|
Search the dblp DataBase
Xiangyang Luo:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Xiangyang Luo, Chunfang Yang, Fenlin Liu
Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2006, pp:161-172 [Conf]
- Xiangyang Luo, Bin Liu, Fenlin Liu
Improved RS Method for Detection of LSB Steganography. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2005, pp:508-516 [Conf]
- Peizhong Lu, Xiangyang Luo, Qingyang Tang, Li Shen
An Improved Sample Pairs Method for Detection of LSB Embedding. [Citation Graph (0, 0)][DBLP] Information Hiding, 2004, pp:116-127 [Conf]
- Xiangyang Luo, Ping Wang, Peizhong Lu, Fenlin Liu
Fast and Blind Restoration Scheme for the Initial States of LFSRs. [Citation Graph (0, 0)][DBLP] IMSCCS (1), 2006, pp:192-198 [Conf]
- Xiangyang Luo, Bin Liu, Fenlin Liu
Detecting LSB Steganography Based on Dynamic Masks. [Citation Graph (0, 0)][DBLP] ISDA, 2005, pp:251-255 [Conf]
- Fenlin Liu, Bin Lu, Xiangyang Luo
A Chaos-Based Robust Software Watermarking. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:355-366 [Conf]
- Li Shen, Peizhong Lu, Xiangyang Luo, Yan Zou
Equivalence of Punctured Convolutional Codes from Shift Equivalent Puncturing Patterns. [Citation Graph (0, 0)][DBLP] ITCC (1), 2004, pp:786-0 [Conf]
- Bin Liu, Fenlin Liu, Bin Lu, Xiangyang Luo
Real-Time Steganography in Compressed Video. [Citation Graph (0, 0)][DBLP] MRCS, 2006, pp:43-48 [Conf]
- Xiangyang Luo, Junyong Luo, Fenlin Liu
Searching and Detecting Spatial LSB Steganographic Images on the Internet. [Citation Graph (0, 0)][DBLP] Parallel and Distributed Computing and Networks, 2006, pp:273-278 [Conf]
- Ping Wang, Xiangyang Luo, Fenlin Liu
An Improved Secret Key Estimation Method for Sequential Steganography. [Citation Graph (0, 0)][DBLP] IIH-MSP, 2006, pp:396-402 [Conf]
- Xiangyang Luo, Chunfang Yang, Daoshun Wang, Fenlin Liu
LTSB Steganalysis Based on Quartic Equation. [Citation Graph (0, 0)][DBLP] T. Data Hiding and Multimedia Security, 2007, v:2, n:, pp:68-90 [Journal]
Embedding Ratio Estimating for Each Bit Plane of Image. [Citation Graph (, )][DBLP]
Classification between PS and Stego Images Based on Noise Model. [Citation Graph (, )][DBLP]
Secret Key Estimation for Image Sequential Steganograph in Transform Domain. [Citation Graph (, )][DBLP]
A Software Birthmark Based on Dynamic Opcode n-gram. [Citation Graph (, )][DBLP]
Image universal steganalysis based on wavelet packet transform. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|