Welcome to:   Multimedia Forensics Group   |   Computer Science Department   

• Home

• Teaching

• Research

• Publications

• Downloads

• Resources

Publications

Multimedia Forensics    |    Bioinformatics    |    Others    |    Students Work


Disclaimer

Papers on this web site are provided for personal and academic use only. Use of these materials for other purposes may violate the copyright owned by corresponding publishers, such as the IEEE and ACM.

Multimedia Forensics

Book chapter

1.     Q. Liu , A. Sung, M. Qiao, B. Ribeiro and Z. Chen (2011), Feature Mining and Pattern Recognition in Multimedia Forensics, in the book Pattern Recognition, Machine Intelligence and Biometrics, edited by PSP Wang, in memory and honor of late Professor King-Sun Fu*, High Education Press and Springer, pages 561-604. ISBN 978-3-642-22406-5. (* Professor Fu was elected to the National Academy of Engineering in 1976)

 

Journal Papers

2.     Q. Liu and Z. Chen, Improved approaches with calibrated neighboring joint density to steganalysis and seam-carved forgery in JPEG images, ACM Transactions on Intelligent Systems and Technology, in press. http://tist.acm.org/papers/TIST-2012-11-0181.R2.pdf

3.     Q. Liu, P.A. Cooper, L. Chen, H. Cho, Z. Chen, M. Qiao, Y. Su, M. Wei, A. H. Sung (2013), Detection of JPEG double compression and identification of smartphone image source and post-capture manipulation, Applied Intelligence, December 2013, vol. 39, issue 4, pp 705-726.

4.     M. Qiao, AH Sung and Q. Liu (2013), MP3 audio steganalysis, Information Sciences, vol. 231, 10 May 2013, pages 123-134.

5.     J. Xu, Y. Su, Q. Liu (2013), Detection of Double MPEG-2 Compression Based on Distributions of DCT coefficients. International Journal of Pattern Recognition and Artificial Intelligence 27(1), DOI: 10.1142/S0218001413540013.

6.     M. Qiao, A. sung and Q. Liu (2013), MP3 audio steganalysis, Information Sciences 231: 123-134.

7.     Q. Liu , A. Sung, and M. Qiao (2011), Neighboring joint density-based JPEG Steganalysis, ACM Transactions on Intelligent Systems and Technology, 2(2), article 16:1-16. [PDF]

8.     Q. Liu, A. Sung, and M. Qiao (2011), Derivative-based Audio Steganalysis, ACM Transactions on Multimedia Computing, Communications and Applications. 7(3), article 18:1-19. [PDF] 

9.     Y. Su, J. Xu, B. Dong, J. Zhang, and Q. Liu (2010), A Novel Source MPEG-2 Video Identification Algorithm, International Journal of Pattern Recognition and Artificial Intelligence. 24(8): 1311-1328. [PDF]

10.   Y. Su, J. Zhang, Y. Han, J. Chen, and Q. Liu (2010), Exposing Digital Video Logo-Removal Forgery by Inconsistency of Blur, International Journal of Pattern Recognition and Artificial Intelligence. 24(7):1027-1046.

11.   Q. Liu , A. Sung and M. Qiao (2010), Detection of Double MP3 Compression, Cognitive Computation. 2(4): 291-296. 

12.   Q. Liu , A. Sung, M. Qiao, Z. Chen and B. Ribeiro (2010), An Improved Approach to Steganalysis of JPEG Images, Information Sciences, 180(9):1643-1655. [PDF] 

13.   Q. Liu , A. Sung and M. Qiao (2009), Temporal Derivative Based Spectrum and Mel-Cepstrum Audio Steganalysis, IEEE Transactions on Information Forensics and Security, 4(3): 359-368. [PDF] 

14.   Q. Liu , A. Sung, Z. Chen, J. Xu (2008), Feature Mining and Pattern Classification for Steganalysis of LSB Matching Steganography in Grayscale Images, Pattern Recognition, 41 (1): 56-66. doi: 10.1016/j.patcog.2007.06.005. [PDF] .

15.   Q. Liu , A. Sung, B. Ribeiro, M. Wei, Z. Chen, J. Xu (2008), Image Complexity and Feature Mining for Steganalysis of Least Significant Bit Matching Steganography, Information Sciences, 178(1): 21-36. doi: 10.1016/j.ins.2007.08.007. [PDF] 

 

 Peer-Review Conference Papers:

16.   Q. Liu (2011), Steganalysis of DCT-embedding based adaptive steganography and YASS, in Proc. ACM Workshop on Multimedia & Security, pp. 77-86. Buffalo, NY, September 29-30, 2011 [PDF]

17.   Q. Liu (2011), Detection of misaligned cropping and recompression with the same quantization matrix and relevant forgery, in Proc. 3rd ACM Multimedia Workshop on Multimedia Forensics and Intelligence, pp. 25-30. Scottsdale, Arizona, USA, November 29, 2011  [PDF]

18.   Q. Liu, A. H. Sung, M. Qiao (2011), A Method to Detect JPEG-Based Double Compression. ISNN (2) 2011: 466-476.

19.   M. Qiao, A. Sung, and Q. Liu (2010), Revealing Real Quality of Double Compressed MP3 Audio, ACM Multimedia (ACM-MM) 2010, pp. 1011-1014.

