dblp.uni-trier.dewww.uni-trier.de

Fenlin Liu

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
20EEBin Liu, Fenlin Liu, Chunfang Yang, Yifeng Sun: Secure Steganography in Compressed Video Bitstreams. ARES 2008: 1382-1387
19EELi Jing, Fenlin Liu, Bin Liu: Robust Image Watermarking Scheme with General Regression Neural Network and FCM Algorithm. ICIC (1) 2008: 243-250
18EEPing Wang, Fenlin Liu, Guodong Wang, Yifeng Sun, Daofu Gong: Multi-class steganalysis for Jpeg stego algorithms. ICIP 2008: 2076-2079
17EEBin Lu, Fenlin Liu, Xin Ge, Ping Wang: Feature n-gram Set Based Software Zero-Watermarking. ISIP 2008: 607-611
16EEXiangyang Luo, Fenlin Liu, Jianming Chen, Yining Zhang: Image universal steganalysis based on wavelet packet transform. MMSP 2008: 780-784
15EEBin Liu, Fenlin Liu, Chunfang Yang: Stepwise inter-frame correlation-based steganalysis system for video streams. Security and Communication Networks 1(6): 487-494 (2008)
14EEXiangyang Luo, Daoshun Wang, Ping Wang, Fenlin Liu: A review on blind detection for image steganography. Signal Processing 88(9): 2138-2157 (2008)
2007
13EEXiangyang Luo, Daoshun Wang, Ping Wang, Fenlin Liu: Secret Key Estimation for Image Sequential Steganograph in Transform Domain. GLOBECOM 2007: 538-542
12EELi Jing, Fenlin Liu: Double Zero-Watermarks Scheme Utilizing Scale Invariant Feature Transform and Log-Polar Mapping. ICME 2007: 2118-2121
11EEBin Lu, Fenlin Liu, Xin Ge, Bin Liu, Xiangyang Luo: A Software Birthmark Based on Dynamic Opcode n-gram. ICSC 2007: 37-44
10EEJie Zhang, Fenlin Liu, Ping Wang, Guodong Wang: Value Combination Technique for Image Authentication. PCM 2007: 276-285
9EEXiangyang Luo, Chunfang Yang, Daoshun Wang, Fenlin Liu: LTSB Steganalysis Based on Quartic Equation. T. Data Hiding and Multimedia Security 2: 68-90 (2007)
2006
8EEXiangyang Luo, Chunfang Yang, Fenlin Liu: Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods. Communications and Multimedia Security 2006: 161-172
7EEPing Wang, Xiangyang Luo, Fenlin Liu: An Improved Secret Key Estimation Method for Sequential Steganography. IIH-MSP 2006: 396-402
6EEXiangyang Luo, Ping Wang, Peizhong Lu, Fenlin Liu: Fast and Blind Restoration Scheme for the Initial States of LFSRs. IMSCCS (1) 2006: 192-198
5EEFenlin Liu, Bin Lu, Xiangyang Luo: A Chaos-Based Robust Software Watermarking. ISPEC 2006: 355-366
4EEBin Liu, Fenlin Liu, Bin Lu, Xiangyang Luo: Real-Time Steganography in Compressed Video. MRCS 2006: 43-48
3 Xiangyang Luo, Junyong Luo, Fenlin Liu: Searching and Detecting Spatial LSB Steganographic Images on the Internet. Parallel and Distributed Computing and Networks 2006: 273-278
2005
2EEXiangyang Luo, Bin Liu, Fenlin Liu: Improved RS Method for Detection of LSB Steganography. ICCSA (2) 2005: 508-516
1EEXiangyang Luo, Bin Liu, Fenlin Liu: Detecting LSB Steganography Based on Dynamic Masks. ISDA 2005: 251-255

Coauthor Index

1Jianming Chen [16]
2Xin Ge [11] [17]
3Daofu Gong [18]
4Li Jing [12] [19]
5Bin Liu [1] [2] [4] [11] [15] [19] [20]
6Bin Lu [4] [5] [11] [17]
7Peizhong Lu [6]
8Junyong Luo [3]
9Xiangyang Luo [1] [2] [3] [4] [5] [6] [7] [8] [9] [11] [13] [14] [16]
10Yifeng Sun [18] [20]
11Daoshun Wang [9] [13] [14]
12Guodong Wang [10] [18]
13Ping Wang [6] [7] [10] [13] [14] [17] [18]
14Chunfang Yang [8] [9] [15] [20]
15Jie Zhang [10]
16Yining Zhang [16]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)