1. Y. Zhao, S. Wang, X. Zhang, and H. Yao, Robust Hashing for Image Authentication Using Zernike Moments and Local Features, IEEE Transactions on Information Forensics and Security, to appear, 2012 Abstract
  2. 倪丽佳, 王朔中, 吴酋珉, 裴蓓, 对局部内容篡改敏感的感知图像散列, 通信学报, 33(9), 2012 Abstract
  3. P. Zhang, S. Wang, and R. Wang, Reducing Frequncy-domain Artifacts of Binary Image Due to Coarse Sampling by Repeated Interpolation and Smoothing of Radon Projections, Journal of Visual Communication and Image Representation, 23, 2012: 697-740 PDF
  4. H. Yao, S. Wang, Y. Zhao, and X. Zhang, Detecting Image Forgery Using Perspective Constraints, IEEE Signal Processing Letters, 19(3), 2012: 123-126 PDF
  5. C. Qin, S. Wang, and X. Zhang, Simultaneous Inpainting for Image Structure and Texture Using Anisotropic Heat Transfer Model, Multimedia Tools and Applications, 56(3),2012: 469-483 PDF
  6. X. Zhang, and S. Wang, Efficient Data Hiding with Histogram-Preserving Property, Telecommunication Systems, 49(2), 2012: 179-185 PDF
  7. 张培珍, 王朔中, 声散射预报中目标断面图像的快速旋转, 声学技术, 30(4), 2011: 340-344 PDF
  8. Q. Wu, S. Wang, and X. Zhang, Log-Polar Based Scheme for Revealing Duplicated Regions in Digital Images, IEEE Signal Processing Letters, 18(10), 2011: 559-562 PDF
  9. X. Zhang, S. Wang, and G. Feng, Reversible Visible Watermarking with Lossless Data Embedding Based on Difference Value Shift, Intelligent Automation and Soft Computing, 17(2), 2011: 233-243 PDF
  10. X. Zhang, S. Wang, Z. Qian, and G. Feng, Self-Embedding Watermark with Flexible Restoration Quality, Multimedia Tools and Applications, 54, 2011: 385–395 PDF
  11. Z. Tang, S.Wang, X. Zhang, W. Wei, Y. Zhao, Lexicographical framework for image hashing with implementation based on DCT and NMF, Multimedia Tools and Applications, 52, 2011: 325-345 PDF
  12. Z. Tang, S. Wang, X. Zhang, W. Wei, Structural Feature-Based Image Hashing and Similarity Metric for Tampering Detection, Fundamenta Informaticae, 106(1), 2011: 75-91 PDF
  13. X. Zhang, S. Wang, Z. Qian, and G. Feng, Reference Sharing Mechanism for Watermark Self-Embedding, IEEE Transactions on Image Processing, 20(2), 2011: 485-495 PDF
  14. Y. Zhao, S. Wang, G. Feng, and Z. Tang, A Robust Image Hashing Method Based on Zernike Moments, Journal of Computational Information Systems, 6(3), 2010: 717-725 PDF
  15. X. Zhang, S. Wang, Z. Qian, and G. Feng, Reversible Fragile Watermarking for Locating Tampered Blocks in JPEG Images, Signal Processing, 90(12), 2010: 3026-3036 PDF
  16. Shuozhong Wang, Passive Detection of Digital Image Forgery, Keynote Speech, Second International Conference of Computational Collective Intelligence, Kaohsiung, Taiwan, November 10-12, 2010 PDF
  17. 王朔中, 吴酋珉, 真伪之辨-数字图像的防伪认证, 自然杂志, 32(5): 281-287, 2010 PDF
  18. T. Liu, S. Wang, X. Zhang, Z. Yu, Extraction of Color-Intensity Feature towards Image Authentication, Journal of Shanghai University, 14(5), 2010: 337-342 PDF
  19. 秦运龙, 孙广玲, 王朔中, 张新鹏, 根据GOP异常进行视频序列剪辑篡改的盲检测, 电子学报, 38(7): 1597-1602, 2010 PDF
  20. W. Wei, S. Wang, X. Zhang, and Z. Tang, Estimation of Image Rotation Angle Using Interpolation-Related Spectral Signatures with Application to Blind Detection of Image Forgery, IEEE Transactions on Information Forensics and Security, 5(3): 507-517, 2010 PDF
  21. S. Wang, Prediction of Scattered Sound Field Based on the Reversal of Acoustic Diffraction Tomography, 17th International Congress on Sound and Vibration (ICSV17), Cairo, Egypt, July 2010 PDF
  22. W. Zhang, X. Zhang, and S. Wang, Near-Optimal Codes for Information Embedding in Gray-Scale Signals, IEEE Transactions on Information Theory, 56(3): 1262-1270, 2010 PDF
  23. 王朔中, 方针, 声衍射层析成像研究进展, 声学技术, 29(2): 117-122, 2010 PDF
  24. S. Wang, S. Huang, X. Zhang, and W. Wu, Hologram-Based Watermarking Capable of Surviving Print-Scan Process, Applied Optics, 49(7), 1170-1178 2010 PDF
  25. 王朔中, 张新鹏, 张卫明, 以数字图像为载体的隐写分析研究进展, 计算机学报, 32(7), 2009: 1247-1263 PDF
  26. X. Zhang, S. Wang, Fragile Watermarking Scheme Using a Hierarchical Mechanism, Signal Processing, 89(4), 2009: 675-679 PDF
  27. 黄素娟, 王朔中, 于瀛洁, 共轭对称延拓傅里叶计算全息, 物理学报, 2009, 58(2): 952-958 PDF
  28. X. Zhang and S. Wang, Fragile Watermarking with Error-Free Restoration Capability, IEEE Transactions on Multimedia, 10(8): 1490-1499, 2008 PDF
  29. W. Zhang, X. Zhang, S. Wang, Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes, Proceedings of IH 2008, Lecture Notes in Computer Science, 5284, 2008: 60-71 PDF
  30. Z. Tang, S. Wang, X. Zhang, W. Wei, S. Su, Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization, Journal of Ubiquitous Convergence Technology, 2(1), 2008: 18-26 PDF
  31. X. Zhang, S. Wang, and Zhenyu Zhou, Multibit Assignment Steganography in Palette Images, IEEE Signal Processing Letters, 15, 2008: 553-556 PDF
  32. X. Zhang, and S. Wang, Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels, IEEE Signal Processing Letters, 14(10), 2007: 727-730  PDF
  33. 张新鹏, 王朔中, 基于稀疏表示的密写编码, 电子学报, 35(10), 2007: 1892-1896 PDF
  34. W. Zhang, S. Wang, and X. Zhang, Improving Embedding Efficiency of Covering Codes for Applications in Steganography, IEEE Communications Letters, 11(8), 2007: 680-682  PDF
  35. W. Zhang, X. Zhang, and S. Wang, A Double Layered “Plus-Minus One” Data Embedding Scheme, IEEE Signal Processing Letters, 14(11), 2007: 848-851 PDF
  36. X. Zhang, W. Zhang, and S. Wang, Efficient Double-Layered Steganographic Embedding, Electronics Letters, 43(8), 2007: 482-483 PDF
  37. X. Zhang, W. Zhang, and S. Wang, Integrated Encoding with High Efficiency for Digital Steganography, Electronics Letters, 43(22), 2007: 1191-1192 PDF
  38. X. Zhang, and S. Wang, Watermarking Scheme Capable of Resisting Sensitivity Attack, IEEE Signal Processing Letters, 14(2), 2007: 125-128 PDF
  39. X. Zhang, and S. Wang, Efficient Steganographic Embedding by Exploiting Modification Direction, IEEE Communications Letters, 10(11), 2006: 781-783 PDF
  40. X. Zhang, and S. Wang, Image Restoration Using Truncated SVD Filter Bank Based on an Energy Criterion, IEE Proceedings - Vision, Image and Signal Processing, 153(6), Dec 2006: 825-836 PDF
  41. X. Zhang, and S. Wang, Dynamically Running Coding in Digital Steganography, IEEE Signal Processing Letters, 13(3), 2006: 165-168 PDF
  42. S. Wang, C. Chen, and X. Zhang, Undercover Communication Using Image and Text as Disguise and Countermeasures, Journal of Shanghai University, 10(1), 2006 PDF
  43. 秦川, 王朔中, 张新鹏, 一种基于视觉特性的图像摘要算法, 中国图像图形学报, 11(11), 2006: 1678-1681 PDF
  44. 徐伟, 王朔中, 基于视频图像Harris角点检测的车辆测速, 中国图像图形学报, 11(11), 2006: 1650-1652 PDF
  45. 陈超, 王朔中, 张新鹏, 应用TeX控制功能和图像检测的文本密写, 应用科学学报, 24(2), 2006: 115-119 PDF
  46. 张新鹏, 王朔中, 对空域BPCS密写的统计分析, 计算机辅助设计与图形学学报, 17(7), 2005: 1626-1629  PDF
  47. X. Zhang and S. Wang, Stego-Encoding with Error Correction Capability, IEICE Transactions on Fundamentals, E88-A(12), 2005 PDF
  48. 俞一彪, 王朔中, 文本无关说话人识别的全特征矢量集模型及互信息评估方法, 声学学报, 30(6), 2005: 536-341 PDF
  49. X. Zhang and S. Wang, Watermarking Protocol Compatible with Secret Algorithms for Resisting Invertibility Attack, Knowledge-Based Intelligent Information and Engineering Systems, Lecture Notes in Artificial Intelligence, 3682, Springer-Verlag, 2005 PDF
  50. X. Zhang and S. Wang, Analysis of Parity Assignment Steganography in Palette Images, Knowledge-Based Intelligent Information and Engineering Systems, Lecture Notes in Artificial Intelligence, 3683, Springer-Verlag, 2005 PDF
  51. X. Zhang, and S. Wang, Steganography Using Multiple-Base Notational System and Human Vision Sensitivity, IEEE Signal Processing Letters, 12(1), 2005 PDF
  52. H. Wang, and S. Wang, Cyber Warfare: Steganography vs. Steganalysis, Communications of the ACM, 47(10), 2004 PDF
  53. X. Zhang, and S. Wang, Invertibility Attack against Watermarking Based on Forged Algorithm and a Countermeasure, Pattern Recognition Letters, 25, 2004 PDF
  54. S. Wang, X. Zhang, and K. Zhang, Data Hiding in Digital Audio by Frequency Domain Dithering, Lecture Notes in Computer Science, 2776, 2003 PDF
  55. X. Zhang, S. Wang, and Kaiwen Zhang, Steganography with Least Histogram Abnormality, Lecture Notes in Computer Science, 2776, 2003 PDF
  56. X. Zhang, and S. Wang, Vulnerability of Pixel-Value Differencing Steganography to Histogram Analysis and Modification for Enhanced Security, Pattern Recognition Letters, 25, 2004 PDF
  57. K. Zhang, S. Wang, and X. Zhang, Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation, Lecture Notes in Computer Science, 2776, 2003 PDF
  58. S. Wang, and X. Zhang, Least Square Based Convolution Mask for Image Restoration, Journal of the Imaging Society of Japan, 41(4), 2002  PDF
  59. X. Zhang, and S. Wang, Watermarking Scheme Capable of Resisting Attacks Based on Availability of Inserter, Signal Processing, 82(11), 2002 PDF
  60. S. Wang, X. Zhang, and T. Ma, Image Watermarking Using Dither Modulation in Dual-Transform Domain, Journal of the Imaging Society of Japan, 41(4), 2002 PDF
  61. K. Zhang, S. Wang, and X. Zhang, A New Metric for Quality Assessment of Digital Images Based on Weighted-Mean Square Error, Proceedings of SPIE, 4875, 2002 PDF
  62. S. Wang, X. Zhang, and K. Zhang, Steganographic Technique Capable of Withstanding RQP Analysis, Journal of Shanghai University, 6(4), 2002 PDF
  63. 王朔中,基于OFDM的数字音频水印,中国学术期刊文摘, 7(11), 2001: 1456-1459 PDF
  64. S. Wang, Watermarking Based on Principal Component Analysis, Journal of Shanghai University, 4(1), 2000 PDF
  65. S. Wang, R. Wang, and Z. Fang, Calculation of Sound Scattering from Elastic Targets Using Unified FDTD Formulae, Journal of the Acoustical Society of America, 104(3), pt.2, 1998 PDF
  66. S. Wang, Finite-Difference Time-Domain Approach to Underwater Acoustic Scattering Problems, Journal of the Acoustical Society of America, 99(4), pt.1, 1996 PDF
  67. S. Wang, and T. G. Birdsall, Computer Simulation of Tidal Signal Prediction in Long Range Ocean Acoustic Travel Time Measurements, Chinese Journal of Acoustics, 15(1), 1996 PDF
  68. M. L. Grabb, S. Wang, and T. G. Birdsall, Deterministic Three-Dimensional Analysis of Long-Range Sound Sound Propagation through Internal-Wave Fields, IEEE Journal of Oceanic Engineering, 21(3), 1996 PDF
  69. 王朔中, 声学中用于时域有限差分法的一种高效吸收边界, 声学学报, 21(6), 1996 [Wang Shuozhong, An Efficient Absorbing Boundary for Finite-Difference Time-Domain Field Modeling in Acoustics, Chinese Journal of Acoustics, 16(2), 1997] PDF
  70. S. Wang, M. L. Grabb, and T. G. Birdsall, Design of Periodic Signals Using FM Sweeps and Amplitude Modulation for Ocean Acoustic Travel-Time Measurements, IEEE Journal of Oceanic Engineering, 19(4), 1994 PDF
  71. 王朔中, 数字化连续波声呐中的分段相关器, 声学学报, 13(5), 1988: 349-355 PDF
  72. 王朔中,有限声阻抗半无限薄板的衍射对一个经验公式的改进, 声学学报, 9(5), 1984: 333-337 [S. Wang, Diffraction by Half Screen with Finite Acoustic Impedance - A Modification to an Empirical Formula, Chinese Journal of Acoustics, 4(3), 1985: 279-284] PDF
  73. 王朔中, 尖劈边缘附近的衍射声场, 声学学报, 10(4), 1985 [S. Wang, Diffracted Acoustic Field around a Wedge, Chinese Journal of Acoustics, 3(2), 1984] PDF
  74. S. Wang An Application of Diffraction Theory to Echo Formation, Chinese Journal of Acoustics, 2(4), 1983: 273-292 [王朔中,衍射理论在回声形成中的应用, 声学学报, 10(5), 1985: 302-318] PDF

 

代表性论文
回到顶部
 
研究领域
著作教材
回到首页
教  学