|
Search the dblp DataBase
Shiguo Lian:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Shiguo Lian, Jinsheng Sun, Zhiquan Wang
Perceptual Cryptography on JPEG2000 Compressed Images or Videos. [Citation Graph (0, 0)][DBLP] CIT, 2004, pp:78-83 [Conf]
- Shiguo Lian, Jinsheng Sun, Zhiquan Wang
Perceptual cryptography on SPIHT compressed images or videos. [Citation Graph (0, 0)][DBLP] ICME, 2004, pp:2195-2198 [Conf]
- Shiguo Lian, Jinsheng Sun, Zhongxin Li, Zhiquan Wang
A Fast MPEG4 Video Encryption Scheme Based on Chaotic Neural Network. [Citation Graph (0, 0)][DBLP] ICONIP, 2004, pp:720-725 [Conf]
- Jinwei Wang, Shiguo Lian, Zhen Ren, Yuewei Dai, Zhiquan Wang
Semi-Fragile Watermarking Authentication with Local and Global Watermarks. [Citation Graph (0, 0)][DBLP] AIAI, 2006, pp:681-688 [Conf]
- Shiguo Lian, Guanrong Chen, Albert Cheung, Zhiquan Wang
A Chaotic-Neural-Network-Based Encryption Algorithm for JPEG2000 Encoded Images. [Citation Graph (0, 0)][DBLP] ISNN (2), 2004, pp:627-632 [Conf]
- Guangjie Liu, Jinwei Wang, Shiguo Lian, Yuewei Dai, Zhiquan Wang
Data Hiding in Neural Network Prediction Errors. [Citation Graph (0, 0)][DBLP] ISNN (2), 2006, pp:273-278 [Conf]
- Shiguo Lian, Jinsheng Sun, Zhiquan Wang
A Novel Image Encryption Scheme Based-on JPEG Encoding. [Citation Graph (0, 0)][DBLP] IV, 2004, pp:217-220 [Conf]
- Zhongxuan Liu, Shiguo Lian, Ronggang Wang, Zhen Ren
Desynchronization in Compression Process for Collusion Resilient Video Fingerprint. [Citation Graph (0, 0)][DBLP] IWDW, 2006, pp:308-322 [Conf]
- Shiguo Lian, Zhongxuan Liu, Zhen Ren, Zhiquan Wang
Selective Video Encryption Based on Advanced Video Coding. [Citation Graph (0, 0)][DBLP] PCM (2), 2005, pp:281-290 [Conf]
- Shiguo Lian, Jinsheng Sun, Dengfeng Zhang, Zhiquan Wang
A Selective Image Encryption Scheme Based on JPEG2000 Codec. [Citation Graph (0, 0)][DBLP] PCM (2), 2004, pp:65-72 [Conf]
- Zhongxuan Liu, Shiguo Lian, Zhen Ren
Image Desynchronization for Secure Collusion-Resilient Fingerprint in Compression Domain. [Citation Graph (0, 0)][DBLP] PCM, 2006, pp:56-63 [Conf]
- Jinwei Wang, Guangjie Liu, Yuewei Dai, Zhiquan Wang, Shiguo Lian
Robustness Analysis of Watermarking Schemes Based on Two Novel Transforms. [Citation Graph (0, 0)][DBLP] ICICIC (3), 2006, pp:471-474 [Conf]
- Zhongxuan Liu, Shiguo Lian, Zhen Ren
Quaternion Diffusion for Color Image Filtering. [Citation Graph (0, 0)][DBLP] J. Comput. Sci. Technol., 2006, v:21, n:1, pp:126-136 [Journal]
- Shiguo Lian, Zhongxuan Liu, Zhen Ren, Haila Wang
Secure Distribution Scheme for Compressed Data Streams. [Citation Graph (0, 0)][DBLP] ICIP, 2006, pp:1953-1956 [Conf]
- Shiguo Lian, Zhongxuan Liu, Zhen Ren, Haila Wang
Hash function based on chaotic neural networks. [Citation Graph (0, 0)][DBLP] ISCAS, 2006, pp:- [Conf]
- Shiguo Lian, Zhongxuan Liu, Zhen Ren, Haila Wang
Secure Media Distribution Scheme Based on Chaotic Neural Network. [Citation Graph (0, 0)][DBLP] ISNN (2), 2007, pp:79-87 [Conf]
- Shiguo Lian, Zhongxuan Liu, Zhen Ren, Haila Wang
On the Performance of Joint Fingerprint Embedding and Decryption Scheme [Citation Graph (0, 0)][DBLP] CoRR, 2007, v:0, n:, pp:- [Journal]
- Shiguo Lian, Jinsheng Sun, Zhiquan Wang
Security Analysis of A Chaos-based Image Encryption Algorithm [Citation Graph (0, 0)][DBLP] CoRR, 2006, v:0, n:, pp:- [Journal]
- Shiguo Lian, Jinsheng Sun, Zhiquan Wang
One-way Hash Function Based on Neural Network [Citation Graph (0, 0)][DBLP] CoRR, 2007, v:0, n:, pp:- [Journal]
- Shiguo Lian
Image Authentication Based on Neural Networks [Citation Graph (0, 0)][DBLP] CoRR, 2007, v:0, n:, pp:- [Journal]
- Shiguo Lian, Jinsheng Sun, Zhiquan Wang
Secure hash function based on neural network. [Citation Graph (0, 0)][DBLP] Neurocomputing, 2006, v:69, n:16-18, pp:2346-2350 [Journal]
- Shiguo Lian, Zhongxuan Liu, Zhen Ren, Haila Wang
Commutative Encryption and Watermarking in Video Compression. [Citation Graph (0, 0)][DBLP] IEEE Trans. Circuits Syst. Video Techn., 2007, v:17, n:6, pp:774-778 [Journal]
- Jinwei Wang, Guangjie Liu, Yuewei Dai, Jinsheng Sun, Zhiquan Wang, Shiguo Lian
Locally optimum detection for Barni's multiplicative watermarking in DWT domain. [Citation Graph (0, 0)][DBLP] Signal Processing, 2008, v:88, n:1, pp:117-130 [Journal]
A Secure Solution for Ubiquitous Multimedia Broadcasting. [Citation Graph (, )][DBLP]
Desynchronized image fingerprint for large scale distribution. [Citation Graph (, )][DBLP]
Joint Fingerprint Embedding and Decryption for Video Distribution. [Citation Graph (, )][DBLP]
Image Steganography Based on Quantization-Embedders Combination. [Citation Graph (, )][DBLP]
On the joint audio fingerprinting and decryption scheme. [Citation Graph (, )][DBLP]
Secure Video Multicast Based on Desynchronized Fingerprint and Partial Encryption. [Citation Graph (, )][DBLP]
Efficient Temporal Segmentation for Sports Programs with Special Cases. [Citation Graph (, )][DBLP]
A fast video encryption scheme based-on chaos. [Citation Graph (, )][DBLP]
Special issue on multimedia networking and security in convergent networks. [Citation Graph (, )][DBLP]
A hybrid game model based on reputation for spectrum allocation in wireless networks. [Citation Graph (, )][DBLP]
Secure and traceable multimedia distribution for convergent Mobile TV services. [Citation Graph (, )][DBLP]
Secure Fractal Image Coding [Citation Graph (, )][DBLP]
On the Robustness of the Delay-Based Fingerprint Embedding Scheme [Citation Graph (, )][DBLP]
Search in 0.399secs, Finished in 0.400secs
|