Author image not provided
 Mengyu Qiao

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article7.95
Citation Count151
Publication count19
Publication years2008-2015
Available for download6
Average downloads per article540.67
Downloads (cumulative)3,244
Downloads (12 Months)163
Downloads (6 Weeks)19
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


19 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 19 of 19
Sort by:

1
July 2015 COMPSAC '15: Proceedings of the 2015 IEEE 39th Annual Computer Software and Applications Conference - Volume 02
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

With the booming of smart phone and high-speed wireless networks in recent years, applications and data have been shifting from desktop to mobile devices at a vigorous pace. Although mobile computing provides great convenience in daily life, it becomes vulnerable to various types of emerging attacks. User authentication plays an ...
Keywords: multi-touch gestures, biometric, authentication, password, pressure sensiitvity

2
December 2013 Applied Intelligence: Volume 39 Issue 4, December 2013
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 4

Digital multimedia forensics is an emerging field that has important applications in law enforcement and protection of public safety and national security. In digital imaging, JPEG is the most popular lossy compression standard and JPEG images are ubiquitous. Today's digital techniques make it easy to tamper JPEG images without leaving ...
Keywords: Image complexity, Support vector machine, Hierarchical clustering, JPEG double compression, Smartphone identification, Source, Classification, Image forensics, Marginal density, Neighboring joint density

3
December 2013 Journal of Computing Sciences in Colleges: Volume 29 Issue 2, December 2013
Publisher: Consortium for Computing Sciences in Colleges
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 4,   Downloads (12 Months): 48,   Downloads (Overall): 765

Full text available: PDFPDF
With the booming of smartphone and wireless networks, contactless payment systems have been gradually accepted by a range of sectors and industries. Near Field Communication (NFC), as a de facto standard for radio communication, dominates this market and has accumulated many applications, such as use as a digital wallet and ...

4
May 2013 Information Sciences: an International Journal: Volume 231, May, 2013
Publisher: Elsevier Science Inc.
Bibliometrics:
Citation Count: 3

MP3, one of the most widely used digital audio formats, provides a high compression ratio with faithful quality. The widespread use enables MP3 audio files to become excellent covers to carry hidden information in audio steganography on the Internet. Our research, however, indicates that there are few steganalysis methods proposed ...
Keywords: SVM, MP3, Feature selection, Signal complexity, Steganalysis, Steganography

5
June 2012 IEA/AIE'12: Proceedings of the 25th international conference on Industrial Engineering and Other Applications of Applied Intelligent Systems: advanced research in applied artificial intelligence
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 4

As smartphones are being widely used in daily lives, the images captured by smartphones become ubiquitous and may be used for legal purposes. Accordingly, the authentication of smartphone images and the identification of post-capture manipulation are of significant interest in digital forensics. In this paper, we propose a method to ...
Keywords: JPEG images, operation, classification, hierarchical clustering, support vector machine, source, image forensics, neighboring joint density, smartphone identification

6 published by ACM
September 2011 ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM): Volume 7 Issue 3, August 2011
Publisher: ACM
Bibliometrics:
Citation Count: 13
Downloads (6 Weeks): 5,   Downloads (12 Months): 25,   Downloads (Overall): 519

Full text available: PDFPDF
This article presents a second-order derivative-based audio steganalysis. First, Mel-cepstrum coefficients and Markov transition features from the second-order derivative of the audio signal are extracted; a support vector machine is then applied to the features for discovering the existence of hidden data in digital audio streams. Also, the relation between ...
Keywords: signal complexity, Audio, SVM, derivative, steganography, Markov, Mel-cepstrum, steganalysis

7
May 2011 ISNN'11: Proceedings of the 8th international conference on Advances in neural networks - Volume Part II
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 9

Digital multimedia forensics is an emerging field that has important applications in law enforcement, the protection of public safety, and notational security. As a popular image compression standard, the JPEG format is widely adopted; however, the tampering of JPEG images can be easily performed without leaving visible clues, and it ...
Keywords: digital forensics, feature mining, quality factor, SVM, forgery, marginal density, DCT, coefficient, double JPEG compression, image complexity, neighboring joint density

8 published by ACM
February 2011 ACM Transactions on Intelligent Systems and Technology (TIST): Volume 2 Issue 2, February 2011
Publisher: ACM
Bibliometrics:
Citation Count: 22
Downloads (6 Weeks): 2,   Downloads (12 Months): 33,   Downloads (Overall): 644

Full text available: PDFPDF
The threat posed by hackers, spies, terrorists, and criminals, etc. using steganography for stealthy communications and other illegal purposes is a serious concern of cyber security. Several steganographic systems that have been developed and made readily available utilize JPEG images as carriers. Due to the popularity of JPEG images on ...
Keywords: neighboring joint density, nuero-fuzzy, JPEG, SVMRFE, SVM, classification, steganography, steganalysis

9 published by ACM
October 2010 MM '10: Proceedings of the 18th ACM international conference on Multimedia
Publisher: ACM
Bibliometrics:
Citation Count: 9
Downloads (6 Weeks): 4,   Downloads (12 Months): 20,   Downloads (Overall): 432

Full text available: PDFPDF
MP3 is the most popular format for audio storage and a de facto standard of digital audio compression for the transfer and playback. The flexibility of compression ratio of MP3 coding enables users to choose their customized configuration in the trade-off between file size and quality. Double MP3 compression often ...
Keywords: pattern classification, SVM, audio, neuron-fuzzy inference system, double mp3 compression, digital forgery

10
May 2010 Information Sciences: an International Journal: Volume 180 Issue 9, May, 2010
Publisher: Elsevier Science Inc.
Bibliometrics:
Citation Count: 18

Steganography secretly embeds additional information in digital products, the potential for covert dissemination of malicious software, mobile code, or information is great. To combat the threat posed by steganography, steganalysis aims at the exposure of the stealthy communication. In this paper, a new scheme is proposed for steganalysis of JPEG ...
Keywords: Markov, MSVM-RFE, Steganalysis, Steganography, JPEG, Polynomial fitting, SVM-RFE

11 published by ACM
October 2009 MM '09: Proceedings of the 17th ACM international conference on Multimedia
Publisher: ACM
Bibliometrics:
Citation Count: 13
Downloads (6 Weeks): 4,   Downloads (12 Months): 26,   Downloads (Overall): 470

Full text available: PDFPDF
Detection of information-hiding in JPEG images is actively delivered in steganalysis community due to the fact that JPEG is a widely used compression standard and several steganographic systems have been designed for covert communication in JPEG images. In this paper, we propose a novel method of JPEG steganalysis. Based on ...
Keywords: Markov, steganalysis, image complexity, joint density, JPEG, generalized gaussian distribution, SVM

12 published by ACM
October 2009 MM '09: Proceedings of the 17th ACM international conference on Multimedia
Publisher: ACM
Bibliometrics:
Citation Count: 12
Downloads (6 Weeks): 0,   Downloads (12 Months): 11,   Downloads (Overall): 414

Full text available: PDFPDF
In this paper, we present a novel stream data mining for audio steganalysis, based on second order derivative of audio streams. We extract Mel-cepstrum coefficients and Markov transition features on the second order derivative, a support vector machine is applied to the features for discovery of the existence of covert ...
Keywords: mel-cepstrum, signal complexity, SVM, audio, spectrum, steganography, steganalysis, markov, second order derivative

13
October 2009 International Journal of Knowledge Engineering and Soft Data Paradigms: Volume 1 Issue 3, October 2009
Publisher: Inderscience Publishers
Bibliometrics:
Citation Count: 0

Mass spectrometry has become a widely used measurement in proteomics research. High dimensionality of features and small dataset are two major limitations hindering the accuracy of classification in mass spectrum data analysis; consequently, to obtain good results, the issues of feature extraction and feature selection are especially important. The quality ...
Keywords: SVM recursive features, mass spectrometry, SVMRFE, distance metric learning, support vector machines, classification, manifold learning, feature selection, proteomics, recursive feature elimination

14
September 2009 IEEE Transactions on Information Forensics and Security: Volume 4 Issue 3, September 2009
Publisher: IEEE Press
Bibliometrics:
Citation Count: 19

To improve a recently developed mel-cepstrum audio steganalysis method, we present in this paper a method based on Fourier spectrum statistics and mel-cepstrum coefficients, derived from the second-order derivative of the audio signal. Specifically, the statistics of the high-frequency spectrum and the melcepstrum coefficients of the second-order derivative are extracted ...
Keywords: mel-cepstrum, Audio, audio, second-order derivative, spectrum, steganalysis, support vector machine (SVM), wavelet

15
August 2009 IJCBS '09: Proceedings of the 2009 International Joint Conference on Bioinformatics, Systems Biology and Intelligent Computing
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 4

MP3 allows a high compression ratio while providing high fidelity. As it has become one of the most popular digital audio formats, MP3 is also conceivably a most utilized carrier for audio steganography, therefore, MP3 steganalysis is a topic deserving attention. In this paper, we propose a scheme for steganalysis ...
Keywords: audio, steganalysis, MP3, second order derivative, Markov, joint density, SVM

16
July 2009 MLDM '09: Proceedings of the 6th International Conference on Machine Learning and Data Mining in Pattern Recognition
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 1

In this paper, we propose an audio steganalysis method called reference based Fourier Spectrum Steganalysis. The mean values and the standard deviations of the high frequency spectrum of the second and high order derivatives are extracted from the testing signals and the reference versions. A Support Vector Machine (SVM) is ...
Keywords: SVM, audio, derivative, spectrum, steganography, steganalysis

17
June 2009 IJCNN'09: Proceedings of the 2009 international joint conference on Neural Networks
Publisher: IEEE Press
Bibliometrics:
Citation Count: 9

In this article, we propose a scheme for detecting hidden messages in compressed audio files produced by MP3Stego, as our literature search has found no previous work on successful steganalysis of MP3Stego. We extract moment statistical features on the second derivatives, as well as Markov transition features and neighboring joint ...

18
December 2008 ICMLA '08: Proceedings of the 2008 Seventh International Conference on Machine Learning and Applications
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

Mass spectrometry becomes the most widely used measurement in proteomics research. High dimensionality of features and small dataset are two major limitations restrict the accuracy of classification in mass spectrum data analysis. To improve the data mining result, two major issues need to be highlighted, which are feature extraction and ...
Keywords: Proteomics, mass spectrum, feature selection, classification, distance metric learning

19
December 2008 ICMLA '08: Proceedings of the 2008 Seventh International Conference on Machine Learning and Applications
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 4

In this article, we propose a scheme of detecting the information-hiding in videos based on the pairs of condition and joint distributions in the transform domains. Specifically, based on the approach of the Markov-process in JPEG image steganalysis [1] and our previous work [11], we propose the pairs of condition ...
Keywords: Video Steganalysis, MSU StegoVideo, Markov, Joint distribution



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us