Welcome to:   Multimedia Forensics Group   |   Computer Science Department   

• Home

• Teaching

• Research

• Publications

• Downloads

• Resources

Publications

Multimedia Forensics    |    Bioinformatics    |    Others    |    Students Work


Disclaimer

Papers on this web site are provided for personal and academic use only. Patents start with "P", journal papers start with "J", conference papers start with "C", book chapters start with "B", and students work starts with "S". Only a part of conference papers is listed on this webpage. Use of these materials for other purposes may violate the copyright owned by corresponding publishers, such as the IEEE and ACM.

This page may not be updated in a timely manner and only a part of papers are included. The complete paper list may be referred to Google Scholar.

Multimedia Forensics

 

Patents

P3. Q. Liu, Exposing inpainting image forgery under combination attacks with hybrid large feature mining (patent 6624-03300); .

P2. Q. Liu, Rich feature mining to combat anti-forensics and detect jpeg down-recompression and inpainting forgery on the same quantization (patent 6624-02701); .

P1. Q. Liu, Steganalysis with neighboring joint density (US8965038); .

Journal Papers

J44. J. Zhang, Z. Mei, Y. Su and Q. Liu, Geometrically Resilient H.264 Video Watermarking. IEEE Transactions on Multimedia, under review.

J43. Q. Liu, Z. Chen, and J. Zhang, Hybrid Large-Scale Feature Mining to Expose Seam Carving Forgery from Down Recompressed JPEG Images. IEEE Transactions on Multimedia, under review.

J42. Q. Liu, Exposing inpainting image forgery under combination attacks: an empirical study with hybrid large feature mining, IEEE Transactions on Information Forensics and Security, under review.

J41. Q. Liu, Rich feature mining for image forensics — detecting JPEG down recompression and inpainting forgery on the same quantization matrix. ACM Trans. on Intelligent Systems and Technology, under review.

J40. J Zhang, M Zhi, Y Su and Q Liu , Mobile watermarking against geometrical distortions. Proceedings of 8th International Conference on Mobile Multimedia Communications, EAI Endorsed Transactions on Security and Safety, to appear (an expanded journal version of Mobimedia'2015).

J39. Q. Liu, A. Sung, L. Chen, Z. Chen, M. Yang, J. Zhang and Y. Liu, A Shift-Recompression-based Approach to AAC Audio Forgery Detection. EAI Endorsed Transactions on Security and Safety, to appear (an expanded journal version of Mobimedia'2015).

J38. Q. Liu and Z. Chen (2014), Improved approaches with calibrated neighboring joint density to steganalysis and seam-carved forgery in JPEG images, ACM Transactions on Intelligent Systems and Technology, 5(4), article 63. [PDF]

J31. Q. Liu, P.A. Cooper, L. Chen, H. Cho, Z. Chen, M. Qiao, Y. Su, M. Wei, A. H. Sung (2013), Detection of JPEG double compression and identification of smartphone image source and post-capture manipulation, Applied Intelligence, December 2013, vol. 39, issue 4, pp 705-726.

J30. M. Qiao, AH Sung and Q. Liu (2013), MP3 audio steganalysis, Information Sciences, vol. 231, 10 May 2013, pages 123-134.

J29. J. Xu, Y. Su, Q. Liu (2013), Detection of Double MPEG-2 Compression Based on Distributions of DCT coefficients. International Journal of Pattern Recognition and Artificial Intelligence 27(1), DOI: 10.1142/S0218001413540013.

J28. M. Qiao, A. sung and Q. Liu (2013), MP3 audio steganalysis, Information Sciences 231: 123-134.

J21. Q. Liu , A. Sung, and M. Qiao (2011), Neighboring joint density-based JPEG Steganalysis, ACM Transactions on Intelligent Systems and Technology, 2(2), article 16:1-16. [PDF]

J20. Q. Liu, A. Sung, and M. Qiao (2011), Derivative-based Audio Steganalysis, ACM Transactions on Multimedia Computing, Communications and Applications. 7(3), article 18:1-19.[PDF]

J18. Y. Su, J. Xu, B. Dong, J. Zhang, and Q. Liu (2010), A Novel Source MPEG-2 Video Identification Algorithm, International Journal of Pattern Recognition and Artificial Intelligence. 24(8): 1311-1328. [PDF]

J17. Y. Su, J. Zhang, Y. Han, J. Chen, and Q. Liu (2010), Exposing Digital Video Logo-Removal Forgery by Inconsistency of Blur, International Journal of Pattern Recognition and Artificial Intelligence. 24(7):1027-1046.

J16. Q. Liu , A. Sung and M. Qiao (2010), Detection of Double MP3 Compression, Cognitive Computation. 2(4): 291-296.

J15. Q. Liu , A. Sung, M. Qiao, Z. Chen and B. Ribeiro (2010), An Improved Approach to Steganalysis of JPEG Images, Information Sciences, 180(9):1643-1655. [PDF]

J14. Q. Liu , A. Sung and M. Qiao (2009), Temporal Derivative Based Spectrum and Mel-Cepstrum Audio Steganalysis, IEEE Transactions on Information Forensics and Security, 4(3): 359-368. [PDF]

J8.   Q. Liu , A. Sung, Z. Chen, J. Xu (2008), Feature Mining and Pattern Classification for Steganalysis of LSB Matching Steganography in Grayscale Images, Pattern Recognition, 41 (1): 56-66. doi: 10.1016/j.patcog.2007.06.005. [PDF].

J7.   Q. Liu , A. Sung, B. Ribeiro, M. Wei, Z. Chen, J. Xu (2008), Image Complexity and Feature Mining for Steganalysis of Least Significant Bit Matching Steganography, Information Sciences, 178(1): 21-36. doi: 10.1016/j.ins.2007.08.007. [PDF]

 

 Peer-Review Conference Papers (Seleted):

C16. Q. Liu (2011), Steganalysis of DCT-embedding based adaptive steganography and YASS, in Proc. ACM Workshop on Multimedia & Security, pp. 77-86. Buffalo, NY, September 29-30, 2011 [PDF]

C15. Q. Liu (2011), Detection of misaligned cropping and recompression with the same quantization matrix and relevant forgery, in Proc. 3rd ACM Multimedia Workshop on Multimedia Forensics and Intelligence, pp. 25-30. Scottsdale, Arizona, USA, November 29, 2011 [PDF]

C14. Q. Liu, A. H. Sung, M. Qiao (2011), A Method to Detect JPEG-Based Double Compression. ISNN (2) 2011: 466-476.

C13. M. Qiao, A. Sung, and Q. Liu (2010), Revealing Real Quality of Double Compressed MP3 Audio, ACM Multimedia (ACM-MM) 2010, pp. 1011-1014.

C12. Q. Liu , A. Sung, and M. Qiao (2009) Improved Detection and Evaluation for JPEG Steganalysis, ACM Multimedia (ACM-MM) 2009 system track, pp. 873- 876.

C11. Q. Liu , A. Sung, and M. Qiao (2009), Novel Stream Mining for Audio Steganalysis, ACM Multimedia (ACM-MM) 2009 content track, pp. 95-104.

C10. Q. Liu and A. Sung (2009), A New Approach for JPEG Resize and Image Splicing Detection, ACM Multimedia (ACM-MM) workshop Multimedia in Forensics 2009 , pp. 43-47.

C9.   M. Qiao, A. Sung, and Q. Liu (2009), Steganalysis of MP3stego, Proc. 22nd International Joint Conference on Neural Network (IJCNN), pp. 2566-2571.

C8.   Q. Liu , A. Sung, and M. Qiao (2009), Spectrum Steganalysis of WAV Audio Streams. International Conference on Machine Learning and Data Mining 2009, LNAI vol. 5632, pp 582-593.

C7.   Q. Liu , A. Sung, M. Qiao, and B Ribeiro (2009), Merging Expanded Markov Process and Joint Distribution Features for JPEG Steganalysis, Proc. International Conference on Agents and Artificial Intelligence 2009, pp. 226-231.

C6.   Q. Liu , A. Sung, and M. Qiao (2008), Detecting Information-Hiding in WAV Audios. Proc. 19th International Conference on Pattern Recognition (ICPR), pp.1-4.

C5.   Q. Liu , A. Sung, B. Ribeiro, R. Ferriera (2008),Steganalysis of Multi-class JPEG Images based on Expanded Markov Features and Polynomial Fitting, Proc. 21st International Joint Conference on Neural Network (IJCNN), pp. 3351-3356.

C4.   R. Ferriera, B. Ribeiro, C. Silva, Q. Liu and A. Sung (2008),Building Resilient Classifiers for LSB Matching Steganography, Proc. 21st International Joint Conference on Neural Network (IJCNN), pp. 1563-1568.

C3.   Q. Liu , A. Sung, and M. Qiao (2008), Video Steganalysis Based on the Expanded Markov and Joint Distribution Features on the Transform Domains-Detecting MSU StegoVideo, Proc 7th International Conference on Machine Learning and Applications, pp. 671-674.

C2.   Q. Liu and A. Sung (2007), Feature Mining and Nuero-Fuzzy Inference System for Steganalysis of LSB Matching Steganography in Grayscale Images, Proc. of 20th International Joint Conference on Artificial Intelligence (IJCAI), pp. 2808-2813.

C1.   Q. Liu , A. Sung, J. Xu, B. M. Ribeiro (2006), Image Complexity and Feature Extraction for Steganalysis of LSB Matching Steganography, 18th International Conference on Pattern Recognition, ICPR (2): 267-270.

Bioinformatics

Selected Journal Papers:

J37. Z Chen, HK Ng, J Li, Q Liu, and H Huang (2014), Detecting associated single-nucleotide polymorphisms on the X chromosome in case control genome-wide association studies, Statistical Methods in Medecial Research, 2014 Sep 24, pii: 0962280214551815.(

J36. Z Chen, W Yang, Q Liu , JY Yang, J Li and MQ Yang(2014), A new statistical approach to combining p-values using gamma distribution and its application to genome-wide association study. BMC Bioinformatics, 2014, 15(Suppl 17):S3

J35. Z Chen, H Huang and Q Liu (2014), Detecting differentially methylated loci for multiple treatments based on high-throughput methylation data. BMC Bioinformatics, 15: 142. doi:10.1186/1471- 2105-15-142.

J27. B Hu, G Jiang, C Pang, S Wang, Q Liu, Z Chen, CR Vanderburg, JT Rogers, Y Deng and X Huang (2013). Assessment of Gene Order Computing Methods for Alzheimer’s Disease, BMC Medical Genomics, 6(Suppl 1):S8. doi:10.1186/1755-8794-6-S1-S8

J26. Z. Chen, Q. Liu , and S. Nadarajah (2012), A new statistical approach to detecting differentially methylated loci for case control Illumina array methylation data, Bioinformatics,doi: 10.1093/bioinformatics/bts093.

J25. C. Pang, G. Jiang, S. Wang, B. Hu, Q. Liu, Y. Deng, X. Huang (2102), Gene order computation using Alzheimer's DNA microarray gene expression data and the ant colony optimisation algorithm. IJDMB 6(6): 617-632.

J24. Z. Chen, Q. Liu , M. McGee, M. Kong, X. Huang, Y. Deng and R. H. Scheuermann (2011), A gene selection method for GeneChip array data with small sample sizes, BMC Genomics, 12(Suppl 5):S7 doi:10.1186/1471-2164-12-S5-S7

J23. Q. Liu , A. Sung, Z. Chen, L. Chen, J. Liu, M. Qiao, Z. Wang, X. Huang and Y. Deng (2011), Gene Selection and Classification for Cancer Microarray Data Based on Machine Learning and Similarity Measures, BMC Genomics 12(Suppl 5):S1 doi:10.1186/1471-2164-12-S5-S1

J22. Z. Chen and Q. Liu (2011), A new approach to account for the correlations among SNPs in Genome-wide association studies. Human Heredity 72(1):1-9.

J20. Z Chen, M McGee, Q Liu, Y Kong, X Huang, J Yang and RH Scheuermann (2010), Identifying Differantially Expressed Genes Based on Probe Level Data for GeneChip Arrays. International Journal of Computational Biology and Drug Design, 3(3):237-257..

J13. Q. Liu, A. Sung, Z. Chen, J. Liu, X. Huang, and Y. Deng (2009), Feature Selection and Classification of MAQC-II Breast Cancer and Multiple Myeloma Microarray Gene Expression Data, PLoS One 4(12): e8250. doi:10.1371/journal.pone.0008250

J12. Q. Liu , A. Sung, M. Qiao, Z. Chen, J. Yang, M. Q. Yang, X. Huang, Y. Deng (2009), Comparison of Feature Selection and Classification of MALDI-MS Data, BMC Genomics, http://www.biomedcentral.com/1471-2164/10/S1/S3.

J11. Z. Chen, M. McGee, Q. Liu , M. Kong, Y. Deng, R. Scheuermann (2009), A Distribution-Free Convolution Model for Background Correction of Oligonucleotide Microarray Data, BMC Genomics, http://www.biomedcentral.com/1471-2164/10/S1/S19.

J10. Q. Liu , M. Qiao and A. Sung (2009), Distance Metric Learning and Support Vector Machines for Classification of Mass Spectrometry Proteomics Data, International Journal of Knowledge Engineering and Soft Data Paradigms, 1(3):216-226.

J9.   W. Kong, X. Mou, Q. Liu , Z. Chen, C. Vanderburg, J. Rogers, and X. Huang (2009), Independent Component Analysis of Alzheimer's DNA Microarray Gene Expression Data, Molecular Neurodegeneration 2009, 4:5, doi: 10.1186/1750-1326-4-5.

J6.   Q. Liu, J. Yang, Z. Chen, M. Yang, A. Sung, X. Huang (2008), Supervised-Learning based TagSNPs for Genome-wide Disease Classification, BMC Genomics 2008, 9(Suppl 1):S6, doi:10.1186/1471-2164-9-S1-S6.

J5.   Z. Chen, M. McGee, Q. Liu , and R.H. Scheuermann (2007), A Distribution Free Summarization Method for Affymetrix GeneChip Arrays, Bioinformatics, 23(3):321-327.

J1.   S. Mukkamala, Q. Liu , R. Veeraghattam, A. Sung (2005), Computational Intelligent Techniques for Tumor Classification (Using Microarray Gene Expression Data). International Journal of Lateral Computing, 2(1): 38-45.

Other Journal Papers

J34. RB Basnet, AH Sung and Q Liu (2014), Learning to detect phishing URLs, IJRET: International Journal of Research in Engineering and Technology, 3(6):11-24.

J33. BM Wilbert and Q Liu (2013), "Meta Cloud Discovery" Model: An Approach to Integrity Monitoring for Cloud-Based Disaster Recovery Planning. International Journal of Information & Education Technology, 3(5): 516-521

J32. D Suryakumar, AH Sung and Q Liu (2013), Influence of Machine Learning vs. Ranking Algorithm on the Critical Dimension, International Journal of Future Computer and Communication, 2(3): 215- 219..

J4.   M. Wei, B. Bai, A. Sung, Q. Liu , J. Wang, M. Cather (2007), Predicting Injection Profiles Using ANFIS, Information Sciences, 177 (20): 4445-4461. doi:10.1016/j.ins.2007.03.021.

J3.   J. Xu, A. Sung, S. Mukkamala, Q. Liu (2007), Obfuscated Malicious Executable Scanner, Journal of Research and Practice in Information Technology, 39(3): 181-197.

J2.   J. Xu, A. Sung, Q. Liu (2007), Behavior Mining for Fraud Detection, Journal of Research and Practice in Information Technology, 39(1): 3-18.

Book Chapters

B4.   Q. Liu, Sung AH, Chen Z and Chen L (2015), Exposing Image Tampering with the Same Quantization Matrix, in the book Multimedia Data Mining and Analytics - Disruptive Innovation, (editors: Baughman AK, Gao J, Pan J-Y and Petrushin V), pages 327-343.

B3.   L. Chen, C. Varol, Q Liu, and B. Zhou (2013), Security in Wireless Metropolitan Area Networks: WiMAX and LTE, in the book Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications, October, 2013 (editors: Danda B. Rawat, Bhed B. Bista, and Gongjun Yan, copyright 2014).

B2.   L. Chen, PA Cooper and Q Liu (2013), Security in Bluetooth Networks and Communications, in the book Wireless Network Security: Theories and Applications, by High Education Press and Springer, pages 77-94. ISBN: 978-3-642-36510-2.

B1.   Q. Liu , A. Sung, M. Qiao, B. Ribeiro and Z. Chen (2011), Feature Mining and Pattern Recognition in Multimedia Forensics, in the book Pattern Recognition, Machine Intelligence and Biometrics, edited by PSP Wang, in memory and honor of late Professor King-Sun Fu*, High Education Press and Springer, pages 561-604. ISBN 978-3-642-22406-5. (* Professor Fu was elected to the National Academy of Engineering in 1976)

 

Students Work (SHSU) (Students highlighted in bold, undergraduate marked by #)

S11. Raviteja Murukutla, William Yang and Q. Liu, Spam Detection in Twitter, The 13th International Conference on Software Engineering Research and Practice. accepted.

S10. Sunil Koirala and Q. Liu, RtpExtSteg: A VoIP Network Steganography Exploiting RTP Extension Header, under review.

S9.   Q. Liu, A. Sung, L. Chen, Z. Chen, M. Yang, J. Zhang and Yanxin Liu# , A Shift-Recompression-based Approach to AAC Audio Forgery Detection, The JOURNAL VERSION OF MOBIMEDIA'15 [PDF]

S8.   Subash Kumar Saladi , Andrew H. Sung and Q. Liu (2015), Exploring covert communication on Google Hangouts, The 2015 International Conference on Security and Management, Las Vegas, USA, July 27-30. [PDF]

S7.   Damacharla Pavan Chowdary, and Q. Liu (2015), Exploring Covert Communication in Text Message on Android Smartphones, The 2015 International Conference on Security and Management, Las Vegas, USA, July 27-30. [PDF]

S6.   Brittany Byrd, Rakesh Malik, Venkata Kandalam and Q. Liu (2014), Malware detection with computational intelligence, The 2014 International Conference on Security and Management, Las Vegas, USA, July 21-24, accepted.

S5.   Satish Tummala, Yanxin Liu# and Q. Liu (2014), VoIP forgery detection, The 2014 International Conference on Security and Management, Las Vegas, USA, July 21-24, accepted.

S4.   Avinash Chandragiri, P. Cooper, Yanxin Liu# and Q. Liu (2014), Implementing secure communication on short text messaging, Proceedings of 2nd International Symposium on Digital Forensics and Security (ISDFS14), 12-13 May 2014, Houston, TX, pages 77-80. [PDF]

S3.   BM Wilbert and Q. Liu (2013), "Meta Cloud Discovery" Model: An Approach to Integrity Monitoring for Cloud-Based Disaster Recovery Planning, International Journal of Information and Education Technology 3 (5), 516.

S2.   Q. Liu, Xiaodong Li, P Cooper, X. Hu (2012), Shift recompression-based feature mining for detecting content-aware scaled forgery in JPEG images, Proceedings of the Twelfth International Workshop on Multimedia Data Mining (MDM-KDD), pages 10-16.

S1.   Q. Liu, Xiaodong Li, L. Chen, H. Cho, P. Cooper, Z. Chen, M. Qiao, A. Sung (2012), Identification of Smartphone-Image Source and Manipulation, Advanced Research in Applied Artificial Intelligence, Lecture Notes in Computer Science, vol. 7345, pp 262-271.

 

Home   |    Teaching   |    Research   |    Publications   |    People   |    Downloads   |    Resources

Copyright © 2011. All Rights Reserved. Site designed by Multimedia Forensics Group .