2008 |
20 | EE | Bin Liu,
Fenlin Liu,
Chunfang Yang,
Yifeng Sun:
Secure Steganography in Compressed Video Bitstreams.
ARES 2008: 1382-1387 |
19 | EE | Li Jing,
Fenlin Liu,
Bin Liu:
Robust Image Watermarking Scheme with General Regression Neural Network and FCM Algorithm.
ICIC (1) 2008: 243-250 |
18 | EE | Ping Wang,
Fenlin Liu,
Guodong Wang,
Yifeng Sun,
Daofu Gong:
Multi-class steganalysis for Jpeg stego algorithms.
ICIP 2008: 2076-2079 |
17 | EE | Bin Lu,
Fenlin Liu,
Xin Ge,
Ping Wang:
Feature n-gram Set Based Software Zero-Watermarking.
ISIP 2008: 607-611 |
16 | EE | Xiangyang Luo,
Fenlin Liu,
Jianming Chen,
Yining Zhang:
Image universal steganalysis based on wavelet packet transform.
MMSP 2008: 780-784 |
15 | EE | Bin Liu,
Fenlin Liu,
Chunfang Yang:
Stepwise inter-frame correlation-based steganalysis system for video streams.
Security and Communication Networks 1(6): 487-494 (2008) |
14 | EE | Xiangyang Luo,
Daoshun Wang,
Ping Wang,
Fenlin Liu:
A review on blind detection for image steganography.
Signal Processing 88(9): 2138-2157 (2008) |
2007 |
13 | EE | Xiangyang Luo,
Daoshun Wang,
Ping Wang,
Fenlin Liu:
Secret Key Estimation for Image Sequential Steganograph in Transform Domain.
GLOBECOM 2007: 538-542 |
12 | EE | Li Jing,
Fenlin Liu:
Double Zero-Watermarks Scheme Utilizing Scale Invariant Feature Transform and Log-Polar Mapping.
ICME 2007: 2118-2121 |
11 | EE | Bin Lu,
Fenlin Liu,
Xin Ge,
Bin Liu,
Xiangyang Luo:
A Software Birthmark Based on Dynamic Opcode n-gram.
ICSC 2007: 37-44 |
10 | EE | Jie Zhang,
Fenlin Liu,
Ping Wang,
Guodong Wang:
Value Combination Technique for Image Authentication.
PCM 2007: 276-285 |
9 | EE | Xiangyang Luo,
Chunfang Yang,
Daoshun Wang,
Fenlin Liu:
LTSB Steganalysis Based on Quartic Equation.
T. Data Hiding and Multimedia Security 2: 68-90 (2007) |
2006 |
8 | EE | Xiangyang Luo,
Chunfang Yang,
Fenlin Liu:
Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods.
Communications and Multimedia Security 2006: 161-172 |
7 | EE | Ping Wang,
Xiangyang Luo,
Fenlin Liu:
An Improved Secret Key Estimation Method for Sequential Steganography.
IIH-MSP 2006: 396-402 |
6 | EE | Xiangyang Luo,
Ping Wang,
Peizhong Lu,
Fenlin Liu:
Fast and Blind Restoration Scheme for the Initial States of LFSRs.
IMSCCS (1) 2006: 192-198 |
5 | EE | Fenlin Liu,
Bin Lu,
Xiangyang Luo:
A Chaos-Based Robust Software Watermarking.
ISPEC 2006: 355-366 |
4 | EE | Bin Liu,
Fenlin Liu,
Bin Lu,
Xiangyang Luo:
Real-Time Steganography in Compressed Video.
MRCS 2006: 43-48 |
3 | | Xiangyang Luo,
Junyong Luo,
Fenlin Liu:
Searching and Detecting Spatial LSB Steganographic Images on the Internet.
Parallel and Distributed Computing and Networks 2006: 273-278 |
2005 |
2 | EE | Xiangyang Luo,
Bin Liu,
Fenlin Liu:
Improved RS Method for Detection of LSB Steganography.
ICCSA (2) 2005: 508-516 |
1 | EE | Xiangyang Luo,
Bin Liu,
Fenlin Liu:
Detecting LSB Steganography Based on Dynamic Masks.
ISDA 2005: 251-255 |