The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Xiangyang Luo: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xiangyang Luo, Chunfang Yang, Fenlin Liu
    Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:161-172 [Conf]
  2. Xiangyang Luo, Bin Liu, Fenlin Liu
    Improved RS Method for Detection of LSB Steganography. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:508-516 [Conf]
  3. Peizhong Lu, Xiangyang Luo, Qingyang Tang, Li Shen
    An Improved Sample Pairs Method for Detection of LSB Embedding. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:116-127 [Conf]
  4. Xiangyang Luo, Ping Wang, Peizhong Lu, Fenlin Liu
    Fast and Blind Restoration Scheme for the Initial States of LFSRs. [Citation Graph (0, 0)][DBLP]
    IMSCCS (1), 2006, pp:192-198 [Conf]
  5. Xiangyang Luo, Bin Liu, Fenlin Liu
    Detecting LSB Steganography Based on Dynamic Masks. [Citation Graph (0, 0)][DBLP]
    ISDA, 2005, pp:251-255 [Conf]
  6. Fenlin Liu, Bin Lu, Xiangyang Luo
    A Chaos-Based Robust Software Watermarking. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:355-366 [Conf]
  7. Li Shen, Peizhong Lu, Xiangyang Luo, Yan Zou
    Equivalence of Punctured Convolutional Codes from Shift Equivalent Puncturing Patterns. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:786-0 [Conf]
  8. Bin Liu, Fenlin Liu, Bin Lu, Xiangyang Luo
    Real-Time Steganography in Compressed Video. [Citation Graph (0, 0)][DBLP]
    MRCS, 2006, pp:43-48 [Conf]
  9. Xiangyang Luo, Junyong Luo, Fenlin Liu
    Searching and Detecting Spatial LSB Steganographic Images on the Internet. [Citation Graph (0, 0)][DBLP]
    Parallel and Distributed Computing and Networks, 2006, pp:273-278 [Conf]
  10. Ping Wang, Xiangyang Luo, Fenlin Liu
    An Improved Secret Key Estimation Method for Sequential Steganography. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:396-402 [Conf]
  11. Xiangyang Luo, Chunfang Yang, Daoshun Wang, Fenlin Liu
    LTSB Steganalysis Based on Quartic Equation. [Citation Graph (0, 0)][DBLP]
    T. Data Hiding and Multimedia Security, 2007, v:2, n:, pp:68-90 [Journal]

  12. Embedding Ratio Estimating for Each Bit Plane of Image. [Citation Graph (, )][DBLP]


  13. Classification between PS and Stego Images Based on Noise Model. [Citation Graph (, )][DBLP]


  14. Secret Key Estimation for Image Sequential Steganograph in Transform Domain. [Citation Graph (, )][DBLP]


  15. A Software Birthmark Based on Dynamic Opcode n-gram. [Citation Graph (, )][DBLP]


  16. Image universal steganalysis based on wavelet packet transform. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002