请帮我找这篇论文!Watermarking Combined with celp编码 Speech Coding for Authentication

永久链接: http://mypage./lzmhome&&&&
发表论文情况
截至日发表SCI论文101篇(被检101篇),非SCI的EI论文136篇
101篇SCI论文中有76篇论文被他人引用过,被引总次数:938次(1+1+1+3+1+1+11+3+3+1+3+2+2+1+1+18+6+10+3+1+3+9+8+10+16+8+6+2+8+11+6+3+1+2+3+3+3+10+14+12+21+3+23+15+25+11+1+8+87+12+13+13+2+1+19+15+5+6+1+58+23+37+2+5+8+34+9+1+4+26+49+7+5+74+27+77)
(SCI journal Search Website:
(SCIExpanded journal Search Website:
被引次数最多的10篇SCI论文
1.&Zhe-Ming Lu, Dian-Guo Xu and Sheng-He Sun (2005): Multipurpose Image Watermarking Algorithm Based on Multistage Vector Quantization. IEEE Transactions on Image Processing. 14 (6): 822-831. (SCI).& 被引87次。
2.&Xia-mu Niu, Zhe-ming Lu and Sheng-he Sun (2000): Digital Watermarking of Still Images with Gray-level Digital Watermarks. IEEE Transactions on Consumer Electronics. 46(1): 137-145. (SCI). 被引77次。
3.&Z. M. Lu and S. H. Sun (2000): Digital Image Watermarking Technique Based on Vector Quantisation. Electronics Letters. 36(4): 303-305. (SCI).&& 被引74次。
4.&Jeng-Shyang Pan, Zhe-Ming Lu and Sheng-He Sun (2003): An Efficient Encoding Algorithm for Vector Quantization Based on Subvector Technique. IEEE Transactions on Image Processing. 12(3): 265-270. (SCI).& 被引58次。
5.&Zhe-ming Lu, Jeng-shyang Pan and Sheng-he Sun (2000): VQ-based Digital Image Watermarking Method.& Electronics Letters. 36(14): . (SCI).&& 被引49次。
6.&Zhe-Ming Lu, Chun-He Liu, Dian-Guo Xu and Sheng-He Sun (2003): Semi-fragile Image Watermarking Method Based on Index Constrained Vector Quantisation. Electronics Letters. 39(1): 35-36. (SCI). 被引37次。
7.&Hsiang-Cheh Huang, Jeng-Shyang Pan, Zhe-Ming Lu, Sheng-He Sun and Hsueh-Ming Hang (2001): Vector Quantization Based on Genetic Simulated Annealing. Signal Processing. 81(7): . (SCI-E) . 被引34次。
8.&Zhe-Ming Lu, Jeng-Shyang Pan and Sheng-He Sun (2000): Efficient Codeword Search Algorithm Based on Hadamard Transform. IEE Electronics Letters. 36(16): . (SCI). 被引26次。
9.&Yu-Long Qiao, Zhe-Ming Lu, Jeng-Shyang Pan and Sheng-He Sun (2006): Spline Wavelets Based Texture Features for Image Retrieval. International Journal of Innovative Computing, Information and Control. 2(3): 653-658. (SCI-E) . 被引25次。
10.&Zhe-Ming LU and Sheng-He SUN (2003): Equal-average Equal-variance Equal-norm Nearest Neighbor Search Algorithm for Vector Quantization. IEICE Transactions on Information and Systems. E86-D(3): 660-663. (SCI). 被引23次。
其他代表性SCI论文
11.&Zhe-Ming Lu and Yong
Shi(2013): Fast Video Shot Boundary Detection Based on SVD and Pattern Matching.
IEEE Transactions on Image Processing. 22(12): .
12.&Zhe-Ming Lu, Yu-Xin Su and Shi-Ze Guo(2013). Deterministic scale-free small-world network of any order. Physica A. 392(17):. (SCI).
