Published Conference Papers

1) L. Guo, J. Ni and Y. Q. Shi, ※An Efficient JPEG Steganographic Scheme Using Uniform Embedding,§ IEEE International Workshop on Information Forensics and Security (WIFS2012), December 2012, Tenerife, Spain.

2) G. Xuan, X. Tong, J. Teng, X. Zhang and Y. Q. Shi, ※Optimal Histogram-pair and Prediction-error Based Image Reversible Data Hiding,§ International Workshop on Digital-forensics and Watermarking (IWDW12), Oct. 31 to Nov. 3, 2012, Shanghai, China.

3) L. Chen, Y. Q. Shi, S. Patchara and X. Niu, ※A Novel Mapping Scheme for Steganalysis,§ International Workshop on Digital-forensics and Watermarking (IWDW12), Oct. 31 to Nov. 3, 2012, Shanghai, China.  Best student paper awards

4) Z. Li, J. Ye and Y. Q. Shi, ※Distinguishing Computer Graphics from Photographic Images Using Local Binary Patterns,§ International Workshop on Digital-forensics and Watermarking (IWDW12), Oct. 31 to Nov. 3, 2012, Shanghai, China.

5) G. Xu and Y. Q. Shi, ※Camera model identification using local binary patterns,§ IEEE International Conferenced on Multimedia and expo (ICME) 2012, Melbourne, Australia, July 9-13, 2012.

6) Y. Q. Shi, P. Sutthiwan and L. Chen, ※Textural features for steganalysis,§ Information Hiding Conference 2012, May 2012, Berkeley, CA, USA.

7) X. Jiang, T. Sun, Y. Zhou and Y. Q. Shi, ※A drift compensation algorithm for H.264/AVC video robust watermarking scheme,§ International Workshop on Digital-forensics and Watermarking (IWDW11), October 23-26, 2011, Atlantic City, NJ, USA.

8)  P. Sutthiwan and Y. Q. Shi, ※Anti-Forensics of double JPEG compression detection,§ International Workshop on Digital-forensics and Watermarking (IWDW11), October 23-26, 2011, Atlantic City, NJ, USA.

9)  P. Meng, Y. Q. Shi, L. Huang, ※LINL: Lost in n-best list,§ Information Hiding Conference, Prague, Czech, May 2011.

10) M. Fallahpour, D. Megias, Y. Q. Shi, ※Lossless image data embedding in plain areas,§ SPIE, Media Watermarking, Security, and Forensics XIII (conference 7880), SPIE Electronic Imaging, San Francisco, CA, USA, February 10, 2011.

11) H. Zhao and Y. Q. Shi, ※A Phase-space reconstruction approach to detect covert channels in TCP/IP protocols,§ IEEE International Workshop on Information Forensics and Security (WIFS10), Seattle, WA, December 10-15, 2010.

12) Y. 每Q. Zhao, Frank Y. Shih, Yun Q. Shi, ※Passive detection of paint-doctored JPEG images,§ International Workshop on Digital Watermarking 2010 (IWDW10), Seoul, Korea, October 2010.

13) G. Narayanan, Y. Q. Shi, A Statistical Model for Quantized AC Block DCT Coefficients in JPEG Compression and its Application to Detecting Potential Compression History in Bitmap Images International Workshop on Digital Watermarking 2010 (IWDW10), Seoul, Korea, October 2010.

14) F. Huang, Y. Q. Shi, J. Huang, ※New JPEG steganographic scheme with high security performance,§ International Workshop on Digital Watermarking 2010 (IWDW10), Seoul, Korea, October 2010.

15) X. Gao, Bo Qiu, J. Shen, T. 每T. Ng and Yun Qing Shi, ※A smart phone image database for single image recapture detection,§ International Workshop on Digital Watermarking 2010 (IWDW10), Seoul, Korea, October 2010.

16) W. Jiang, A. T. S. Ho, H. Treharne, and Y. Q. Shi, ※A novel multi-size block Benford*s law scheme for printer identification,§ Pacific- Rim Conference on Multimedia (1), PCM 2010, pp. 643每652 in Guoping Qiu, Kin-Man Lam, Hitoshi Kiya, Xiangyang Xue, C. C. Jay Kuo, Michael S. Lew (Eds.): Advances in Multimedia Information Processing - PCM 2010 - 11th Pacific Rim Conference on Multimedia, Shanghai, China, September 21-24, 2010, Proceedings, Part I. Lecture Notes in Computer Science 6297 Springer 2010, ISBN 978-3-642-15701-1

17) P. Sutthiwan, Y. Q. Shi, W. Su, T.-T. Ng, ※Rake transform and edge statistics for image forgery detection,§ Workshop on Content Protection and Forensics, Singapore, July 2010.

18) L. Yu, Y. Zhao, R. Ni, Y. Q. Shi, ※A high-performance YASS-like scheme using randomized big-blocks,§ Proceedings of IEEE International Conference on Multimedia and Expo 2010 (ICME10), Singapore, July 2010.

19) H. Zhao, Y. Q. Shi, and N. Ansari, ※Hiding data in multimedia streaming over networks,§ 8th Communication Networks and Services Research Conference (CNSR 2010), Montreal, Canada, May 2010.

20) P. Sutthiwan, Y. Q. Shi, J. Dong, T. Tan, T. 每T. Ng, ※New developments in color image tampering detection,§ IEEE International Symposium on Circuits and Systems (ISCAS10), Paris, France, May 2010.

21) G. Xuan, Y. Q. Shi, J. Teng, X. Tong, P. Chai, ※Double-threshold reversible data hiding,§ IEEE International Symposium on Circuits and Systems (ISCAS10), pp.1129-1132, Paris, France, May 2010.

22) H. Xiao, Y. Q. Shi, W. Su, and J. Kosinski, ※An Investigation of Non-Data-Aided SNR Estimation Techniques for Analog Modulation Signals,§, Proceedings of 33rd IEEE Sarnoff Symposium, Sarnoff, NJ, USA,  April 2010.

23) R. Yang, Y. Q. Shi, J. Huang, ※Detecting double compression of audio signal§, Proceedings of IS&T/SPIE Electronic Imaging 2010: Media Forensics and Security XII, vol. 7541, January 2010.

24) H. Xiao, Y. Q. Shi, W. Su, and J. Kosinski, ※Blind carrier frequency estimation for SSB-SC signals,§ Proceedings of IEEE Radio and Wireless Symposium (RWS), pp. 312-315, January 2010.

25) P. Sutthiwan, X. Cai, Y. Q. Shi, H. Zhang, ※Computer graphics classification based on Markov process model and using boosting feature selection technique,§ IEEE International Conference on Image Processing (ICIP09), Cairo, Egypt, November 7-11, 2009.

26) G. Xu, Y. Q. Shi, W. Su,  ※Camera brand and model identification using moments of 1-D and 2-D characteristic functions,§ IEEE International Conference on Image Processing (ICIP09), Cairo, Egypt, November 7-11, 2009.

27) R. Yang, Y. Q. Shi, J. Huang, ※Defeating faked MP3,§ Proceedings of the 11th ACM Workshop on Multimedia and Security (ACM MMSEC09), pp. 117-124, Princeton, NJ, September 2009.

28) B. D*Alessandro and Y. Q. Shi, ※MP3 bit rate quality detection through frequency spectrum analysis,§ Proceedings of the 11th ACM Workshop on Multimedia and Security (ACM MMSEC09), Princeton, NJ, September 2009.

29) P. Sutthiwan, J. Ye and Y. Q. Shi, ※An Enhanced Statistical Approach to Identifying Photorealistic Images,§ IWDW 2009, Guildford, UK, August 24-26, 2009. (Best student paper award)

30) G. Xu, S. Gao, Y. Q. Shi, W. Su and R. M. Hu, ※Camera-Model Identification Using Markovian Transition Probability Matrix,§ IWDW 2009, Guildford, UK, August 24-26, 2009.

31) X. Zhao, A. T. S. Ho, Y. Q. Shi, ※Image forensics using generalized Benford*s law for accurate detection of unknown JPEG compression in watermarked images,§ 2009 16th International Conference on Digital Signal Processing (DSP), Greece, July 2009.

32) W. Chen and Y. Q. Shi, ※Detection of double MPEG video compression using first digits statistics,§ International Workshop on Digital Watermarking (IWDW08), Busan, Korea, November 2008.

33) Y. Q. Shi, ※First digit law and its application to digital forensics,§ International Workshop on Digital Watermarking (IWDW08), Busan, Korea, November 2008.

34) C. Chen, Y. Q. Shi, W. Su, ※A machine learning based scheme for double JPEG compression detection,§ IEEE International Conference on pattern Recognition, ICPR08, Florida, USA, December 2008.

35) W. Chen, Y. Q. Shi, G. Xuan, W. Su, ※Computer graphics identification using genetic algorithm,§ IEEE International Conference on pattern Recognition, ICPR08, Florida, USA, December 2008.

36) G. Xuan, Y. Q. Shi, P. Chai , X. Tong, J. Teng, J. Li, ※Reversible binary image data hiding by run-length histogram modification,§ IEEE International Conference on Pattern Recognition, ICPR08, Florida, USA, December 2008.

37) F. Huang, Y. Q. Shi, J. Huang, ※A study on security performance of YASS,§ IEEE International Conference on Image Processing, San Diego, California, USA, October 2008.

38) B. Li, Y. Q. Shi and J. Huang, ※Detecting double compressed JPEG Image by using mode based first digit features,§ IEEE International Workshop on Multimedia Signal Processing, MMSP08, Queensland, Australia, October 2008.

39) B. Li, Y. Q. Shi and J. Huang, ※Steganalysis of YASS,§ ACM Workshop on Multimedia Security, Oxford, UK, September, 2008.

40) H. F. Xiao, C. Chen, W. Su, J. Kosinski, and Y. Q. Shi, ※Data mining of modulation types using cyclostationarity-based decision tree,§  Proceedings of International Conference on Data Mining (DMIN'08), Las Vegas, Nevada, USA, vol.1, pp. 3-9, July 14-17, 2008.  

41) C. Chen and Y. Q. Shi, ※JPEG image steganalysis utilizing both intrablock and interblock correlations,§ IEEE International Symposium on Circuits and Systems (ISCAS08), Seattle, WA, May 2008.

42) G. Xuan, Y. Q. Shi, P. Chai, X. Cui, Z. Ni and X. Tong, ※Optimum histogram pair based image lossless data embedding,§ International Workshop on Digital Watermarking (IWDW07), pp. 264-278, Guangzhou, China, December 2007. (Best paper award)

43) Y. Q. Shi, C. Chen, G. Xuan, W. Su, ※Steganalysis versus splicing detection,§ International Workshop on Digital Watermarking (IWDW07), Guangzhou, China, December 2007.  

44) B. Li, F. Huang, S. Tan, J. Huang, Y. Q. Shi, ※Effect of different coding patterns on compressed frequency domain based universal JPEG steganalysis,§ International Workshop on Digital Watermarking (IWDW07), Guangzhou, China, December 2007. 

45) S. Tan, J. Huang, Y. Q. Shi, ※Steganalysis of enhanced BPCS steganography with the Hilbert-Huang transform based sequential analysis,§ International Workshop on Digital Watermarking (IWDW07), Guangzhou, China, December 2007. 

46) Z. Yu, Y. Q. Shi, W. Su, ※Automatic classification of joint analog and digital communication signals in blind environment,§  Military Communications Conference (MILCOM07), October 29-31, 2007, Orlando, Florida.

47) Y. Q. Shi, C. Chen, W. Chen, ※A natural image model approach to splicing detection,§ ACM Workshop on Multimedia Security, Dallas, Texas, September 2007.

48) C. Chen, Y. Q. Shi, G. Xuan, ※Steganalyzing texture images,§ IEEE International Conference on Image Processing (ICIP07), Texas, US, September 2007.

49) G. Xuan, Y. Q. Shi, Z. Ni, P. Chai, X. Cui and X. Tong, ※Reversible data hiding for JPEG images based on histogram pairs,§ International Conference on Image Analysis and Recognition (ICIAR07), August 22-24, 2007, Montreal, Canada.  

