Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yao Zhi-qiang is active.

Publication


Featured researches published by Yao Zhi-qiang.


international conference on communication technology | 2008

Watermarking T-Spline surfaces

Weng Bin; Pan Ri-jing; Yao Zhi-qiang; Yang Shan-chao; Feng Xiao-qing; Pan Zhigeng

This paper proposes two data embedding algorithms for T-spline surfaces, one is suitable for steganography, and the other for robust shape-preserving watermarking. For steganography, we embed data into the points on T-spline surfaces by using constrained optimization method. For robust shape-preserving watermarking, we use the local knot insertion of T-spline surfaces. The experiment results and their analyses are also presented.


ieee youth conference on information, computing and telecommunications | 2010

Robust watermarking for T-spline surfaces based on nonuniform B-spline wavelets transformation

Weng Bin; Pan Ri-jing; Yao Zhi-qiang; Xiao Jun; Yang Shan-chao

T-spline surfaces are widely used in entertainment, engineering, science and medicine. Nonuniform B-spline wavelets transformation is introduced into T-spline surfaces watermarking, and a scheme is proposed for embedding watermarks into T-spline surfaces. In watermark embeding stage, firstly, the points are selected from the standard T-spline surfaces. Secondly, the points are decomposited by nonumiform B-spline wavelets transformation, then the watermarks are embedded into its lower resolution coefficients, and then the watermarked points are obtained by the B-spline wavelets reconstruction. Finally, the watermarked T-spline surfaces are obtained by modifing the T-spline control points. In watermark extracting stage, the same points selection and wavelets decomposition processes are performed to both the original surfaces and the watermarked surfaces, then the watermarks are obtained according to the differences of their lower resolution coefficients. Experimental results show that the proposed scheme is robust against attacks such as translation, rotation, uniform scaling, noise addition, control points modification, weights modification, local knot insertion and control point removal.


international workshop on education technology and computer science | 2009

The Concept Lattices of Q-Matrices

Yang Shuqun; Cai Shenzheng; Yao Zhi-qiang; Ding Shu-liang

FCA is applied into Q-matrix theory and modifies that Q is Boolean algebra in terms of Boolean addition, Boolean multiplication, and complement operator Tatsuoka 1991 1995. The structure of Item tree Tatsuoka 1995 is denied, and the concept lattices are constructed which is derived from Q matrix.


2009 IEEE Youth Conference on Information, Computing and Telecommunication | 2009

A fragile watermarking algorithm for T-Spline surfaces

Weng Bin; Pan Ri-jing; Yao Zhi-qiang; Xiao Jun; Yang Shan-chao

T-Spline surface is an important parametric surface, which is widely used in entertainment, engineering, science and medicine. A fragile watermarking algorithm is proposed for integrity authentication of T-Spline surfaces. In this algorithm, some points on T-Spline surfaces are selected by a special algorithm, then the watermark is embedded by modifing the selected points, and then the watermarked surfaces is acquired by modifying the control points with constrained optimization method. The experiment results show that the watermark is fragile to many attacks, and the tampered area can be detected. Additionally, when preprocessing is used before watermark extracting, the algorithm can modified to be semi-fragile that is robust to translating, rotating and uniformly scaling.


Archive | 2014

Three-dimensional grid model blind-watermarking method based on depth image mapping

Yao Zhi-qiang; Guo Yongning; Yao Xiufang; Kong Xiangzeng


Journal of Computer Applications | 2012

Access control model based on RBAC in cloud computing

Yao Zhi-qiang


Archive | 2015

Network brief comment sentiment mining method

Huang Faliang; Li Chaoxiong; Yuan Chang An; Wang Yan; Yao Zhi-qiang


Archive | 2014

Video watermark based on optical flow method and digital holographic

Yao Zhi-qiang; Chen Liping; Kong Xiangzeng; Chen Licong


Computer Engineering and Applications | 2005

Blind Audio Watermarking Algorithm Based on Local Extremum

Chen Licong; Yao Zhi-qiang


Journal of Fujian Normal University | 2004

A Digital Watermarking Algorithm Based on Hamming Code in Wavelet Domain

Yao Zhi-qiang

Collaboration


Dive into the Yao Zhi-qiang's collaboration.

Top Co-Authors

Avatar

Pan Ri-jing

Fujian Normal University

View shared research outputs
Top Co-Authors

Avatar

Weng Bin

Fujian Normal University

View shared research outputs
Top Co-Authors

Avatar

Yang Shan-chao

Fujian Normal University

View shared research outputs
Top Co-Authors

Avatar

Ding Shu-liang

Jiangxi Normal University

View shared research outputs
Top Co-Authors

Avatar

Xiao Jun

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Yang Shuqun

Fujian Normal University

View shared research outputs
Top Co-Authors

Avatar

Cai Shenzheng

Fujian Normal University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge