Lee-Ming Cheng

Orcid: 0000-0001-5501-8441

Affiliations:
  • City University of Hong Kong, China


According to our database1, Lee-Ming Cheng authored at least 66 papers between 1986 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Lightweight and Privacy-Preserving Template Generation for Palm-Vein-Based Human Recognition.
IEEE Trans. Inf. Forensics Secur., 2020

Modified Decoding Metric Of Distributed Arithmetic Coding.
Proceedings of the IEEE International Conference on Image Processing, 2020

2019
Dynamic Scalable Elliptic Curve Cryptographic Scheme and Its Application to In-Vehicle Security.
IEEE Internet Things J., 2019

Face template protection using deep LDPC codes learning.
IET Biom., 2019

Modular exponential multivariate sequence and its application to lightweight security design.
Future Gener. Comput. Syst., 2019

Paper Document Authentication Using Print-Scan Resistant Image Hashing and Public-Key Cryptography.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

Robust Facial Landmark Localization Based on Two-Stage Cascaded Pose Regression.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Multivariate Cryptography Based on Clipped Hopfield Neural Network.
IEEE Trans. Neural Networks Learn. Syst., 2018

Authenticity and copyright verification of printed images.
Signal Process., 2018

Image authentication using distributed arithmetic coding.
Multim. Tools Appl., 2018

Watermark Extraction under Print-Cam Process Using Wave Atoms Based Blind Digital Watermarking.
Proceedings of the 2nd International Conference on Vision, Image and Signal Processing, 2018

2016
Wave atom transform based image hashing using distributed source coding.
J. Inf. Secur. Appl., 2016

A novel client service quality measuring model and an eHealthcare mitigating approach.
Int. J. Medical Informatics, 2016

2015
Wave Atom-Based Perceptual Image Hashing Against Content-Preserving and Content-Altering Attacks.
Trans. Data Hiding Multim. Secur., 2015

A FPGA implementation of facial feature extraction.
J. Real Time Image Process., 2015

2014
Enhanced perceptual image authentication with tamper localization and self-restoration.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2014

2013
Adaptive reversible data hiding based on block median preservation and modification of prediction errors.
J. Syst. Softw., 2013

Editorial: Smart Card and RFID Security.
J. Inf. Secur. Appl., 2013

2012
Robust digital image watermarking scheme using wave atoms with multiple description coding.
EURASIP J. Adv. Signal Process., 2012

Memoryless Hash-Based Perceptual Image Authentication.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

2011
Robust Watermarking Scheme Using Wave Atoms.
EURASIP J. Adv. Signal Process., 2011

Perceptual Image Hashing via Wave Atom Transform.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

A Novel Image Hashing Scheme Based on Wave Atoms.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

2010
Robust Watermarking Schemes Using Selective Curvelet Coefficients Based on a HVS Model.
Int. J. Wavelets Multiresolution Inf. Process., 2010

Robust Blind Watermarking Scheme Using Wave Atoms.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010

A forensic chip for secure digital video recording.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010

2009
A probabilistic relaxation labeling framework for reducing the noise effect in geometric biclustering of gene expression data.
Pattern Recognit., 2009

A Robust Watermarking Scheme Using Selective Curvelet Coefficients.
Int. J. Wavelets Multiresolution Inf. Process., 2009

Digital Watermarking Schemes Using Multi-resolution Curvelet and HVS Model.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009

2008
Multipurpose Watermarking Based on Multiscale Curvelet Transform.
IEEE Trans. Inf. Forensics Secur., 2008

Second-Generation RFID.
IEEE Secur. Priv., 2008

Multivariate hierarchical Bayesian model for differential gene expression analysis in microarray experiments.
BMC Bioinform., 2008

Mining functional biclusters of DNA microarray gene expression data.
Proceedings of the IEEE International Conference on Systems, 2008

Multipurpose watermarking based on curvelet transform.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008

Analysis Based on Generalized Vector Quantization for Information Hiding.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A Robust Image Watermarking Scheme Based on a Novel HVS Model in Curvelet Domain.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

2007
A Novel Lossy Image-Hiding Scheme Based on Block Difference.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Hardware Realization of Steganographic Techniques.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2006
A novel image-hiding scheme based on block difference.
Pattern Recognit., 2006

A Symmetric Probabilistic Encryption Scheme Based On CHNN Without Data Expansion.
Neural Process. Lett., 2006

Fast elliptic scalar multiplication using new double-base chain and point halving.
Appl. Math. Comput., 2006

Data Hiding in Images by Adaptive LSB Substitution Based on the Pixel-Value Differencing.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

Performance Evaluation of a Steganographic Method for Digital Images Using Side Match.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

2004
Hiding data in images by simple LSB substitution.
Pattern Recognit., 2004

Digital watermarking based on frequency random position insertion.
Proceedings of the 8th International Conference on Control, 2004

Image hiding based on block difference.
Proceedings of the 8th International Conference on Control, 2004

2003
On commutativity of duality operator and propagation operator of linear codes generated from algebraic curves.
IEEE Trans. Inf. Theory, 2003

Cryptanalysis of a modified remote user authentication scheme using smart cards.
IEEE Trans. Consumer Electron., 2003

2002
Correlation properties of an improved summation generator with 2-bit memory.
Signal Process., 2002

Security of Lin's image watermarking system.
J. Syst. Softw., 2002

Cryptanalysis of a Timestamp-Based Password Authentication Scheme.
Comput. Secur., 2002

2001
The convergence properties of a clipped Hopfield network and its application in the design of keystream generator.
IEEE Trans. Neural Networks, 2001

Cryptanalysis of a remote password authentication scheme.
Int. J. Comput. Math., 2001

Encryption System Based on Neutral Network.
Proceedings of the Communications and Multimedia Security Issues of the New Century, 2001

2000
Cryptanalysis of a remote user authentication scheme using smart cards.
IEEE Trans. Consumer Electron., 2000

An attack on the Hwang-Chang-Hwang watermarking scheme.
IEEE Trans. Consumer Electron., 2000

1999
Adaptive watermarking by using pixel position shifting technique.
IEEE Trans. Consumer Electron., 1999

Lossless image compression by using gradient adjusted prediction and Burrows-Wheeler transformation.
IEEE Trans. Consumer Electron., 1999

Sub-block interchange for lossless image compression.
IEEE Trans. Consumer Electron., 1999

A New Symmetric Probabilistic Encryption Scheme Based on Chaotic Attractors of Neural Networks.
Appl. Intell., 1999

Selective block assignment approach for robust digital image watermarking.
Proceedings of the Security and Watermarking of Multimedia Contents, 1999

Modelling the Crypto-Processor from Design to Synthesis.
Proceedings of the Cryptographic Hardware and Embedded Systems, 1999

1998
The CHNN nonlinear combination generator.
Proceedings of the 5th IEEE International Conference on Electronics, Circuits and Systems, 1998

1997
Dynamic word based text compression.
Proceedings of the 4th International Conference Document Analysis and Recognition (ICDAR '97), 1997

Artificial Neural Network for Discrete Cosine Transform and Image Compression.
Proceedings of the 4th International Conference Document Analysis and Recognition (ICDAR '97), 1997

1986
An adaptive asteroid zonal filter for data compression.
Comput. Vis. Graph. Image Process., 1986


  Loading...