Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Chuan
    Last name: Qin
    DBLP: 24/2771
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 25 of 70  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Chuan Qin, Ping Ji, Jinwei Wang, Chin-Chen Chang.
    Fragile image watermarking scheme based on VQ index sharing and self-embedding.
    Multimedia Tools Appl. 2017, Volume 76 (0) 2017
    Journal article
    Heng Yao, Chuan Qin, Zhenjun Tang, Ying Tian.
    Guided filtering based color image reversible data hiding.
    J. Visual Communication and Image Representation 2017, Volume 43 (0) 2017
    Conference paper
    Chuan Qin, Lei Zhang 0033, Li Zhang, Yan Wang, Zhiping Yu.
    A 5.8 GHz class-AB power amplifier with 25.4 dBm saturation power and 29.7% PAE.
    SCIENCE CHINA Information Sciences 2017, Volume 60 (0) 2017
    Journal article
    Heng Yao, Chuan Qin, Zhenjun Tang, Ying Tian.
    Improved dual-image reversible data hiding method using the selection strategy of shiftable pixels' coordinates with minimum distortion.
    Signal Processing 2017, Volume 135 (0) 2017
    Journal article
    Zhi-Hui Wang, Xu Zhuang, Chin-Chen Chang, Chuan Qin, Yan Zhu 0001.
    Reversible Data Hiding Based on Geometric Structure of Pixel Groups.
    I. J. Network Security 2016, Volume 18 (0) 2016
    Conference paper
    Mingqiang Li, Chuan Qin, Jingwei Li, Patrick P. C. Lee.
    CDStore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal.
    IEEE Internet Computing 2016, Volume 20 (0) 2016
    Journal article
    Chuan Qin, Xueqin Chen, Dengpan Ye, Jinwei Wang, Xingming Sun.
    A novel image hashing scheme with perceptual robustness using block truncation coding.
    Inf. Sci. 2016, Volume 361 (0) 2016
    Conference paper
    Liyuan Song, Tingting Zhang, Xiaofei Yu, Chuan Qin, Qinyu Zhang.
    Scheduling in Cooperative UWB Localization Networks Using Round Trip Measurements.
    IEEE Communications Letters 2016, Volume 20 (0) 2016
    Journal article
    Chuan Qin, Jingwei Li, Patrick P. C. Lee.
    The Design and Implementation of a Rekeying-aware Encrypted Deduplication Storage System.
    CoRR 2016, Volume 0 (0) 2016
    Journal article
    Chuan Qin, Yu-Chen Hu.
    Reversible data hiding in VQ index table with lossless coding and adaptive switching mechanism.
    Signal Processing 2016, Volume 129 (0) 2016
    Conference paper
    Tingting Zhang, Chuan Qin, Andreas F. Molisch, Qinyu Zhang.
    Joint Allocation of Spectral and Power Resources for Non-Cooperative Wireless Localization Networks.
    IEEE Transactions on Communications 2016, Volume 64 (0) 2016
    Conference paper
    Chuan Qin, Dengpan Ye, Xiangyang Luo.
    Guest Editorial: Information Hiding and Forensics for Multimedia Security.
    Multimedia Tools Appl. 2016, Volume 75 (0) 2016
    Conference paper
    Jingwei Li, Chuan Qin, Patrick P. C. Lee, Jin Li 0002.
    Rekeying for Encrypted Deduplication Storage.
    46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016, Toulouse, France, June 28 - July 1, 2016 2016 (0) 2016
    Conference paper
    Ping Ji, Chuan Qin, Zhenjun Tang.
    Fragile Watermarking with Self-recovery Capability via Absolute Moment Block Truncation Coding.
    Cloud Computing and Security - Second International Conference, ICCCS 2016, Nanjing, China, July 29-31, 2016, Revised Selected Papers, Part I 2016 (0) 2016
    Journal article
    Chuan Qin, Xueqin Chen, Jing Dong, Xinpeng Zhang.
    Perceptual image hashing with selective sampling for salient structure features.
    Displays 2016, Volume 45 (0) 2016
    Journal article
    Chuan Qin, Huili Wang, Xinpeng Zhang, Xingming Sun.
    Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode.
    Inf. Sci. 2016, Volume 373 (0) 2016
    Journal article
    Boqing Xu, Qun Xiao, Zhenxing Qian, Chuan Qin.
    Unequal Protection Mechanism for Digital Speech Transmission Based on Turbo Codes.
    I. J. Network Security 2015, Volume 17 (0) 2015
    Journal article
    Mingqiang Li, Chuan Qin, Patrick P. C. Lee.
    CDStore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal.
    CoRR 2015, Volume 0 (0) 2015
    Conference paper
    Roberto Proietti, Lei Liu, Ryan P. Scott, Binbin Guan, Chuan Qin, Tiehui Su, Francesco Giannone, S. J. Ben Yoo.
    3D elastic optical networking in the temporal, spectral, and spatial domains.
    IEEE Communications Magazine 2015, Volume 53 (0) 2015
    Conference paper
    Zhijian Pan, Chuan Qin, Zuochang Ye, Yan Wang.
    Automatic design for analog/RF front-end system in 802.11ac receiver.
    The 20th Asia and South Pacific Design Automation Conference, ASP-DAC 2015, Chiba, Japan, January 19-22, 2015 2015 (0) 2015
    Conference paper
    Chuan Qin, Chin-Chen Chang, Chia-Chun Lin.
    An adaptive reversible steganographic scheme based on the just noticeable distortion.
    Multimedia Tools Appl. 2015, Volume 74 (0) 2015
    Conference paper
    Chuan Qin, Chin-Chen Chang, Gwoboa Horng, Ying-Hsuan Huang, Yen-Chang Chen.
    Reversible data embedding for vector quantization compressed images using search-order coding and index parity matching.
    Security and Communication Networks 2015, Volume 8 (0) 2015
    Journal article
    Zhenjun Tang, Linlin Ruan, Chuan Qin, Xianquan Zhang, Chunqiang Yu.
    Robust image hashing with embedding vector variance of LLE.
    Digital Signal Processing 2015, Volume 43 (0) 2015
    Conference paper
    Mingqiang Li, Chuan Qin, Patrick P. C. Lee.
    CDStore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal.
    2015 USENIX Annual Technical Conference, USENIX ATC '15, July 8-10, Santa Clara, CA, USA 2015 (0) 2015
    Conference paper
    Chuan Qin, Chin-Chen Chang, Tai-Jung Hsu.
    Reversible data hiding scheme based on exploiting modification direction with two steganographic images.
    Multimedia Tools Appl. 2015, Volume 74 (0) 2015
    Show item 1 to 25 of 70  

    Your query returned 70 matches in the database.