20.   Q. Liu , A. Sung, and M. Qiao (2009) Improved Detection and Evaluation for JPEG Steganalysis, ACM Multimedia (ACM-MM) 2009 system track, pp. 873- 876.

21.   Q. Liu , A. Sung, and M. Qiao (2009), Novel Stream Mining for Audio Steganalysis, ACM Multimedia (ACM-MM) 2009 content track, pp. 95-104.

22.   Q. Liu and A. Sung (2009), A New Approach for JPEG Resize and Image Splicing Detection, ACM Multimedia (ACM-MM) workshop Multimedia in Forensics 2009 , pp. 43-47.

23.   M. Qiao, A. Sung, and Q. Liu (2009), Steganalysis of MP3stego, Proc. 22nd International Joint Conference on Neural Network (IJCNN), pp. 2566-2571. 

24.   Q. Liu , A. Sung, and M. Qiao (2009), Spectrum Steganalysis of WAV Audio Streams. International Conference on Machine Learning and Data Mining 2009, LNAI vol. 5632, pp 582-593.

25.   Q. Liu , A. Sung, M. Qiao, and B Ribeiro (2009), Merging Expanded Markov Process and Joint Distribution Features for JPEG Steganalysis, Proc. International Conference on Agents and Artificial Intelligence 2009, pp. 226-231.

26.   Q. Liu , A. Sung, and M. Qiao (2008), Detecting Information-Hiding in WAV Audios. Proc. 19th International Conference on Pattern Recognition (ICPR), pp.1-4.

27.   Q. Liu , A. Sung, B. Ribeiro, R. Ferriera (2008),Steganalysis of Multi-class JPEG Images based on Expanded Markov Features and Polynomial Fitting, Proc. 21st International Joint Conference on Neural Network (IJCNN), pp. 3351-3356.

28.   R. Ferriera, B. Ribeiro, C. Silva, Q. Liu and A. Sung (2008),Building Resilient Classifiers for LSB Matching Steganography, Proc. 21st International Joint Conference on Neural Network (IJCNN), pp. 1563-1568.

29.   Q. Liu , A. Sung, and M. Qiao (2008), Video Steganalysis Based on the Expanded Markov and Joint Distribution Features on the Transform Domains — Detecting MSU StegoVideo, Proc 7th International Conference on Machine Learning and Applications, pp. 671-674.

30.   Q. Liu and A. Sung (2007), Feature Mining and Nuero-Fuzzy Inference System for Steganalysis of LSB Matching Steganography in Grayscale Images, Proc. of 20th International Joint Conference on Artificial Intelligence (IJCAI), pp. 2808-2813.

31.   Q. Liu , A. Sung, J. Xu, B. M. Ribeiro (2006), Image Complexity and Feature Extraction for Steganalysis of LSB Matching Steganography, 18th International Conference on Pattern Recognition, ICPR (2): 267-270. 

Bioinformatics

Selected Publications in Bioinformatics:

Journal Papers

32.   Z. Chen, Q. Liu , and S. Nadarajah (2012), A new statistical approach to detecting differentially methylated loci for case control Illumina array methylation data, Bioinformatics,doi: 10.1093/bioinformatics/bts093.

33.   C. Pang, G. Jiang, S. Wang, B. Hu, Q. Liu, Y. Deng, X. Huang (2102), Gene order computation using Alzheimer's DNA microarray gene expression data and the ant colony optimisation algorithm. IJDMB 6(6): 617-632.

34.   Z. Chen, Q. Liu , M. McGee, M. Kong, X. Huang, Y. Deng and R. H. Scheuermann (2011), A gene selection method for GeneChip array data with small sample sizes, BMC Genomics, 12(Suppl 5):S7 doi:10.1186/1471-2164-12-S5-S7

35.   Q. Liu , A. Sung, Z. Chen, L. Chen, J. Liu, M. Qiao, Z. Wang, X. Huang and Y. Deng (2011), Gene Selection and Classification for Cancer Microarray Data Based on Machine Learning and Similarity Measures, BMC Genomics 12(Suppl 5):S1 doi:10.1186/1471-2164-12-S5-S1

36.   Z. Chen and Q. Liu (2011), A new approach to account for the correlations among SNPs in Genome-wide association studies. Human Heredity 72(1):1-9.

37.   Q. Liu, A. Sung, Z. Chen, J. Liu, X. Huang, and Y. Deng (2009), Feature Selection and Classification of MAQC-II Breast Cancer and Multiple Myeloma Microarray Gene Expression Data, PLoS One 4(12): e8250. doi:10.1371/journal.pone.0008250

38.   Q. Liu , A. Sung, M. Qiao, Z. Chen, J. Yang, M. Q. Yang, X. Huang, Y. Deng (2009), Comparison of Feature Selection and Classification of MALDI-MS Data, BMC Genomics, http://www.biomedcentral.com/1471-2164/10/S1/S3. 

39.   Z. Chen, M. McGee, Q. Liu , M. Kong, Y. Deng, R. Scheuermann (2009), A Distribution-Free Convolution Model for Background Correction of Oligonucleotide Microarray Data, BMC Genomics, http://www.biomedcentral.com/1471-2164/10/S1/S19. 

40.   Q. Liu , M. Qiao and A. Sung (2009), Distance Metric Learning and Support Vector Machines for Classification of Mass Spectrometry Proteomics Data, International Journal of Knowledge Engineering and Soft Data Paradigms, 1(3):216-226.

41.   W. Kong, X. Mou, Q. Liu , Z. Chen, C. Vanderburg, J. Rogers, and X. Huang (2009), Independent Component Analysis of Alzheimer’s DNA Microarray Gene Expression Data, Molecular Neurodegeneration 2009, 4:5, doi: 10.1186/1750-1326-4-5. 

42.   Q. Liu, J. Yang, Z. Chen, M. Yang, A. Sung, X. Huang (2008), Supervised-Learning based TagSNPs for Genome-wide Disease Classification, BMC Genomics 2008, 9(Suppl 1):S6, doi:10.1186/1471-2164-9-S1-S6.

43.   Z. Chen, M. McGee, Q. Liu , and R.H. Scheuermann (2007), A Distribution Free Summarization Method for Affymetrix GeneChip Arrays, Bioinformatics, 23(3):321-327. 

44.   S. Mukkamala, Q. Liu , R. Veeraghattam, A. Sung (2005), Computational Intelligent Techniques for Tumor Classification (Using Microarray Gene Expression Data). International Journal of Lateral Computing, 2(1): 38-45. 

Others

45.   R. Basnet, A. Sung and Q. Liu (2011), Rule-based phishing attack detection, In Proc. the 2011 International Conference on Security and Management-SAM'11.

46.   B. Ribeiro, A. Vieira, J. Duarte, C. Silva, J. Carvalho Das Neves, Q. Liu , A. Sung (2009),  Learning Manifolds for Bankruptcy Analysis, M. Koppen et al. (eds.): ICONIP 2008, Part I, LNCS 5506, pp. 722-729. 2009.

47.   J. Xu, A. Sung, S. Mukkamala, Q. Liu (2007), Obfuscated Malicious Executable Scanner, Journal of Research and Practice in Information Technology, 39(3): 181-197.

48.   J. Xu, A. Sung, Q. Liu (2007), Behavior Mining for Fraud Detection, Journal of Research and Practice in Information Technology, 39(1): 3-18. 

49.   M. Wei, B. Bai, A. Sung, Q. Liu , J. Wang, M. Cather (2007), Predicting Injection Profiles Using ANFIS, Information Sciences, 177 (20): 4445-4461. doi:10.1016/j.ins.2007.03.021.

50.   J. Xu, A. Sung, Q. Liu (2006), Tree Based Behavior Monitoring for Adaptive Fraud Detection, 18th International Conference on Pattern Recognition, ICPR (1): 1208-1211.


Students Work (in part)

1.     Satish Tummala, Yanxin Liu and Q. Liu (2014), VoIP forgery detection, The 2014 International Conference on Security and Management, Las Vegas, USA, July 21 – 24, accepted.

2.      Avinash Chandragiri, P. Cooper, Yanxin Liu and Q. Liu (2014), Implementing secure communication on short text messaging, Proceedings of 2nd International Symposium on Digital Forensics and Security (ISDFS14), 12-13 May 2014, Houston, TX, pages 77-80. [PDF]

3.      Q. Liu, Xiaodong Li, P Cooper, X. Hu (2012), Shift recompression-based feature mining for detecting content-aware scaled forgery in JPEG images, Proceedings of the Twelfth International Workshop on Multimedia Data Mining (MDM-KDD), pages 10-16.

4.      Q. Liu, Xiaodong Li, L. Chen, H. Cho, P. Cooper, Z. Chen, M. Qiao, A. Sung (2012), Identification of Smartphone-Image Source and Manipulation, Advanced Research in Applied Artificial Intelligence, Lecture Notes in Computer Science, vol. 7345, pp 262-271.

 

Home   |    Teaching   |    Research   |    Publications   |    People   |    Downloads   |    Resources

Copyright © 2011. All Rights Reserved. Site designed by Multimedia Forensics Group .