Welcome to:   Multimedia Forensics Group   |   Computer Science Department   

• Home

• Teaching

• Research

• Publications

• Downloads

• Resources

Publications

Multimedia Forensics    |    Bioinformatics    |    Others    |   


Disclaimer

Papers on this web site are provided for personal and academic use only. Use of these materials for other purposes may violate the copyright owned by corresponding publishers, such as the IEEE and ACM.

Multimedia Forensics

Book chapter

1.     Q. Liu , A. Sung, M. Qiao, B. Ribeiro and Z. Chen (2011), Feature Mining and Pattern Recognition in Multimedia Forensics, in the book Pattern Recognition, Machine Intelligence and Biometrics, edited by PSP Wang, in memory and honor of late Professor King-Sun Fu*, High Education Press and Springer, pages 561-604. ISBN 978-3-642-22406-5. (* Professor Fu was elected to the National Academy of Engineering in 1976)

   

Journal Papers

2.     Q. Liu and Z. Chen, “Improved approaches with calibrated neighboring joint density to steganalysis and seam-carved forgery in JPEG images", ACM Transactions on Intelligent Systems and Technology, accepted.

3.     Q. Liu, P.A. Cooper, L. Chen, H. Cho, Z. Chen, M. Qiao, Y. Su, M. Wei, A. H. Sung (2013), “Detection of JPEG double compression and identification of smartphone image source and post-capture manipulation”, Applied Intelligence, doi: 10.1007/s10489-013-0430-z http://link.springer.com/content/pdf/10.1007%2Fs10489-013-0430-z.pdf

4.     J. Xu, Y. Su, Q. Liu (2013), “Detection of Double MPEG-2 Compression Based on Distributions of DCT coefficients”. IJPRAI 27(1)

5.     M. Qiao, A. sung and Q. Liu (2013), “MP3 audio steganalysis", Information Sciences 231: 123-134.

6.     Q. Liu , A. Sung, and M. Qiao (2011), “Neighboring joint density-based JPEG Steganalysis”, ACM Transactions on Intelligent Systems and Technology, 2(2), article 16:1-16. [PDF]

7.     Q. Liu, A. Sung, and M. Qiao (2011), “Derivative-based Audio Steganalysis”, ACM Transactions on Multimedia Computing, Communications and Applications. 7(3), article 18:1-19. [PDF]  

8.     Y. Su, J. Xu, B. Dong, J. Zhang, and Q. Liu (2010), “A Novel Source MPEG-2 Video Identification Algorithm”, International Journal of Pattern Recognition and Artificial Intelligence. 24(8): 1311-1328. [PDF]

9.     Y. Su, J. Zhang, Y. Han, J. Chen, and Q. Liu (2010), “Exposing Digital Video Logo-Removal Forgery by Inconsistency of Blur”, International Journal of Pattern Recognition and Artificial Intelligence. 24(7):1027-1046.

10.   Q. Liu , A. Sung and M. Qiao (2010), “Detection of Double MP3 Compression”, Cognitive Computation. 2(4): 291-296.  

11.   Q. Liu , A. Sung, M. Qiao, Z. Chen and B. Ribeiro (2010), “An Improved Approach to Steganalysis of JPEG Images”, Information Sciences, 180(9):1643-1655. [PDF]  

12.   Q. Liu , A. Sung and M. Qiao (2009), “Temporal Derivative Based Spectrum and Mel-Cepstrum Audio Steganalysis”, IEEE Transactions on Information Forensics and Security, 4(3): 359-368. [PDF]  

13.   Q. Liu , A. Sung, Z. Chen, J. Xu (2008), “Feature Mining and Pattern Classification for Steganalysis of LSB Matching Steganography in Grayscale Images”, Pattern Recognition, 41 (1): 56-66. doi: 10.1016/j.patcog.2007.06.005. [PDF] .

