X. Zhang, A New Metric for Quality Assessment of Digital Images Based on Weighted-Mean Square Error, Proceedings of SPIE, 4875, 2002 PDF
  68. S. Wang, X. Zhang, and K. Zhang, Steganographic Technique Capable of Withstanding RQP Analysis, Journal of Shanghai University, 6(4), 2002: 273-277 PDF
  69. 王朔中,基于OFDM的数字音频水印,中国学术期刊文摘, 7(11), 2001: 1456-1459 PDF
  70. S. Wang, Watermarking Based on Principal Component Analysis, Journal of Shanghai University, 4(1), 2000: 22-26 PDF
  71. S. Wang, R. Wang, and Z. Fang, Calculation of Sound Scattering from Elastic Targets Using Unified FDTD Formulae, Journal of the Acoustical Society of America, 104(3), pt.2, 1998: 1755 PDF
  72. S. Wang, Finite-Difference Time-Domain Approach to Underwater Acoustic Scattering Problems, Journal of the Acoustical Society of America, 99(4), pt.1, 1996: 1924-1931 PDF
  73. S. Wang, and T. G. Birdsall, Computer Simulation of Tidal Signal Prediction in Long Range Ocean Acoustic Travel Time Measurements, Chinese Journal of Acoustics, 15(1), 1996: 39-51 PDF
  74. M. L. Grabb, S. Wang, and T. G. Birdsall, Deterministic Three-Dimensional Analysis of Long-Range Sound Sound Propagation through Internal-Wave Fields, IEEE Journal of Oceanic Engineering, 21(3), 1996: 260-272 PDF
  75. 王朔中, 声学中用于时域有限差分法的一种高效吸收边界, 声学学报, 21(6), 1996: 11-21 [Wang Shuozhong, An Efficient Absorbing Boundary for Finite-Difference Time-Domain Field Modeling in Acoustics, Chinese Journal of Acoustics, 16(2), 1997: 121-134] PDF
  76. S. Wang, M. L. Grabb, and T. G. Birdsall, Design of Periodic Signals Using FM Sweeps and Amplitude Modulation for Ocean Acoustic Travel-Time Measurements, IEEE Journal of Oceanic Engineering, 19(4), 1994: 611-618 PDF
  77. 王朔中, 数字化连续波声呐中的分段相关器, 声学学报, 13(5), 1988: 349-355 PDF
  78. 王朔中,有限声阻抗半无限薄板的衍射:对一个经验公式的改进, 声学学报, 9(5), 1984: 333-337 [S. Wang, Diffraction by Half Screen with Finite Acoustic Impedance - A Modification to an Empirical Formula, Chinese Journal of Acoustics, 4(3), 1985: 279-284] PDF
  79. 王朔中, 尖劈边缘附近的衍射声场, 声学学报, 10(4), 1985: 247-256 [S. Wang, Diffracted Acoustic Field around a Wedge, Chinese Journal of Acoustics, 3(2), 1984: 121-132] PDF
  80. S. Wang An Application of Diffraction Theory to Echo Formation, Chinese Journal of Acoustics, 2(4), 1983: 273-292 [王朔中,衍射理论在回声形成中的应用, 声学学报, 10(5), 1985: 302-318] PDF

  回到顶部
回到主页