Xingming Sun

Orcid: 0000-0001-7982-726X

According to our database1, Xingming Sun authored at least 200 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Generative Steganography Based on Long Readable Text Generation.
IEEE Trans. Comput. Soc. Syst., August, 2024

2023
Exposing Deepfake Face Forgeries With Guided Residuals.
IEEE Trans. Multim., 2023

Geometric correction code-based robust image watermarking.
IET Image Process., 2023

A Derivative Matrix-Based Covert Communication Method in Blockchain.
Comput. Syst. Sci. Eng., 2023

2022
High-Capacity Steganography Using Object Addition-Based Cover Enhancement for Secure Communication in Networks.
IEEE Trans. Netw. Sci. Eng., 2022

Remote Attacks on Drones Vision Sensors: An Empirical Study.
IEEE Trans. Dependable Secur. Comput., 2022

MFFFLD: A Multimodal-Feature-Fusion-Based Fingerprint Liveness Detection.
IEEE Trans. Cogn. Dev. Syst., 2022

FLD-SRC: Fingerprint Liveness Detection for AFIS Based on Spatial Ridges Continuity.
IEEE J. Sel. Top. Signal Process., 2022

MSPPIR: Multi-Source Privacy-Preserving Image Retrieval in cloud computing.
Future Gener. Comput. Syst., 2022

Semantic and secure search over encrypted outsourcing cloud based on BERT.
Frontiers Comput. Sci., 2022

A Robust 3-D Medical Watermarking Based on Wavelet Transform for Data Protection.
Comput. Syst. Sci. Eng., 2022

A Robust Document Image Watermarking Scheme using Deep Neural Network.
CoRR, 2022

2021
Multiple Distance-Based Coding: Toward Scalable Feature Matching for Large-Scale Web Image Search.
IEEE Trans. Big Data, 2021

Secure Authentication in Cloud Big Data with Hierarchical Attribute Authorization Structure.
IEEE Trans. Big Data, 2021

Linguistic Generative Steganography With Enhanced Cognitive-Imperceptibility.
IEEE Signal Process. Lett., 2021

Blockchain-based decentralized reputation system in E-commerce environment.
Future Gener. Comput. Syst., 2021

Fake face detection via adaptive manipulation traces extraction network.
Comput. Vis. Image Underst., 2021

Chapter Five - Fingerprint liveness detection using an improved CNN with the spatial pyramid pooling structure.
Adv. Comput., 2021

Chapter Three - Review on privacy-preserving data comparison protocols in cloud computing.
Adv. Comput., 2021

Multi-scale Extracting and Second-Order Statistics for Lightweight Steganalysis.
Proceedings of the Pattern Recognition and Computer Vision - 4th Chinese Conference, 2021

Achieving Lightweight Image Steganalysis with Content-Adaptive in Spatial Domain.
Proceedings of the Image and Graphics - 11th International Conference, 2021

2020
A Novel Weber Local Binary Descriptor for Fingerprint Liveness Detection.
IEEE Trans. Syst. Man Cybern. Syst., 2020

Region-Level Visual Consistency Verification for Large-Scale Partial-Duplicate Image Search.
ACM Trans. Multim. Comput. Commun. Appl., 2020

Integrating SIFT and CNN Feature Matching for Partial-Duplicate Image Detection.
IEEE Trans. Emerg. Top. Comput. Intell., 2020

Secure Verifiable Database Supporting Efficient Dynamic Operations in Cloud Computing.
IEEE Trans. Emerg. Top. Comput., 2020

Deep Residual Network With Adaptive Learning Framework for Fingerprint Liveness Detection.
IEEE Trans. Cogn. Dev. Syst., 2020

Security and Privacy Issues of UAV: A Survey.
Mob. Networks Appl., 2020

Confusing-Keyword Based Secure Search over Encrypted Cloud Data.
Mob. Networks Appl., 2020

Semi-supervised stacked autoencoder-based deep hierarchical semantic feature for real-time fingerprint liveness detection.
J. Real Time Image Process., 2020

Real-time image carrier generation based on generative adversarial network and fast object detection.
J. Real Time Image Process., 2020

Efficient cloud-aided verifiable secret sharing scheme with batch verification for smart cities.
Future Gener. Comput. Syst., 2020

Coverless information hiding based on the generation of anime characters.
EURASIP J. Image Video Process., 2020

