Lm Cheng
Lm Cheng
Associate Professor of Electronic Engineeing, Cit University of Hong Kong
Verified email at cityu.edu.hk
TitleCited byYear
Hiding data in images by simple LSB substitution
CK Chan, LM Cheng
Pattern recognition 37 (3), 469-474, 2004
16522004
Cryptanalysis of a remote user authentication scheme using smart cards
CK Chan, LM Cheng
IEEE Transactions on Consumer Electronics 46 (4), 992-993, 2000
2562000
Cryptanalysis of a modified remote user authentication scheme using smart cards
KC Leung, LM Cheng, AS Fong, CK Chan
IEEE Transactions on Consumer Electronics 49 (4), 1243-1245, 2003
1342003
Improved hiding data in images by optimal moderately-significant-bit replacement
CK Chan, LM Cheng
Electronics Letters 37 (16), 1017-1018, 2001
1172001
Cryptanalysis of a timestamp-based password authentication scheme
CK Chan, LM Cheng
Computers & Security 21 (1), 74-76, 2001
1152001
A secure communication scheme based on the phase synchronization of chaotic systems
JY Chen, KW Wong, LM Cheng, JW Shuai
Chaos: An Interdisciplinary Journal of Nonlinear Science 13 (2), 508-514, 2003
932003
A new symmetric probabilistic encryption scheme based on chaotic attractors of neural networks
D Guo, LM Cheng, LL Cheng
Applied Intelligence 10 (1), 71-84, 1999
781999
Multipurpose watermarking based on multiscale curvelet transform
C Zhang, LL Cheng, Z Qiu, LM Cheng
IEEE Transactions on Information Forensics and Security 3 (4), 611-619, 2008
672008
Synchronization of spatiotemporal chaos with positive conditional Lyapunov exponents
JW Shuai, KW Wong, LM Cheng
Physical Review E 56 (2), 2272, 1997
541997
Adaptive water marking
KK Wong, CH Tse, KS Ng, TH Lee, LM Cheng
IEEE Transactions on Consumer Electronics 43 (4), 1003-1009, 1997
421997
A novel image-hiding scheme based on block difference
SL Li, KC Leung, LM Cheng, CK Chan
Pattern Recognition 39 (6), 1168-1176, 2006
402006
Fast elliptic scalar multiplication using new double-base chain and point halving
KW Wong, ECW Lee, LM Cheng, X Liao
Applied mathematics and computation 183 (2), 1000-1007, 2006
392006
The convergence properties of a clipped Hopfield network and its application in the design of keystream generator
CK Chan, LM Cheng
IEEE Transactions on Neural Networks 12 (2), 340-348, 2001
352001
Data hiding in images by adaptive LSB substitution based on the pixel-value differencing
SL Li, KC Leung, LM Cheng, CK Chan
First International Conference on Innovative Computing, Information and …, 2006
332006
Adaptive reversible data hiding based on block median preservation and modification of prediction errors
HY Leung, LM Cheng, F Liu, QK Fu
Journal of Systems and Software 86 (8), 2204-2219, 2013
312013
Digital watermarking based on frequency random position insertion
LM Cheng, LL Cheng, CK Chan, KW Ng
ICARCV 2004 8th Control, Automation, Robotics and Vision Conference, 2004. 2 …, 2004
282004
Sequence generator and method of generating a pseudo random sequence
LM Cheng, CK Chan
US Patent 7,142,675, 2006
272006
A robust watermarking scheme using selective curvelet coefficients
HY Leung, LM Cheng, LL Cheng
International Journal of Wavelets, Multiresolution and Information …, 2009
242009
Optical modified signed-digit addition based on binary logical operations
KW Wong, LM Cheng
Optics & Laser Technology 26 (4), 213-217, 1994
231994
High-efficiency cosine-approximated binary Gabor zone plate
CM Choy, LM Cheng
Applied optics 33 (5), 794-799, 1994
221994
The system can't perform the operation now. Try again later.
Articles 1–20