Z
Zhe Wang
Researcher at McMaster University
Publications - 15
Citations - 1300
Zhe Wang is an academic researcher from McMaster University. The author has contributed to research in topics: Directed acyclic graph & Longest path problem. The author has an hindex of 8, co-authored 15 publications receiving 1263 citations. Previous affiliations of Zhe Wang include University of Western Ontario.
Papers
More filters
Journal ArticleDOI
Detection of LSB steganography via sample pair analysis
TL;DR: In this article, the authors introduce a new approach to detecting least significant bit (LSB) steganography in digital signals such as images and audio, which is based on some statistical measures of sample pairs that are highly sensitive to LSB embedding operations.
Journal Article
Detection of LSB steganography via sample pair analysis
TL;DR: It is shown that the length of hidden messages embedded in the least significant bits of signal samples can be estimated with relatively high precision and the new steganalytic approach is based on some statistical measures of sample pairs that are highly sensitive to LSB embedding operations.
Book ChapterDOI
Detection of LSB Steganography via Sample Pair Analysis
TL;DR: A new, principled approach to detecting LSB steganography in digital signals such as images and audio is introduced and it is shown that the length of hidden message embedded in the least significant bits of signal samples can be estimated with relatively high precision.
Journal ArticleDOI
Globally optimal uneven error-protected packetization of scalable code streams
TL;DR: A family of new algorithms for rate-fidelity optimal packetization of scalable source bit streams with uneven error protection does away with the expediency of fractional bit allocation, a limitation of some existing algorithms.
Proceedings ArticleDOI
Globally optimal uneven error-protected packetization of scalable code streams
TL;DR: A family of new algorithms for rate-fidelity optimal packetization of scalable source bit streams with uneven error protection does away with the expediency of fractional bit allocation, a limitation of some existing algorithms.