Sheng Li (李晟)
Sheng Li (李晟)
Verified email at fudan.edu.cn
Title
Cited by
Cited by
Year
Fingerprint Combination for Privacy Protection
S Li, A Kot
IEEE Transactions on Information Forensics and Security 8 (2), 350 - 360, 2013
732013
Privacy protection of fingerprint database
S Li, AC Kot
IEEE Signal Processing Letters 18 (2), 115-118, 2011
362011
Towards robust image steganography
J Tao, S Li, X Zhang, Z Wang
IEEE Transactions on Circuits and Systems for Video Technology 29 (2), 594-600, 2018
312018
An Improved Scheme for Full Fingerprint Reconstruction
S Li, A Kot
IEEE Transactions on Information Forensics and Security 7 (6), 1906 - 1912, 2012
312012
Toward construction-based data hiding: From secrets to fingerprint images
S Li, X Zhang
IEEE Transactions on Image Processing 28 (3), 1482-1497, 2018
282018
A novel system for fingerprint privacy protection< sup> 1</sup>
S Li, AC Kot
2011 7th International Conference on Information Assurance and Security (IAS …, 2011
282011
Attack using reconstructed fingerprint
S Li, AC Kot
2011 IEEE International Workshop on Information Forensics and Security (WIFS …, 2011
222011
Lossless data hiding in JPEG bitstream using alternative embedding
Y Qiu, H He, Z Qian, S Li, X Zhang
Journal of Visual Communication and Image Representation 52, 86-91, 2018
172018
Quality assessment of finger-vein image
H Qin, S Li, AC Kot, L Qin
Proceedings of the 2012 Asia Pacific signal and information processing …, 2012
162012
利用 JPEG 压缩特性的合成图像检测
李晟, 张新鹏
应用科学学报 26 (3), 281-287, 2008
162008
Privacy protection of fingerprint database using lossless data hiding
S Li, AC Kot
2010 IEEE International Conference on Multimedia and Expo, 1293-1298, 2010
132010
DeepBag: Recognizing Handbag Models
Y Wang, S Li, AC Kot
IEEE Transactions on Multimedia 17 (11), 2072-2083, 2015
122015
Diversity-based cascade filters for JPEG steganalysis
G Feng, X Zhang, Y Ren, Z Qian, S Li
IEEE Transactions on Circuits and Systems for Video Technology 30 (2), 376-386, 2019
112019
On Branded Handbag Recognition
ACK Y Wang, S Li
IEEE TRANSACTIONS ON MULTIMEDIA 18 (9), 1869-1881, 2016
10*2016
Complementary feature extraction for branded handbag recognition
Y Wang, S Li, AC Kot
2014 IEEE International Conference on Image Processing (ICIP), 5896-5900, 2014
52014
Category-separating strategy for branded handbag recognition
Y Wang, S Li, AC Kot
2014 6th International Symposium on Communications, Control and Signal …, 2014
42014
Data hiding in Iris image for privacy protection
S Li, X Chen, Z Wang, Z Qian, X Zhang
IETE technical review 35 (sup1), 34-41, 2018
32018
Constructive steganography using texture synthesis
Z Qian, N Huang, S Li, X Zhang
IETE Technical Review 35 (sup1), 14-22, 2018
32018
Steganography by constructing marbling texture
Z Qian, L Pan, S Li, X Zhang
International Conference on Cloud Computing and Security, 428-439, 2018
32018
Tagging the shoe images by semantic attributes
H Zhan, S Li, AC Kot
2015 IEEE International Conference on Digital Signal Processing (DSP), 892-895, 2015
32015
The system can't perform the operation now. Try again later.
Articles 1–20