Xingming Sun

According to our database1, Xingming Sun authored at least 169 papers between 2001 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Security and Privacy Issues of UAV: A Survey.
MONET, 2020

Confusing-Keyword Based Secure Search over Encrypted Cloud Data.
MONET, 2020

Semi-supervised stacked autoencoder-based deep hierarchical semantic feature for real-time fingerprint liveness detection.
J. Real-Time Image Processing, 2020

2019
Enabling Semantic Search Based on Conceptual Graphs over Encrypted Outsourced Data.
IEEE Trans. Services Computing, 2019

Writing in the Air with WiFi Signals for Virtual Reality Devices.
IEEE Trans. Mob. Comput., 2019

Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing.
IEEE Trans. Dependable Sec. Comput., 2019

Difference co-occurrence matrix using BP neural network for fingerprint liveness detection.
Soft Comput., 2019

An effective comparison protocol over encrypted data in cloud computing.
J. Inf. Sec. Appl., 2019

Polynomial-Based Google Map Graphical Password System against Shoulder-Surfing Attacks in Cloud Environment.
Complexity, 2019

Video Copy Detection Using Spatio-Temporal CNN Features.
IEEE Access, 2019

Fingerprint Liveness Detection Using an Improved CNN With Image Scale Equalization.
IEEE Access, 2019

A Steganography Algorithm Based on CycleGAN for Covert Communication in the Internet of Things.
IEEE Access, 2019

Image Steganography Based on Foreground Object Generation by Generative Adversarial Networks in Mobile Edge Computing With Internet of Things.
IEEE Access, 2019

2018
Dynamic Resource Allocation for Load Balancing in Fog Environment.
Wireless Communications and Mobile Computing, 2018

Semantic-Aware Searching Over Encrypted Data for Cloud Computing.
IEEE Trans. Information Forensics and Security, 2018

Speech authentication and content recovery scheme for security communication and storage.
Telecommunication Systems, 2018

A video error concealment method using data hiding based on compressed sensing over lossy channel.
Telecommunication Systems, 2018

Identification of Motion-Compensated Frame Rate Up-Conversion Based on Residual Signals.
IEEE Trans. Circuits Syst. Video Techn., 2018

Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing.
IEEE Trans. Cloud Computing, 2018

Semantic Contextual Search Based on Conceptual Graphs over Encrypted Cloud.
Security and Communication Networks, 2018

Encoding multiple contextual clues for partial-duplicate image retrieval.
Pattern Recognition Letters, 2018

A robust forgery detection algorithm for object removal by exemplar-based image inpainting.
Multimedia Tools Appl., 2018

A copy-move forgery detection method based on CMFD-SIFT.
Multimedia Tools Appl., 2018

Rotation-invariant Weber pattern and Gabor feature for fingerprint liveness detection.
Multimedia Tools Appl., 2018

Norm ratio-based audio watermarking scheme in DWT domain.
Multimedia Tools Appl., 2018

Perceptual image hashing via dual-cross pattern encoding and salient structure detection.
Inf. Sci., 2018

Privacy-Preserving and Lightweight Key Agreement Protocol for V2G in the Social Internet of Things.
IEEE Internet of Things Journal, 2018

K-barrier coverage in wireless sensor networks based on immune particle swarm optimisation.
IJSNet, 2018

A novel meteorological sensor data acquisition approach based on unmanned aerial vehicle.
IJSNet, 2018

Convolutional neural network for smooth filtering detection.
IET Image Processing, 2018

Multiple-parameter fractional quaternion Fourier transform and its application in colour image encryption.
IET Image Processing, 2018

Non-uniform Watermark Sharing Based on Optimal Iterative BTC for Image Tampering Recovery.
IEEE MultiMedia, 2018

A lightweight multi-layer authentication protocol for wireless body area networks.
Future Generation Comp. Syst., 2018

Secret Image Sharing Based on Encrypted Pixels.
IEEE Access, 2018

A Privacy-Preserving Handwritten Signature Verification Method Using Combinational Features and Secure KNN.
IEEE Access, 2018

Secure Image LBP Feature Extraction in Cloud-Based Smart Campus.
IEEE Access, 2018

2017
Structural Minimax Probability Machine.
IEEE Trans. Neural Netw. Learning Syst., 2017

Unimodal Stopping Model-Based Early SKIP Mode Decision for High-Efficiency Video Coding.
IEEE Trans. Multimedia, 2017

Effective and Efficient Global Context Verification for Image Copy Detection.
IEEE Trans. Information Forensics and Security, 2017

Adaptive Inter CU Depth Decision for HEVC Using Optimal Selection Model and Encoding Parameters.
TBC, 2017

A secure cloud-assisted urban data sharing framework for ubiquitous-cities.
Pervasive and Mobile Computing, 2017

Detecting video frame rate up-conversion based on frame-level analysis of average texture variation.
Multimedia Tools Appl., 2017

A passive authentication scheme for copy-move forgery based on package clustering algorithm.
Multimedia Tools Appl., 2017

Residual domain dictionary learning for compressed sensing video recovery.
Multimedia Tools Appl., 2017

Erratum to: A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment.
Multimedia Tools Appl., 2017

A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment.
Multimedia Tools Appl., 2017

A selective encryption scheme for protecting H.264/AVC video in multimedia social network.
Multimedia Tools Appl., 2017

Lossless visible watermarking based on adaptive circular shift operation for BTC-compressed images.
Multimedia Tools Appl., 2017

A security watermark scheme used for digital speech forensics.
Multimedia Tools Appl., 2017

Detecting image seam carving with low scaling ratio using multi-scale spatial and spectral entropies.
J. Visual Communication and Image Representation, 2017

Quaternion pseudo-Zernike moments combining both of RGB information and depth information for color image splicing detection.
J. Visual Communication and Image Representation, 2017

An Enhanced Cloud Data Storage Auditing Protocol Providing Strong Security and Efficiency for Smart City.
J. Inf. Sci. Eng., 2017

Detection of image seam carving by using weber local descriptor and local binary patterns.
J. Inf. Sec. Appl., 2017

EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing.
Inf. Sci., 2017

Reversible data hiding with contrast enhancement and tamper localization for medical images.
Inf. Sci., 2017

A Content-Based Image Retrieval Scheme Using an Encrypted Difference Histogram in Cloud Computing.
Information, 2017

Fast and accurate near-duplicate image elimination for visual sensor networks.
IJDSN, 2017

Design of new scan orders for perceptual encryption of H.264/AVC videos.
IET Information Security, 2017

Organized topology based routing protocol in incompletely predictable ad-hoc networks.
Computer Communications, 2017

Enhanced Remote Password-Authenticated Key Agreement Based on Smart Card Supporting Password Changing.
Proceedings of the Information Security Practice and Experience, 2017

Robust detection for object removal with post-processing by exemplar-based image inpainting.
Proceedings of the 13th International Conference on Natural Computation, 2017

2016
"Friend is Treasure": Exploring and Exploiting Mobile Social Contacts for Efficient Task Offloading.
IEEE Trans. Vehicular Technology, 2016

A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data.
IEEE Trans. Parallel Distrib. Syst., 2016

Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement.
IEEE Trans. Parallel Distrib. Syst., 2016

Sparse Representation-Based Image Quality Index With Adaptive Sub-Dictionaries.
IEEE Trans. Image Processing, 2016

A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing.
IEEE Trans. Information Forensics and Security, 2016

Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement.
IEEE Trans. Information Forensics and Security, 2016

Cross correlation feature mining for steganalysis of hash based least significant bit substitution video steganography.
Telecommunication Systems, 2016

Fast Motion Estimation Based on Content Property for Low-Complexity H.265/HEVC Encoder.
TBC, 2016

Privacy-preserving outsourced gene data search in encryption domain.
Security and Communication Networks, 2016

Steganalysis of LSB matching using differences between nonadjacent pixels.
Multimedia Tools Appl., 2016

Blind quality index for camera images with natural scene statistics and patch-based sharpness assessment.
J. Visual Communication and Image Representation, 2016

Fast reference frame selection based on content similarity for low complexity HEVC encoder.
J. Visual Communication and Image Representation, 2016

A Privacy-Preserving Outsourcing Data Storage Scheme with Fragile Digital Watermarking-Based Data Auditing.
J. Electrical and Computer Engineering, 2016

Techniques for Design and Implementation of an FPGA-Specific Physical Unclonable Function.
J. Comput. Sci. Technol., 2016

Reversible Watermarking with Adaptive Embedding Threshold Matrix.
TIIS, 2016

Detecting video frame-rate up-conversion based on periodic properties of edge-intensity.
J. Inf. Sec. Appl., 2016

Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode.
Inf. Sci., 2016

A novel image hashing scheme with perceptual robustness using block truncation coding.
Inf. Sci., 2016

Early DIRECT mode decision based on all-zero block and rate distortion cost for multiview video coding.
IET Image Processing, 2016

Effective and Efficient Image Copy Detection with Resistance to Arbitrary Rotation.
IEICE Transactions, 2016

Multi-User Quantum Wireless Network Communication Based on Multi-Qubit GHZ State.
IEEE Communications Letters, 2016

Quantum network coding for multi-unicast problem based on 2D and 3D cluster states.
SCIENCE CHINA Information Sciences, 2016

Towards efficient content-aware search over encrypted outsourced data in cloud.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

A RFID Based Localization Algorithm for Wireless Sensor Networks.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
Image Integrity Authentication Scheme Based on Fixed Point Theory.
IEEE Trans. Image Processing, 2015

Segmentation-Based Image Copy-Move Forgery Detection Scheme.
IEEE Trans. Information Forensics and Security, 2015

Air Temperature Error Correction Based on Solar Radiation in an Economical Meteorological Wireless Sensor Network.
Sensors, 2015

Low Complexity HEVC Encoder for Visual Sensor Networks.
Sensors, 2015

Histogram shifting based reversible data hiding method using directed-prediction scheme.
Multimedia Tools Appl., 2015

Color Image Analysis by Quaternion-Type Moments.
Journal of Mathematical Imaging and Vision, 2015

Image copy-move forgery detection based on sped-up robust features descriptor and adaptive minimal-maximal suppression.
J. Electronic Imaging, 2015

Enhanced secure sensor association and key management in wireless body area networks.
Journal of Communications and Networks, 2015

Digital forensics of Microsoft Office 2007-2013 documents to prevent covert communication.
Journal of Communications and Networks, 2015

Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing.
IEICE Transactions, 2015

Detecting seam carving based image resizing using local binary patterns.
Computers & Security, 2015

Exposing Photographic Splicing by Detecting the Inconsistencies in Shadows.
Comput. J., 2015

Coverless Image Steganography Without Embedding.
Proceedings of the Cloud Computing and Security - First International Conference, 2015

Coverless Information Hiding Method Based on the Chinese Mathematical Expression.
Proceedings of the Cloud Computing and Security - First International Conference, 2015

2014
Synthetic Aperture Radar Image Segmentation by Modified Student's t-Mixture Model.
IEEE Trans. Geoscience and Remote Sensing, 2014

Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data.
IEEE Trans. Consumer Electronics, 2014

Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query.
IEEE Trans. Consumer Electronics, 2014

A novel signature based on the combination of global and local signatures for image copy detection.
Security and Communication Networks, 2014

Steganalysis of least significant bit matching using multi-order differences.
Security and Communication Networks, 2014

Linguistic steganalysis using the features derived from synonym frequency.
Multimedia Tools Appl., 2014

Buffer scheme optimization of epidemic routing in delay tolerant networks.
Journal of Communications and Networks, 2014

Secure semantic expansion based search over encrypted cloud data supporting similarity ranking.
J. Cloud Computing, 2014

Removing Gaussian noise for colour images by quaternion representation and optimisation of weights in non-local means filter.
IET Image Processing, 2014

Full 4-D quaternion discrete Fourier transform based watermarking for color images.
Digital Signal Processing, 2014

An Effective Search Scheme Based on Semantic Tree Over Encrypted Cloud Data Supporting Verifiability.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Combination of SIFT Feature and Convex Region-Based Global Context Feature for Image Copy Detection.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Document Attribute-Based Keyword Search over Encrypted Data.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Data Access Control for Multi-authority Cloud Storage Systems.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

A Similarity Search Method for Encrypted Cloud Document.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Secure Storage of Data in Cloud Computing.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Semantic keyword search based on trie over encrypted cloud data.
Proceedings of the Second International Workshop on Security in Cloud Computing, 2014

2013
Reversible watermarking method based on asymmetric-histogram shifting of prediction errors.
Journal of Systems and Software, 2013

Steganalysis of least significant bit matching based on image histogram and correlation.
J. Electronic Imaging, 2013

Securing sensor data storage and query based on k-out-of- n coding.
Int. J. Communication Systems, 2013

Detection of copy-move forgery in digital images based on DCT.
CoRR, 2013

A Novel Method for Image Integrity Authentication Based on Fixed Point Theory.
CoRR, 2013

