Yanjun Liu

Orcid: 0000-0003-3518-5562

Affiliations:
  • Feng Chia University, Department of Information Engineering and Computer Science, Taichung, Taiwan
  • Anhui University, School of Computer Science and Technology, China (former)
  • University of Science and Technology of China, School of Computer Science and Technology, Hefei, China (PhD 2010)


According to our database1, Yanjun Liu authored at least 58 papers between 2013 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Coverless image steganography using morphed face recognition based on convolutional neural network.
EURASIP J. Wirel. Commun. Netw., 2022

2021
A generalized Chinese remainder theorem-based proactive multi-secret sharing scheme for global wide area network.
Telecommun. Syst., 2021

A high-capacity reversible data hiding scheme for encrypted images employing vector quantization prediction.
Multim. Tools Appl., 2021

An anisotropic reference matrix for image steganography.
J. Vis. Commun. Image Represent., 2021

Enhanced (n, n)-threshold QR code secret sharing scheme based on error correction mechanism.
J. Inf. Secur. Appl., 2021

Predicting missing data for data integrity based on the linear regression model.
Int. J. Embed. Syst., 2021

A novel image compression technology based on vector quantisation and linear regression prediction.
Connect. Sci., 2021

An SMVQ compressed data hiding scheme based on multiple linear regression prediction.
Connect. Sci., 2021

2020
Unordered Multisecret Sharing Based on Generalized Chinese Remainder Theorem.
Secur. Commun. Networks, 2020

One-Code-Pass User Authentication Based on QR Code and Secret Sharing.
Int. J. Netw. Secur., 2020

A Reversible Data Hiding Method for SMVQ Indices Based on Improved Locally Adaptive Coding.
Int. J. Netw. Secur., 2020

Efficient QR Code Secret Embedding Mechanism Based on Hamming Code.
IEEE Access, 2020

A Reversible Secret Image Sharing Scheme Based on Stick Insect Matrix.
IEEE Access, 2020

2019
Extended squared magic matrix for embedding secret information with large payload.
Multim. Tools Appl., 2019

Efficient QR code authentication mechanism based on Sudoku.
Multim. Tools Appl., 2019

High-payload secret hiding mechanism for QR codes.
Multim. Tools Appl., 2019

A square lattice oriented reversible information hiding scheme with reversibility and adaptivity for dual images.
J. Vis. Commun. Image Represent., 2019

A real-time dual-image-based reversible data hiding scheme using turtle shells.
J. Real Time Image Process., 2019

Real-time adaptive visual secret sharing with reversibility and high capacity.
J. Real Time Image Process., 2019

Fast turtle shell-based data embedding mechanisms with good visual quality.
J. Real Time Image Process., 2019

A Novel Image Compression Method Using Turtle-Shell-Shaped Codewords with Less Blocking Artifact.
J. Inf. Hiding Multim. Signal Process., 2019

Efficient secret sharing scheme with cheater identification based on QR code.
KSII Trans. Internet Inf. Syst., 2019

Signature Gateway: Offloading Signature Generation to IoT Gateway Accelerated by GPU.
IEEE Internet Things J., 2019

A Cloud-assisted Passenger Authentication Scheme for Japan Rail Pass Based on Image Morphing.
Int. J. Netw. Secur., 2019

A Secret Image Restoring Scheme Using Threshold Pairs of Unordered Image Shares.
IEEE Access, 2019

A Mini-Sudoku Matrix-Based Data Embedding Scheme With High Payload.
IEEE Access, 2019

2018
Efficient Information Hiding Based on Theory of Numbers.
Symmetry, 2018

Efficient access control system based on aesthetic QR code.
Pers. Ubiquitous Comput., 2018

A turtle shell-based visual secret sharing scheme with reversibility and authentication.
Multim. Tools Appl., 2018

Minima-maxima preserving data hiding algorithm for absolute moment block truncation coding compressed images.
Multim. Tools Appl., 2018

A reversible data hiding scheme based on absolute moment block truncation coding compression using exclusive OR operator.
Multim. Tools Appl., 2018

Efficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction.
KSII Trans. Internet Inf. Syst., 2018

An Improved Data Hiding Method Based on Lempel-Ziv-Welch Compression Codes.
Int. J. Netw. Secur., 2018

Reversible data hiding for JPEG images employing all quantized non-zero AC coefficients.
Displays, 2018

2017
A one-card-pass user authentication scheme using image morphing.
Multim. Tools Appl., 2017

An Efficient and Secure Smart Card Based Password Authentication Scheme.
Int. J. Netw. Secur., 2017

A high payload steganographic algorithm based on edge detection.
Displays, 2017

An offline user-verifiable electronic traveler's check system.
Proceedings of the 5th International Workshop on Biometrics and Forensics, 2017

A reversible data hiding scheme for image interpolation based on reference matrix.
Proceedings of the 5th International Workshop on Biometrics and Forensics, 2017

Extended Exploiting-Modification-Direction Data Hiding with High Capacity.
Proceedings of the International Conference on Video and Image Processing, 2017

A Digital Gift Certificate Scheme with Conditional Anonymity.
Proceedings of the 2017 International Conference on Management Engineering, 2017

2016
A Novel Three-party Authenticated Key Exchange Protocol Based on Secret Sharing.
J. Inf. Hiding Multim. Signal Process., 2016

Notes on "An Anonymous Multi-server Authenticated Key Agreement Scheme Based on Trust Computing Using Smart Card and Biometrics".
Int. J. Netw. Secur., 2016

An Integratable Verifiable Secret Sharing Mechanism.
Int. J. Netw. Secur., 2016

High capacity turtle shell-based data hiding.
IET Image Process., 2016

Distortion-free secret image sharing method with two meaningful shadows.
IET Image Process., 2016

2015
A Secure and Efficient Scheme for Digital Gift Certificates.
J. Inf. Hiding Multim. Signal Process., 2015

A Group Key Distribution System Based on the Generalized Aryabhata Remainder Theorem for Enterprise Digital Rights Management.
J. Inf. Hiding Multim. Signal Process., 2015

A novel verifiable secret sharing mechanism using theory of numbers and a method for sharing secrets.
Int. J. Commun. Syst., 2015

2014
(k, n)-Image Reversible Data Hiding.
J. Inf. Hiding Multim. Signal Process., 2014

A Secure Broadcasting Method Based on the Generalized Aryabhata Remainder Theorem.
J. Inf. Hiding Multim. Signal Process., 2014

A Database Encryption Scheme Based on the Generalized Aryabhata Remainder Theorem.
J. Inf. Hiding Multim. Signal Process., 2014

A Fast and Secure Scheme for Data Outsourcing in the Cloud.
KSII Trans. Internet Inf. Syst., 2014

Computational power of tissue P systems for generating control languages.
Inf. Sci., 2014

An Access Control Mechanism Based on the Generalized Aryabhata Remainder Theorem.
Int. J. Netw. Secur., 2014

An authenticated group key distribution mechanism using theory of numbers.
Int. J. Commun. Syst., 2014

A Novel Turtle Shell Based Scheme for Data Hiding.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

2013
An Efficient Oblivious Transfer Protocol Using Residue Number System.
Int. J. Netw. Secur., 2013


  Loading...