MSPPIR: Multi-source privacy-preserving image retrieval in cloud computing.
CoRR, 2020

Fake Face Detection via Adaptive Residuals Extraction Network.
CoRR, 2020

2019
Enabling Semantic Search Based on Conceptual Graphs over Encrypted Outsourced Data.
IEEE Trans. Serv. Comput., 2019

Writing in the Air with WiFi Signals for Virtual Reality Devices.
IEEE Trans. Mob. Comput., 2019

Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing.
IEEE Trans. Dependable Secur. Comput., 2019

Difference co-occurrence matrix using BP neural network for fingerprint liveness detection.
Soft Comput., 2019

An effective comparison protocol over encrypted data in cloud computing.
J. Inf. Secur. Appl., 2019

Polynomial-Based Google Map Graphical Password System against Shoulder-Surfing Attacks in Cloud Environment.
Complex., 2019

Video Copy Detection Using Spatio-Temporal CNN Features.
IEEE Access, 2019

Fingerprint Liveness Detection Using an Improved CNN With Image Scale Equalization.
IEEE Access, 2019

A Steganography Algorithm Based on CycleGAN for Covert Communication in the Internet of Things.
IEEE Access, 2019

Image Steganography Based on Foreground Object Generation by Generative Adversarial Networks in Mobile Edge Computing With Internet of Things.
IEEE Access, 2019

2018
Dynamic Resource Allocation for Load Balancing in Fog Environment.
Wirel. Commun. Mob. Comput., 2018

Semantic-Aware Searching Over Encrypted Data for Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2018

Speech authentication and content recovery scheme for security communication and storage.
Telecommun. Syst., 2018

A video error concealment method using data hiding based on compressed sensing over lossy channel.
Telecommun. Syst., 2018

Identification of Motion-Compensated Frame Rate Up-Conversion Based on Residual Signals.
IEEE Trans. Circuits Syst. Video Technol., 2018

Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing.
IEEE Trans. Cloud Comput., 2018

Semantic Contextual Search Based on Conceptual Graphs over Encrypted Cloud.
Secur. Commun. Networks, 2018

Encoding multiple contextual clues for partial-duplicate image retrieval.
Pattern Recognit. Lett., 2018

A robust forgery detection algorithm for object removal by exemplar-based image inpainting.
Multim. Tools Appl., 2018

A copy-move forgery detection method based on CMFD-SIFT.
Multim. Tools Appl., 2018

Rotation-invariant Weber pattern and Gabor feature for fingerprint liveness detection.
Multim. Tools Appl., 2018

Norm ratio-based audio watermarking scheme in DWT domain.
Multim. Tools Appl., 2018

Perceptual image hashing via dual-cross pattern encoding and salient structure detection.
Inf. Sci., 2018

Privacy-Preserving and Lightweight Key Agreement Protocol for V2G in the Social Internet of Things.
IEEE Internet Things J., 2018

K-barrier coverage in wireless sensor networks based on immune particle swarm optimisation.
Int. J. Sens. Networks, 2018

A novel meteorological sensor data acquisition approach based on unmanned aerial vehicle.
Int. J. Sens. Networks, 2018

Convolutional neural network for smooth filtering detection.
IET Image Process., 2018

Multiple-parameter fractional quaternion Fourier transform and its application in colour image encryption.
IET Image Process., 2018

Non-uniform Watermark Sharing Based on Optimal Iterative BTC for Image Tampering Recovery.
IEEE Multim., 2018

A lightweight multi-layer authentication protocol for wireless body area networks.
Future Gener. Comput. Syst., 2018

Secret Image Sharing Based on Encrypted Pixels.
IEEE Access, 2018

A Privacy-Preserving Handwritten Signature Verification Method Using Combinational Features and Secure KNN.
IEEE Access, 2018

Secure Image LBP Feature Extraction in Cloud-Based Smart Campus.
IEEE Access, 2018

2017
Structural Minimax Probability Machine.
IEEE Trans. Neural Networks Learn. Syst., 2017

Unimodal Stopping Model-Based Early SKIP Mode Decision for High-Efficiency Video Coding.
IEEE Trans. Multim., 2017

Effective and Efficient Global Context Verification for Image Copy Detection.
IEEE Trans. Inf. Forensics Secur., 2017

Adaptive Inter CU Depth Decision for HEVC Using Optimal Selection Model and Encoding Parameters.
IEEE Trans. Broadcast., 2017

