Jin Liu

Affiliations:
  • National Huaqiao University, College of Computer Science and Technology, Xiamen, China
  • Huazhong University of Science and Technology, School of Computer Science and Technology, Wuhan National Laboratory for Optoelectronics, Wuhan, China (PhD 2013)


According to our database1, Jin Liu authored at least 16 papers between 2008 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage.
IEEE Trans. Serv. Comput., 2017

Distributed steganalysis of compressed speech.
Soft Comput., 2017

Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs.
Signal Process., 2017

2016
Steganalysis of analysis-by-synthesis speech exploiting pulse-position distribution characteristics.
Secur. Commun. Networks, 2016

Neighbor-index-division steganography based on QIM method for G.723.1 speech streams.
J. Ambient Intell. Humaniz. Comput., 2016

2015
Optimal matrix embedding for Voice-over-IP steganography.
Signal Process., 2015

A High-Capacity Covering Code for Voice-Over-IP Steganography.
Int. J. Inf. Technol. Web Eng., 2015

Improved adaptive partial-matching steganography for Voice over IP.
Comput. Commun., 2015

Steganalysis of Low Bit-Rate Speech Based on Statistic Characteristics of Pulse Positions.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

An Efficient VoIP Steganography Based on Random Binary Matrix.
Proceedings of the 10th International Conference on P2P, 2015

2014
Improving security of quantization-index-modulation steganography in low bit-rate speech streams.
Multim. Syst., 2014

2012
State-based steganography in low bit rate speech.
Proceedings of the 20th ACM Multimedia Conference, MM '12, Nara, Japan, October 29, 2012

Least-significant-digit steganography in low bitrate speech.
Proceedings of IEEE International Conference on Communications, 2012

2009
An Adaptive Steganography Scheme for Voice Over IP.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009

An M-Sequence Based Steganography Model for Voice over IP.
Proceedings of IEEE International Conference on Communications, 2009

2008
A Covert Communication Model Based on Least Significant Bits Steganography in Voice over IP.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008


  Loading...