default search action
Lee-Ming Cheng
Person information
- affiliation: City University of Hong Kong, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j39]Fawad Ahmad, Lee-Ming Cheng, Asif Khan:
Lightweight and Privacy-Preserving Template Generation for Palm-Vein-Based Human Recognition. IEEE Trans. Inf. Forensics Secur. 15: 184-194 (2020) - [c28]Yanchao Yang, Mingwei Qi, Junwei Zhou, Lee-Ming Cheng:
Modified Decoding Metric Of Distributed Arithmetic Coding. ICIP 2020: 1108-1112
2010 – 2019
- 2019
- [j38]Jia Wang, Houbing Song, Jianqiang Li, Qiuzhen Lin, Lee-Ming Cheng:
Modular exponential multivariate sequence and its application to lightweight security design. Future Gener. Comput. Syst. 98: 435-443 (2019) - [j37]Lingying Chen, Guanghui Zhao, Junwei Zhou, Anthony T. S. Ho, Lee-Ming Cheng:
Face template protection using deep LDPC codes learning. IET Biom. 8(3): 190-197 (2019) - [j36]Jia Wang, Jianqiang Li, Huihui Wang, Leo Yu Zhang, Lee-Ming Cheng, Qiuzhen Lin:
Dynamic Scalable Elliptic Curve Cryptographic Scheme and Its Application to In-Vehicle Security. IEEE Internet Things J. 6(4): 5892-5901 (2019) - [c27]Ziye Tong, Junwei Zhou, Yanchao Yang, Lee-Ming Cheng:
Robust Facial Landmark Localization Based on Two-Stage Cascaded Pose Regression. AAAI 2019: 10055-10056 - [c26]Fawad Ahmad, Lee-Ming Cheng:
Paper Document Authentication Using Print-Scan Resistant Image Hashing and Public-Key Cryptography. SpaCCS 2019: 157-165 - 2018
- [j35]Junwei Zhou, Fang Liu, Lee-Ming Cheng:
Image authentication using distributed arithmetic coding. Multim. Tools Appl. 77(12): 15505-15520 (2018) - [j34]Fawad Ahmad, Lee-Ming Cheng:
Authenticity and copyright verification of printed images. Signal Process. 148: 322-335 (2018) - [j33]Jia Wang, Lee-Ming Cheng, Tong Su:
Multivariate Cryptography Based on Clipped Hopfield Neural Network. IEEE Trans. Neural Networks Learn. Syst. 29(2): 353-363 (2018) - [c25]Fawad Ahmad, Lee-Ming Cheng:
Watermark Extraction under Print-Cam Process Using Wave Atoms Based Blind Digital Watermarking. ICVISP 2018: 59:1-59:5 - 2016
- [j32]Lee-Ming Cheng, Wai Ping Choi Choi, Anita Yiu Ming Wong:
A novel client service quality measuring model and an eHealthcare mitigating approach. Int. J. Medical Informatics 91: e16-e31 (2016) - [j31]Yanchao Yang, Junwei Zhou, Feipeng Duan, Fang Liu, Lee-Ming Cheng:
Wave atom transform based image hashing using distributed source coding. J. Inf. Secur. Appl. 31: 75-82 (2016) - 2015
- [j30]Hon Yin Leung, Lee-Ming Cheng, Xiangyu Li:
A FPGA implementation of facial feature extraction. J. Real Time Image Process. 10(1): 135-149 (2015) - [j29]Fang Liu, Lee-Ming Cheng:
Wave Atom-Based Perceptual Image Hashing Against Content-Preserving and Content-Altering Attacks. Trans. Data Hiding Multim. Secur. 10: 21-37 (2015) - 2014
- [c24]Fang Liu, Hui Wang, Lee-Ming Cheng, Anthony T. S. Ho, Shujun Li:
Enhanced perceptual image authentication with tamper localization and self-restoration. ICME 2014: 1-6 - 2013
- [j28]Lee-Ming Cheng, K. W. Wong:
Editorial: Smart Card and RFID Security. J. Inf. Secur. Appl. 18(2-3): 97 (2013) - [j27]Hon Yin Leung, Lee-Ming Cheng, Fang Liu, Q. K. Fu:
Adaptive reversible data hiding based on block median preservation and modification of prediction errors. J. Syst. Softw. 86(8): 2204-2219 (2013) - 2012
- [j26]Hon Yin Leung, Lee-Ming Cheng, Fang Liu:
Robust digital image watermarking scheme using wave atoms with multiple description coding. EURASIP J. Adv. Signal Process. 2012: 245 (2012) - [c23]Fang Liu, Qi-Kai Fu, Lee-Ming Cheng:
Memoryless Hash-Based Perceptual Image Authentication. IWDW 2012: 425-434 - 2011
- [j25]H. Y. Y. Leung, Lee-Ming Cheng:
Robust Watermarking Scheme Using Wave Atoms. EURASIP J. Adv. Signal Process. 2011 (2011) - [c22]Fang Liu, Lee-Ming Cheng:
A Novel Image Hashing Scheme Based on Wave Atoms. IIH-MSP 2011: 125-128 - [c21]Fang Liu, Lee-Ming Cheng:
Perceptual Image Hashing via Wave Atom Transform. IWDW 2011: 468-478 - 2010
- [j24]H. Y. Leung, Lee-Ming Cheng, L. L. Cheng:
Robust Watermarking Schemes Using Selective Curvelet Coefficients Based on a HVS Model. Int. J. Wavelets Multiresolution Inf. Process. 8(6): 941-959 (2010) - [c20]Lee-Ming Cheng, L. L. Cheng:
A forensic chip for secure digital video recording. ISCAS 2010: 3068-3071 - [c19]H. Y. Leung, Lee-Ming Cheng:
Robust Blind Watermarking Scheme Using Wave Atoms. IWDW 2010: 148-158
2000 – 2009
- 2009
- [j23]H. Y. Leung, Lee-Ming Cheng, L. L. Cheng:
A Robust Watermarking Scheme Using Selective Curvelet Coefficients. Int. J. Wavelets Multiresolution Inf. Process. 7(2): 163-181 (2009) - [j22]Hongya Zhao, Kwok-Leung Chan, Lee-Ming Cheng, Hong Yan:
A probabilistic relaxation labeling framework for reducing the noise effect in geometric biclustering of gene expression data. Pattern Recognit. 42(11): 2578-2588 (2009) - [c18]H. Y. Leung, Lee-Ming Cheng, L. L. Cheng:
Digital Watermarking Schemes Using Multi-resolution Curvelet and HVS Model. IWDW 2009: 4-13 - 2008
- [j21]Hongya Zhao, Kwok-Leung Chan, Lee-Ming Cheng, Hong Yan:
Multivariate hierarchical Bayesian model for differential gene expression analysis in microarray experiments. BMC Bioinform. 9(S-1) (2008) - [j20]Abdul Razaq, Wai Tong Luk, Kam Man Shum, Lee-Ming Cheng, Kai Ning Yung:
Second-Generation RFID. IEEE Secur. Priv. 6(4): 21-27 (2008) - [j19]Chune Zhang, L. L. Cheng, Zhengding Qiu, Lee-Ming Cheng:
Multipurpose Watermarking Based on Multiscale Curvelet Transform. IEEE Trans. Inf. Forensics Secur. 3(4): 611-619 (2008) - [c17]Yi Xiao, Lee-Ming Cheng, L. L. Cheng:
A Robust Image Watermarking Scheme Based on a Novel HVS Model in Curvelet Domain. IIH-MSP 2008: 343-347 - [c16]H. Y. Leung, Lee-Ming Cheng, L. L. Cheng:
A Robust Watermarking Scheme Using Selective Curvelet Coefficients. IIH-MSP 2008: 465-468 - [c15]Chune Zhang, Zhengding Qiu, L. L. Cheng, Lee-Ming Cheng:
Analysis Based on Generalized Vector Quantization for Information Hiding. IIH-MSP 2008: 1316-1320 - [c14]Chune Zhang, L. L. Cheng, Lee-Ming Cheng, Zhengding Qiu:
Multipurpose watermarking based on curvelet transform. ISCAS 2008: 2957-2960 - [c13]Hongya Zhao, Qinghua Huang, Kwok-Leung Chan, Lee-Ming Cheng, Hong Yan:
Mining functional biclusters of DNA microarray gene expression data. SMC 2008: 1737-1742 - 2007
- [c12]Y. K. Sek, Lee-Ming Cheng, L. L. Cheng, Chi-Kwong Chan:
A Novel Lossy Image-Hiding Scheme Based on Block Difference. IIH-MSP 2007: 275-278 - [c11]H. Y. Leung, Lee-Ming Cheng, L. L. Cheng, Chi-Kwong Chan:
Hardware Realization of Steganographic Techniques. IIH-MSP 2007: 279-282 - 2006
- [j18]Kwok-Wo Wong, Edward C. W. Lee, Lee-Ming Cheng, Xiaofeng Liao:
Fast elliptic scalar multiplication using new double-base chain and point halving. Appl. Math. Comput. 183(2): 1000-1007 (2006) - [j17]Kai-Chi Leung, Suk-Ling Li, Lee-Ming Cheng, Chi-Kwong Chan:
A Symmetric Probabilistic Encryption Scheme Based On CHNN Without Data Expansion. Neural Process. Lett. 24(2): 93-105 (2006) - [j16]Suk-Ling Li, Kai-Chi Leung, Lee-Ming Cheng, Chi-Kwong Chan:
A novel image-hiding scheme based on block difference. Pattern Recognit. 39(6): 1168-1176 (2006) - [c10]Suk-Ling Li, Kai-Chi Leung, Lee-Ming Cheng, Chi-Kwong Chan:
Performance Evaluation of a Steganographic Method for Digital Images Using Side Match. ICICIC (3) 2006: 54-57 - [c9]Suk-Ling Li, Kai-Chi Leung, Lee-Ming Cheng, Chi-Kwong Chan:
Data Hiding in Images by Adaptive LSB Substitution Based on the Pixel-Value Differencing. ICICIC (3) 2006: 58-61 - [i1]Kwok-Wo Wong, Edward C. W. Lee, Lee-Ming Cheng, Xiaofeng Liao:
Fast Elliptic Scalar Multiplication using New Double-base Chain and Point Halving. IACR Cryptol. ePrint Arch. 2006: 124 (2006) - 2004
- [j15]Chi-Kwong Chan, Lee-Ming Cheng:
Hiding data in images by simple LSB substitution. Pattern Recognit. 37(3): 469-474 (2004) - [c8]Chi-Kwong Chan, Lee-Ming Cheng, Kai-Chi Leung, Suk-Ling Li:
Image hiding based on block difference. ICARCV 2004: 968-972 - [c7]Lee-Ming Cheng, L. L. Cheng, C. K. Chan, K. W. Ng:
Digital watermarking based on frequency random position insertion. ICARCV 2004: 977-982 - 2003
- [j14]Kai-Chi Leung, Lee-Ming Cheng, A. S. Fong, Chi-Kwong Chan:
Cryptanalysis of a modified remote user authentication scheme using smart cards. IEEE Trans. Consumer Electron. 49(4): 1243-1245 (2003) - [j13]Lee-Ming Cheng, L. L. Cheng, Wei Sun:
On commutativity of duality operator and propagation operator of linear codes generated from algebraic curves. IEEE Trans. Inf. Theory 49(1): 258-261 (2003) - 2002
- [j12]Chi-Kwong Chan, Lee-Ming Cheng:
Cryptanalysis of a Timestamp-Based Password Authentication Scheme. Comput. Secur. 21(1): 74-76 (2002) - [j11]Chi-Kwong Chan, Lee-Ming Cheng:
Security of Lin's image watermarking system. J. Syst. Softw. 62(3): 211-215 (2002) - [j10]Chi-Kwong Chan, Lee-Ming Cheng:
Correlation properties of an improved summation generator with 2-bit memory. Signal Process. 82(6): 907-909 (2002) - 2001
- [j9]Chi-Kwong Chan, Lee-Ming Cheng:
Cryptanalysis of a remote password authentication scheme. Int. J. Comput. Math. 78(3): 323-326 (2001) - [j8]Chi-Kwong Chan, Lee-Ming Cheng:
The convergence properties of a clipped Hopfield network and its application in the design of keystream generator. IEEE Trans. Neural Networks 12(2): 340-348 (2001) - [c6]Choi-Kuen Chan, Chi-Kwong Chan, Lee-Ming Cheng:
Encryption System Based on Neutral Network. Communications and Multimedia Security 2001 - 2000
- [j7]Chi-Kwong Chan, Lee-Ming Cheng:
An attack on the Hwang-Chang-Hwang watermarking scheme. IEEE Trans. Consumer Electron. 46(1): 40-43 (2000) - [j6]Chi-Kwong Chan, Lee-Ming Cheng:
Cryptanalysis of a remote user authentication scheme using smart cards. IEEE Trans. Consumer Electron. 46(4): 992-993 (2000)
1990 – 1999
- 1999
- [j5]Donghui Guo, Lee-Ming Cheng, L. L. Cheng:
A New Symmetric Probabilistic Encryption Scheme Based on Chaotic Attractors of Neural Networks. Appl. Intell. 10(1): 71-84 (1999) - [j4]K. S. Ng, Lee-Ming Cheng:
Sub-block interchange for lossless image compression. IEEE Trans. Consumer Electron. 45(1): 236-242 (1999) - [j3]K. S. Ng, Lee-Ming Cheng:
Lossless image compression by using gradient adjusted prediction and Burrows-Wheeler transformation. IEEE Trans. Consumer Electron. 45(2): 380-386 (1999) - [j2]K. S. Ng, Lee-Ming Cheng, L. L. Cheng, M. K. Wong:
Adaptive watermarking by using pixel position shifting technique. IEEE Trans. Consumer Electron. 45(4): 1057-1064 (1999) - [c5]W. P. Choi, Lee-Ming Cheng:
Modelling the Crypto-Processor from Design to Synthesis. CHES 1999: 25-36 - [c4]Kam-Shing Ng, Lee-Ming Cheng:
Selective block assignment approach for robust digital image watermarking. Security and Watermarking of Multimedia Contents 1999: 14-20 - 1998
- [c3]Chi-Kwong Chan, Lee-Ming Cheng:
The CHNN nonlinear combination generator. ICECS 1998: 257-260 - 1997
- [c2]K. S. Ng, Lee-Ming Cheng, C. H. Wong:
Dynamic word based text compression. ICDAR 1997: 412-416 - [c1]K. S. Ng, Lee-Ming Cheng:
Artificial Neural Network for Discrete Cosine Transform and Image Compression. ICDAR 1997: 675-678
1980 – 1989
- 1986
- [j1]Lee-Ming Cheng, A. S. Ho, R. E. Burge:
An adaptive asteroid zonal filter for data compression. Comput. Vis. Graph. Image Process. 34(3): 292-301 (1986)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint