default search action
Xiamu Niu
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [j83]Xianyan Wu, Qi Han, Xiamu Niu, Hongli Zhang, Siu-Ming Yiu, Jun-bin Fang:
JPEG image width estimation for file carving. IET Image Process. 12(7): 1245-1252 (2018) - 2017
- [j82]Chen Cui, Shen Wang, Xiamu Niu:
A novel watermarking for DIBR 3D images with geometric rectification based on feature points. Multim. Tools Appl. 76(1): 649-677 (2017) - 2016
- [j81]Dan Le, Xianyan Wu, Xiamu Niu:
Decoding schedule generating method for successive-cancellation decoder of polar codes. IET Commun. 10(5): 462-467 (2016) - [j80]Chen Cui, Haokun Mao, Xiamu Niu, Lixian Zhang, Tasawar Hayat, Ahmed Alsaedi:
A novel hashing scheme for Depth-image-based-rendering 3D images. Neurocomputing 191: 1-11 (2016) - [j79]Liyang Yu, Huanran Wang, Qi Han, Xiamu Niu, Siu-Ming Yiu, Jun-bin Fang, Zhifang Wang:
Exposing frame deletion by detecting abrupt changes in video streams. Neurocomputing 205: 84-91 (2016) - [j78]Xianyan Wu, Qi Han, Xiamu Niu:
Reassembling fragmented BMP files based on padding bytes. J. Electronic Imaging 25(3): 033002 (2016) - [j77]Chen Cui, Shen Wang, Xiamu Niu:
A Robust Depth-Image-Based-Rendering 3D Image Hashing Scheme Based on Histogram Shape. J. Inf. Hiding Multim. Signal Process. 7(3): 543-557 (2016) - [j76]Zhenjia Dou, Qi Han, Xiamu Niu, Xiang Peng, Hong Guo:
An Aeromagnetic Compensation Coefficient-Estimating Method Robust to Geomagnetic Gradient. IEEE Geosci. Remote. Sens. Lett. 13(5): 611-615 (2016) - [j75]Zhenjia Dou, Qi Han, Xiamu Niu, Xiang Peng, Hong Guo:
An Adaptive Filter for Aeromagnetic Compensation Based on Wavelet Multiresolution Analysis. IEEE Geosci. Remote. Sens. Lett. 13(8): 1069-1073 (2016) - [j74]Xianhua Song, Shen Wang, Ahmed A. Abd El-Latif, Xiamu Niu:
Response to the Letter to the Editor from Y.G. Yang et al. regarding "Dynamic watermarking scheme for quantum images based on Hadamard transform" by Xianhua Song et al., Multimedia Systems, doi: 10.1007/s00530-014-0355-3. Multim. Syst. 22(2): 273-274 (2016) - [j73]Liyang Yu, Qi Han, Xiamu Niu:
Feature point-based copy-move forgery detection: covering the non-textured areas. Multim. Tools Appl. 75(2): 1159-1176 (2016) - [j72]Shen Wang, Xuehu Yan, Jianzhi Sang, Xiamu Niu:
Meaningful visual secret sharing based on error diffusion and random grids. Multim. Tools Appl. 75(6): 3353-3373 (2016) - [j71]Xuehu Yan, Shen Wang, Xiamu Niu:
Threshold progressive visual cryptography construction with unexpanded shares. Multim. Tools Appl. 75(14): 8657-8674 (2016) - [j70]Mahmoud Emam, Qi Han, Xiamu Niu:
PCET based copy-move forgery detection in images under geometric transforms. Multim. Tools Appl. 75(18): 11513-11527 (2016) - [j69]Jianzhi Sang, Shen Wang, Xiamu Niu:
Quantum realization of the nearest-neighbor interpolation method for FRQI and NEQR. Quantum Inf. Process. 15(1): 37-64 (2016) - [j68]Qiong Li, Qiang Zhao, Dan Le, Xiamu Niu:
Study on the security of the authentication scheme with key recycling in QKD. Quantum Inf. Process. 15(9): 3815-3831 (2016) - [j67]Xianyan Wu, Qi Han, Xiamu Niu:
Quality Assessment for Reassembled Image Files. IEEE Signal Process. Lett. 23(2): 232-236 (2016) - 2015
- [j66]Xuehu Yan, Shen Wang, Xiamu Niu, Ching-Nung Yang:
Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality. Digit. Signal Process. 38: 53-65 (2015) - [j65]Huiyun Jing, Xin He, Qi Han, Xiamu Niu:
Co-saliency Detection Linearly Combining Single-View Saliency and Foreground Correspondence. IEICE Trans. Inf. Syst. 98-D(4): 985-988 (2015) - [j64]Jialiang Peng, Qiong Li, Ahmed A. Abd El-Latif, Xiamu Niu:
Finger multibiometric cryptosystem based on score-level fusion. Int. J. Comput. Appl. Technol. 51(2): 120-130 (2015) - [j63]Liyang Yu, Qi Han, Xiamu Niu:
Qualified matching feature collection for feature point-based copy-move forgery detection. J. Electronic Imaging 24(2): 023035 (2015) - [j62]Jianzhi Sang, Shen Wang, Xianhua Song, Xuehu Yan, Xiamu Niu:
A novel representation for Multi-Channel log-polar quantum images. J. Inf. Hiding Multim. Signal Process. 6(2): 340-350 (2015) - [j61]Wenbing Xie, Jun Jiang, Zhongsheng Li, Xiamu Niu:
基于Libsafe库的缓冲区溢出检测算法改进 (Improved Algorithm for Buffer Overflow Detection Based on Libsafe Library). 计算机科学 42(Z6): 382-387 (2015) - [j60]Xuehu Yan, Shen Wang, Xiamu Niu, Ching-Nung Yang:
Random grid-based visual secret sharing with multiple decryptions. J. Vis. Commun. Image Represent. 26: 94-104 (2015) - [j59]Xuehu Yan, Shen Wang, Ahmed A. Abd El-Latif, Xiamu Niu:
Visual secret sharing based on random grids with abilities of AND and XOR lossless recovery. Multim. Tools Appl. 74(9): 3231-3252 (2015) - [j58]Jialiang Peng, Qiong Li, Ahmed A. Abd El-Latif, Xiamu Niu:
Linear discriminant multi-set canonical correlations analysis (LDMCCA): an efficient approach for feature fusion of finger biometrics. Multim. Tools Appl. 74(13): 4469-4486 (2015) - [j57]Xuehu Yan, Shen Wang, Ahmed A. Abd El-Latif, Xiamu Niu:
Random grids-based visual secret sharing with improved visual quality via error diffusion. Multim. Tools Appl. 74(21): 9279-9296 (2015) - [j56]Qiong Li, Dan Le, Xianyan Wu, Xiamu Niu, Hong Guo:
Efficient bit sifting scheme of post-processing in quantum key distribution. Quantum Inf. Process. 14(10): 3785-3811 (2015) - [j55]Xuehu Yan, Shen Wang, Xiamu Niu, Ching-Nung Yang:
Generalized random grids-based threshold visual cryptography with meaningful shares. Signal Process. 109: 317-333 (2015) - [j54]Xuehu Yan, Shen Wang, Ahmed A. Abd El-Latif, Xiamu Niu:
New approaches for efficient information hiding-based secret image sharing schemes. Signal Image Video Process. 9(3): 499-510 (2015) - [j53]Xuehu Yan, Shen Wang, Ahmed A. Abd El-Latif, Xiamu Niu:
Threshold visual secret sharing with comprehensive properties based on random grids. Signal Image Video Process. 9(7): 1659-1668 (2015) - [j52]Ning Wang, Qiong Li, Ahmed A. Abd El-Latif, Jialiang Peng, Xuehu Yan, Xiamu Niu:
A novel template protection scheme for multibiometrics based on fuzzy commitment and chaotic system. Signal Image Video Process. 9(Supplement-1): 99-109 (2015) - [c116]Qiong Li, Shuming Wang, Haokun Mao, Qi Han, Xiamu Niu:
An Adaptive Improved Winnow Algorithm. COMPSAC Workshops 2015: 303-306 - [c115]Mahmoud Emam, Qi Han, Liyang Yu, Ye Zhang, Xiamu Niu:
A passive technique for detecting copy-move forgery with rotation based on polar complex exponential transform. ICDIP 2015: 963104 - [c114]Yanbin Tang, Zheng Tan, Kam-Pui Chow, Siu-Ming Yiu, Jun-bin Fang, Xiamu Niu, Qi Han, Xianyan Wu:
Fragmented JPEG File Recovery Using Pseudo Headers. IFIP Int. Conf. Digital Forensics 2015: 215-231 - [c113]Liyang Yu, Qi Han, Xiamu Niu:
Detecting Duplicated Frames by Mapping Frames to 3D Skeletons. IIH-MSP 2015: 168-171 - [c112]Xin Liu, Shen Wang, Weizhe Zhang, Xiamu Niu:
A Novel (2, 2) Visual Secret Sharing without the Pixel Expansion. IIH-MSP 2015: 172-175 - [c111]Dan Le, Qiong Li, Lu Shan, Xiamu Niu:
A New Reduced-Latency SC Decoder for Polar Codes. IIH-MSP 2015: 215-218 - [c110]Xianyan Wu, Qi Han, Xiamu Niu:
Improving Weights for Graph-Based Image Fragment Reassembly. IIH-MSP 2015: 219-222 - [c109]Qi Han, Huanran Wang, Xiamu Niu, Zhifang Wang:
Identify the Copy & Paste Frames in Compressed Surveillance Video Based on Stream Parameters. RVSP 2015: 31-34 - 2014
- [j51]Huiyun Jing, Xin He, Qi Han, Xiamu Niu:
Background contrast based salient region detection. Neurocomputing 124: 57-62 (2014) - [j50]Huiyun Jing, Xin He, Qi Han, Ahmed A. Abd El-Latif, Xiamu Niu:
Saliency detection based on integrated features. Neurocomputing 129: 114-121 (2014) - [j49]Jialiang Peng, Qiong Li, Ahmed A. Abd El-Latif, Xiamu Niu:
Finger multibiometric cryptosystems: fusion strategy and template security. J. Electronic Imaging 23(2): 023001 (2014) - [j48]Qi Han, Liyang Yu, Wenchao Zheng, Na Cheng, Xiamu Niu:
A Novel QKD Network Routing Algorithm Based on Optical-Path-Switching. J. Inf. Hiding Multim. Signal Process. 5(1): 13-19 (2014) - [j47]Xianhua Song, Shen Wang, Xiamu Niu:
Multi-Channel Quantum Image Representation Based on Phase Transform and Elementary Transformations. J. Inf. Hiding Multim. Signal Process. 5(4): 574-585 (2014) - [j46]Xianhua Song, Shen Wang, Ahmed A. Abd El-Latif, Xiamu Niu:
Dynamic watermarking scheme for quantum images based on Hadamard transform. Multim. Syst. 20(4): 379-388 (2014) - [j45]Ahmed A. Abd El-Latif, Li Li, Xiamu Niu:
A new image encryption scheme based on cyclic elliptic curve and chaotic system. Multim. Tools Appl. 70(3): 1559-1584 (2014) - [j44]Ning Wang, Qiong Li, Ahmed A. Abd El-Latif, Tiejun Zhang, Xiamu Niu:
Toward accurate localization and high recognition performance for noisy iris images. Multim. Tools Appl. 71(3): 1411-1430 (2014) - [j43]Ning Wang, Qiong Li, Ahmed A. Abd El-Latif, Jialiang Peng, Xiamu Niu:
An enhanced thermal face recognition method based on multiscale complex fusion for Gabor coefficients. Multim. Tools Appl. 72(3): 2339-2358 (2014) - [j42]Liyang Yu, Qi Han, Xiamu Niu:
An improved contraction-based method for mesh skeleton extraction. Multim. Tools Appl. 73(3): 1709-1722 (2014) - [j41]Qiong Li, Dan Le, Haokun Mao, Xiamu Niu, Tian Liu, Hong Guo:
Study on error reconciliation in quantum key distribution. Quantum Inf. Comput. 14(13-14): 1117-1135 (2014) - [j40]Xianhua Song, Xiamu Niu:
Comment on: Novel image encryption/decryption based on quantum fourier transform and double phase encoding. Quantum Inf. Process. 13(6): 1301-1304 (2014) - [j39]Jun-bin Fang, Zoe Lin Jiang, Kexin Ren, Yunhan Luo, Zhe Chen, Weiping Liu, Xuan Wang, Xiamu Niu, Siu-Ming Yiu, Lucas Chi Kwong Hui:
Improved key integrity checking for high-speed quantum key distribution using combinatorial group testing with strongly selective family design. Quantum Inf. Process. 13(6): 1425-1435 (2014) - [j38]Xianhua Song, Shen Wang, Ahmed A. Abd El-Latif, Xiamu Niu:
Quantum image encryption based on restricted geometric and color transformations. Quantum Inf. Process. 13(8): 1765-1787 (2014) - [j37]Xuehu Yan, Shen Wang, Xiamu Niu:
Threshold construction from specific cases in visual cryptography without the pixel expansion. Signal Process. 105: 389-398 (2014) - [j36]Xuehu Yan, Shen Wang, Ahmed A. Abd El-Latif, Jianzhi Sang, Xiamu Niu:
A Novel Perceptual Secret Sharing Scheme. Trans. Data Hiding Multim. Secur. 9: 68-90 (2014) - [c108]Shen Wang, Xuehu Yan, Jianzhi Sang, Xiamu Niu:
Equivalence Proof of Traditional and Random Grid-Based (2, 2) Visual Secret Sharing. ECC (2) 2014: 137-146 - [c107]Shen Wang, Xianhua Song, Xiamu Niu:
A Novel Encryption Algorithm for Quantum Images Based on Quantum Wavelet Transform and Diffusion. ECC (2) 2014: 243-250 - [c106]Liyang Yu, Qi Han, Xiamu Niu:
Copy-Rotation-Move Forgery Detection Using the MROGH Descriptor. IC2E 2014: 510-513 - [c105]Xianyan Wu, Qi Han, Xiamu Niu:
An adaptive transfer scheme based on sparse representation for figure-ground segmentation. ICIP 2014: 3327-3331 - [c104]Xuehu Yan, Shen Wang, Xiamu Niu:
Threshold Visual Secret Sharing Based on Boolean Operations and Random Grids. ICONIP (3) 2014: 620-627 - [c103]Xuehu Yan, Shen Wang, Xiamu Niu, Ching-Nung Yang:
Essential Visual Cryptographic Scheme with Different Importance of Shares. ICONIP (3) 2014: 636-643 - [c102]Xianhua Song, Shen Wang, Jianzhi Sang, Xuehu Yan, Xiamu Niu:
Flexible Quantum Image Secret Sharing Based on Measurement and Strip. IIH-MSP 2014: 215-218 - [c101]Xuehu Yan, Shen Wang, Xiamu Niu:
Equivalence Proof of Two (2, n) Progressive Visual Secret Sharing. IIH-MSP 2014: 223-226 - [c100]Xiamu Niu, Yongting Wang, Di Wu:
A Method to Generate Random Number for Cryptographic Application. IIH-MSP 2014: 235-238 - [c99]Jialiang Peng, Qiong Li, Xiamu Niu:
A Novel Finger Vein Image Quality Evaluation Method Based on Triangular Norm. IIH-MSP 2014: 239-242 - [c98]Zhenjia Dou, Kexin Ren, Qi Han, Xiamu Niu:
A Novel Real-Time Aeromagnetic Compensation Method Based on RLSQ. IIH-MSP 2014: 243-246 - [c97]Chen Cui, Shen Wang, Xiamu Niu:
Perceptual Image Hashing for DIBR 3D Images Based on Ring Partition and SIFT Feature Points. IIH-MSP 2014: 247-250 - [i2]Xianyan Wu, Qi Han, Dan Le, Xiamu Niu:
A New Method for Estimating the Widths of JPEG Images. CoRR abs/1410.2100 (2014) - [i1]Dan Le, Qiong Li, Xianyan Wu, Xiamu Niu:
Study on Successive Cancellation Decoding of Polar Codes. CoRR abs/1411.5082 (2014) - 2013
- [j35]Xin He, Huiyun Jing, Qi Han, Xiamu Niu:
Region Diversity Based Saliency Density Maximization for Salient Object Detection. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 394-397 (2013) - [j34]Xuefeng Bai, Tiejun Zhang, Chuanjun Wang, Ahmed A. Abd El-Latif, Xiamu Niu:
A Fully Automatic Player Detection Method Based on One-Class SVM. IEICE Trans. Inf. Syst. 96-D(2): 387-391 (2013) - [j33]Huiyun Jing, Xin He, Qi Han, Xiamu Niu:
CBRISK: Colored Binary Robust Invariant Scalable Keypoints. IEICE Trans. Inf. Syst. 96-D(2): 392-395 (2013) - [j32]Huiyun Jing, Qi Han, Xin He, Xiamu Niu:
Saliency Density and Edge Response Based Salient Object Detection. IEICE Trans. Inf. Syst. 96-D(5): 1243-1246 (2013) - [j31]Xianhua Song, Shen Wang, Siu-Ming Yiu, Lin Jiang, Xiamu Niu:
Detection of Image Region Duplication Using Spin Image. IEICE Trans. Inf. Syst. 96-D(7): 1565-1568 (2013) - [j30]Jialiang Peng, Qiong Li, Ahmed A. Abd El-Latif, Ning Wang, Xiamu Niu:
Finger Vein Recognition with Gabor Wavelets and Local Binary Patterns. IEICE Trans. Inf. Syst. 96-D(8): 1886-1889 (2013) - [j29]Ning Wang, Qiong Li, Ahmed A. Abd El-Latif, Jialiang Peng, Xiamu Niu:
Two-directional two-dimensional modified Fisher principal component analysis: an efficient approach for thermal face verification. J. Electronic Imaging 22(2): 023013 (2013) - [j28]Xuehu Yan, Shen Wang, Li Li, Ahmed A. Abd El-Latif, Zhiqiang Wei, Xiamu Niu:
A New Assessment Measure of Shadow Image Quality Based on Error Diffusion Techniques. J. Inf. Hiding Multim. Signal Process. 4(2): 119-127 (2013) - [j27]Xuehu Yan, Shen Wang, Ahmed A. Abd El-Latif, Jianzhi Sang, Xiamu Niu:
Corrigendum to "T. Chen, K. Tsao, Threshold visual secret sharing by random grids" [J. Syst. Softw. 84(2011) 1197-1208]. J. Syst. Softw. 86(5): 1462-1463 (2013) - [j26]Shen Wang, Xiamu Niu:
Hiding traces of double compression in JPEG images based on Tabu Search. Neural Comput. Appl. 22(Supplement-1): 283-291 (2013) - [j25]Zhaoqing Liu, Qiong Li, Xiamu Niu:
Improve the security of image robust hash using fuzzy commitment scheme. Neural Comput. Appl. 23(1): 67-72 (2013) - [j24]Xianhua Song, Shen Wang, Shuai Liu, Ahmed A. Abd El-Latif, Xiamu Niu:
A dynamic watermarking scheme for quantum images using quantum wavelet transform. Quantum Inf. Process. 12(12): 3689-3706 (2013) - [j23]Ahmed A. Abd El-Latif, Li Li, Ning Wang, Qi Han, Xiamu Niu:
A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces. Signal Process. 93(11): 2986-3000 (2013) - [c96]Jialiang Peng, Qiong Li, Qi Han, Xiamu Niu:
Feature-Level Fusion of Finger Biometrics Based on Multi-set Canonical Correlation Analysis. CCBR 2013: 216-224 - [c95]Ahmed A. Abd El-Latif, Ning Wang, Jialiang Peng, Qiong Li, Xiamu Niu:
A new encryption scheme for color images based on quantum chaotic system in transform domain. ICDIP 2013: 88781S - [c94]Jialiang Peng, Qiong Li, Ning Wang, Ahmed A. Abd El-Latif, Xiamu Niu:
An effective preprocessing method for finger vein recognition. ICDIP 2013: 887808 - [c93]Ning Wang, Qiong Li, Ahmed A. Abd El-Latif, Xuehu Yan, Xiamu Niu:
A Novel Hybrid Multibiometrics Based on the Fusion of Dual Iris, Visible and Thermal Face Images. ISBAST 2013: 217-223 - [c92]Tiejun Zhang, Qi Han, Handan Hou, Xiamu Niu:
Local Invariant Shape Feature for Cartoon Image Retrieval. RVSP 2013: 107-110 - 2012
- [j22]Zhenfeng Shi, Dan Le, Liyang Yu, Xiamu Niu:
3D Mesh Segmentation Based on Markov Random Fields and Graph Cuts. IEICE Trans. Inf. Syst. 95-D(2): 703-706 (2012) - [j21]Zhenfeng Shi, Xiamu Niu, Liyang Yu:
A Multi-Scale Structural Degradation Metric for Perceptual Evaluation of 3D Mesh Simplification. IEICE Trans. Inf. Syst. 95-D(7): 1989-2001 (2012) - [j20]Shen Wang, Xiamu Niu:
A Countermeasure against Double Compression Based Image Forensic. IEICE Trans. Inf. Syst. 95-D(10): 2577-2580 (2012) - [j19]Zhenfeng Shi, Liyang Yu, Ahmed A. Abd El-Latif, Xiamu Niu:
Skeleton Modulated Topological Perception Map for Rapid Viewpoint Selection. IEICE Trans. Inf. Syst. 95-D(10): 2585-2588 (2012) - [j18]Chuanjun Wang, Li Li, Xuefeng Bai, Xiamu Niu:
A Novel Expression Deformation Model for 3D Face Recognition. IEICE Trans. Inf. Syst. 95-D(12): 3113-3116 (2012) - [j17]Li Li, Ahmed A. Abd El-Latif, Xiamu Niu:
Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images. Signal Process. 92(4): 1069-1078 (2012) - [j16]Li Li, Ahmed A. Abd El-Latif, Xiamu Niu:
Corrigendum to "Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images" [Signal Process. 92(2012) 1069-1078]. Signal Process. 92(9): 2339-2340 (2012) - [j15]Yuenan Li, Zhe-Ming Lu, Ce Zhu, Xiamu Niu:
Robust Image Hashing Based on Random Gabor Filtering and Dithered Lattice Vector Quantization. IEEE Trans. Image Process. 21(4): 1963-1980 (2012) - [c91]Xin He, Huiyun Jing, Qi Han, Xiamu Niu:
A Novel Nonparametric Approach for Saliency Detection Using Multiple Features. ACIIDS (2) 2012: 83-90 - [c90]Huiyun Jing, Xin He, Qi Han, Xiamu Niu:
Motion Vector Based Information Hiding Algorithm for H.264/AVC against Motion Vector Steganalysis. ACIIDS (2) 2012: 91-98 - [c89]Xiamu Niu, Zhongwei Shuai, Yongqiang Lin, Xuehu Yan:
A Novel Coding Method for Multiple System Barcode Based on QR Code. ACIIDS (2) 2012: 99-108 - [c88]Xuefeng Bai, Tiejun Zhang, Chuanjun Wang, Qiong Li, Xiamu Niu:
Player detection using one-class SVM. ICDIP 2012: 83342X - [c87]Ahmed A. Abd El-Latif, Li Li, Ning Wang, Qiong Li, Xiamu Niu:
A new image encryption based on chaotic systems and singular value decomposition. ICDIP 2012: 83343F - [c86]Xin He, Huiyun Jing, Xuefeng Bai, Li Li, Qi Han, Xiamu Niu:
Saliency based SIFT keypoints filtration. ICDIP 2012: 833415 - [c85]Tiejun Zhang, Ahmed A. Abd El-Latif, Ning Wang, Qiong Li, Xiamu Niu:
A new image segmentation method via fusing NCut eigenvectors maps. ICDIP 2012: 833430 - [c84]Zhaoqing Liu, Qiong Li, Jingrui Liu, Xiamu Niu:
A novel evaluation method for perceptual hash algorithm in authentication mode. ICDIP 2012: 833444 - [c83]Chuanjun Wang, Xuefeng Bai, Tiejun Zhang, Xiamu Niu:
A Fourier series based expression deformation model for 3D face recognition. ICNC 2012: 130-133 - [c82]Jialiang Peng, Ning Wang, Ahmed A. Abd El-Latif, Qiong Li, Xiamu Niu:
Finger-vein Verification Using Gabor Filter and SIFT Feature Matching. IIH-MSP 2012: 45-48 - [c81]Xianhua Song, Shen Wang, Xiamu Niu:
An Integer DCT and Affine Transformation Based Image Steganography Method. IIH-MSP 2012: 102-105 - [c80]Xin He, Huiyun Jing, Qi Han, Xiamu Niu:
Saliency-Based Region Log Covariance Feature for Image Copy Detection. IWDW 2012: 327-335 - 2011
- [j14]Zhenfeng Shi, Hao Luo, Xiamu Niu:
Saliency-based structural degradation evaluation of 3D mesh simplification. IEICE Electron. Express 8(3): 161-167 (2011) - [j13]Xin He, Huiyun Jing, Qi Han, Xiamu Niu:
A Novel Bayes' Theorem-Based Saliency Detection Model. IEICE Trans. Inf. Syst. 94-D(12): 2545-2548 (2011) - [c79]Ahmed A. Abd El-Latif, Xiamu Niu, Ning Wang:
Chaotic Image Encryption Using Bézier Curve in DCT Domain Scrambling. DEIS 2011: 30-41 - [c78]Shen Wang, Xiamu Niu:
A PSO Based Image Disguise Method. IBICA 2011: 129-132 - [c77]Huiyun Jing, Xin He, Qi Han, Xiamu Niu:
A Saliency Detection Model Based on Local and Global Kernel Density Estimation. ICONIP (1) 2011: 164-171 - [c76]Ning Wang, Qiong Li, Qi Han, Ahmed A. Abd El-Latif, Xiamu Niu:
A Novel Multi-division Template Protection (MDTP) Scheme for Iris Recognition Based on Fuzzy Vault. IIH-MSP 2011: 101-104 - [c75]Xin He, Huiyun Jing, Qi Han, Xiamu Niu:
A Saliency Detection Approach to Combine LSK and Color for Color Image. IIH-MSP 2011: 129-132 - [c74]Tiejun Zhang, Xuefeng Bai, Xianhua Song, Xiamu Niu:
An Improved Algorithm for Multiple Closed Contour Detection. IIH-MSP 2011: 202-205 - [c73]Xuefeng Bai, Tiejun Zhang, Xianhua Song, Xiamu Niu:
Playfield Detection Using Color Ratio and Local Entropy. IIH-MSP 2011: 356-359 - [c72]Ahmed A. Abd El-Latif, Li Li, Ning Wang, Xiamu Niu:
Image Encryption Scheme of Pixel Bit Based on Combination of Chaotic Systems. IIH-MSP 2011: 369-373 - [c71]Jun-bin Fang, Zoe Lin Jiang, Siu-Ming Yiu, Kam-Pui Chow, Lucas Chi Kwong Hui, Long Chen, Xiamu Niu:
A Dual Cube Hashing Scheme for Solving LPP Integrity Problem. SADFE 2011: 1-7 - [e3]Xiamu Niu, Mingchu Li, Yôiti Suzuki, Jeng-Shyang Pan, Lakhmi C. Jain:
Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2011, Dalian, China, October 14-16, 2011. IEEE Computer Society 2011, ISBN 978-1-4577-1397-2 [contents] - 2010
- [j12]Yuanyuan Hu, Hao Luo, Xiamu Niu:
Image hashing framework for tampering localization in distorted images. IEICE Electron. Express 7(22): 1679-1685 (2010) - [j11]Shen Wang, Bian Yang, Xiamu Niu:
A Secure Steganography Method based on Genetic Algorithm. J. Inf. Hiding Multim. Signal Process. 1(1): 28-35 (2010) - [c70]Chuanjun Wang, Zhenfeng Shi, Xiamu Niu:
An Error Driven 3D Face Modeling Scheme Based on Partial Differential Equations. IIH-MSP 2010: 450-453 - [c69]Li Li, Qi Han, Xiamu Niu:
Enhanced Adaptive FEC Based Multiple Description Coding for Internet Video Streaming over Wireless Network. IIH-MSP 2010: 478-481 - [c68]Shen Wang, Qiong Li, Bian Yang, Xiamu Niu:
A Novel and Secure Image Interpolation Methods for Image Disguise. IIH-MSP 2010: 482-485 - [c67]Zhenfeng Shi, Qiong Li, Xiamu Niu:
A Perceptual Metric Based on Salient Information Entropy for 3D Mesh Distortion. IIH-MSP 2010: 563-566 - [c66]Bian Yang, Christoph Busch, Xiamu Niu:
Joint reversible data hiding and image encryption. Media Forensics and Security 2010: 75410V
2000 – 2009
- 2009
- [j10]Zhifang Wang, Qi Han, Xiamu Niu:
Complex kernel PCA for multimodal biometric recognition. IEICE Electron. Express 6(16): 1131-1136 (2009) - [j9]Di Wu, Xuebing Zhou, Xiamu Niu:
A novel image hash algorithm resistant to print-scan. Signal Process. 89(12): 2415-2424 (2009) - [j8]Di Wu, Wenhai Kong, Bian Yang, Xiamu Niu:
A fast SVD based video watermarking algorithm compatible with MPEG2 Standard. Soft Comput. 13(4): 375-382 (2009) - [j7]Yuhua Jiao, Liping Ji, Xiamu Niu:
Robust Speech Hashing for Content Authentication. IEEE Signal Process. Lett. 16(9): 818-821 (2009) - [c65]Zhifang Wang, Qiong Li, Xiamu Niu, Christoph Busch:
Multimodal Biometric Recognition Based on Complex KFDA. IAS 2009: 177-180 - [c64]Liping Ji, Haijin Liang, Yitao Song, Xiamu Niu:
A Normal-Traffic Network Covert Channel. CIS (1) 2009: 499-503 - [c63]Yuanyuan Hu, Xiamu Niu, ShuiSheng Liu, Hui Zhang:
A Novel Image Perceptual Hashing Algorithm via Feature Points and Fuzzy Distance Matching. CSIE (6) 2009: 509-513 - [c62]Abid Khan, Xiamu Niu, Waqas Anwar, Mansoor Ahmed, Ali Nawaz Khan:
Mobile agent watermarking (MAW): security properties and attacks revisited. FIT 2009: 32:1-32:6 - [c61]Bian Yang, Chongqing Zhou, Christoph Busch, Xiamu Niu:
Transparent and perceptually enhanced JPEG image encryption. DPS 2009: 1-6 - [c60]Jin-Bao Liu, Zhi-Long Qiu, Hui Zhou, Bao-Hui Liu, Xiamu Niu:
A Schema for Multi-Signature Handling Based on Workflow Model. IIH-MSP 2009: 378-381 - [c59]Qi Han, Qiong Li, Xiamu Niu:
Perceptual Content Authentication and Tamper Detection of Facial Image. IIH-MSP 2009: 811-814 - [c58]Yanan Wang, Di Wu, Hui Zhang, Xiamu Niu:
A Robust Contourlet Based Image Hash Algorithm. IIH-MSP 2009: 1010-1013 - [c57]Zhifang Wang, Qi Han, Xiamu Niu, Christoph Busch:
Template Protection for Multimodal Biometric System. IIH-MSP 2009: 1101-1104 - [c56]Zhifang Wang, Qi Han, Xiamu Niu, Christoph Busch:
Feature-Level Fusion of Iris and Face for Personal Identification. ISNN (3) 2009: 356-364 - [c55]Abid Khan, Qasim Arshad, Xiamu Niu, Yong Zhang, Muhammad Waqas Anwar:
On the Security Properties and Attacks against Mobile Agent Graph Head Sealing (MAGHS). ISA 2009: 223-228 - [e2]Ge Yu, Mario Köppen, Shyi-Ming Chen, Xiamu Niu:
9th International Conference on Hybrid Intelligent Systems (HIS 2009), August 12-14, 2009, Shenyang, China. IEEE Computer Society 2009, ISBN 978-0-7695-3745-0 [contents] - 2008
- [j6]Qi Han, Zhifang Wang, Xiamu Niu:
An Improved Biometric Template Protection Method based on Non-Uniform Quantization. J. Digit. Inf. Manag. 6(2): 168-173 (2008) - [c54]Yuhua Jiao, Mingyu Li, Bian Yang, Xiamu Niu:
Compressed domain robust hashing for AAC audio. ICME 2008: 1545-1548 - [c53]Qi Han, Chen Song, Meihui Zhang, Xiamu Niu:
A Novel Facial Image Retrieval Algorithm Based on PLT-PCA. IIH-MSP 2008: 87-90 - [c52]Xiamu Niu, Chongqing Zhou, Jianghua Ding, Bian Yang:
JPEG Encryption with File Size Preservation. IIH-MSP 2008: 308-311 - [c51]Qianwen Wang, Wenjun Huang, Xiamu Niu, Xiuzhan Jiang:
A Template Protection Scheme For Statistic Feature-based 2D Face Recognition. IIH-MSP 2008: 374-377 - [c50]Yuhua Jiao, Qiong Li, Xiamu Niu:
Compressed Domain Perceptual Hashing for MELP Coded Speech. IIH-MSP 2008: 410-413 - [c49]Hui Zhang, Shenghong Chen, Yuqin Sun, Xiamu Niu:
An Evaluation Framework for Kernel-Mode Security Modules. IIH-MSP 2008: 561-564 - [c48]Xuehu Yan, Shuai Guan, Xiamu Niu:
Research on the Capacity of Error-Correcting Codes-Based Information Hiding. IIH-MSP 2008: 1158-1161 - [c47]Xiamu Niu, Wei Song, Meiyu Lu, Wenjun Huang:
A 3D Model Authentication Algorithm Based on Reversible Watermarking. IIH-MSP 2008: 1286-1289 - [c46]Wenjun Huang, Xin Yu, Qiong Li, Xiamu Niu:
A New Face Recognition Scheme with Renewable Templates. IIH-MSP 2008: 1426-1429 - [c45]Yuhua Jiao, Mingyu Li, Qiong Li, Xiamu Niu:
Key-Dependent Compressed Domain Audio Hashing. ISDA (3) 2008: 29-32 - [c44]Hui Zhang, Yanan Wang, Xiamu Niu:
A Cyclic Coding Based Perceptual Hashing Algorithm. ISDA (2) 2008: 96-99 - [c43]Mingyu Li, Yuhua Jiao, Xiamu Niu:
Reversible Watermarking for Compressed Speech. ISDA (3) 2008: 197-201 - [c42]Qi Han, Meihui Zhang, Chen Song, Zhifang Wang, Xiamu Niu:
A Face Image Database for Evaluating Out-of-Focus Blur. ISDA (2) 2008: 277-282 - [c41]Zhifang Wang, Qi Han, Xiamu Niu, Christoph Busch:
A Novel Template Protection Algorithm for Iris Recognition. ISDA (2) 2008: 340-345 - [c40]Xuefeng Bai, Yong Zhang, Xiamu Niu:
Traffic Identification of Tor and Web-Mix. ISDA (1) 2008: 548-551 - [c39]Wenjun Huang, Xiamu Niu, Wei Song, Meiyu Lu:
Digital Watermark for 3D Face Model Authentication and EER Performance Analysis. ISDA (3) 2008: 550-554 - [c38]Hui Zhang, Haibin Zhang, Qiong Li, Xiamu Niu:
A Multi-Channel Combination Method of Image Perceptual Hashing. NCM (2) 2008: 87-90 - [c37]Abid Khan, Xiamu Niu, Waqas Anwar, Yong Zhang:
On the security properties and attacks against Mobile agent watermark encapsulation(MAWE). SMC 2008: 707-712 - [e1]Jeng-Shyang Pan, Xiamu Niu, Hsiang-Cheh Huang, Lakhmi C. Jain:
4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), Harbin, China, 15-17 August 2008, Proceedings. IEEE Computer Society 2008, ISBN 978-0-7695-3278-3 [contents] - 2007
- [j5]Xiao Tong Wang, Cheng Yong Shao, X. G. Xu, Xiamu Niu:
Reversible Data-Hiding Scheme for 2-D Vector Maps Based on Difference Expansion. IEEE Trans. Inf. Forensics Secur. 2(3-1): 311-320 (2007) - [c36]Xuehu Yan, Shenghong Chen, Xiamu Niu:
An Improved Algorithm for Iris Location. CIS 2007: 964-967 - [c35]Hui Zhang, Martin Schmucker, Xiamu Niu:
The Design and Application of PHABS: A Novel Benchmark Platform for Perceptual Hashing Algorithms. ICME 2007: 887-890 - [c34]Jin-Bao Liu, Xian-Qing Hu, Qiong Li, Xiamu Niu:
Design and Implementation of a PKI-Based Electronic Documents Protection Management System. IIH-MSP 2007: 87-92 - [c33]Qiong Li, Guoqiang Li, Yi-Liang He, Xiamu Niu:
Improved Adaptive Lifting Scheme for Wavelet-Based Image Compression. IIH-MSP 2007: 103-108 - [c32]Yong Zhang, Weixin Li, Xiamu Niu:
A Method of Bucket Index over Encrypted Character Data in Database. IIH-MSP 2007: 186-189 - [c31]Chang-yin Liang, Ang Li, Xiamu Niu:
Video Authentication and Tamper Detection Based on Cloud Model. IIH-MSP 2007: 225-228 - [c30]Yong Zhang, Qin-tao Song, Xiamu Niu:
The Key Management of the Encrypted Database Based on XML. IIH-MSP 2007: 229-232 - [c29]Li Li, Jing Wu, Xiaowei Guo, Meng Li, Xiamu Niu:
Framework for Windows Password Function Security Enhancement. IIH-MSP 2007: 269-274 - [c28]Yuhua Jiao, Yubo Tian, Qiong Li, Xiamu Niu:
Content Integrity Verification for G.729 Coded Speech. IIH-MSP 2007: 295-300 - [c27]Abid Khan, Xiamu Niu, Yong Zhang:
Protecting Mobile Agent's Computation Results with Reversible Watermarking and Digital Signature. IIH-MSP 2007: 566-569 - [c26]Chuanjun Wang, Xiamu Niu, Yong Zhang:
Anonymity in PKI Environment. IIH-MSP 2007: 570-576 - [c25]Qi Han, Qiong Li, Xiongdong Huang, Tong Zhou, Xiamu Niu:
Eyes Tracking in a Video Sequence Based-On Haar-like Features and Skin Color. IIH-MSP 2007: 608-611 - [c24]Yuhua Jiao, Bian Yang, Mingyu Li, Xiamu Niu:
MDCT-Based Perceptual Hashing for Compressed Audio Content Identification. MMSP 2007: 381-384 - [p1]Xiamu Niu, Cheng Yong Shao, Xiao Tong Wang:
GIS Watermarking: Hiding Data in 2D Vector Maps. Intelligent Multimedia Data Hiding: New Directions 2007: 123-155 - 2006
