Resume - Njit - New Jersey Institute of Technology
Resume - Njit - New Jersey Institute of Technology
Resume - Njit - New Jersey Institute of Technology
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Patents:<br />
Publications:<br />
3. In the area <strong>of</strong> Text Document Data Hiding: A data hiding scheme aiming at formatted text documents has been<br />
invented. It is a blind algorithm, meaning the original document is not needed for hidden data extraction. The<br />
performance on robustness is superior over all existing technologies. The stego-document can be subjected to<br />
printing, copying and scanning. Specifically, the hidden data can still be correctly extracted after the document<br />
has experienced one printing, followed by 10 times <strong>of</strong> copying, and one scanning. This is the best blind robust<br />
document data hiding algorithm compared with all the existing algorithms. This invention has been disclosed to<br />
NJIT in July 2004. A US provisional patent has been filed in December 2004. A research proposal has been<br />
submitted to DDET, Air Force Research Laboratory in May 2004. This technology opens possibility to Digital<br />
Notarization.<br />
4. In the area <strong>of</strong> Steganalysis: Steganalysis is to detect the hidden message, and is urgently requested by military<br />
and cyber security. So far, the area is very young. The most hard stegnography methods to be detected are the<br />
so-called spread-spectrum based algorithms. There exists no previous steganalysis methods which can handle<br />
this tough case. As a major team member in the research group, I have made significant contribution to this area.<br />
Our recent investigation indicates that our newly developed framework can detect stego-media created by using<br />
the typical spread-spectrum scheme with a successful rate close to 80%. This work in this regard leads to a<br />
proposal submitted to DDET Air Force Research Laboratory in September. Patents and IEEE journal papers are<br />
expected.<br />
1. Dekun Zou, Y.Q. Shi, Z. Ni: Method and Apparatus for Lossless Image Data Hiding that does Not Generate Saltpepper<br />
Noise and Is Robust against Compression, US Provisional Patent filed in December 2003.<br />
2. Dekun Zou, Y.Q. Shi: Formatted Text Document Data Hiding Using Inter-word Space Modulation Robust to<br />
Scanning Copying and Printing, US Provisional Patent filed in December 2004.<br />
1. Dekun Zou, Tianlin Dong: On the Application <strong>of</strong> Single Chip RF Transceiver GJRF400, Journal <strong>of</strong> Mobile<br />
Communications, China, March 2001<br />
2. Dekun Zou, Chai Wah Wu, Yun Q. Shi: A Content-based Image authentication system with lossless data hiding,<br />
IEEE International Conference on Multimedia and Expo (ICME), vol.2, pp.213-216, July 2003<br />
3. C. Manikopoulos, Y.Q. Shi, S. Song, Z. Zhang, Z. Ni; Dekun Zou; Detection <strong>of</strong> block DCT-based steganography in<br />
gray-scale images IEEE International Workshop on Multimedia Signal Processing (MMSP), pp.355-358, Dec. 2002<br />
4. Dekun Zou, Yun Q. Shi Z. Ni: A Semi-fragile Lossless Digital Watermarking Scheme Based on Integer Wavelet<br />
Transform, IEEE International Workshop on Multimedia Signal Processing(MMSP), pp.195-198, Sept. 2004<br />
5. Yun Q. Shi, Z. Ni, Dekun Zou, Changyin Liang and Guorong Xuan: Lossless data hiding: Fundamentals,<br />
Algorithms and Applications, International Symposium on Circuit and System (ISCAS), vol.2, pp.33-36, May 2004<br />
6. G. Xuan, J. Zheng, C. Yang , Yun Q. Shi, Dekun Zou: A Secure Internet-Based Personal Identity Verification<br />
System Using Lossless Watermarking and Fingerprint Recognition, International Workshop on Digital<br />
Watermarking, Oct. 2004<br />
7. Dekun Zou, Y.Q. Shi: Formatted Text Document Data Hiding Robust to Scanning Copying and Printing, IEEE<br />
ISCAS 05<br />
8. Yun Q. Shi, G. Xuan, Dekun Zou: Effective Steganalysis Based on Statistical Moments <strong>of</strong> Wavelet Characteristic<br />
Function, IEEE ITCC05<br />
9. Dekun Zou, Y.Q. Shi, Z. Ni: An Invertible Data Hiding Scheme Robust to Lossy Compression, Submitted to IEEE<br />
Transaction on Multimedia for review<br />
10. Yun Q. Shi, G. Xuan, Dekun Zou: Image Steganalysis Based on Moments <strong>of</strong> Wavelet Characteristic Function,<br />
Submitted to IEE Electronics Letters for review<br />
Personality: Creative, hardworking, easy going, cooperative, teamwork, devoted when working or playing