14.   Q. Liu , A. Sung, B. Ribeiro, M. Wei, Z. Chen, J. Xu (2008), “Image Complexity and Feature Mining for Steganalysis of Least Significant Bit Matching Steganography”, Information Sciences, 178(1): 21-36. doi: 10.1016/j.ins.2007.08.007. [PDF]  

   

Peer-Review Conference Papers:

15.   Q. Liu (2011), “Steganalysis of DCT-embedding based adaptive steganography and YASS”, in Proc. ACM Workshop on Multimedia & Security, pp. 77-86. Buffalo, NY, September 29-30, 2011 [PDF]

16.   Q. Liu (2011), “Detection of misaligned cropping and recompression with the same quantization matrix and relevant forgery”, in Proc. 3rd ACM Multimedia Workshop on Multimedia Forensics and Intelligence, pp. 25-30. Scottsdale, Arizona, USA, November 29, 2011

17.   Q. Liu, A. H. Sung, M. Qiao (2011), "A Method to Detect JPEG-Based Double Compression". ISNN (2) 2011: 466-476.

18.   M. Qiao, A. Sung, and Q. Liu (2010), “Revealing Real Quality of Double Compressed MP3 Audio”, ACM Multimedia (ACM-MM) 2010, pp. 1011-1014.

19.   Q. Liu , A. Sung, and M. Qiao (2009) “Improved Detection and Evaluation for JPEG Steganalysis”, ACM Multimedia (ACM-MM) 2009 system track, pp. 873- 876.

20.   Q. Liu , A. Sung, and M. Qiao (2009), “Novel Stream Mining for Audio Steganalysis”, ACM Multimedia (ACM-MM) 2009 content track, pp. 95-104.

21.   Q. Liu and A. Sung (2009), “A New Approach for JPEG Resize and Image Splicing Detection”, ACM Multimedia (ACM-MM) workshop Multimedia in Forensics 2009 , pp. 43-47.

22.   M. Qiao, A. Sung, and Q. Liu (2009), “Steganalysis of MP3stego”, Proc. 22nd International Joint Conference on Neural Network (IJCNN), pp. 2566-2571.  

23.   Q. Liu , A. Sung, and M. Qiao (2009), “Spectrum Steganalysis of WAV Audio Streams”. International Conference on Machine Learning and Data Mining 2009, LNAI vol. 5632, pp 582-593.

24.   Q. Liu , A. Sung, M. Qiao, and B Ribeiro (2009), “Merging Expanded Markov Process and Joint Distribution Features for JPEG Steganalysis”, Proc. International Conference on Agents and Artificial Intelligence 2009, pp. 226-231.

25.   Q. Liu , A. Sung, and M. Qiao (2008), “Detecting Information-Hiding in WAV Audios”. Proc. 19th International Conference on Pattern Recognition (ICPR), pp.1-4.

26.   Q. Liu , A. Sung, B. Ribeiro, R. Ferriera (2008),“Steganalysis of Multi-class JPEG Images based on Expanded Markov Features and Polynomial Fitting”, Proc. 21st International Joint Conference on Neural Network (IJCNN), pp. 3351-3356.

27.   R. Ferriera, B. Ribeiro, C. Silva, Q. Liu and A. Sung (2008),“Building Resilient Classifiers for LSB Matching Steganography”, Proc. 21st International Joint Conference on Neural Network (IJCNN), pp. 1563-1568.

28.   Q. Liu , A. Sung, and M. Qiao (2008), “Video Steganalysis Based on the Expanded Markov and Joint Distribution Features on the Transform Domains — Detecting MSU StegoVideo”, Proc 7th International Conference on Machine Learning and Applications, pp. 671-674.

29.   Q. Liu and A. Sung (2007), “Feature Mining and Nuero-Fuzzy Inference System for Steganalysis of LSB Matching Steganography in Grayscale Images”, Proc. of 20th International Joint Conference on Artificial Intelligence (IJCAI), pp. 2808-2813.

30.   Q. Liu , A. Sung, J. Xu, B. M. Ribeiro (2006), “Image Complexity and Feature Extraction for Steganalysis of LSB Matching Steganography”, 18th International Conference on Pattern Recognition, ICPR (2): 267-270.  


Bioinformatics

Selected Publications in Bioinformatics:

Journal Papers

31.   Z. Chen, Q. Liu , and S. Nadarajah (2012), “A new statistical approach to detecting differentially methylated loci for case control Illumina array methylation data", Bioinformatics,doi: 10.1093/bioinformatics/bts093.

32.   C. Pang, G. Jiang, S. Wang, B. Hu, Q. Liu, Y. Deng, X. Huang (2102), “Gene order computation using Alzheimer's DNA microarray gene expression data and the ant colony optimisation algorithm”. IJDMB 6(6): 617-632.

33.   Z. Chen, Q. Liu , M. McGee, M. Kong, X. Huang, Y. Deng and R. H. Scheuermann (2011), "A gene selection method for GeneChip array data with small sample sizes", BMC Genomics, 12(Suppl 5):S7 doi:10.1186/1471-2164-12-S5-S7

34.   Q. Liu , A. Sung, Z. Chen, L. Chen, J. Liu, M. Qiao, Z. Wang, X. Huang and Y. Deng (2011), “Gene Selection and Classification for Cancer Microarray Data Based on Machine Learning and Similarity Measures”, BMC Genomics 12(Suppl 5):S1 doi:10.1186/1471-2164-12-S5-S1

35.   Z. Chen and Q. Liu (2011), “A new approach to account for the correlations among SNPs in Genome-wide association studies”. Human Heredity 72(1):1-9.

36.   Q. Liu, A. Sung, Z. Chen, J. Liu, X. Huang, and Y. Deng (2009), “Feature Selection and Classification of MAQC-II Breast Cancer and Multiple Myeloma Microarray Gene Expression Data”, PLoS One 4(12): e8250. doi:10.1371/journal.pone.0008250

37.   Q. Liu , A. Sung, M. Qiao, Z. Chen, J. Yang, M. Q. Yang, X. Huang, Y. Deng (2009), “Comparison of Feature Selection and Classification of MALDI-MS Data”, BMC Genomics, http://www.biomedcentral.com/1471-2164/10/S1/S3.  

38.   Z. Chen, M. McGee, Q. Liu , M. Kong, Y. Deng, R. Scheuermann (2009), “A Distribution-Free Convolution Model for Background Correction of Oligonucleotide Microarray Data”, BMC Genomics, http://www.biomedcentral.com/1471-2164/10/S1/S19.  

39.   Q. Liu , M. Qiao and A. Sung (2009), “Distance Metric Learning and Support Vector Machines for Classification of Mass Spectrometry Proteomics Data”, International Journal of Knowledge Engineering and Soft Data Paradigms, 1(3):216-226.

40.   W. Kong, X. Mou, Q. Liu , Z. Chen, C. Vanderburg, J. Rogers, and X. Huang (2009), “Independent Component Analysis of Alzheimer’s DNA Microarray Gene Expression Data”, Molecular Neurodegeneration 2009, 4:5, doi: 10.1186/1750-1326-4-5.  

41.   Q. Liu, J. Yang, Z. Chen, M. Yang, A. Sung, X. Huang (2008), “Supervised-Learning based TagSNPs for Genome-wide Disease Classification”, BMC Genomics 2008, 9(Suppl 1):S6, doi:10.1186/1471-2164-9-S1-S6.

42.   Z. Chen, M. McGee, Q. Liu , and R.H. Scheuermann (2007), “A Distribution Free Summarization Method for Affymetrix GeneChip Arrays”, Bioinformatics, 23(3):321-327.  

43.   S. Mukkamala, Q. Liu , R. Veeraghattam, A. Sung (2005), “Computational Intelligent Techniques for Tumor Classification (Using Microarray Gene Expression Data)”. International Journal of Lateral Computing, 2(1): 38-45.  


Others

44.   R. Basnet, A. Sung and Q. Liu (2011), “Rule-based phishing attack detection”, In Proc. the 2011 International Conference on Security and Management-SAM'11.

45.   B. Ribeiro, A. Vieira, J. Duarte, C. Silva, J. Carvalho Das Neves, Q. Liu , A. Sung (2009), “ Learning Manifolds for Bankruptcy Analysis”, M. Koppen et al. (eds.): ICONIP 2008, Part I, LNCS 5506, pp. 722-729. 2009.

46.   J. Xu, A. Sung, S. Mukkamala, Q. Liu (2007), “Obfuscated Malicious Executable Scanner”, Journal of Research and Practice in Information Technology, 39(3): 181-197.

47.   J. Xu, A. Sung, Q. Liu (2007), “Behavior Mining for Fraud Detection”, Journal of Research and Practice in Information Technology, 39(1): 3-18.  

48.   M. Wei, B. Bai, A. Sung, Q. Liu , J. Wang, M. Cather (2007), “Predicting Injection Profiles Using ANFIS”, Information Sciences, 177 (20): 4445-4461. doi:10.1016/j.ins.2007.03.021.

49.   J. Xu, A. Sung, Q. Liu (2006), “Tree Based Behavior Monitoring for Adaptive Fraud Detection”, 18th International Conference on Pattern Recognition, ICPR (1): 1208-1211.

Home   |    Teaching   |    Research   |    Publications   |    People   |    Downloads   |    Resources

Copyright © 2011. All Rights Reserved. Site designed by Multimedia Forensics Group .