default search action
Sheng-He Sun
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2010
- [j12]Yu-Long Qiao, Zhe-Ming Lu, Jeng-Shyang Pan, Sheng-He Sun:
Fast k-nearest neighbor search algorithm based on pyramid structure of wavelet transform and its application to texture classification. Digit. Signal Process. 20(3): 837-845 (2010)
2000 – 2009
- 2009
- [c32]Meng Li, Ping Fu, Sheng-He Sun:
3D Laser Scanning Data Segmentation Based on Region Dilation Strategy. HIS (1) 2009: 313-316 - [c31]Meng Li, Ping Fu, Sheng-He Sun:
3D Digital Patching Using Height-Map of Broken Surface. HIS (1) 2009: 317-320 - 2007
- [c30]Shuguo Yang, Sheng-He Sun, Chunxia Li:
Research on Video Watermarking Scheme Based on Chaos, DWT and JND Model. CIS 2007: 926-930 - [c29]Bin Yan, Zhe-Ming Lu, Sheng-He Sun:
Spectrum Shaped Dither Modulation Watermarking for Correlated Host Signal. ICME 2007: 1227-1230 - [c28]Longjiang Yu, Sheng-He Sun:
Image Authentication in Print-and-scan Scenario. IIH-MSP 2007: 295-298 - [c27]Shuguo Yang, Chunxia Li, Sheng-He Sun, Rongsheng Xie:
A Fractal Watermarking Scheme for Image in DWT Domain. SNPD (1) 2007: 364-368 - [c26]Shuguo Yang, Chunxia Li, Sheng-He Sun, Yaoqun Xu:
A Robust 3D Model Watermarking Scheme Based on Feature Recognition. SNPD (3) 2007: 989-993 - 2006
- [j11]Yu-Long Qiao, Zhe-Ming Lu, Sheng-He Sun:
Fast K Nearest Neighbors Search Algorithm Based on Wavelet Transform. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(8): 2239-2243 (2006) - [j10]Bin Yan, Zhe-Ming Lu, Sheng-He Sun:
Security of autoregressive speech watermarking model under guessing attack. IEEE Trans. Inf. Forensics Secur. 1(3): 386-390 (2006) - [c25]Longjiang Yu, Sheng-He Sun:
Slantlet transform-based image fingerprints. Communication, Network, and Information Security 2006: 41-43 - [c24]Wang Liu, Sheng-He Sun:
Rotation, Scaling and Translation Invariant Blind Digital Watermarking for 3D Mesh Models. ICICIC (3) 2006: 463-466 - [c23]Xin-guang Zou, Sheng-He Sun:
Information Hiding Using Secret Sharing Scheme. ICICIC (1) 2006: 484-487 - [c22]Longjiang Yu, Sheng-He Sun:
Image Robust Hashing Based on DCT Sign. IIH-MSP 2006: 131-134 - [c21]Yu-Long Qiao, Meng Li, Zhe-Ming Lu, Sheng-He Sun:
Gabor Filter Based Text Extraction from Digital Document Images. IIH-MSP 2006: 297-300 - [c20]Xin-guang Zou, Sheng-He Sun:
Analysis of Anonymity on the Signatures of Knowledge. IIH-MSP 2006: 621-624 - 2005
- [j9]Zhe-Ming Lu, Bin Yan, Sheng-He Sun:
Watermarking Combined with CELP Speech Coding for Authentication. IEICE Trans. Inf. Syst. 88-D(2): 330-334 (2005) - [j8]Longjiang Yu, Xiamu Niu, Sheng-He Sun:
Print-and-scan model and the watermarking countermeasure. Image Vis. Comput. 23(9): 807-814 (2005) - [j7]Zhe-Ming Lu, Dianguo Xu, Sheng-He Sun:
Multipurpose image watermarking algorithm based on multistage vector quantization. IEEE Trans. Image Process. 14(6): 822-831 (2005) - [c19]Yu-Long Qiao, Jeng-Shyang Pan, Sheng-He Sun:
An Experimental Comparison on Gabor Wavelet and Wavelet Frame Based Features for Image Retrieval. KES (3) 2005: 353-358 - [c18]Bin Yan, Zhe-Ming Lu, Sheng-He Sun, Jeng-Shyang Pan:
Speech Authentication by Semi-fragile Watermarking. KES (3) 2005: 497-504 - [c17]Hao-Xian Wang, Yue-Nan Li, Zhe-Ming Lu, Sheng-He Sun:
Compressed Domain Video Watermarking in Motion Vector. KES (2) 2005: 580-586 - [c16]Wang Liu, Sheng-He Sun:
A Robust and Invisible Watermarking of 3D Triangle Meshes. KES (4) 2005: 881-888 - [c15]Qiong Li, Xiamu Niu, Zhifang Wang, Yuhua Jiao, Sheng-He Sun:
A Verifiable Fingerprint Vault Scheme. KES (3) 2005: 1072-1078 - [c14]Xin-guang Zou, Qiong Li, Sheng-He Sun, Xiamu Niu:
The Research on Information Hiding Based on Command Sequence of FTP Protocol. KES (3) 2005: 1079-1085 - [c13]Longjiang Yu, Xiamu Niu, Sheng-He Sun:
SVG-Based Countermeasure to Geometric Attack. KES (2) 2005: 1129-1133 - [c12]Bian Yang, Martin Schmucker, Christoph Busch, Xiamu Niu, Sheng-He Sun:
Approaching optimal value expansion for reversible watermarking. MM&Sec 2005: 95-102 - [c11]Bin Yan, Zhe-Ming Lu, Jeng-Shyang Pan, Sheng-He Sun:
Statistical Analysis of Two Polarity Detection Schemes in Speech Watermarking. ROCLING 2005 - [c10]Longjiang Yu, Martin Schmucker, Christoph Busch, Sheng-He Sun:
Cumulant-based image fingerprints. Security, Steganography, and Watermarking of Multimedia Contents 2005: 68-75 - [c9]Bian Yang, Martin Schmucker, Xiamu Niu, Christoph Busch, Sheng-He Sun:
Integer-DCT-based reversible image watermarking by adaptive coefficient modification. Security, Steganography, and Watermarking of Multimedia Contents 2005: 218-229 - 2004
- [j6]Tsong-Yi Chen, Xiao-Dan Mei, Jeng-Shyang Pan, Sheng-He Sun:
Optimization of HMM by the Tabu Search Algorithm. J. Inf. Sci. Eng. 20(5): 949-957 (2004) - [c8]Yu-Long Qiao, Jeng-Shyang Pan, Sheng-He Sun:
Improved partial distance search for k nearest-neighbor classification. ICME 2004: 1275-1278 - [c7]Bian Yang, Martin Schmucker, Xiamu Niu, Christoph Busch, Sheng-He Sun:
Reversible image watermarking by histogram modification for integer DCT coefficients. MMSP 2004: 143-146 - [c6]Bian Yang, Martin Schmucker, Wolfgang Funk, Christoph Busch, Sheng-He Sun:
Integer DCT-based reversible watermarking for images using companding technique. Security, Steganography, and Watermarking of Multimedia Contents 2004: 405-415 - 2003
- [j5]Jeng-Shyang Pan, Zhe-Ming Lu, Sheng-He Sun:
An efficient encoding algorithm for vector quantization based on subvector technique. IEEE Trans. Image Process. 12(3): 265-270 (2003) - 2001
- [j4]Zhao-Li Zhang, Sheng-He Sun, Fu-Chun Zheng:
Image fusion based on median filters and SOFM neural networks: : a three-step scheme. Signal Process. 81(6): 1325-1330 (2001) - [j3]Hsiang-Cheh Huang, Jeng-Shyang Pan, Zhe-Ming Lu, Sheng-He Sun, Hsueh-Ming Hang:
Vector quantization based on genetic simulated annealing. Signal Process. 81(7): 1513-1523 (2001) - [c5]Xiao-Dan Mei, Sheng-He Sun, Jeng-Shyang Pan, Tsong-Yi Chen:
Optimiztion of HMM by the Tabu Search Algorithm. ROCLING 2001 - 2000
- [j2]Xiamu Niu, Zhe-Ming Lu, Sheng-He Sun:
Digital watermarking of still images with gray-level digital watermarks. IEEE Trans. Consumer Electron. 46(1): 137-145 (2000) - [j1]Xiamu Niu, Sheng-He Sun, Wenjun Xiang:
Multiresolution watermarking for video based on gray-level digital watermark. IEEE Trans. Consumer Electron. 46(2): 375-384 (2000) - [c4]Jeng-Shyang Pan, Zhe-Ming Lu, Sheng-He Sun:
VQ Image Coding Using Sub-Vector Techniques. ICIP 2000: 160-163 - [c3]Jeng-Shyang Pan, Zhe-Ming Lu, Sheng-He Sun:
A fast image coding algorithm using variable-rate mean-match correlation vector quantization. KES 2000: 572-576 - [c2]Jeng-Shyang Pan, Zhe-Ming Lu, Sheng-He Sun:
Image Coding Using SMVQ with Two-level Block Classifier. ISMSE 2000: 276-282
1990 – 1999
- 1999
- [c1]Jeng-Shyang Pan, Zhe-Ming Lu, Shu-Chuan Chu, Sheng-He Sun:
Non-redundant VQ channel coding using modified tabu search approach with simulated annealing. KES 1999: 242-245
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-07 22:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint