21.08.2013 Views

Resume - Njit - New Jersey Institute of Technology

Resume - Njit - New Jersey Institute of Technology

Resume - Njit - New Jersey Institute of Technology

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Patents:<br />

Publications:<br />

3. In the area <strong>of</strong> Text Document Data Hiding: A data hiding scheme aiming at formatted text documents has been<br />

invented. It is a blind algorithm, meaning the original document is not needed for hidden data extraction. The<br />

performance on robustness is superior over all existing technologies. The stego-document can be subjected to<br />

printing, copying and scanning. Specifically, the hidden data can still be correctly extracted after the document<br />

has experienced one printing, followed by 10 times <strong>of</strong> copying, and one scanning. This is the best blind robust<br />

document data hiding algorithm compared with all the existing algorithms. This invention has been disclosed to<br />

NJIT in July 2004. A US provisional patent has been filed in December 2004. A research proposal has been<br />

submitted to DDET, Air Force Research Laboratory in May 2004. This technology opens possibility to Digital<br />

Notarization.<br />

4. In the area <strong>of</strong> Steganalysis: Steganalysis is to detect the hidden message, and is urgently requested by military<br />

and cyber security. So far, the area is very young. The most hard stegnography methods to be detected are the<br />

so-called spread-spectrum based algorithms. There exists no previous steganalysis methods which can handle<br />

this tough case. As a major team member in the research group, I have made significant contribution to this area.<br />

Our recent investigation indicates that our newly developed framework can detect stego-media created by using<br />

the typical spread-spectrum scheme with a successful rate close to 80%. This work in this regard leads to a<br />

proposal submitted to DDET Air Force Research Laboratory in September. Patents and IEEE journal papers are<br />

expected.<br />

1. Dekun Zou, Y.Q. Shi, Z. Ni: Method and Apparatus for Lossless Image Data Hiding that does Not Generate Saltpepper<br />

Noise and Is Robust against Compression, US Provisional Patent filed in December 2003.<br />

2. Dekun Zou, Y.Q. Shi: Formatted Text Document Data Hiding Using Inter-word Space Modulation Robust to<br />

Scanning Copying and Printing, US Provisional Patent filed in December 2004.<br />

1. Dekun Zou, Tianlin Dong: On the Application <strong>of</strong> Single Chip RF Transceiver GJRF400, Journal <strong>of</strong> Mobile<br />

Communications, China, March 2001<br />

2. Dekun Zou, Chai Wah Wu, Yun Q. Shi: A Content-based Image authentication system with lossless data hiding,<br />

IEEE International Conference on Multimedia and Expo (ICME), vol.2, pp.213-216, July 2003<br />

3. C. Manikopoulos, Y.Q. Shi, S. Song, Z. Zhang, Z. Ni; Dekun Zou; Detection <strong>of</strong> block DCT-based steganography in<br />

gray-scale images IEEE International Workshop on Multimedia Signal Processing (MMSP), pp.355-358, Dec. 2002<br />

4. Dekun Zou, Yun Q. Shi Z. Ni: A Semi-fragile Lossless Digital Watermarking Scheme Based on Integer Wavelet<br />

Transform, IEEE International Workshop on Multimedia Signal Processing(MMSP), pp.195-198, Sept. 2004<br />

5. Yun Q. Shi, Z. Ni, Dekun Zou, Changyin Liang and Guorong Xuan: Lossless data hiding: Fundamentals,<br />

Algorithms and Applications, International Symposium on Circuit and System (ISCAS), vol.2, pp.33-36, May 2004<br />

6. G. Xuan, J. Zheng, C. Yang , Yun Q. Shi, Dekun Zou: A Secure Internet-Based Personal Identity Verification<br />

System Using Lossless Watermarking and Fingerprint Recognition, International Workshop on Digital<br />

Watermarking, Oct. 2004<br />

7. Dekun Zou, Y.Q. Shi: Formatted Text Document Data Hiding Robust to Scanning Copying and Printing, IEEE<br />

ISCAS 05<br />

8. Yun Q. Shi, G. Xuan, Dekun Zou: Effective Steganalysis Based on Statistical Moments <strong>of</strong> Wavelet Characteristic<br />

Function, IEEE ITCC05<br />

9. Dekun Zou, Y.Q. Shi, Z. Ni: An Invertible Data Hiding Scheme Robust to Lossy Compression, Submitted to IEEE<br />

Transaction on Multimedia for review<br />

10. Yun Q. Shi, G. Xuan, Dekun Zou: Image Steganalysis Based on Moments <strong>of</strong> Wavelet Characteristic Function,<br />

Submitted to IEE Electronics Letters for review<br />

Personality: Creative, hardworking, easy going, cooperative, teamwork, devoted when working or playing

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!