A secure cloud-assisted urban data sharing framework for ubiquitous-cities.
Pervasive Mob. Comput., 2017

Detecting video frame rate up-conversion based on frame-level analysis of average texture variation.
Multim. Tools Appl., 2017

A passive authentication scheme for copy-move forgery based on package clustering algorithm.
Multim. Tools Appl., 2017

Residual domain dictionary learning for compressed sensing video recovery.
Multim. Tools Appl., 2017

Erratum to: A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment.
Multim. Tools Appl., 2017

A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment.
Multim. Tools Appl., 2017

A selective encryption scheme for protecting H.264/AVC video in multimedia social network.
Multim. Tools Appl., 2017

Lossless visible watermarking based on adaptive circular shift operation for BTC-compressed images.
Multim. Tools Appl., 2017

A security watermark scheme used for digital speech forensics.
Multim. Tools Appl., 2017

Detecting image seam carving with low scaling ratio using multi-scale spatial and spectral entropies.
J. Vis. Commun. Image Represent., 2017

Quaternion pseudo-Zernike moments combining both of RGB information and depth information for color image splicing detection.
J. Vis. Commun. Image Represent., 2017

An Enhanced Cloud Data Storage Auditing Protocol Providing Strong Security and Efficiency for Smart City.
J. Inf. Sci. Eng., 2017

Detection of image seam carving by using weber local descriptor and local binary patterns.
J. Inf. Secur. Appl., 2017

EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing.
Inf. Sci., 2017

Reversible data hiding with contrast enhancement and tamper localization for medical images.
Inf. Sci., 2017

A Content-Based Image Retrieval Scheme Using an Encrypted Difference Histogram in Cloud Computing.
Inf., 2017

Fast and accurate near-duplicate image elimination for visual sensor networks.
Int. J. Distributed Sens. Networks, 2017

Design of new scan orders for perceptual encryption of H.264/AVC videos.
IET Inf. Secur., 2017

Organized topology based routing protocol in incompletely predictable ad-hoc networks.
Comput. Commun., 2017

Enhanced Remote Password-Authenticated Key Agreement Based on Smart Card Supporting Password Changing.
Proceedings of the Information Security Practice and Experience, 2017

Robust detection for object removal with post-processing by exemplar-based image inpainting.
Proceedings of the 13th International Conference on Natural Computation, 2017

2016
"Friend is Treasure": Exploring and Exploiting Mobile Social Contacts for Efficient Task Offloading.
IEEE Trans. Veh. Technol., 2016

A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data.
IEEE Trans. Parallel Distributed Syst., 2016

Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement.
IEEE Trans. Parallel Distributed Syst., 2016

Sparse Representation-Based Image Quality Index With Adaptive Sub-Dictionaries.
IEEE Trans. Image Process., 2016

A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2016

Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement.
IEEE Trans. Inf. Forensics Secur., 2016

Cross correlation feature mining for steganalysis of hash based least significant bit substitution video steganography.
Telecommun. Syst., 2016

Fast Motion Estimation Based on Content Property for Low-Complexity H.265/HEVC Encoder.
IEEE Trans. Broadcast., 2016

Privacy-preserving outsourced gene data search in encryption domain.
Secur. Commun. Networks, 2016

Steganalysis of LSB matching using differences between nonadjacent pixels.
Multim. Tools Appl., 2016

Blind quality index for camera images with natural scene statistics and patch-based sharpness assessment.
J. Vis. Commun. Image Represent., 2016

Fast reference frame selection based on content similarity for low complexity HEVC encoder.
J. Vis. Commun. Image Represent., 2016

A Privacy-Preserving Outsourcing Data Storage Scheme with Fragile Digital Watermarking-Based Data Auditing.
J. Electr. Comput. Eng., 2016

Techniques for Design and Implementation of an FPGA-Specific Physical Unclonable Function.
J. Comput. Sci. Technol., 2016

Reversible Watermarking with Adaptive Embedding Threshold Matrix.
KSII Trans. Internet Inf. Syst., 2016

Detecting video frame-rate up-conversion based on periodic properties of edge-intensity.
J. Inf. Secur. Appl., 2016

Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode.
Inf. Sci., 2016

A novel image hashing scheme with perceptual robustness using block truncation coding.
Inf. Sci., 2016

Early DIRECT mode decision based on all-zero block and rate distortion cost for multiview video coding.
IET Image Process., 2016

Effective and Efficient Image Copy Detection with Resistance to Arbitrary Rotation.
IEICE Trans. Inf. Syst., 2016

Multi-User Quantum Wireless Network Communication Based on Multi-Qubit GHZ State.
IEEE Commun. Lett., 2016

Quantum network coding for multi-unicast problem based on 2D and 3D cluster states.
Sci. China Inf. Sci., 2016

Towards efficient content-aware search over encrypted outsourced data in cloud.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

A RFID Based Localization Algorithm for Wireless Sensor Networks.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
Image Integrity Authentication Scheme Based on Fixed Point Theory.
IEEE Trans. Image Process., 2015

Segmentation-Based Image Copy-Move Forgery Detection Scheme.
IEEE Trans. Inf. Forensics Secur., 2015

Air Temperature Error Correction Based on Solar Radiation in an Economical Meteorological Wireless Sensor Network.
Sensors, 2015

Low Complexity HEVC Encoder for Visual Sensor Networks.
Sensors, 2015

Histogram shifting based reversible data hiding method using directed-prediction scheme.
Multim. Tools Appl., 2015

Color Image Analysis by Quaternion-Type Moments.
J. Math. Imaging Vis., 2015

Image copy-move forgery detection based on sped-up robust features descriptor and adaptive minimal-maximal suppression.
J. Electronic Imaging, 2015

Enhanced secure sensor association and key management in wireless body area networks.
J. Commun. Networks, 2015

Digital forensics of Microsoft Office 2007-2013 documents to prevent covert communication.
J. Commun. Networks, 2015

Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing.
IEICE Trans. Commun., 2015

Detecting seam carving based image resizing using local binary patterns.
Comput. Secur., 2015

Exposing Photographic Splicing by Detecting the Inconsistencies in Shadows.
Comput. J., 2015

Coverless Image Steganography Without Embedding.
Proceedings of the Cloud Computing and Security - First International Conference, 2015

Coverless Information Hiding Method Based on the Chinese Mathematical Expression.
Proceedings of the Cloud Computing and Security - First International Conference, 2015

2014
Synthetic Aperture Radar Image Segmentation by Modified Student's t-Mixture Model.
IEEE Trans. Geosci. Remote. Sens., 2014

Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data.
IEEE Trans. Consumer Electron., 2014

Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query.
IEEE Trans. Consumer Electron., 2014

A novel signature based on the combination of global and local signatures for image copy detection.
Secur. Commun. Networks, 2014

Steganalysis of least significant bit matching using multi-order differences.
Secur. Commun. Networks, 2014

Linguistic steganalysis using the features derived from synonym frequency.
Multim. Tools Appl., 2014

Buffer scheme optimization of epidemic routing in delay tolerant networks.
J. Commun. Networks, 2014

Secure semantic expansion based search over encrypted cloud data supporting similarity ranking.
J. Cloud Comput., 2014

Removing Gaussian noise for colour images by quaternion representation and optimisation of weights in non-local means filter.
IET Image Process., 2014

Full 4-D quaternion discrete Fourier transform based watermarking for color images.
Digit. Signal Process., 2014

An Effective Search Scheme Based on Semantic Tree Over Encrypted Cloud Data Supporting Verifiability.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Combination of SIFT Feature and Convex Region-Based Global Context Feature for Image Copy Detection.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Document Attribute-Based Keyword Search over Encrypted Data.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

A Similarity Search Method for Encrypted Cloud Document.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Secure Storage of Data in Cloud Computing.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Semantic keyword search based on trie over encrypted cloud data.
Proceedings of the Second International Workshop on Security in Cloud Computing, 2014

2013
Reversible watermarking method based on asymmetric-histogram shifting of prediction errors.
J. Syst. Softw., 2013

Steganalysis of least significant bit matching based on image histogram and correlation.
J. Electronic Imaging, 2013

Securing sensor data storage and query based on <i>k</i>-out-of- <i>n</i> coding.
Int. J. Commun. Syst., 2013

Detection of copy-move forgery in digital images based on DCT.
CoRR, 2013

A Novel Method for Image Integrity Authentication Based on Fixed Point Theory.
CoRR, 2013

A New Reversible Data Hiding Scheme Based on Efficient Prediction.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

New Forensic Methods for OOXML Format Documents.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Multi-keyword ranked search supporting synonym query over encrypted data in cloud computing.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013

2012
A Secure Scheme of Continuity Based on Two-Dimensional Backward Hash Key Chains for Sensor Networks.
IEEE Wirel. Commun. Lett., 2012

Text split-based steganography in OOXML format documents for covert communication.
Secur. Commun. Networks, 2012

2011
Query Preserving Relational Database Watermarking.
Informatica (Slovenia), 2011

Removing dubious feedback from mobile wireless ad hoc peer-to-peer systems.
Int. J. Ad Hoc Ubiquitous Comput., 2011

Forensic investigation of OOXML format documents.
Digit. Investig., 2011

A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion.
Comput. Aided Des., 2011

2010
JPEG image steganalysis using joint discrete cosine transform domain features.
J. Electronic Imaging, 2010

Watermarking 3D Triangular Mesh with High Visual Quality.
J. Digit. Content Technol. its Appl., 2010

Watermarking-based intellectual property protection for sensor streaming data.
Int. J. Comput. Appl. Technol., 2010

A Novel method for similarity analysis and protein sub-cellular localization prediction.
Bioinform., 2010

2009
A Contrast-Sensitive Reversible Visible Image Watermarking Technique.
IEEE Trans. Circuits Syst. Video Technol., 2009

Principal feature selection and fusion method for image steganalysis.
J. Electronic Imaging, 2009

A binary coding method of RNA secondary structure and its application.
J. Comput. Chem., 2009

Natural Language Information Hiding Based on Chinese Mathematical Expression.
Int. J. Netw. Secur., 2009

An efficient and scalable pairwise key pre-distribution scheme for sensor networks using deployment knowledge.
Comput. Commun., 2009

Three-Dimensional Reconstruction Using Enhanced Shape from Stereo Technique.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

2008
Removable visible image watermarking algorithm in the discrete cosine transform domain.
J. Electronic Imaging, 2008

Detection of Hidden Information in Webpage Based on Higher-Order Statistics.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

Steganalysis of Information Hidden in Webpage Based on Higher-order Statistics.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

A Combined Static and Dynamic Software Birthmark Based on Component Dependence Graph.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A Security Threshold Subliminal Channel Based on Elliptic Curve Cryptosystem.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Copyright Protection in Wireless Sensor Networks by Watermarking.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Steganalysis of Data Hiding for Two-Dimensional Engineering Graphics Based on Characters Statistic.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

File-Update Based Steganography for Microsoft PowerPoint Files.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A Steganography Scheme in P2P Network.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

An Algorithm of Webpage Information Hiding Based on Attributes Permutation.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Time-Based Privacy Protection for Multi-attribute Data in WSNs.
Proceedings of the 14th International Conference on Parallel and Distributed Systems, 2008

Dynamic K-Gram Based Software Birthmark.
Proceedings of the 19th Australian Software Engineering Conference (ASWEC 2008), 2008

2007
Semi-Fragile Watermarking for Image Authentication and Tamper Detection Using HVS Model.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

A Stern-based Collusion-Secure Software Watermarking Algorithm and Its Implementation.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Secure Data Transmission of Wireless Sensor Network Based on Information Hiding.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

Detection of steganographic information in tags of webpage.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

An Evaluation Scheme for Steganalysis-proof Ability of Steganographic Algorithms.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Detection of Hidden Information in Tags of Webpage Based on Tag-Mismatch.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

An Efficient Linguistic Steganography for Chinese Text.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

An Image-Adaptive Semi-fragile Watermarking for Image Authentication and Tamper Detection.
Proceedings of the Computational Science and Its Applications, 2007

Detection of Hidden Information in Webpage.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

Second-LSB-Dependent Robust Watermarking for Relational Database.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

Research on Steganalysis for Text Steganography Based on Font Format.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

Detection of Hidden Information in Webpages Based on Randomness.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2005
Noun-Verb Based Technique of Text Watermarking Using Recursive Decent Semantic Net Parsers.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

A Natural Language Watermarking Based on Chinese Syntax.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

2004
Component-based digital watermarking of Chinese texts.
Proceedings of the 3rd International Conference on Information Security, 2004

2003
Construction of wavelets for width-invariant characterization of curves.
Pattern Recognit. Lett., 2003

2002
Mathematical Representation of a Chinese Character and its Applications.
Int. J. Pattern Recognit. Artif. Intell., 2002

2001
A New Stroke Extraction Method of Chinese Characters.
Int. J. Pattern Recognit. Artif. Intell., 2001


  Loading...