50) G. Xuan, X.  Zhu, Y. Q. Shi, P. Chai, X. Cui, J. Li, ※A novel Bayesian classifier with smaller eigenvalues reset by threshold based on database,§ International Conference on Image Analysis and Recognition (ICIAR07), August 22-24, 2007, Montreal, Canada.  

51) W. Chen and Y. Q. Shi, ※Identifying computer graphics using HSV color model and statistical moments of characteristic function,§ IEEE International Conference on Multimedia and Expo (ICME07), Beijing, China, July 2007.

52) G. Xuan, X. Cui, Y. Q. Shi, W. Chen, X. Tong, C. Huang, ※JPEG steganalysis based on classwise non-principal components analysis and multi-directional Markov model,§ IEEE International Conference on Multimedia and Expo (ICME07), Beijing, China, July 2007.

53) Y. Q. Shi, C. Chen, W. Chen and M. O. Kaundinya, ※Effect of Recompression on Attacking JPEG Steganographic Schemes An Experimental Study,§ IEEE International Symposium on Circuits and Systems (ISCAS07), New Orleans, LA, May 2007.

54) D. Fu, Y. Q. Shi and W. Su, ※A generalized Benford*s law for JPEG coefficients and its applications in image forensics,§ SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, January 2007.

55) W. Chen, Y. Q. Shi, and W. Su, ※Image splicing detection using 2-D phase congruency and statistical moments of characteristic function,§ SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, January 2007.

56) D. Fu, Y. Q. Shi and W. Su, ※Detection of image splicing based on Hilbert-Huang transform and moments of characteristic functions with wavelet decomposition,§ International Workshop on Digital Watermarking (IWDW06), November 2006, Jeju, Korea.

57) G. Xuan, Q. Yao, C. Yang, J. Gao, P. Chai, Y. Q. Shi, Z. Ni ※Lossless data hiding using histogram shifting method based on integer wavelets,§ International Workshop on Digital Watermarking (IWDW06), November 2006, Jeju, Korea.

58) G. Xuan, Y. Q. Shi, C. Huang, D. Fu, X. Zhu, P. Chai, and J. Gao, ※Steganalysis Using High-Dimensional Features Derived from Co-Occurrence Matrix and Class-wise Non-Principal Components Analysis (CNPCA),§ International Workshop on Digital Watermarking (IWDW06), November 2006, Jeju, Korea.

59) D. Fu, Y. Q. Shi, D. Zou and G. Xuan, ※JPEG Steganalysis Based on Empirical Transition Matrix in DCT Domain,§ IEEE International Workshop on Multimedia Signal Processing (MMSP06), October 2006, Victoria, Canada.

60) C. Chen, Y. Q. Shi, W. Chen and G. Xuan, ※Statistical moments based universal steganalysis using JPEG 2-D array, and 2-D characteristics function,§ IEEE International Conference on Image Processing (ICIP06), Atlanta, Georgia, October 2006 (Best student paper).

61) G. Xuan, Y. Q. Shi. D. Fu, ※A novel pattern classification scheme: Classwise non-principal component analysis (CNPCA),§ International Conference on Pattern Recognition (ICPR06), August 2006, Hong Kong.

62) G. Xuan, X. Zhu, P. Chai, Z. Zhang, Y. Q. Shi, D. Fu, ※Feature selection based on the Bhattacharyya distance,§ International Conference on Pattern Recognition (ICPR06), August 2006, Hong Kong.

63) Y. Q. Shi, C. Chen and W. Chen, ※A Markov process based approach to effective attacking JEPG steganography,§ Information Hiding Workshop (IH06), Old Town Alexandria, Virginia, July 2006.

64) D. Zou, Y. Q. Shi, W. Su and G. Xuan, ※Steganalysis Based on Markov Model of Thresholded Prediction-Error Image,§ IEEE International Conference on Multimedia and Expo (ICME06), Toronto, Canada, July 2006.

65) K. Kang, Y. Q. Shi and J. Huang, ※Achieving Non-ambiguity of Quantization Based Watermarking,§ SPIE Electronic Imaging: Security, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, January 2006.

66) G. Xuan, Z. Zhang, Y. Q. Shi, D. Fu, P. Chai, ※A feature selection based on minimum upper bound of Bayes error,§ IEEE International Workshop on Multimedia Signal Processing (MMSP05), Shanghai, China, October 2005.

67) G. Xuan, D. Jiang, H. Ji, Y. Q. Shi, D. Zou, L. Liu and H. Liu, ※Identity verification system using data hiding and fingerprint recognition,§ IEEE International Workshop on Multimedia Signal Processing (MMSP05), Shanghai, China, October 2005.

68) G. Xuan, J. Gao, Y. Q. Shi and D. Zou, ※Image steganalysis based on statistical moments of wavelet subband histograms in DFT domain,§ IEEE International Workshop on Multimedia Signal Processing (MMSP05), Shanghai, China, October 2005.

69) Y. Q. Shi,  G. Xuan, D. Zou,  J. Gao, C. Yang,  Z. Zhang,  P. Chai,  W. Chen,  C. Chen, ※Steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network,§ IEEE International Conference on Multimedia and Expo (ICME05),  Amsterdam, Netherlands, July, 2005.

70) G. Xuan, Y. Q. Shi, C. Yang, Y. Zheng, D. Zou, P. Chai, ※Lossless data hiding using integer wavelet transform and threshold embedding technique,§ IEEE International Conference on Multimedia and Expo (ICME05),  Amsterdam, Netherlands, July, 2005.

71) G. Xuan, Y. Q. Shi, J. Gao, D. Zou, C. Yang, Z. Zhang,  P. Chai, C. Chen, W. Chen, ※Steganalysis Based on multiple features formed by statistical moments of wavelet characteristic functions,§ Information Hiding Workshop (IH05), Barcelona, Spain, June 2005.

72) D. Zou and Y. Q. Shi,  ※Formatted Text Document Data Hiding Robust to Printing, Copying and Scanning,§ IEEE International Symposium on Circuits and Systems (ISCAS05), Kobe, Japan, May 2005.

73) Z. Yu, Y. Q. Shi and W. Su, ※Symbol-rate estimation based on filter bank,§ IEEE International Symposium on Circuits and Systems (ISCAS05), Kobe, Japan, May 2005.

74) Y. Q. Shi, G. Xuan, C. Yang, J. Gao, Z. Zhang, P. Chai, D. Zou, C. Chen, W. Chen, ※Effective steganalysis based on statistical moments of wavelet characteristic function,§ IEEE Conference on Information Technology: Coding and Computation (ITCC05), Las Vegas, Nevada, USA, April 4-6, 2005.

75) H. Zhao, N. Ansari and Y. Q. Shi, ※Layered MPEG Transmission over IP DiffServ§
IEEE Conference on Information Technology: Coding and Computation (ITCC05)
, Las Vegas, Nevada, USA, April 4-6, 2005.

76) D. Fu, Y. Q. Shi and M. Sun, ※A Temporal-Spatial Frame-Layer Rate Control for Very Low Bite Rate Video Coding,§ Proc. of the 39th Annual Conference on Information Sciences and Systems (CISS), Baltimore, March 2005.

77) G. Xuan, Y. Q. Shi, D. Zou, ※A secure internet-based personal identity verification system using lossless watermarking and fingerprint recognition,§ International Workshop on Digital watermarking (IWDW04), Korea, October 2004.

78) G. Xuan, Y. Q. Shi, Z. Ni,  ※Reversible data hiding using integer wavelet transform and companding technique,§ International Workshop on Digital watermarking (IWDW04), Seoul, Korea, October 2004.

79) Y. Q. Shi, ※Reversible data hiding,§ invited lecture, International Workshop on Digital Watermarking (IWDW04), Seoul, Korea, October 2004.

80) J. Huang, J. Hu, D. Huang, Y. Q. Shi, ※A Secure fragile watermarking  using parameterized integer wavelet transform,§  IEEE International Conference on Image Processing (ICIP04), October 2004.

81) X. Kang, J. Huang, Yun Q. Shi, ※Robust quantization-based image watermarking with adaptive receiving,§   IEEE International Conference on Image Processing (ICIP04), October 2004.

82) D. Zou, Y. Q. Shi, Z. Ni, ※A semi-fragile lossless digital Watermarking scheme based on integer wavelet transform,§ IEEE International Workshop on Multimedia Signal Processing (MMSP04), Siena, Italy, September 2004.

83) G. Xuan, Y. Q. Shi, Z. Ni, ※Lossless data hiding using integer wavelet transform and spread spectrum,§ IEEE International Workshop on Multimedia Signal Processing (MMSP04), Siena, Italy, September 2004.

84) Z. Ni, Y. Q. Shi, N. Ansari, W. Su, Q. Sun and X. Lin, ※Robust lossless data hiding,§ IEEE International Conference on Multimedia and Expo (ICME04), Taipei, Taiwan, June 2004.

85) Z. Zhang, Q. Sun, X. Lin, Y. Q. Shi and Z. Ni, ※A unified authentication framework for JPEG2000 images,§ IEEE International Conference and Expo (ICME04), Taipei, Taiwan, June 2004.

86) Y. Q. Shi, Z. Ni, D. Zou, C. Liang and G. Xuan, ※Lossless data hiding: Fundamentals, algorithms and applications,§ Proceedings of IEEE International Symposium on Circuits and Systems, vol. II, pp. 33-36, Vancouver, Canada, May 2004.

87) G. Xuan, Y. Q. Shi, Z. Ni, J. Chen, C. Yang, Y. Zhen and J. Zhen, ※High capacity lossless data hiding algorithms,§ IEEE International Symposium on Circuits and Systems, Vancouver, Canada, May 2004.

88) S. Wu, J. Huang, D. Huang and Y. Q. Shi, ※Self-synchronized audio watermarking in DWT domain,§ IEEE International Symposium on Circuits and Systems, vol. 5, pp. 23-26, Vancouver, Canada, May 2004.

89) X. Kang, J. Huang, Y. Q. Shi, J. Zhu, ※Robust watermarking with adaptive receiving,§ Proceedings of International Workshop on Digital Watermarking, 2003, T. Kalkar, J. Cox and Y. M. Ro Edited, Lecture Notes in Computer Science, vol. 2939, pp. 396-407, Heidelberg, Germany.

90) Z. Yu, Y. Q. Shi and W. Su, ※M-ary frequency shift keying signal classification based-on discrete Fourier transform,§ Proceedings of IEEE MILCOM, pp. 1167-1172, Boston, MA, October 2003.

91) X. M. Zhang, Y. Q. Shi, W. Q. Xu,  A. Vetro, H. Sun, ※Optimal 2-D interleaving for robust multimedia transmission,§ IEEE ITRE2003, Newark, NJ, August 2003.

92) T. Chen, X. M. Zhang, Y. Q. Shi, ※Error concealment using refined boundary matching algorithm,§ IEEE ITRE2003, Newark, NJ, August 2003.

93) S. Song, D. Zou, C. Manikopoulos, Y. Q. Shi, ※Stegnography detection of whole-image DCT-based watermarking in gray-scale images,§ 7th WSEAS International Multiconference on Circuits, Systems, Communications and Computers (WSEAS-CSCC 2003), Corfu, Greece, July 2003.

94) D. Zou, C. W. Wu, G. Xuan and Y. Q. Shi, ※A content-based image authentication system with lossless data hiding,§ Proceedings of IEEE International Conference on Multimedia and Expo, vol. II, pp. 213-216, July 2003,  Baltimore, Maryland.

95) H. Cheng, X. Zhang, Y. Q. Shi, A. Vetro, H. Sun, ※Rate allocation for FGS video using composite R-D analysis,§ Proceedings of IEEE International Conference on Multimedia and Expo, vol. II, pp. 41-44, July 2003, Baltimore, Maryland.

96) Y. Q. Shi, Z. Ni, N. Ansari and J. Huang, ※2-D and 3-D successive packing interleaving techniques and their applications to image and video data hiding,§ IEEE International Symposium on Circuits and Systems, May 2003, Bangkok, Thailand.

97) Z. Ni, Y. Q. Shi, N. Ansari and W. Su, ※Reversible data hiding,§ Proceedings of IEEE International Symposium on Circuits and Systems, vol. 2, pp. 912-915, Bangkok, Thailand, May 2003.

98) H. Liu, Z. Zhang, J. Huang, X. Huang, Y. Q. Shi, ※A high capacity distortion-free data hiding algorithm for palette image,§ Proceedings of IEEE International Symposium on Circuits and Systems, vol. 2, pp. 916-919, Bangkok, Thailand, May 25-28, 2003.

99) L. Gu, J. Huang and Y. Q. Shi, ※Analysis of the role played by error correcting coding in robust watermarking,§ IEEE International Symposium on Circuits and Systems, Bangkok, Thailand, May 2003.

100) Y. Fang, J. Huang and Y. Q. Shi, ※Image watermarking algorithm applying CDMA,§ IEEE International Symposium on Circuits and Systems, Bangkok, Thailand, May 2003.

101) H. Zhao, N. Ansari and Y. Q. Shi, ※Self-similar traffic prediction using least mean kurtosis,§ IEEE Conference on Information Technology, ITCC 2003, Las Vegas, Nevada, USA, April 28-30, 2003.

102) X. M. Zhang, A. Vetro, Y. Q. Shi, H. Sun, ※Adaptive field/frame selection for high compression coding§, IS&T/SPIE Symposium : Image and Video Communications and  Processing 2003, Santa Clara, Jan. 2003.

103) G. Xuan, J. Chen, J. Zhu, Y. Q. Shi, Z. Ni and W. Su, ※Lossless data hiding based on integer wavelet transform,§ Proceedings of IEEE International Workshop on Multimedia Signal Processing, St. Thomas, US Virgin Islands, December 2002.

104) H. Lu, X. Shi, Y. Q. Shi, A. C. Kot and L. Chen, ※Watermark embedding in DC components of DCT for binary images,§ Proceedings of IEEE International Workshop on Multimedia Signal Processing, pp. 300-303, St. Thomas, US Virgin Islands, December 2002.

105) C. Manikopoulos, Y. Q. Shi, S. Song, Z. Zhang, Z. Ni, D. Zou, ※Detection of block DCT-based Steganography in gray-scale images,§ Proceedings of IEEE International Workshop on Multimedia Signal Processing, St. Thomas, US Virgin Islands, December 2002.

106) M. Sun, Y. Q. Shi, Q. Liu, and R. J. Sclabassi, ※Sample Domain Integration of Medical Data for Multimedia Diagnosis,§ Proceedings of IEEE International Workshop on Multimedia Signal Processing, St. Thomas, US Virgin Islands, December 2002.

107) J. Hu, J. Huang, D. Huang and Y. Q. Shi, ※A DWT-based fragile watermarking tolerant to JPEG compression,§ International Workshop on Digital Watermarking, November 2002, Seoul, Korea. (collected in Lecture Notes in Computer Science).

108) X. Kang, J. Huang and Y. Q. Shi, ※An image watermarking algorithm robust to geometric distortion,§ International Workshop on Digital Watermarking, November 2002, Seoul, Korea. (collected in Lecture Notes in Computer Science by Springer).

109) H. Lu, J. Wang, A. C. Kot and Y. Q. Shi, "An objective distortion measure for binary document images based on human visual perception", in Proceedings of International Conference on Pattern Recognition (ICPR), vol. IV, pp. 239-242, Quebec, Canada August 2002.

110) G. Xuan, J. Chen, J. Zhu, Y. Q. Shi, ※Lossless image digital watermarking based on integer wavelet and histogram adjustment,§ International Conference on Diagnostic Imaging and Analysis (ICDIA*02), Shanghai, China, August 18-20, 2002.

111) X. M. Zhang, Y. Q. Shi and S. Basu, ※On successive approach to multidimensional interleaving,§ Fifteenth International Symposium on Mathematical Theory of Networks and Systems (MTNS02), University of Notre Dame, August 12-16, 2002. http://www.nd.edu/~mtns

112) X. M. Zhang and Y. Q. Shi, ※Equal contribution based unequal error protection for FGS coded video,§ Proceedings of the 6th World Multiconference on Systemics, Cybernetics and Informatics (ISAS, SCI2002), vol. XIV, Image, Acoustic, Speech and Signal Processing III, pp. 237-241, Orlando, Florida, July 2002.

113) H. Liu, J. Liu, J. Huang, D. Huang and Y. Q. Shi, ※A robust oblivious watermarking algorithm,§ IEEE International Symposium on Circuits and Systems, Scottsdale, AZ, May 2002.

114) X. Kang, J. Huang and Y. Q. Shi, ※Automatic resynchronization of hidden data from geometric distorted image,§ IEEE International Symposium on Circuits and Systems, Scottsdale, AZ, May 02.

115) H. Liu, N. Chen, J. Huang, X. Huang and Y. Q. Shi, ※An robust DWT-based video watermarking algorithm,§ IEEE International Symposium on Circuits and Systems, Scottsdale, AZ, May 02.

116) J. Huang, Y. Wang and Y. Q. Shi, ※A blind audio watermarking algorithm with self-synchronization,§ IEEE International Symposium on Circuits and Systems, Scottsdale, AZ, May 02. 

117) X. M. Zhang, Y. Q. Shi, H. Chen, A. Haimovich, A. Vetro and H. Sun, ※Successive packing based interleaver design for Turbo codes,§ IEEE International Symposium on Circuits and Systems, Scottsdale, AZ, May 2002.

118) Q. Liu, M. Sun, M. L. Scheuer, Y. Q. Shi, C. C. Li, L. S. Pon, and R. J. Sclabassi, ※Application of MPEG Video Compression to Medical Monitoring,§ Third MPEG-7 Awareness Event at Washington DC, May 2002.

119) H. Zhao, N. Ansari and Y.Q. Shi, ※A Fast Non-linear Adaptive Algorithm for Video Traffic Prediction,§ IEEE International Conference Information Technology: Coding and Computing (ITCC*2002), Las Vegas, Nevada, April 8-10, 2002. (Student Best Paper Award: 2nd place)

120) H. Zhao, N. Ansari and Y.Q. Shi, ※Bandwidth Prediction for Real-Time Video Delivery,§ Proc. 2002 36th Conference on Information Sciences and Systems, Princeton University, Princeton, NJ, March 20-22, 2002, Paper no. 50, 5 pages.

