Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Shuxun Wang is active.

Publication


Featured researches published by Shuxun Wang.


international conference on neural networks and signal processing | 2003

The application of binary image in digital audio watermarking

Lili Cui; Shuxun Wang; Tanfeng Sun

In this paper, we propose apply a visually recognizable binary image as watermarking embedding audio signals cepstrum domain. Cepstrum representation of audio can be shown to be very robust to a wide range of attacks including most challenging time-scaling and pitch-shifting warping. An intuitive psychoacoustic model is employed to control the audibility of introduced distortion. The results have shown the watermark imperceptible and robust against some signal processing, and our method succeeded in detection the embedded binary image. Extensive experimental results prove that the proposed method robustness to against the data compression and some kinds of synchronization attacks such as MP3, Gaussian white noise, filter and so on.


international conference on pattern recognition | 2006

A Novel Blind Watermarking Algorithm in Contourlet Domain

Haifeng Li; Weiwei Song; Shuxun Wang

A novel watermarking algorithm based on contourlet transform is proposed in this paper. The watermark composed of pseudo-random sequence is embedded in the selected contourlet transform coefficients by means of multiplicative method. The contourlet coefficients are modeled with generalized Gaussian distribution with zero mean, and then watermark detection method is proposed based on maximum likelihood detection. Furthermore the decision rule is optimized via Neyman-Pearson criterion. Experimental results show that the fidelity of the watermarked image is good and robust to signal processing and small geometrical attacks


international conference on neural networks and signal processing | 2003

The application of wavelet analysis and audio compression technology in digital audio watermarking

Lili Cui; Shuxun Wang; Tanfeng Sun

In this paper, we propose apply wavelet analysis and audio compress technology in audio watermarking. Our approach performs a wavelet transformation to determine the local audio properties optimal. Then apply audio compression technology local the watermark embedding location. A chaos sequence being watermark is embedded into the significant coefficients of the audio in detail coefficients. The scheme we proposed is shown to be very robust to a wide range of attacks including most challenging time-scaling and pitch-shifting warping. The results have shown the watermark imperceptible and robust against some signal processing. Extensive experimental results prove that the proposed method robustness to against the data compression, cropping attack and some kinds of synchronization attacks such as MP3, white Gaussian noise, filter and so on.


international conference on neural networks and signal processing | 2003

The application of chaotic oscillators to digital watermarking detection

Quan Wen; Shuxun Wang; Kai-Yan Zhu

In this paper, a new digital watermarking algorithm is presented. In this algorithm, the watermark embedded in the image is a sinusoidal signal with a certain frequency. When detected, the extracted watermark is the input to a chaotic system in which the weak signal with the same frequency as system frequency parameter can be detected. Chaotic system are sensitive to certain signals and immune to noise at the same time, so the watermarking detection method based on a chaotic scheme has a good performance for distorted original watermark signal. Simulation results are provided to support this claim.


international conference on natural computation | 2005

A novel watermarking scheme based on independent component analysis

Haifeng Li; Shuxun Wang; Weiwei Song; Quan Wen

A new blind watermarking algorithm is proposed in this paper. Our watermark embedding algorithm mainly exploits the important properties of Singular Value Decomposition (SVD). By means of Independent Component Analysis (ICA), the watermark is successfully extracted without the original image. Experiment results have shown that the proposed approach is robust against the common signal processing and geometric attacks.


international conference on neural networks and signal processing | 2003

Fourth-order cyclic cumulant TLS-ESPRIT algorithm to estimate direction of cyclostationary coherent sources

Hong Jiang; Shuxun Wang

In this paper, considering that most signals exhibit cyclostationarity and coherent sources caused by multipath propagation are often encountered in a variety of wireless communication systems, we propose a direction-finding algorithm based on cyclic cumulants to extract the desired non-Gaussian cyclostationary coherent sources by designing a fourth-order cyclic cumulant matrix and using TLS-ESPRIT algorithm. To coherent sources, a de-correlating method is exploited in our cyclic cumulant matrix model. Simulation results show that not only does the approach possess signal-selectivity capability but can effectively suppress additive stationary noise and Gaussian noise in environments where the spatial characteristics of noise are unknown, even when the noise shares the same cycle frequency as the signals of interests (SOIs). Moreover, under a lower signal to noise ratio (SNR) and a smaller sampling number, it has ability to detect and resolve more coherent and incoherent sources using fewer sensors.


pacific rim conference on multimedia | 2002

Research on Technology of Chaos Secrecy Communications in Digital Watermarking

Tanfeng Sun; Lili Cui; Shuxun Wang

In this paper, we present a novel DCSK-based protecting method of watermarks information security. We apply chaos sequence to encrypt wateramrks information. It makes watermarks information more secure than others methods. Then we embedded encrypted sequence into image base on wavelet theory. It make wateramrk information secure and secret.As a result, DCSK-based watermarking is more secure in protecting embedded information. Furthermore blind- detection watermarking can be realized. That method possesses research value.


intelligence and security informatics | 2005

A blind image watermarking using for copyright protection and tracing

Haifeng Li; Shuxun Wang; Weiwei Song; Quan Wen

With the development and mature of the Internet and wireless communication techniques the copy and distribution of the digital production becomes easier and faster. The copyright protection is an urgent problem to be resolved. The watermark is a digital code unremovably, robustly, and imperceptibly embedded in the host data and typically contains information about origin, status, and/or destination of the data. Most of present watermarking algorithms embed only one watermark, however one watermark is not sufficient under some circumstances. One of the reasons of privacy is that we cannot trace the responsibility of the pirates. It would come true by means of embedding the different exclusive watermarks belong to the issuer. As the different watermarks are needed at the different time, the multiple watermarks algorithm is required. The reports about multiple watermarks scheme are rather few. Cox et al. extend the single watermark algorithm to embed multiple orthogonal watermarks. The disadvantage is that the original image is needed at the watermark detector, and the watermark capacity is small. Stankovic et al. proposed a scheme utilizing the two-dimensional Radon–Wigner distribution. The lack is that the watermark capacity is small and we cannot judge the validity of the extracted watermark directly. Tao et al. present a multiple watermark algorithm in the DWT (Discrete Wavelet Transform) domain. The binary image is used for the watermark, and is embedded into all frequencies of DWT. The shortage is that the algorithm is not blind.


international conference on neural networks and signal processing | 2003

Beam space-time block coding with beamforming based on cyclic statistics for wireless communications

Lin-lin Wang; Shuxun Wang; Xiaoying Sun; Feng-Ye Hu

This paper presents an approach for beamforming based on third-order cyclic statistics. The approach has fairly well accuracy. Further, a new scheme joint beamforming and space-time block coding is suggested that dual antenna arrays transmit at base station and multi-antenna elements receive at mobile terminal. This scheme improves the receiving error performance of mobile terminal and increases the capacity of the entire wireless communication system. The computer simulation validates that the aforementioned scheme is superior and effective.


international conference on neural networks and signal processing | 2003

Two-dimensional cubic nonlinear coupling estimation in nonzero-mean multiplicative noise

Huijing Dou; Shuxun Wang; Fei Wang

This paper describes an algorithm based on cyclic statistic to estimate the two-dimensional (2-D) frequency of harmonic process which cubic nonlinear coupling exists. We defined a fourth-order time-average moment spectrum. It can be applied to obtain the coupled and coupling frequencies in nonzero-mean multiplicative noise. This method neednt constrain the distribution and the color of noises. Simulation examples illustrate the algorithms.

Collaboration


Dive into the Shuxun Wang's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge