Xiamu Niu

According to our database1, Xiamu Niu authored at least 202 papers between 2000 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
JPEG image width estimation for file carving.
IET Image Process., 2018

2017
A novel watermarking for DIBR 3D images with geometric rectification based on feature points.
Multim. Tools Appl., 2017

2016
Quality Assessment for Reassembled Image Files.
IEEE Signal Process. Lett., 2016

Quantum realization of the nearest-neighbor interpolation method for FRQI and NEQR.
Quantum Inf. Process., 2016

Study on the security of the authentication scheme with key recycling in QKD.
Quantum Inf. Process., 2016

Feature point-based copy-move forgery detection: covering the non-textured areas.
Multim. Tools Appl., 2016

Threshold progressive visual cryptography construction with unexpanded shares.
Multim. Tools Appl., 2016

Meaningful visual secret sharing based on error diffusion and random grids.
Multim. Tools Appl., 2016

PCET based copy-move forgery detection in images under geometric transforms.
Multim. Tools Appl., 2016

Response to the Letter to the Editor from Y.G. Yang et al. regarding "Dynamic watermarking scheme for quantum images based on Hadamard transform" by Xianhua Song et al., Multimedia Systems, doi: 10.1007/s00530-014-0355-3.
Multim. Syst., 2016

An Adaptive Filter for Aeromagnetic Compensation Based on Wavelet Multiresolution Analysis.
IEEE Geosci. Remote. Sens. Lett., 2016

An Aeromagnetic Compensation Coefficient-Estimating Method Robust to Geomagnetic Gradient.
IEEE Geosci. Remote. Sens. Lett., 2016

A Robust Depth-Image-Based-Rendering 3D Image Hashing Scheme Based on Histogram Shape.
J. Inf. Hiding Multim. Signal Process., 2016

Reassembling fragmented BMP files based on padding bytes.
J. Electronic Imaging, 2016

Exposing frame deletion by detecting abrupt changes in video streams.
Neurocomputing, 2016

A novel hashing scheme for Depth-image-based-rendering 3D images.
Neurocomputing, 2016

Decoding schedule generating method for successive-cancellation decoder of polar codes.
IET Commun., 2016

2015
Threshold visual secret sharing with comprehensive properties based on random grids.
Signal Image Video Process., 2015

New approaches for efficient information hiding-based secret image sharing schemes.
Signal Image Video Process., 2015

A novel template protection scheme for multibiometrics based on fuzzy commitment and chaotic system.
Signal Image Video Process., 2015

Generalized random grids-based threshold visual cryptography with meaningful shares.
Signal Process., 2015

Efficient bit sifting scheme of post-processing in quantum key distribution.
Quantum Inf. Process., 2015

Random grids-based visual secret sharing with improved visual quality via error diffusion.
Multim. Tools Appl., 2015

Visual secret sharing based on random grids with abilities of AND and XOR lossless recovery.
Multim. Tools Appl., 2015

Linear discriminant multi-set canonical correlations analysis (LDMCCA): an efficient approach for feature fusion of finger biometrics.
Multim. Tools Appl., 2015

Random grid-based visual secret sharing with multiple decryptions.
J. Vis. Commun. Image Represent., 2015

基于Libsafe库的缓冲区溢出检测算法改进 (Improved Algorithm for Buffer Overflow Detection Based on Libsafe Library).
计算机科学, 2015

A novel representation for Multi-Channel log-polar quantum images.
J. Inf. Hiding Multim. Signal Process., 2015

Qualified matching feature collection for feature point-based copy-move forgery detection.
J. Electronic Imaging, 2015

Finger multibiometric cryptosystem based on score-level fusion.
Int. J. Comput. Appl. Technol., 2015

Co-saliency Detection Linearly Combining Single-View Saliency and Foreground Correspondence.
IEICE Trans. Inf. Syst., 2015

Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality.
Digit. Signal Process., 2015

Identify the Copy & Paste Frames in Compressed Surveillance Video Based on Stream Parameters.
Proceedings of the Third International Conference on Robot, Vision and Signal Processing, 2015

Detecting Duplicated Frames by Mapping Frames to 3D Skeletons.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

Improving Weights for Graph-Based Image Fragment Reassembly.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

A Novel (2, 2) Visual Secret Sharing without the Pixel Expansion.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

A New Reduced-Latency SC Decoder for Polar Codes.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

Fragmented JPEG File Recovery Using Pseudo Headers.
Proceedings of the Advances in Digital Forensics XI, 2015

A passive technique for detecting copy-move forgery with rotation based on polar complex exponential transform.
Proceedings of the Seventh International Conference on Digital Image Processing, 2015

An Adaptive Improved Winnow Algorithm.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

2014
A Novel Perceptual Secret Sharing Scheme.
Trans. Data Hiding Multim. Secur., 2014

Threshold construction from specific cases in visual cryptography without the pixel expansion.
Signal Process., 2014

Quantum image encryption based on restricted geometric and color transformations.
Quantum Inf. Process., 2014

Comment on: Novel image encryption/decryption based on quantum fourier transform and double phase encoding.
Quantum Inf. Process., 2014

Improved key integrity checking for high-speed quantum key distribution using combinatorial group testing with strongly selective family design.
Quantum Inf. Process., 2014

Study on error reconciliation in quantum key distribution.
Quantum Inf. Comput., 2014

An improved contraction-based method for mesh skeleton extraction.
Multim. Tools Appl., 2014

Toward accurate localization and high recognition performance for noisy iris images.
Multim. Tools Appl., 2014

An enhanced thermal face recognition method based on multiscale complex fusion for Gabor coefficients.
Multim. Tools Appl., 2014

A new image encryption scheme based on cyclic elliptic curve and chaotic system.
Multim. Tools Appl., 2014

Dynamic watermarking scheme for quantum images based on Hadamard transform.
Multim. Syst., 2014

Multi-Channel Quantum Image Representation Based on Phase Transform and Elementary Transformations.
J. Inf. Hiding Multim. Signal Process., 2014

A Novel QKD Network Routing Algorithm Based on Optical-Path-Switching.
J. Inf. Hiding Multim. Signal Process., 2014

Finger multibiometric cryptosystems: fusion strategy and template security.
J. Electronic Imaging, 2014

Background contrast based salient region detection.
Neurocomputing, 2014

Saliency detection based on integrated features.
Neurocomputing, 2014

A New Method for Estimating the Widths of JPEG Images.
CoRR, 2014

Study on Successive Cancellation Decoding of Polar Codes.
CoRR, 2014

Equivalence Proof of Two (2, n) Progressive Visual Secret Sharing.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Flexible Quantum Image Secret Sharing Based on Measurement and Strip.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

A Novel Finger Vein Image Quality Evaluation Method Based on Triangular Norm.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

A Method to Generate Random Number for Cryptographic Application.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

A Novel Real-Time Aeromagnetic Compensation Method Based on RLSQ.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Perceptual Image Hashing for DIBR 3D Images Based on Ring Partition and SIFT Feature Points.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Essential Visual Cryptographic Scheme with Different Importance of Shares.
Proceedings of the Neural Information Processing - 21st International Conference, 2014

Threshold Visual Secret Sharing Based on Boolean Operations and Random Grids.
Proceedings of the Neural Information Processing - 21st International Conference, 2014

An adaptive transfer scheme based on sparse representation for figure-ground segmentation.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

Copy-Rotation-Move Forgery Detection Using the MROGH Descriptor.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

Equivalence Proof of Traditional and Random Grid-Based (2, 2) Visual Secret Sharing.
Proceedings of the Intelligent Data analysis and its Applications, Volume II, 2014

A Novel Encryption Algorithm for Quantum Images Based on Quantum Wavelet Transform and Diffusion.
Proceedings of the Intelligent Data analysis and its Applications, Volume II, 2014

2013
A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces.
Signal Process., 2013

A dynamic watermarking scheme for quantum images using quantum wavelet transform.
Quantum Inf. Process., 2013

Hiding traces of double compression in JPEG images based on Tabu Search.
Neural Comput. Appl., 2013

Improve the security of image robust hash using fuzzy commitment scheme.
Neural Comput. Appl., 2013

Corrigendum to "T. Chen, K. Tsao, Threshold visual secret sharing by random grids" [J. Syst. Softw. 84(2011) 1197-1208].
J. Syst. Softw., 2013

A New Assessment Measure of Shadow Image Quality Based on Error Diffusion Techniques.
J. Inf. Hiding Multim. Signal Process., 2013

Two-directional two-dimensional modified Fisher principal component analysis: an efficient approach for thermal face verification.
J. Electronic Imaging, 2013

Detection of Image Region Duplication Using Spin Image.
IEICE Trans. Inf. Syst., 2013

Finger Vein Recognition with Gabor Wavelets and Local Binary Patterns.
IEICE Trans. Inf. Syst., 2013

Saliency Density and Edge Response Based Salient Object Detection.
IEICE Trans. Inf. Syst., 2013

CBRISK: Colored Binary Robust Invariant Scalable Keypoints.
IEICE Trans. Inf. Syst., 2013

Region Diversity Based Saliency Density Maximization for Salient Object Detection.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

A Fully Automatic Player Detection Method Based on One-Class SVM.
IEICE Trans. Inf. Syst., 2013

Local Invariant Shape Feature for Cartoon Image Retrieval.
Proceedings of the Second International Conference on Robot, Vision and Signal Processing, 2013

A Novel Hybrid Multibiometrics Based on the Fusion of Dual Iris, Visible and Thermal Face Images.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

An effective preprocessing method for finger vein recognition.
Proceedings of the Fifth International Conference on Digital Image Processing, 2013

A new encryption scheme for color images based on quantum chaotic system in transform domain.
Proceedings of the Fifth International Conference on Digital Image Processing, 2013

Feature-Level Fusion of Finger Biometrics Based on Multi-set Canonical Correlation Analysis.
Proceedings of the Biometric Recognition - 8th Chinese Conference, 2013

2012
Robust Image Hashing Based on Random Gabor Filtering and Dithered Lattice Vector Quantization.
IEEE Trans. Image Process., 2012

Corrigendum to "Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images" [Signal Process. 92(2012) 1069-1078]
Signal Process., 2012

Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images.
Signal Process., 2012

A Countermeasure against Double Compression Based Image Forensic.
IEICE Trans. Inf. Syst., 2012

A Novel Expression Deformation Model for 3D Face Recognition.
IEICE Trans. Inf. Syst., 2012

Skeleton Modulated Topological Perception Map for Rapid Viewpoint Selection.
IEICE Trans. Inf. Syst., 2012

A Multi-Scale Structural Degradation Metric for Perceptual Evaluation of 3D Mesh Simplification.
IEICE Trans. Inf. Syst., 2012

3D Mesh Segmentation Based on Markov Random Fields and Graph Cuts.
IEICE Trans. Inf. Syst., 2012

Saliency-Based Region Log Covariance Feature for Image Copy Detection.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

An Integer DCT and Affine Transformation Based Image Steganography Method.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

Finger-vein Verification Using Gabor Filter and SIFT Feature Matching.
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012

A Fourier series based expression deformation model for 3D face recognition.
Proceedings of the Eighth International Conference on Natural Computation, 2012

A new image segmentation method via fusing NCut eigenvectors maps.
Proceedings of the Fourth International Conference on Digital Image Processing, 2012

A novel evaluation method for perceptual hash algorithm in authentication mode.
Proceedings of the Fourth International Conference on Digital Image Processing, 2012

Saliency based SIFT keypoints filtration.
Proceedings of the Fourth International Conference on Digital Image Processing, 2012

A new image encryption based on chaotic systems and singular value decomposition.
Proceedings of the Fourth International Conference on Digital Image Processing, 2012

Player detection using one-class SVM.
Proceedings of the Fourth International Conference on Digital Image Processing, 2012

A Novel Coding Method for Multiple System Barcode Based on QR Code.
Proceedings of the Intelligent Information and Database Systems - 4th Asian Conference, 2012

Motion Vector Based Information Hiding Algorithm for H.264/AVC against Motion Vector Steganalysis.
Proceedings of the Intelligent Information and Database Systems - 4th Asian Conference, 2012

A Novel Nonparametric Approach for Saliency Detection Using Multiple Features.
Proceedings of the Intelligent Information and Database Systems - 4th Asian Conference, 2012

2011
A Novel Bayes' Theorem-Based Saliency Detection Model.
IEICE Trans. Inf. Syst., 2011

Saliency-based structural degradation evaluation of 3D mesh simplification.
IEICE Electron. Express, 2011

A Dual Cube Hashing Scheme for Solving LPP Integrity Problem.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011

An Improved Algorithm for Multiple Closed Contour Detection.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

A Novel Multi-division Template Protection (MDTP) Scheme for Iris Recognition Based on Fuzzy Vault.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

A Saliency Detection Approach to Combine LSK and Color for Color Image.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

Image Encryption Scheme of Pixel Bit Based on Combination of Chaotic Systems.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

Playfield Detection Using Color Ratio and Local Entropy.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

A Saliency Detection Model Based on Local and Global Kernel Density Estimation.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

A PSO Based Image Disguise Method.
Proceedings of the Second International Conference on Innovations in Bio-inspired Computing and Applications, 2011

Chaotic Image Encryption Using Bézier Curve in DCT Domain Scrambling.
Proceedings of the Digital Enterprise and Information Systems - International Conference, 2011

2010
A Secure Steganography Method based on Genetic Algorithm.
J. Inf. Hiding Multim. Signal Process., 2010

Image hashing framework for tampering localization in distorted images.
IEICE Electron. Express, 2010

Joint reversible data hiding and image encryption.
Proceedings of the Media Forensics and Security II, 2010

An Error Driven 3D Face Modeling Scheme Based on Partial Differential Equations.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

A Novel and Secure Image Interpolation Methods for Image Disguise.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

A Perceptual Metric Based on Salient Information Entropy for 3D Mesh Distortion.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Enhanced Adaptive FEC Based Multiple Description Coding for Internet Video Streaming over Wireless Network.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

2009
Robust Speech Hashing for Content Authentication.
IEEE Signal Process. Lett., 2009

A fast SVD based video watermarking algorithm compatible with MPEG2 Standard.
Soft Comput., 2009

A novel image hash algorithm resistant to print-scan.
Signal Process., 2009

Complex kernel PCA for multimodal biometric recognition.
IEICE Electron. Express, 2009

On the Security Properties and Attacks against Mobile Agent Graph Head Sealing (MAGHS).
Proceedings of the Advances in Information Security and Assurance, 2009

Feature-Level Fusion of Iris and Face for Personal Identification.
Proceedings of the Advances in Neural Networks, 2009

A Robust Contourlet Based Image Hash Algorithm.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Template Protection for Multimodal Biometric System.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

A Schema for Multi-Signature Handling Based on Workflow Model.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Perceptual Content Authentication and Tamper Detection of Facial Image.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Transparent and perceptually enhanced JPEG image encryption.
Proceedings of the 16th International Conference on Digital Signal Processing, 2009

Mobile agent watermarking (MAW): security properties and attacks revisited.
Proceedings of the FIT '09, 2009

A Novel Image Perceptual Hashing Algorithm via Feature Points and Fuzzy Distance Matching.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

A Normal-Traffic Network Covert Channel.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Multimodal Biometric Recognition Based on Complex KFDA.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
An Improved Biometric Template Protection Method based on Non-Uniform Quantization.
J. Digit. Inf. Manag., 2008

On the security properties and attacks against Mobile agent watermark encapsulation(MAWE).
Proceedings of the IEEE International Conference on Systems, 2008

A Multi-Channel Combination Method of Image Perceptual Hashing.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

A Cyclic Coding Based Perceptual Hashing Algorithm.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

A Novel Template Protection Algorithm for Iris Recognition.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Reversible Watermarking for Compressed Speech.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Key-Dependent Compressed Domain Audio Hashing.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Digital Watermark for 3D Face Model Authentication and EER Performance Analysis.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

A Face Image Database for Evaluating Out-of-Focus Blur.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Traffic Identification of Tor and Web-Mix.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

An Evaluation Framework for Kernel-Mode Security Modules.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Research on the Capacity of Error-Correcting Codes-Based Information Hiding.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A Template Protection Scheme For Statistic Feature-based 2D Face Recognition.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

JPEG Encryption with File Size Preservation.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A 3D Model Authentication Algorithm Based on Reversible Watermarking.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Compressed Domain Perceptual Hashing for MELP Coded Speech.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A New Face Recognition Scheme with Renewable Templates.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A Novel Facial Image Retrieval Algorithm Based on PLT-PCA.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Compressed domain robust hashing for AAC audio.
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008

2007
GIS Watermarking: Hiding Data in 2D Vector Maps.
Proceedings of the Intelligent Multimedia Data Hiding: New Directions, 2007

Reversible Data-Hiding Scheme for 2-D Vector Maps Based on Difference Expansion.
IEEE Trans. Inf. Forensics Secur., 2007

MDCT-Based Perceptual Hashing for Compressed Audio Content Identification.
Proceedings of the IEEE 9th Workshop on Multimedia Signal Processing, 2007

The Key Management of the Encrypted Database Based on XML.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

A Method of Bucket Index over Encrypted Character Data in Database.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Anonymity in PKI Environment.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Design and Implementation of a PKI-Based Electronic Documents Protection Management System.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Video Authentication and Tamper Detection Based on Cloud Model.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Framework for Windows Password Function Security Enhancement.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Improved Adaptive Lifting Scheme for Wavelet-Based Image Compression.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Protecting Mobile Agent's Computation Results with Reversible Watermarking and Digital Signature.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Content Integrity Verification for G.729 Coded Speech.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Eyes Tracking in a Video Sequence Based-On Haar-like Features and Skin Color.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

The Design and Application of PHABS: A Novel Benchmark Platform for Perceptual Hashing Algorithms.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

An Improved Algorithm for Iris Location.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2006
A Shape-Preserving Method for Watermarking 2D Vector Maps Based on Statistic Detection.
IEICE Trans. Inf. Syst., 2006

Research on Applying Java Card to Database Encryption Systems.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Block Mean Value Based Image Perceptual Hashing.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

A Practical Multipurpose Watermarking Scheme for Visual Content Copyright Protection and Authentication.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Image Watermarking Based on Singular Value Decomposition.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Focus on the Generalized Information Hiding Technology.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Analysis and Problems on Fuzzy Vault Scheme.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

SVD Based Robust Image Content Retrieval.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

A Non-uniform Quantizing Approach to Protect Biometric Templates.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Relational Databases Watermark Technique Based on Content Characteristic.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

Fingerprint Identification Based on Frequency Texture Analysis.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

SVD Based Blind Video Watermarking Algorithm.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

A New Design Scheme of Role-Based Access Control Based on PKI.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

Research on a Novel Hashing Stream Cipher.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

A Novel Method of Watermarking Relational Databases using Character String.
Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, 2006

2005
Print-and-scan model and the watermarking countermeasure.
Image Vis. Comput., 2005

Integer-DCT-based reversible image watermarking by adaptive coefficient modification.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Shape-Preserving Algorithm for Watermarking 2-D Vector Map Data.
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005

Approaching optimal value expansion for reversible watermarking.
Proceedings of the 7th workshop on Multimedia & Security, 2005

The Research on Information Hiding Based on Command Sequence of FTP Protocol.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

SVG-Based Countermeasure to Geometric Attack.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

A Verifiable Fingerprint Vault Scheme.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

A Secure Steganographic Scheme in Binary Image.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

2004
Reversible image watermarking by histogram modification for integer DCT coefficients.
Proceedings of the IEEE 6th Workshop on Multimedia Signal Processing, 2004

2002
Video watermarking resistance to rotation, scaling, and translation.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

2000
Multiresolution watermarking for video based on gray-level digital watermark.
IEEE Trans. Consumer Electron., 2000

Digital watermarking of still images with gray-level digital watermarks.
IEEE Trans. Consumer Electron., 2000


  Loading...