Towards robust image steganography J Tao, S Li, X Zhang, Z Wang IEEE Transactions on Circuits and Systems for Video Technology 29 (2), 594-600, 2018 | 137 | 2018 |
Fingerprint Combination for Privacy Protection S Li, A Kot IEEE Transactions on Information Forensics and Security 8 (2), 350 - 360, 2013 | 92 | 2013 |
Toward construction-based data hiding: from secrets to fingerprint images S Li, X Zhang IEEE Transactions on Image Processing 28 (3), 1482-1497, 2018 | 75 | 2018 |
Privacy protection of fingerprint database S Li, AC Kot IEEE Signal Processing Letters 18 (2), 115-118, 2011 | 50 | 2011 |
An Improved Scheme for Full Fingerprint Reconstruction S Li, A Kot IEEE Transactions on Information Forensics and Security 7 (6), 1906 - 1912, 2012 | 43 | 2012 |
Lossless data hiding in JPEG bitstream using alternative embedding Y Qiu, H He, Z Qian, S Li, X Zhang Journal of Visual Communication and Image Representation 52, 86-91, 2018 | 38 | 2018 |
Diversity-based cascade filters for JPEG steganalysis G Feng, X Zhang, Y Ren, Z Qian, S Li IEEE transactions on circuits and systems for video technology 30 (2), 376-386, 2019 | 37 | 2019 |
A novel system for fingerprint privacy protection< sup> 1</sup> S Li, AC Kot 2011 7th International Conference on Information Assurance and Security (IAS …, 2011 | 32 | 2011 |
Exploring stable coefficients on joint sub-bands for robust video watermarking in DT CWT domain W Huan, S Li, Z Qian, X Zhang IEEE Transactions on Circuits and Systems for Video Technology 32 (4), 1955-1965, 2021 | 29 | 2021 |
Attack using reconstructed fingerprint S Li, AC Kot 2011 IEEE International Workshop on Information Forensics and Security (WIFS …, 2011 | 29 | 2011 |
Quality assessment of finger-vein image H Qin, S Li, AC Kot, L Qin Proceedings of the 2012 Asia Pacific signal and information processing …, 2012 | 23 | 2012 |
Detection of spoofing medium contours for face anti-spoofing X Zhu, S Li, X Zhang, H Li, AC Kot IEEE Transactions on Circuits and Systems for Video Technology 31 (5), 2039-2045, 2019 | 22 | 2019 |
Data hiding in iris image for privacy protection S Li, X Chen, Z Wang, Z Qian, X Zhang IETE technical review 35 (sup1), 34-41, 2018 | 19 | 2018 |
利用 JPEG 压缩特性的合成图像检测 李晟, 张新鹏 应用科学学报 26 (3), 281-287, 2008 | 16 | 2008 |
Privacy protection of fingerprint database using lossless data hiding S Li, AC Kot 2010 IEEE International Conference on Multimedia and Expo, 1293-1298, 2010 | 14 | 2010 |
On Branded Handbag Recognition ACK Y Wang, S Li IEEE TRANSACTIONS ON MULTIMEDIA 18 (9), 1869-1881, 2016 | 13* | 2016 |
DeepBag: Recognizing Handbag Models Y Wang, S Li, AC Kot IEEE Transactions on Multimedia 17 (11), 2072-2083, 2015 | 13 | 2015 |
Reversible privacy-preserving recognition Z You, S Li, Z Qian, X Zhang 2021 IEEE International Conference on Multimedia and Expo (ICME), 1-6, 2021 | 12 | 2021 |
信息隐藏研究展望 张新鹏, 钱振兴, 李晟 应用科学学报 34 (5), 475-489, 2016 | 11 | 2016 |
High-capacity framework for reversible data hiding in encrypted image using pixel prediction and entropy encoding Y Qiu, Q Ying, Y Yang, H Zeng, S Li, Z Qian IEEE Transactions on Circuits and Systems for Video Technology 32 (9), 5874-5887, 2022 | 10 | 2022 |