Lee-Ming Cheng
Orcid: 0000-0001-5501-8441Affiliations:
- City University of Hong Kong, China
According to our database1,
Lee-Ming Cheng
authored at least 66 papers
between 1986 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
On csauthors.net:
Bibliography
2020
Lightweight and Privacy-Preserving Template Generation for Palm-Vein-Based Human Recognition.
IEEE Trans. Inf. Forensics Secur., 2020
Proceedings of the IEEE International Conference on Image Processing, 2020
2019
Dynamic Scalable Elliptic Curve Cryptographic Scheme and Its Application to In-Vehicle Security.
IEEE Internet Things J., 2019
Modular exponential multivariate sequence and its application to lightweight security design.
Future Gener. Comput. Syst., 2019
Paper Document Authentication Using Print-Scan Resistant Image Hashing and Public-Key Cryptography.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019
2018
IEEE Trans. Neural Networks Learn. Syst., 2018
Watermark Extraction under Print-Cam Process Using Wave Atoms Based Blind Digital Watermarking.
Proceedings of the 2nd International Conference on Vision, Image and Signal Processing, 2018
2016
J. Inf. Secur. Appl., 2016
A novel client service quality measuring model and an eHealthcare mitigating approach.
Int. J. Medical Informatics, 2016
2015
Wave Atom-Based Perceptual Image Hashing Against Content-Preserving and Content-Altering Attacks.
Trans. Data Hiding Multim. Secur., 2015
J. Real Time Image Process., 2015
2014
Enhanced perceptual image authentication with tamper localization and self-restoration.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2014
2013
Adaptive reversible data hiding based on block median preservation and modification of prediction errors.
J. Syst. Softw., 2013
2012
Robust digital image watermarking scheme using wave atoms with multiple description coding.
EURASIP J. Adv. Signal Process., 2012
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012
2011
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
2010
Robust Watermarking Schemes Using Selective Curvelet Coefficients Based on a HVS Model.
Int. J. Wavelets Multiresolution Inf. Process., 2010
Proceedings of the Digital Watermarking - 9th International Workshop, 2010
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010
2009
A probabilistic relaxation labeling framework for reducing the noise effect in geometric biclustering of gene expression data.
Pattern Recognit., 2009
Int. J. Wavelets Multiresolution Inf. Process., 2009
Proceedings of the Digital Watermarking, 8th International Workshop, 2009
2008
IEEE Trans. Inf. Forensics Secur., 2008
Multivariate hierarchical Bayesian model for differential gene expression analysis in microarray experiments.
BMC Bioinform., 2008
Proceedings of the IEEE International Conference on Systems, 2008
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
2007
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
2006
Neural Process. Lett., 2006
Appl. Math. Comput., 2006
Data Hiding in Images by Adaptive LSB Substitution Based on the Pixel-Value Differencing.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006
Performance Evaluation of a Steganographic Method for Digital Images Using Side Match.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006
2004
Proceedings of the 8th International Conference on Control, 2004
Proceedings of the 8th International Conference on Control, 2004
2003
On commutativity of duality operator and propagation operator of linear codes generated from algebraic curves.
IEEE Trans. Inf. Theory, 2003
IEEE Trans. Consumer Electron., 2003
2002
Signal Process., 2002
Comput. Secur., 2002
2001
The convergence properties of a clipped Hopfield network and its application in the design of keystream generator.
IEEE Trans. Neural Networks, 2001
Int. J. Comput. Math., 2001
Encryption System Based on Neutral Network.
Proceedings of the Communications and Multimedia Security Issues of the New Century, 2001
2000
IEEE Trans. Consumer Electron., 2000
IEEE Trans. Consumer Electron., 2000
1999
IEEE Trans. Consumer Electron., 1999
Lossless image compression by using gradient adjusted prediction and Burrows-Wheeler transformation.
IEEE Trans. Consumer Electron., 1999
IEEE Trans. Consumer Electron., 1999
A New Symmetric Probabilistic Encryption Scheme Based on Chaotic Attractors of Neural Networks.
Appl. Intell., 1999
Proceedings of the Security and Watermarking of Multimedia Contents, 1999
Proceedings of the Cryptographic Hardware and Embedded Systems, 1999
1998
Proceedings of the 5th IEEE International Conference on Electronics, Circuits and Systems, 1998
1997
Proceedings of the 4th International Conference Document Analysis and Recognition (ICDAR '97), 1997
Proceedings of the 4th International Conference Document Analysis and Recognition (ICDAR '97), 1997
1986
Comput. Vis. Graph. Image Process., 1986