- [j4]Cheng Yong Shao, Hai Long Wang, Xiamu Niu, Xiao Tong Wang:
A Shape-Preserving Method for Watermarking 2D Vector Maps Based on Statistic Detection. IEICE Trans. Inf. Syst. 89-D(3): 1290-1293 (2006) - [c23]Yong Zhang, Xiamu Niu, Abid Khan, Qiong Li, Qi Han:
A Novel Method of Watermarking Relational Databases using Character String. Artificial Intelligence and Applications 2006: 120-124 - [c22]Yong Zhang, Xiamu Niu, Juncao Li, Chun-ming Li:
Research on a Novel Hashing Stream Cipher. CIS 2006: 481-490 - [c21]Juncao Li, Yong Zhang, Wenhai Kong, Xiamu Niu:
Fingerprint Identification Based on Frequency Texture Analysis. ICICIC (2) 2006: 121-125 - [c20]Wenhai Kong, Bian Yang, Di Wu, Xiamu Niu:
SVD Based Blind Video Watermarking Algorithm. ICICIC (1) 2006: 265-268 - [c19]Yuping Deng, Xiaowei Guo, Xiamu Niu:
A New Design Scheme of Role-Based Access Control Based on PKI. ICICIC (3) 2006: 669-672 - [c18]Yong Zhang, Xiamu Niu, Dongning Zhao, Juncao Li, Siming Liu:
Relational Databases Watermark Technique Based on Content Characteristic. ICICIC (3) 2006: 677-680 - [c17]Bian Yang, Fan Gu, Xiamu Niu:
Block Mean Value Based Image Perceptual Hashing. IIH-MSP 2006: 167-172 - [c16]Qiong Li, Zhaoqing Liu, Xiamu Niu:
Analysis and Problems on Fuzzy Vault Scheme. IIH-MSP 2006: 244-250 - [c15]Yuhua Jiao, Bian Yang, He Wang, Xiamu Niu:
SVD Based Robust Image Content Retrieval. IIH-MSP 2006: 351-354 - [c14]Jie Liu, Xiamu Niu, Wenhai Kong:
Image Watermarking Based on Singular Value Decomposition. IIH-MSP 2006: 457-460 - [c13]Zhifang Wang, Bian Yang, Xiamu Niu, Yijia Zhang:
A Practical Multipurpose Watermarking Scheme for Visual Content Copyright Protection and Authentication. IIH-MSP 2006: 461-464 - [c12]Han Yu, Xiamu Niu, Duohe Ma, Changxiang Shen:
Research on Applying Java Card to Database Encryption Systems. IIH-MSP 2006: 575-578 - [c11]Daimao Lin, Linna Zhou, Yunbiao Guo, Lan Hu, Xiamu Niu:
Focus on the Generalized Information Hiding Technology. IIH-MSP 2006: 605-608 - [c10]Qi Han, Zhifang Wang, Xiamu Niu:
A Non-uniform Quantizing Approach to Protect Biometric Templates. IIH-MSP 2006: 693-698 - 2005
- [j3]Longjiang Yu, Xiamu Niu, Sheng-He Sun:
Print-and-scan model and the watermarking countermeasure. Image Vis. Comput. 23(9): 807-814 (2005) - [c9]Qiong Li, Xiamu Niu, Zhifang Wang, Yuhua Jiao, Sheng-He Sun:
A Verifiable Fingerprint Vault Scheme. KES (3) 2005: 1072-1078 - [c8]Xin-guang Zou, Qiong Li, Sheng-He Sun, Xiamu Niu:
The Research on Information Hiding Based on Command Sequence of FTP Protocol. KES (3) 2005: 1079-1085 - [c7]Yunbiao Guo, Daimao Lin, Xiamu Niu, Lan Hu, Linna Zhou:
A Secure Steganographic Scheme in Binary Image. KES (3) 2005: 1093-1100 - [c6]Longjiang Yu, Xiamu Niu, Sheng-He Sun:
SVG-Based Countermeasure to Geometric Attack. KES (2) 2005: 1129-1133 - [c5]Bian Yang, Martin Schmucker, Christoph Busch, Xiamu Niu, Sheng-He Sun:
Approaching optimal value expansion for reversible watermarking. MM&Sec 2005: 95-102 - [c4]Cheng Yong Shao, Hai Long Wang, Xiamu Niu, Xiao Tong Wang:
Shape-Preserving Algorithm for Watermarking 2-D Vector Map Data. MMSP 2005: 1-4 - [c3]Bian Yang, Martin Schmucker, Xiamu Niu, Christoph Busch, Sheng-He Sun:
Integer-DCT-based reversible image watermarking by adaptive coefficient modification. Security, Steganography, and Watermarking of Multimedia Contents 2005: 218-229 - 2004
- [c2]Bian Yang, Martin Schmucker, Xiamu Niu, Christoph Busch, Sheng-He Sun:
Reversible image watermarking by histogram modification for integer DCT coefficients. MMSP 2004: 143-146 - 2002
- [c1]Xiamu Niu, Martin Schmucker, Christoph Busch:
Video watermarking resistance to rotation, scaling, and translation. Security and Watermarking of Multimedia Contents 2002: 512-519 - 2000
- [j2]Xiamu Niu, Zhe-Ming Lu, Sheng-He Sun:
Digital watermarking of still images with gray-level digital watermarks. IEEE Trans. Consumer Electron. 46(1): 137-145 (2000) - [j1]Xiamu Niu, Sheng-He Sun, Wenjun Xiang:
Multiresolution watermarking for video based on gray-level digital watermark. IEEE Trans. Consumer Electron. 46(2): 375-384 (2000)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint