The SCEAS System
Navigation Menu

Search the dblp DataBase


Xiamu Niu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yong Zhang, Xiamu Niu, Abid Khan, Qiong Li, Qi Han
    A Novel Method of Watermarking Relational Databases using Character String. [Citation Graph (0, 0)][DBLP]
    Artificial Intelligence and Applications, 2006, pp:120-124 [Conf]
  2. Yunbiao Guo, Daimao Lin, Xiamu Niu, Lan Hu, Linna Zhou
    A Secure Steganographic Scheme in Binary Image. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1093-1100 [Conf]
  3. Qiong Li, Xiamu Niu, Zhifang Wang, Yuhua Jiao, Sheng-He Sun
    A Verifiable Fingerprint Vault Scheme. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1072-1078 [Conf]
  4. Longjiang Yu, Xiamu Niu, Sheng-He Sun
    SVG-Based Countermeasure to Geometric Attack. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1129-1133 [Conf]
  5. Xin-guang Zou, Qiong Li, Sheng-He Sun, Xiamu Niu
    The Research on Information Hiding Based on Command Sequence of FTP Protocol. [Citation Graph (0, 0)][DBLP]
    KES (3), 2005, pp:1079-1085 [Conf]
  6. Bian Yang, Martin Schmucker, Xiamu Niu, Christoph Busch, Sheng-He Sun
    Integer-DCT-based reversible image watermarking by adaptive coefficient modification. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2005, pp:218-229 [Conf]
  7. Wenhai Kong, Bian Yang, Di Wu, Xiamu Niu
    SVD Based Blind Video Watermarking Algorithm. [Citation Graph (0, 0)][DBLP]
    ICICIC (1), 2006, pp:265-268 [Conf]
  8. Juncao Li, Yong Zhang, Wenhai Kong, Xiamu Niu
    Fingerprint Identification Based on Frequency Texture Analysis. [Citation Graph (0, 0)][DBLP]
    ICICIC (2), 2006, pp:121-125 [Conf]
  9. Yuping Deng, Xiaowei Guo, Xiamu Niu
    A New Design Scheme of Role-Based Access Control Based on PKI. [Citation Graph (0, 0)][DBLP]
    ICICIC (3), 2006, pp:669-672 [Conf]
  10. Yong Zhang, Xiamu Niu, Dongning Zhao, Juncao Li, Siming Liu
    Relational Databases Watermark Technique Based on Content Characteristic. [Citation Graph (0, 0)][DBLP]
    ICICIC (3), 2006, pp:677-680 [Conf]
  11. Qi Han, Zhifang Wang, Xiamu Niu
    A Non-uniform Quantizing Approach to Protect Biometric Templates. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:693-698 [Conf]
  12. Han Yu, Xiamu Niu, Duohe Ma, Changxiang Shen
    Research on Applying Java Card to Database Encryption Systems. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:575-578 [Conf]
  13. Yuhua Jiao, Bian Yang, He Wang, Xiamu Niu
    SVD Based Robust Image Content Retrieval. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:351-354 [Conf]
  14. Daimao Lin, Linna Zhou, Yunbiao Guo, Lan Hu, Xiamu Niu
    Focus on the Generalized Information Hiding Technology. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:605-608 [Conf]
  15. Zhifang Wang, Bian Yang, Xiamu Niu, Yijia Zhang
    A Practical Multipurpose Watermarking Scheme for Visual Content Copyright Protection and Authentication. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:461-464 [Conf]
  16. Qiong Li, Zhaoqing Liu, Xiamu Niu
    Analysis and Problems on Fuzzy Vault Scheme. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:244-250 [Conf]
  17. Jie Liu, Xiamu Niu, Wenhai Kong
    Image Watermarking Based on Singular Value Decomposition. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:457-460 [Conf]
  18. Bian Yang, Fan Gu, Xiamu Niu
    Block Mean Value Based Image Perceptual Hashing. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:167-172 [Conf]
  19. Longjiang Yu, Xiamu Niu, Sheng-He Sun
    Print-and-scan model and the watermarking countermeasure. [Citation Graph (0, 0)][DBLP]
    Image Vision Comput., 2005, v:23, n:9, pp:807-814 [Journal]
  20. Yong Zhang, Xiamu Niu, Juncao Li, Chun-ming Li
    Research on a Novel Hashing Stream Cipher. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:481-490 [Conf]
  21. Bian Yang, Martin Schmucker, Christoph Busch, Xiamu Niu, Sheng-He Sun
    Approaching optimal value expansion for reversible watermarking. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2005, pp:95-102 [Conf]

  22. An Improved Algorithm for Iris Location. [Citation Graph (, )][DBLP]

  23. A Normal-Traffic Network Covert Channel. [Citation Graph (, )][DBLP]

  24. The Design and Application of PHABS: A Novel Benchmark Platform for Perceptual Hashing Algorithms. [Citation Graph (, )][DBLP]

  25. Compressed domain robust hashing for AAC audio. [Citation Graph (, )][DBLP]

  26. Traffic Identification of Tor and Web-Mix. [Citation Graph (, )][DBLP]

  27. A Cyclic Coding Based Perceptual Hashing Algorithm. [Citation Graph (, )][DBLP]

  28. A Face Image Database for Evaluating Out-of-Focus Blur. [Citation Graph (, )][DBLP]

  29. A Novel Template Protection Algorithm for Iris Recognition. [Citation Graph (, )][DBLP]

  30. Digital Watermark for 3D Face Model Authentication and EER Performance Analysis. [Citation Graph (, )][DBLP]

  31. Key-Dependent Compressed Domain Audio Hashing. [Citation Graph (, )][DBLP]

  32. Reversible Watermarking for Compressed Speech. [Citation Graph (, )][DBLP]

  33. Feature-Level Fusion of Iris and Face for Personal Identification. [Citation Graph (, )][DBLP]

  34. Multimodal Biometric Recognition Based on Complex KFDA. [Citation Graph (, )][DBLP]

  35. On the Security Properties and Attacks against Mobile Agent Graph Head Sealing (MAGHS). [Citation Graph (, )][DBLP]

  36. A Novel Image Perceptual Hashing Algorithm via Feature Points and Fuzzy Distance Matching. [Citation Graph (, )][DBLP]

  37. Joint reversible data hiding and image encryption. [Citation Graph (, )][DBLP]

  38. A Multi-Channel Combination Method of Image Perceptual Hashing. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002