A New Reversible Data Hiding Scheme Based on Efficient Prediction.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

New Forensic Methods for OOXML Format Documents.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Multi-keyword ranked search supporting synonym query over encrypted data in cloud computing.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013

2012
A Secure Scheme of Continuity Based on Two-Dimensional Backward Hash Key Chains for Sensor Networks.
IEEE Wireless Commun. Letters, 2012

Text split-based steganography in OOXML format documents for covert communication.
Security and Communication Networks, 2012

2011
Query Preserving Relational Database Watermarking.
Informatica (Slovenia), 2011

Removing dubious feedback from mobile wireless ad hoc peer-to-peer systems.
IJAHUC, 2011

Forensic investigation of OOXML format documents.
Digital Investigation, 2011

A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion.
Comput. Aided Des., 2011

2010
JPEG image steganalysis using joint discrete cosine transform domain features.
J. Electronic Imaging, 2010

Watermarking 3D Triangular Mesh with High Visual Quality.
JDCTA, 2010

Watermarking-based intellectual property protection for sensor streaming data.
IJCAT, 2010

A Novel method for similarity analysis and protein sub-cellular localization prediction.
Bioinformatics, 2010

2009
A Contrast-Sensitive Reversible Visible Image Watermarking Technique.
IEEE Trans. Circuits Syst. Video Techn., 2009

Principal feature selection and fusion method for image steganalysis.
J. Electronic Imaging, 2009

A binary coding method of RNA secondary structure and its application.
Journal of Computational Chemistry, 2009

Natural Language Information Hiding Based on Chinese Mathematical Expression.
I. J. Network Security, 2009

An efficient and scalable pairwise key pre-distribution scheme for sensor networks using deployment knowledge.
Computer Communications, 2009

Three-Dimensional Reconstruction Using Enhanced Shape from Stereo Technique.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

2008
Removable visible image watermarking algorithm in the discrete cosine transform domain.
J. Electronic Imaging, 2008

Detection of Hidden Information in Webpage Based on Higher-Order Statistics.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

Steganalysis of Information Hidden in Webpage Based on Higher-order Statistics.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

A Combined Static and Dynamic Software Birthmark Based on Component Dependence Graph.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A Security Threshold Subliminal Channel Based on Elliptic Curve Cryptosystem.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Copyright Protection in Wireless Sensor Networks by Watermarking.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Steganalysis of Data Hiding for Two-Dimensional Engineering Graphics Based on Characters Statistic.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

File-Update Based Steganography for Microsoft PowerPoint Files.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A Steganography Scheme in P2P Network.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

An Algorithm of Webpage Information Hiding Based on Attributes Permutation.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Time-Based Privacy Protection for Multi-attribute Data in WSNs.
Proceedings of the 14th International Conference on Parallel and Distributed Systems, 2008

Dynamic K-Gram Based Software Birthmark.
Proceedings of the 19th Australian Software Engineering Conference (ASWEC 2008), 2008

2007
Semi-Fragile Watermarking for Image Authentication and Tamper Detection Using HVS Model.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

A Stern-based Collusion-Secure Software Watermarking Algorithm and Its Implementation.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Secure Data Transmission of Wireless Sensor Network Based on Information Hiding.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

Detection of steganographic information in tags of webpage.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

An Evaluation Scheme for Steganalysis-proof Ability of Steganographic Algorithms.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Detection of Hidden Information in Tags of Webpage Based on Tag-Mismatch.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

An Efficient Linguistic Steganography for Chinese Text.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

An Image-Adaptive Semi-fragile Watermarking for Image Authentication and Tamper Detection.
Proceedings of the Computational Science and Its Applications, 2007

Detection of Hidden Information in Webpage.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

Second-LSB-Dependent Robust Watermarking for Relational Database.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

Research on Steganalysis for Text Steganography Based on Font Format.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

Detection of Hidden Information in Webpages Based on Randomness.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2005
Noun-Verb Based Technique of Text Watermarking Using Recursive Decent Semantic Net Parsers.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

A Natural Language Watermarking Based on Chinese Syntax.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

2003
Construction of wavelets for width-invariant characterization of curves.
Pattern Recognition Letters, 2003

2002
Mathematical Representation of a Chinese Character and its Applications.
IJPRAI, 2002

2001
A New Stroke Extraction Method of Chinese Characters.
IJPRAI, 2001


  Loading...