The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Shiguo Lian: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Shiguo Lian, Jinsheng Sun, Zhiquan Wang
    Perceptual Cryptography on JPEG2000 Compressed Images or Videos. [Citation Graph (0, 0)][DBLP]
    CIT, 2004, pp:78-83 [Conf]
  2. Shiguo Lian, Jinsheng Sun, Zhiquan Wang
    Perceptual cryptography on SPIHT compressed images or videos. [Citation Graph (0, 0)][DBLP]
    ICME, 2004, pp:2195-2198 [Conf]
  3. Shiguo Lian, Jinsheng Sun, Zhongxin Li, Zhiquan Wang
    A Fast MPEG4 Video Encryption Scheme Based on Chaotic Neural Network. [Citation Graph (0, 0)][DBLP]
    ICONIP, 2004, pp:720-725 [Conf]
  4. Jinwei Wang, Shiguo Lian, Zhen Ren, Yuewei Dai, Zhiquan Wang
    Semi-Fragile Watermarking Authentication with Local and Global Watermarks. [Citation Graph (0, 0)][DBLP]
    AIAI, 2006, pp:681-688 [Conf]
  5. Shiguo Lian, Guanrong Chen, Albert Cheung, Zhiquan Wang
    A Chaotic-Neural-Network-Based Encryption Algorithm for JPEG2000 Encoded Images. [Citation Graph (0, 0)][DBLP]
    ISNN (2), 2004, pp:627-632 [Conf]
  6. Guangjie Liu, Jinwei Wang, Shiguo Lian, Yuewei Dai, Zhiquan Wang
    Data Hiding in Neural Network Prediction Errors. [Citation Graph (0, 0)][DBLP]
    ISNN (2), 2006, pp:273-278 [Conf]
  7. Shiguo Lian, Jinsheng Sun, Zhiquan Wang
    A Novel Image Encryption Scheme Based-on JPEG Encoding. [Citation Graph (0, 0)][DBLP]
    IV, 2004, pp:217-220 [Conf]
  8. Zhongxuan Liu, Shiguo Lian, Ronggang Wang, Zhen Ren
    Desynchronization in Compression Process for Collusion Resilient Video Fingerprint. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:308-322 [Conf]
  9. Shiguo Lian, Zhongxuan Liu, Zhen Ren, Zhiquan Wang
    Selective Video Encryption Based on Advanced Video Coding. [Citation Graph (0, 0)][DBLP]
    PCM (2), 2005, pp:281-290 [Conf]
  10. Shiguo Lian, Jinsheng Sun, Dengfeng Zhang, Zhiquan Wang
    A Selective Image Encryption Scheme Based on JPEG2000 Codec. [Citation Graph (0, 0)][DBLP]
    PCM (2), 2004, pp:65-72 [Conf]
  11. Zhongxuan Liu, Shiguo Lian, Zhen Ren
    Image Desynchronization for Secure Collusion-Resilient Fingerprint in Compression Domain. [Citation Graph (0, 0)][DBLP]
    PCM, 2006, pp:56-63 [Conf]
  12. Jinwei Wang, Guangjie Liu, Yuewei Dai, Zhiquan Wang, Shiguo Lian
    Robustness Analysis of Watermarking Schemes Based on Two Novel Transforms. [Citation Graph (0, 0)][DBLP]
    ICICIC (3), 2006, pp:471-474 [Conf]
  13. Zhongxuan Liu, Shiguo Lian, Zhen Ren
    Quaternion Diffusion for Color Image Filtering. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2006, v:21, n:1, pp:126-136 [Journal]
  14. Shiguo Lian, Zhongxuan Liu, Zhen Ren, Haila Wang
    Secure Distribution Scheme for Compressed Data Streams. [Citation Graph (0, 0)][DBLP]
    ICIP, 2006, pp:1953-1956 [Conf]
  15. Shiguo Lian, Zhongxuan Liu, Zhen Ren, Haila Wang
    Hash function based on chaotic neural networks. [Citation Graph (0, 0)][DBLP]
    ISCAS, 2006, pp:- [Conf]
  16. Shiguo Lian, Zhongxuan Liu, Zhen Ren, Haila Wang
    Secure Media Distribution Scheme Based on Chaotic Neural Network. [Citation Graph (0, 0)][DBLP]
    ISNN (2), 2007, pp:79-87 [Conf]
  17. Shiguo Lian, Zhongxuan Liu, Zhen Ren, Haila Wang
    On the Performance of Joint Fingerprint Embedding and Decryption Scheme [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]
  18. Shiguo Lian, Jinsheng Sun, Zhiquan Wang
    Security Analysis of A Chaos-based Image Encryption Algorithm [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  19. Shiguo Lian, Jinsheng Sun, Zhiquan Wang
    One-way Hash Function Based on Neural Network [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]
  20. Shiguo Lian
    Image Authentication Based on Neural Networks [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]
  21. Shiguo Lian, Jinsheng Sun, Zhiquan Wang
    Secure hash function based on neural network. [Citation Graph (0, 0)][DBLP]
    Neurocomputing, 2006, v:69, n:16-18, pp:2346-2350 [Journal]
  22. Shiguo Lian, Zhongxuan Liu, Zhen Ren, Haila Wang
    Commutative Encryption and Watermarking in Video Compression. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Circuits Syst. Video Techn., 2007, v:17, n:6, pp:774-778 [Journal]
  23. Jinwei Wang, Guangjie Liu, Yuewei Dai, Jinsheng Sun, Zhiquan Wang, Shiguo Lian
    Locally optimum detection for Barni's multiplicative watermarking in DWT domain. [Citation Graph (0, 0)][DBLP]
    Signal Processing, 2008, v:88, n:1, pp:117-130 [Journal]

  24. A Secure Solution for Ubiquitous Multimedia Broadcasting. [Citation Graph (, )][DBLP]


  25. Desynchronized image fingerprint for large scale distribution. [Citation Graph (, )][DBLP]


  26. Joint Fingerprint Embedding and Decryption for Video Distribution. [Citation Graph (, )][DBLP]


  27. Image Steganography Based on Quantization-Embedders Combination. [Citation Graph (, )][DBLP]


  28. On the joint audio fingerprinting and decryption scheme. [Citation Graph (, )][DBLP]


  29. Secure Video Multicast Based on Desynchronized Fingerprint and Partial Encryption. [Citation Graph (, )][DBLP]


  30. Efficient Temporal Segmentation for Sports Programs with Special Cases. [Citation Graph (, )][DBLP]


  31. A fast video encryption scheme based-on chaos. [Citation Graph (, )][DBLP]


  32. Special issue on multimedia networking and security in convergent networks. [Citation Graph (, )][DBLP]


  33. A hybrid game model based on reputation for spectrum allocation in wireless networks. [Citation Graph (, )][DBLP]


  34. Secure and traceable multimedia distribution for convergent Mobile TV services. [Citation Graph (, )][DBLP]


  35. Secure Fractal Image Coding [Citation Graph (, )][DBLP]


  36. On the Robustness of the Delay-Based Fingerprint Embedding Scheme [Citation Graph (, )][DBLP]


Search in 0.399secs, Finished in 0.400secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002