13.&Yuenan Li, Zheming Lu, Ce Zhu, and Xiamu Niu (2012): Robust Image Hashing based on Random Gabor Filtering and Dithered Lattice Vector Quantization. IEEE Transactions on Image Processing. 21(4): 1963 - 1980. (SCI).
14.&Bin Yan, Zhe-Ming Lu and Sheng-He Sun (2006): Security of Autoregressive Speech Watermarking Model under Guessing Attack. IEEE Transactions on Information Forensics and Security. 1(3): 386-390. (SCI).
15.&Zhe-Ming Lu, and Shi-Ze Guo(2012). A small-world network derived from the deterministic uniform recursive tree. Physica A. 391(1-2): 87-92. (SCI).
16.&Bei-Bei Liu and Zhe-Ming Lu (2009): Colourisation Using Graph-based Semi-supervised Learning. IET Image Processing. 3(3): 115-120. (SCI).
17.&Yue-Nan Li, Zhe-Ming Lu and Xia-Mu Niu (2009): Fast Video Shot Boundary Detection Framework Employing Pre-processing Techniques. IET Image Processing. 3(3): 121-134. (SCI).
18.&Fa-Xin Yu, Hao Luo and Zhe-Ming Lu (2011). Colour Image Retrieval Using Pattern Co-occurrence Matrices Based on BTC and VQ. IET Electronics Letters. 47(2): 100-101. (SCI).
19.&Fa-Xin Yu, Bei-Bei Liu and Zhe-Ming Lu (2010): Fast Image Colourisation Based on Twin-Codebook Vector Quantisation. IET Electronics Letters. 46(2): 132-134. (SCI).
20.&Zhen Li and Zhe-Ming Lu (2008): Fast Codevector Search Scheme for 3D Mesh Model Vector Quantisation. IET Electronics Letters. 44(2): 104-105. (SCI).
21.&Zhe-Ming Lu and Hans Burkhardt (2005): Colour Image Retrieval Based on DCT-Domain Vector Quantisation Index Histograms. IEE Electronics Letters. 41(17): 956-957. (SCI).
22.&Xia-mu Niu, Zhe-ming Lu and Sheng-he Sun (2000): Digital Image Watermarking Based on Multiresolution Decomposition. IEE Electronics Letters. 36(13): . (SCI).&&
23.&J. S. Pan, Z. M. Lu and S. H. Sun (2000): Fast Codeword Search Algorithm for Image Coding Based on Mean-Variance Pyramids of Codewords. IEE Electronics Letters. 36(3): 210-211. (SCI).
24.&Zhe-Ming Lu and Zhen Li (2008): Dynamically Restricted Codebook Based Vector Quantisation Scheme for Mesh Geometry Compression. Signal Image and Video Processing. 2(3): 251-260. (SCI).
25.&Yu-Long Qiao, Zhe-Ming Lu, Jeng-Shyang Pan, Sheng-He Sun (2010): Fast k-nearest neighbor search algorithm based on pyramid structure of wavelet transform and its application to texture classification. Digital Signal Processing. 20(3): pp. 837-845. (SCI).
26.&Xiao-Ling Deng, Zhe-Ming Lu, and Xiao-Hua Jiang (2010): 3D Stereoscopic Image Generation from Monocular View in Indoor Environments. International Journal of Innovative Computing, Information and Control. 6(9): . (SCI).
27.&Jun-Xiang Wang and Zhe-Ming Lu (2009): A Path Optional Lossless Data Hiding Scheme Based on VQ Index Table Joint Neighboring Coding. Information Sciences. 179(19): pp. . (SCI).
28.&Yuan-Gen Wang, Zhe-Ming Lu, Liang Fan and Yun Zheng (2009): Robust Dual Watermarking Algorithm for AVS Video. Signal Processing: Image Communication. 24(4): 333-344. (SCI).
29.&Zhe-Ming Lu, Jun-Xiang Wang and Bei-Bei Liu (2009): An Improved Lossless Data Hiding Scheme Based on Image VQ-Index Residual Value Coding. Journal of Systems and Software. 82(6): . (SCI).
30.&Shu-Chuan Chu, Zhe-Ming Lu and Jeng-Shyang Pan (2007): Hadamard Transform Based Fast Codeword Search Algorithm for High-dimensional VQ Encoding. Information Science. 177(3): 734-746. (SCI).
31.&Zhe-Ming Lu, Chun-He Liu and He Wang (2007): Image Retrieval and Content Integrity Verification Based on Multipurpose Image Watermarking Scheme. International Journal of Innovative Computing, Information and Control. 3(3): 621-630. (SCI).
32.&Zhe-Ming Lu and Xin-Wu Liao (2006): Counterfeiting Attacks on two Robust Watermarking Schemes. International Journal of Innovative Computing, Information and Control. 2(4): 841-848. (SCI).
33.&Zhe-Ming Lu, Su-Zhi Li and Hans Burkhardt (2006): A Content-based Image Retrieval Scheme in JPEG Compressed Domain. International Journal of Innovative Computing, Information and Control. 2(4): 831-839. (SCI).
34.&Zhe-Ming Lu, Xiu-Na Xu and Jeng-Shyang Pan (2006): Face Detection Based on Vector Quantization in Color Images. International Journal of Innovative Computing, Information and Control. 2(3): 667-672. (SCI).
35.&Zhe-Ming Lu, Shu-Chuan Chu and Kuang-Chih Huang (2005): Equal-average equal-variance equal-norm nearest neighbor codeword search algorithm based on ordered Hadamard transform. International Journal of Innovative Computing, Information and Control. 1(1): 35-41. (SCI).
36.&Zhe-Ming Lu and Hui Pei (2005): Hybrid Image Compression Scheme Based on PVQ and DCTVQ. IEICE Transactions on Information and Systems. E88-D(10): . (SCI).
37.&Zhe-Ming LU, Bin YAN and Sheng-He SUN (2005): Watermarking Combined with CELP Speech Coding for Authentication. IEICE Transactions on Information and Systems. E88-D(2): 330-334. (SCI).
38.&Zhe-Ming LU, Wen XING, Dian-Guo XU and Sheng-He SUN (2003): Digital Image Watermarking Method Based on Vector Quantization with Labeled Codewords. IEICE Transactions on Information and Systems. E86-D(12): . (SCI).&
39.&Zhe-Ming LU, Hao-Tian WU, Dian-Guo XU and Sheng-He SUN (2003): A Multipurpose Image Watermarking Method for Copyright Notification and Protection. IEICE Transactions on Information and Systems. E86-D(9): . (SCI).
40.&Zhe-Ming LU, Dian-Guo XU and Sheng-He SUN (2003): Fast Codeword Search Algorithm for Image Vector Quantization Based on Ordered Hadamard Transform. IEICE Transactions on Information and Systems. E86-D(7): . (SCI).
41.&Zhe-Ming LU, Bian YANG and Sheng-He SUN (2002): Image Compression Algorithms Based on Side-Match Vector Quantizer with Gradient-Based Classifiers. IEICE Transactions on Information and Systems. E85-D(9): . (SCI).&&
42.&Zhe-Ming LU, Jeng-Shyang PAN and Sheng-He SUN (2000): Image Coding Based on Classified Side-Match Vector Quantization. IEICE Transactions on Information and Systems. E83-D(12): . (SCI).&&
Lossless and Lossy Image Secret Sharing for Data Transmission[J],《Eighth International Conference on Intelligent Systems Design and Applications》,),209-214
Robust and Progressive Color Image Visual Secret Sharing Cooperated with Data Hiding[J],《Eighth International Conference on Intelligent Systems Design and Applications》,),431-436
Global Motion Representation of Video Shot Based on Vector Quantization
Index Histogram[J],IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS,2009,E92D(1),90-92
Lossless and Lossy Image Secret Sharing for Data Transmission[J],ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS
DESIGN AND APPLICATIONS, VOL 3, PROCEEDINGS,2008,(),209-214
Robust and Progressive Color Image Visual Secret Sharing Cooperated
with Data Hiding[J],ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS
DESIGN AND APPLICATIONS, VOL 3, PROCEEDINGS,2008,(),431-436
HIDING MULTIPLE WATERMARKS IN TRANSPARENCIES OF VISUAL CRYPTOGRAPHY[J],INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL,),
Learning nonlinear manifolds based on mixtures of localized linear
manifolds under a self-organizing framework[J],NEUROCOMPUTING,-15),
A novel multiple description image coding framework based on the SFQ
algorithm[J],IEICE ELECTRONICS EXPRESS,),
A DCT-VQ BASED MULTIPURPOSE IMAGE HASHING SCHEME FOR COPYRIGHT
PROTECTION AND CONTENT AUTHENTICATION[J],INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL,),
Robust dual watermarking algorithm for AVS video[J],SIGNAL PROCESSING-IMAGE COMMUNICATION,),333-344
A path optional lossless data hiding scheme based on VQ joint
neighboring coding[J],INFORMATION SCIENCES,),
A COMPRESSED DOMAIN MULTIPURPOSE VIDEO WATERMARKING ALGORITHM USING
VECTOR QUANTIZATION[J],INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL,),
Fast video shot boundary detection framework employing pre-processing
techniques[J],IET IMAGE PROCESSING,),121-134
Hiding multiple watermarks in transparencies of visual cryptography[J],International Journal of Innovative Computing, Information and Control,),
Robust dual watermarking algorithm for AVS video[J],Signal Processing: Image Communication,),333-344
Color Image Retrieval Based on Distance-Weighted Boundary Predictive
Vector Quantization Index Histograms[J],IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS,2009,E92D(9),
An efficient MDC framework based on DCT and SPIHT[J],Information Technology Journal,),
Fast video shot boundary detection framework employing pre-processing techniques[J],IET Image Processing,),121-134
Shadow size reduction and multiple image secret sharing based on discrete fractional random transform[J],Information Technology Journal,),298-304
Fast image colourisation based on twin-codebook vector quantisation[J],ELECTRONICS LETTERS,),132-133
Fast k-nearest neighbor search algorithm based on pyramid structure of
wavelet transform and its application to texture classification[J],DIGITAL SIGNAL PROCESSING,),837-845
SPIHT AND ODD-EVEN ESTIMATION BASED MDC ALGORITHM[J],INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL,A),
Color image retrieval based on distance-weighted boundary predictive vector quantization index histograms[J],IEICE Transactions on Information and Systems,2009,E92-D(9),
Fast k-nearest neighbor search algorithm based on pyramid structure of wavelet transform and its application to texture classification[J],Digital Signal Processing: A Review Journal,),837-845
Global motion representation of video shot based on vector quantization index histogram[J],IEICE Transactions on Information and Systems,2009,E92-D(1),90-92
Fast image colourisation based on twin-codebook vector quantisation[J],Electronics Letters,),132-134
Spiht and odd-even estimation based MDC algorithm[J],International Journal of Innovative Computing, Information and Control,),
DCT-DOMAIN GLOBAL FEATURE AND DWT-DOMAIN LEAST-SQUARES LINE FITTING
BASED LOCAL FEATURE FOR ROBUST IMAGE HASHING[J],INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL,),
Reliable transmission of consultative committee for space data systems
file delivery protocol in deep space communication[J],JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS,),349-354
Overview of radiation hardening techniques for IC design[J],Information Technology Journal,),
Early fire detection based on flame contours in video[J],Information Technology Journal,),899-908
3D STEREOSCOPIC IMAGE GENERATION FROM MONOCULAR VIEW IN STRUCTURED
ENVIRONMENTS[J],INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL,),
A vector quantization based automatic fire detection system[J],Information Technology Journal,),758-765
A blind image watermarking scheme using fast hadamard transform[J],Information Technology Journal,),
Quantization based semi-fragile watermarking scheme for H.264 video[J],Information Technology Journal,),
Reliable transmission of consultative committee for space data systems file delivery protocol in deep space communication[J],Journal of Systems Engineering and Electronics,),349-354
3D triangle mesh compression based on vector quantization with k-ring vector prediction[J],International Journal of Innovative Computing, Information and Control,),
Colour image retrieval using pattern co-occurrence matrices based on
BTC and VQ[J],ELECTRONICS LETTERS,),100-+
A flexible H 264/AVC compressed video watermarking scheme using
particle swarm optimization based dither modulation[J],AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS,),27-36
A novel protection architecture scheme for EPON[J],Information Technology Journal,),591-596
Multipurpose perceptual image hashing based on block truncation coding[J],Information Technology Journal,),207-212
Colour image retrieval using pattern co-occurrence matrices based on BTC and VQ[J],Electronics Letters,),100-101
Joint secret sharing and data hiding for block truncation coding compressed image transmission[J],Information Technology Journal,),681-685
Effective hill climbing algorithm for optimality of robust watermarking in digital images[J],Information Technology Journal,),246-256
An image hashing scheme based on mean-removed vector quantization for multiple purposes[J],Information Technology Journal,),120-126
DISSOLVE DETECTION BASED ON TWIN-COMPARISON WITH CURVE FITTING[J],INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL,A),
Dissolve detection based on twin-comparison with curve fitting[J],International Journal of Innovative Computing, Information and Control, A),
3D TRIANGLE MESH COMPRESSION BASED ON VECTOR QUANTIZATION WITH k-RING
VECTOR PREDICTION[J],INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL,),
Learning nonlinear manifolds based on mixtures of localized linear manifolds under a self-organizing framework[J],Neurocomputing,-15),
Blind image watermarking based on discrete fractional random transform
and subsampling[J],OPTIK,),311-316
Reversible data hiding based on multilevel histogram modification and
sequential recovery[J],AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS,),814-826
A small-world network derived from the deterministic uniform recursive tree[J],Physica A: Statistical Mechanics and its Applications,2011,(),-
High performance reversible data hiding for block truncation coding compressed images[J],Signal, Image and Video Processing,2011,(),1-10
Reversible secret image sharing in diverse camouflage images[J],ICIC Express Letters, A),
A Blind Image Watermarking Scheme Utilizing BTC Bitplanes[J],《International Journal of Digital Crime and Forensics》,2011,v3(n4),p42-p53
Strength-Strength and Strength-Degree Correlation Measures for Directed
Weighted Complex Network Analysis[J],IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS,2011,E94D(11),
A small-world network derived from the deterministic uniform recursive tree[J],Physica A: Statistical Mechanics and its Applications,-2),87-92
Multipurpose image hashing based on Multistage Vector Quantization[J],International Journal of Innovative Computing, Information and Control,),
Strength-strength and strength-degree correlation measures for directed weighted complex network analysis[J],IEICE Transactions on Information and Systems,2011,E94-D(11),
An approximate calculation method for eigenvector centrality measure of complex network[J],ICIC Express Letters,),
A swirl-shaped deterministic network with high clustering coefficient[J],Information Technology Journal,),
Degree-degree correlation measures and clustering coefficients for directed complex network analysis[J],ICIC Express Letters, Part B: Applications,),859-864
High-capacity reversible data hiding scheme for optimal common-bitplane BTC-compressed color images[J],ICIC Express Letters,),
High capacity data hiding in reversible secret sharing[J],International Journal of Innovative Computing, Information and Control,),
Reversible data hiding for BTC-compressed color images using difference expansion[J],ICIC Express Letters, Part B: Applications,),
Blind fragile image watermarking based on Vector Quantization and Block Truncation Coding[J],ICIC Express Letters, Part B: Applications,),905-910
3D stereoscopic image generation from monocular view in structured environments[J],International Journal of Innovative Computing, Information and Control,),
DCT-domain global feature and DWT-domain least-squares line fitting based local feature for robust image hashing[J],International Journal of Innovative Computing, Information and Control,),
A small-world network derived from the deterministic uniform recursive
tree[J],PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS,-2),87-92
HIGH CAPACITY DATA HIDING IN REVERSIBLE SECRET SHARING[J],INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL,),
MULTIPURPOSE IMAGE HASHING BASED ON MULTISTAGE VECTOR QUANTIZATION[J],INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL,),
Reversible data hiding based on multilevel histogram modification and sequential recovery[J],AEU - International Journal of Electronics and Communications,),814-826
Reversible data hiding for Btc-compressed images based on bitplane flipping and histogram shifting of mean tables[J],Information Technology Journal,),
A Tree-Structured Deterministic Small-World Network[J],IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS,2012,E95D(5),
Robust Image Hashing Based on Random Gabor Filtering and Dithered
Lattice Vector Quantization[J],IEEE TRANSACTIONS ON IMAGE PROCESSING,),
3D stereoscopic image generation from monocular view in structured environments[J],International Journal of Innovative Computing, Information and Control,),
Image retrieval based on topological features of gray-level co-occurrence networks[J],Information Technology Journal,),626-631
A high capacity reversible information hiding algorithm based on difference coding of VQ indices[J],ICIC Express Letters, Part B: Applications,),701-706
Color image retrieval based on VQ index co-occurrence graphs[J],ICIC Express Letters, Part B: Applications,),551-555
A tree-structured deterministic small-world network[J],IEICE Transactions on Information and Systems,2012,E95-D(5),
An oblivious fragile watermarking scheme for images utilizing edge
transitions in BTC bitmaps[J],SCIENCE CHINA-INFORMATION SCIENCES,),
Research of particle filter based on immune particle swarm optimization[J],Information Technology Journal,),155-161
Daubechies wavelets based robust audio fingerprinting for content-based audio retrieval[J],International Journal of Digital Crime and Forensics,),49-69
High performance reversible data hiding for block truncation coding
compressed images[J],SIGNAL IMAGE AND VIDEO PROCESSING,),297-306
Adaptive quasiconformal kernel fisher discriminant analysis via weighted maximum margin criterion[J],International Journal of Innovative Computing, Information and Control,),437-450
Synchronizability optimization for the edge iteration based deterministic small-world network with the modified simulated annealing algorithm[J],Information Technology Journal,),357-362
Reversible data hiding for BTC-compressed images based on lossless coding of mean tables[J],IEICE Transactions on Communications,2013,E96-B(2),624-631
A new kind of particle filter algorithm based on immune particle swarm optimization in objective tracking[J],ICIC Express Letters,),41-46
Effective image and video error concealment using RST-invariant partial patch matching model and exemplar-based inpainting[J],World Academy of Science, Engineering and Technology,2009,32(),910-915
A pinwheel-shaped deterministic small-world network[J],ICIC Express Letters,),
Robust image hashing based on random gabor filtering and dithered lattice vector quantization[J],IEEE Transactions on Image Processing,),
A blind image watermarking scheme utilizing BTC bitplanes[J],International Journal of Digital Crime and Forensics,),42-53
Video abstraction based on the visual attention model and online clustering[J],Signal Processing: Image Communication,),241-253
Progressive service value network design for bilateral service applications[J],Information Technology Journal,),
Reversible Data Hiding for BTC-Compressed Images Based on Lossless
Coding of Mean Tables[J],IEICE TRANSACTIONS ON COMMUNICATIONS,2013,E96B(2),624-631
姓名:陆哲明
单位:航空航天学院
职称:教授、博导
我的主页共被访问了69759 次}

我要回帖

更多关于 vans authentic 的文章

更多推荐

版权声明:文章内容来源于网络,版权归原作者所有,如有侵权请点击这里与我们联系,我们将及时删除。

点击添加站长微信