Huo-Chong Ling

Orcid: 0000-0002-3173-0562

According to our database1, Huo-Chong Ling authored at least 21 papers between 2004 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Hybrid SVD-Based Image Watermarking Scheme Utilizing Both U and V Orthogonal Vectors for Robustness and Imperceptibility.
IEEE Access, 2023

2022
Explainable Network Intrusion Detection Using External Memory Models.
Proceedings of the AI 2022: Advances in Artificial Intelligence, 2022

2021
Encrypted Steganography Quick Response Scheme for Unified Hotel Access Control System.
Proceedings of the 11th IEEE International Conference on System Engineering and Technology, 2021

2017
Effective recognition of facial micro-expressions with video motion magnification.
Multim. Tools Appl., 2017

2016
Fast watermarking scheme for real-time spatial scalable video coding.
Signal Process. Image Commun., 2016

AIPISteg: An active IP identification based steganographic method.
J. Netw. Comput. Appl., 2016

Low complexity watermarking scheme for scalable video coding.
Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan, 2016

Intrinsic two-dimensional local structures for micro-expression recognition.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

2015
Real-time high-resolution downsampling algorithm on many-core processor for spatially scalable video coding.
J. Electronic Imaging, 2015

Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage.
Hum. centric Comput. Inf. Sci., 2015

Monogenic Riesz wavelet representation for micro-expression recognition.
Proceedings of the 2015 IEEE International Conference on Digital Signal Processing, 2015

Using IP identification for fragmentation resilient data embedding.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2015

2014
Secure Encrypted Steganography Graphical Password scheme for Near Field Communication smartphone access control system.
Expert Syst. Appl., 2014

2011
On the security of ownership watermarking of digital images based on singular value decomposition.
J. Electronic Imaging, 2011

On the Security of a Hybrid SVD-DCT Watermarking Method Based on LPSNR.
Proceedings of the Advances in Image and Video Technology - 5th Pacific Rim Symposium, 2011

On the Security of a Robust Watermarking Scheme Based on RDWT-SVD.
Proceedings of the Future Generation Information Technology, 2011

2010
Analysis on the Improved SVD-Based Watermarking Scheme.
Proceedings of the Advances in Computer Science and Information Technology, 2010

2009
Attacks on a Block Based SVD Watermarking Scheme.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

2008
Attacks on SVD-Based Watermarking Schemes.
Proceedings of the Intelligence and Security Informatics, 2008

2005
On the Insecurity of the Microsoft Research Conference Management Tool (MSRCMT) System.
Proceedings of the 4th International Conference on IT in Asia, 2005

2004
Flaws in Generic Watermarking Protocols Based on Zero-Knowledge Proofs.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004


  Loading...