121) Zhang, X. M., A. Vetro, Y. Shi and H. Sun, ※Constant Quality constrained rate allocation for FGS video coded bitstreams,§ Proceedings of IS&T/SPIE's 14th Annual Symposium: Electronic Imaging 2002  (4671): Visual Communications and Image Processing 2002, San Jose, CA, 21-23 Jan. 2002. (the Best student paper award)

122) Z. Guo, X. M. Zhang, J. Savir and Y. Q. Shi, ※On test and characterization of analog linear time-invariant circuits using neural networks,§ Proceedings of IEEE Asian Annual Test Conference, pp. 338-343, Tokyo, Japan, November 2001.

123) Y. Q. Shi, Z. Ni and N. Ansari, ※Stirmark attack resistant fractal transform-based information hiding,§ The Seventh International Conference on Distributed Multimedia Systems, Taipei, Taiwan, September 26-18, 2001.

124) H. Liu, N. Ansari and Y. Q. Shi, ※The tale of a simple accurate MPEG video traffic model,§ Proceedings of IEEE International Conference of Communications (ICC*2001), pp. 1042-1046, Helsinki, Finland, June 2001.

125) X. M. Zhang, A. Vetro, H. Sun and Y. Q. Shi, ※Robust decoding for reduced error propagation of DC/AC prediction errors,§ IEEE Second Workshop and Exhibition of MPEG-4, San Jose, CA, June 2001.

126) J. Huang and Y. Q. Shi, ※Embedding gray level images,§ IEEE International Symposium on Circuits and Systems, Sydney, Australia, May 2001.

127) H. Liu, N. Ansari and Y. Q. Shi, ※On-line dynamic bandwidth allocation for VBR video transmission,§ IEEE International Conference on Information Technology: Coding and Computing, pp. 354-358, Las Vegas, Nevada, April 2001.

128) Y. Shi, Y. Q. Shi, C. Manikopoulos, W. Su, and Y. Xu, "Automatic Recognition of Digital Gate Symbols and Characters in Electronic Drawings," 2000 International Conference on Signal Processing Application and Technology, October 2000. 

129) Y. Shi, Y. Q. Shi, C. Manikopoulos, and W. Su, "A Modified Shift-Invariant Kohonen Neural Network," 2000 International Conference on Signal Processing Application and Technology, October 2000.

130) Y. Q. Shi and X. Zhang, ※2-D interleaving by using successive packing,§ Proceedings of 38th Annual Allerton Conference on Communications, Control and Computing, pp. 945-953, University of Illinois at Urbana-Champaign, October 2000.

131) H. Liu, N. Ansari and Y. Q. Shi, ※A simple model for MPEG video traffic,§ Proceedings of IEEE International Conference of Multimedia and Expo, New York City, July 31 to August 2, 2000.

132) Z. Ni, Y. Q. Shi and E. Sung, ※Enhancing robustness of digital watermarking against geometric attack based on fractal,§ Proceedings of IEEE International Conference of Multimedia and Expo, New York City, July 31 to August 2, 2000.

133) F. Elmasry and Y. Q. Shi, ※2-D interleaving for enhancing the robustness of watermarking signals embedded in still images,§ Proceedings of IEEE International Conference on Multimedia & Expo, New York, July 31 to August 2, 2000.

134) F. Elmasry and Y. Q. Shi, ※3-D interleaving for enhancing the robustness of watermarking signals embedded in video sequences,§ Proceedings of IEEE International Conference on Multimedia & Expo, New York, July 31 to August 2, 2000.

135) H. Liu, N. Ansari and Y. Q. Shi, ※Dynamic bandwidth allocation for VBR video traffic based on scene change identification,§ Proceedings of IEEE International Conference on Information Technology: Coding and Computing, pp. 284-288, Las Vegas, Nevada, March 2000.

136) J. Huang, Y. Q. Shi and L. Chen, ※Image watermarks using DCT DC componentsThe 2nd International Conference on Information, Communications and Signal Processing (ICICS*99), Singapore, December 7-10, 1999.

137) H. Liu, N. Ansari and Y. Q. Shi, ※Markov-modulated self-similar processes: MPEG coded video traffic modeler and synthesizer,§ Proceedings of Globcom 1999, pp. 1184-1188, Rio de Janeiro, Brazil, December 1999.

138) H. Liu, N. Ansari and Y. Q. Shi, ※Models of MPEG coded video traffic: Sequentially modulated self-similar process,§ presented in IFIP Broadband Communications*99, Hong Kong, November 10-12, 1999, included in D. H. K. Tsang and P. J. Kuhn Ed., Broadband Communications, pp. 63-72, Norwell, MA, Kluwer Academic Publishers, 1999.

139) G. F. Elmasry and Y. Q. Shi, ※MAP symbol decoding of arithmetic coding with embedded channel coding,§ Proceedings of IEEE Wireless Communications and Networking Conference, New Orleans, LA, September 1999.

140) H. Liu, N. Ansari and Y. Q. Shi, ※Modeling VBR video traffic by Markov-modulated self-similar processes,** Proceedings of IEEE Workshop on Multimedia Signal Processing, pp. 363-368, Copenhagen, Denmark, September 1999.

141) B. He, G. F. Elmasry, C. N. Manikopoulos and Y. Q. Shi, ※A go-back-N+1 protocol and its application in wireless ATM networks,§ Proceedings of Conference of Information Systems Science, University of Princeton, Princeton, NJ, March 1999.

142) J. Huang and Y. Q. Shi, ※Embedding strategy for image watermarking in DCT domain,§ Proceedings of the 5th Asia-Pacific Conference on Communications and 4th Optoelectronics and Communications  Conference (APCC/OECC*99), vol. 2, pp. 981-984, 1999, Beijing, China.

143) G. Elmasry and Y. Q. Shi, ※Maximum likelihood sequence decoding of digital image watermarking,§ IS&T/SPIE 11th International Symposium Electronic Imaging*99, vol. 3657 SPIE, Security and Watermarking of Multimedia Contents, pp. 425-436, San Hose, California, USA, January 1999.

144) G. Elmasry and Y. Q. Shi, ※Interleaving Reed-Solomon codes for 2-D arrays: applications in 2-D bar code,§ Proceedings of Allerton Annual Conference on Communications and Control, pp. 49-58, University of Illinois at Urbana-Champaign, USA, September 1998.

145) J. Huang, G. Elmasry and Y. Q. Shi,                ※Power constrained multiple signaling in digital image watermarking,§ Proceedings of 1998 IEEE Workshop on Multimedia Signal Processing, pp. 388-393, Los Angeles, CA, USA, December 1998.

146) J. Huang and Y. Q. Shi, ※A space and frequency hybrid algorithm to remove block artifacts,§ Proceedings of International Conference on Signal Processing, vol. 2, pp. 869-872, Beijing, China, September 1998.

147) J. Huang and Y. Q. Shi, ※Incorporating contrast masking into segmentation-based coding,§ IEEE Workshop on Digital Signal Processing, CD-ROM, Utah, USA, August 1998.

148) G. F.  Elmasry, J. Huang and Y. Q. Shi, ※Capacity of multiple signaling in digital image watermarking,§ Proceedings of 4th International Conference on Information Systems Analysis and Synthesis, ISAS'98, vol. 3, pp. 155-159, Invited Session on Video Processing/Multimedia Systems, Orlando, FL, USA, July 1998.

149) J. Huang, L. Chen and Y. Q. Shi, ※An integrated classifier in classified coding,§ Proceedings of IEEE International Symposium on Circuits and Systems, vol. IV, pp. 146-149, Monterey, CA, USA, May 1998.

150) S. Lin and Y. Q. Shi, ※Region-based adaptive DWT video coding using dense motion field,§ Proceedings of 1997 IEEE Workshop on Multimedia Signal Processing, pp. 175-180, Princeton, NJ, June 1997.

151) S. Lin, Y. Q. Shi and Ya-Qin Zhang, ※An optical flow based motion compensation algorithm for very low bit-rate video coding,§ Proceedings of 1997 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 2869-2872, Munich, Germany, April 1997.

152) X. Xia and Y. Q. Shi, ※A thresholding hierarchical block matching algorithm,§ Proceedings of IEEE 1996 International Symposium on Circuits and Systems, vol. 2, pp. 624-627, Atlanta, GA, May 1996.

153) S. Lin and Y. Q. Shi, ※A new approach to video teleconferencing coding 每 Another look at wireframe model in facial coding,§ Proceedings of IEEE 9th Workshop on Image and Multidimensional Signal Processing,  pp. 172-173, Belize City, Belize, March 1996.

154) X. Xia and Y. Q. Shi, ※Multiresolution block matching in video compression by thresholding,§ Proceedings of IEEE 9th Workshop on Image and Multidimensional Signal Processing,  pp. 168-169, Belize City, Belize, March 1996.

155) Y. Q. Shi and L. Horn, ※Contour extraction from HVEM images of microvessels,§ Abstract of The Second Asian Congress for Microcirculation, p. 172, Beijing, China, August 1995.

156) R. Z. Liu, Y. Q. Shi, K. F. Kosonocky and F. P. Higgins, ※Infrared Solder Joint Inspection on Surface Mount Printed Circuit Boards,§ Proceedings of 38th Midwest Symposium on Circuits and Systems, pp. 145-148, Rio de Janeiro, Brazil, August 1995.

157) X. Xia and Y. Q. Shi, ※A new multiresolution block matching  algorithm for motion estimation in video coding,§ Proceedings of the  Twenty-ninth Annual Conference  on Information Sciences and Systems, p. 599, The John Hopkins University, Baltimore, MD, USA, March 1995.

158) X. Xia and Y. Q. Shi, ※A multiple attributes algorithm to compute optical flow,§ Proceedings of the Twenty-ninth Annual Conference on Information Sciences and Systems, p. 480,  The John Hopkins University, Baltimore, MD, USA, March 1995.

159) J. N. Pan, Y. Q. Shi and C. Q. Shu, ※A Kalman filter in motion analysis from stereo image sequences,§ Proceedings of IEEE 1994 International Conference on Image  Processing, vol. 3, pp. 63-67, Austin, Texas, USA, November 1994. 

160) J. N. Pan and Y. Q. Shi, ※A Kalman filter for improving optical flow accuracy along moving Boundaries,§ Proceedings of SPIE 1994 Visual Communication and Image Processing, vol. 1, pp. 638-649, Chicago, September 1994.

161) J. N. Pan, Y. Q. Shi and C. Q. Shu, ※A correlation-feedback approach to optical flow determination,§ Proceedings of IEEE 1994 International Symposium on Circuits and Systems, vol. 3, pp. 33-36, London, UK, May 1994.

162) M. Xiao, Y. Q. Shi, H. Horn, P. Engler and D. Kristol, ※Boundary extraction from HVEM images of microvessels using active model,§ Proceedings of the 1994 20th Annual Northeast Bioengineering Conference, pp. 1-2, Western New England College, Springfield, MA, USA, March 1994.

163) Y. Q. Shi, C. Q. Shu and J. N. Pan, ※Unified optical flow field approach to motion analysis from a sequence of stereo images,§ Proceedings of the 8th IEEE Workshop on Image and Multidimensional Signal Processing, pp. 230-231, Cannes, France, September, 1993.

164) F. You,  Y. Q. Shi and P. Engler, ※Fingerprint pattern recognition for medical  usage,§ Proceedings of 1993 IEEE 19th Annual Northeast Bioengineering  Conference, pp. 176-177, New Jersey Institute of Technology, Newark, NJ, USA, March 1993.

165) Y. Q. Shi, Y. G. Liu, L. Horn and P. Engler, ※Automatic contour extraction from HVEM  images of microvessels,§ Proceedings of the 14th Annual International Conference of the IEEE Engineering in Medicine and Biology  Science, pp. 1913-1915, October 1992, Paris, France.

166) Y. Q. Shi and H. Zhang, ※Robust Hurwitzness of complex polynomials in convex and compact domain,§ Proceedings of IEEE 1992 International Symposium on Circuits and Systems, pp. 697-700, San Diego, CA, USA, May 1992.

167) Y. Q. Shi, C. Q. Shu and M. A. Salhi, ※Direct recovering of Nth ordersurface  structure using UOFF approach,§ Proceedings of IEEE 1992 International  Symposium on Circuits and Systems, pp. 1475-1478,  San Diego, CA, USA, May 1992.

168) Y. Q. Shi, C. Q. Shu and Y. Xie, ※Motion analysis based on a four-frame rectangular model,§ Proceedings of the 1992 Conference on Information Sciences and Systems, pp. 138, Princeton University, Princeton, NJ, USA, March 1992.

169) C. Q. Shu, Y. Zhu, Y. Q. Shi and C. H. Lu, ※Recovering surface structure characterized by an Nth degree polynomial equation,§ IEEE Seventh Workshop on Multidimensional Signal Processing, 5.7, Lake Placid, NY, USA, September 1991.

170) Y. Q. Shi and S. F. Zhou,  ※Stability of multivariate complex diamond polynomials,§ Proceedings of IEEE 1991 International Symposium on Circuits and Systems, pp. 2411-2414, Singapore, June 1991.

171) Y. Q. Shi, ※Positivity of multivariate interval rational functions,§ Proceedings of IEEE 1991 International Symposium on Circuits and Systems, pp. 1085-1088, Singapore, June 1991.

172) C. Q. Shu, Y. Q. Shi, J. N. Pan and L. Zhou, ※A new approach to 3-D position estimation based on the unified optical flow field,§ Proceedings of 1991 IEEE Workshop on Visual Signal Processing and Communications, pp. 83-86, National Chiao Tung University, Hsinchu, Taiwan, June 1991.

173) Y. Q. Shi, K. Zhou, J. Huang and C. Q. Shu, ※Automatic solder joint inspection via fusion of visual and infrared imaging techniques,§ Proceedings of 1991 IEEE Workshop on Visual Signal Processing and Communications, pp. 210-213, National Chiao Tung University, Hsinchu, Taiwan, June 1991. 

174) Y. Q. Shi and H. Zhang, ※Positive complex rational functions with coefficients perturbed in diamond domain,§ Proceedings of the Twenty-fifth Annual Conference on Information Sciences and Systems, pp. 359-364, Johns Hopkins University, Baltimore, MD, USA, March 1991.

175) C. Q. Shu and Y. Q. Shi, ※Computation of motion from stereo image sequence using the unified optical flow field,§ presented at SPIE's 1990 International Symposium on Optical  and Optoelectronic Applied Science and Engineering,  San Diego, CA, July 1990; and collected in Applications of Digital Image Processing XIII, Andrew G. Tescher, Editor, Proc. SPIE 1349, pp. 346 - 357 (1990).

176) Y. Q. Shi, D. F. Zhang and K. K. Yen, ※Improved stability  robustness of polynomials in discrete-time systems via a linear fractional transformation,§ Proceedings of the 1990 Conference on Information Sciences and Systems, pp. 140-145, Princeton University, NJ, USA, March 1990.

177) Y. Q. Shi and J. N.  Pan, ※A pair of stability theorems for complex polynomials,§ Proceedings of the 1990 Conference on Information Sciences and Systems,  p. 283, Princeton University, NJ, USA, March 1990.

178) C. Q. Shu,  Y. Q. Shi and C. H. Lu, ※A new arrangement for motion estimation from a binocular image sequence using unified optical flow field,§ Proceedings of  the 1990 Conference on Information Sciences and Systems, p. 444, Princeton University, NJ, USA, March 1990.

179) C. Q. Shu and Y. Q. Shi, ※Unified optical flow field,§ Proceedings of the 1990 Conference on Information Sciences and Systems, p. 445, Princeton University, NJ, USA, March 1990.

180) Y. Q. Shi and C. M. Chen, ※Simple tests for instability of complex interval polynomials,§ Proceedings of 32nd Midwest Symposium on Circuits and Systems, Urbana, IL, USA, pp. 916-918, August 1989.

181) Y. Q. Shi and K. Zhou, ※Robust multivariate interval strictly positive functions,§ Proceedings of 32nd Midwest Symposium on Circuits and Systems, pp. 898-901, Urbana, IL, USA, August 1989.

182) Y. Q. Shi and K. Zhou, ※The formulation of Kharitonov's polynomials,§ Proceedings of  the Twentieth Annual Pittsburgh Conference on Modeling and Simulation, pp. 1837-1842, Pittsburgh, PA, USA, May 1989.

183) Y. Q. Shi, ※A pair of stability theorems,§ Proceedings of the Twentieth nnualPittsburgh Conference on Modeling and Simulation, pp. 1831-1835, Pittsburgh, PA, USA, May 1989.

184) Y. Q. Shi, ※2-D Arp spectral factorization,§ Proceedings of IEEE 1989 International Symposium on Circuits and Systems, pp. 1487-1490, Portland, OR, USA, May 1989.

185) Y. Q. Shi and  D. F. Zhang, ※Determination of the widest-sense Hurwitz property for the second order bivariate polynomials,§ Proceedings of the 1988 International Conference  on Advances in  Communication and Control Systems, pp. 305-314, Baton Rouge, LA, USA, October 1988.

186) Y. Q. Shi and D. F. Zhang, ※Study of  scattering Hurwitz property invariance of complex multivariate interval polynomials,§ Proceedings of the 31st Midwest Symposium on Circuits and Systems, pp. 351-354, St. Louis, MO, USA, August 1988.

187) Y. Q. Shi, ※Stability of linear systems characterized by univariate polynomials and constant matrices under coefficient perturbation, Proceedings of the Nineteenth Annual Pittsburgh Conference on Modeling and Simulation,  pp. 2367-2371, Pittsburgh, PA, USA, May 1988.

188) Y. Q. Shi and N. K. Bose, ※Nonnegativity constrained spectral factorization for image reconstruction from autocorrelation data,§ Proceedings of IEEE 1988 International Conference on Acoustics, Speech, and Signal Processing, pp. 1766-1769, New York, NY, USA, April 1988.

189) N. K. Bose and  Y. Q. Shi, ※A simple general proof of Kharitonov's generalized stability criterion,§ IEEE 1987 International Symposium on Circuits and Systems, Philadelphia, PA, USA, May 1987. Presented in special session on Intelligent and Adaptive Signal Processing and collected in the proceedings.

190) N. K. Bose and Y. Q. Shi, ※Iterative schemes for two-dimensional spectral factorization,§ IEEE 1987 International Conference on Acoustics, Speech, and Signal Processing, Dallas, Texas, USA, April 1987.