Hiding data in images by simple LSB substitution CK Chan, LM Cheng Pattern recognition 37 (3), 469-474, 2004 | 2267 | 2004 |
Cryptanalysis of a remote user authentication scheme using smart cards CK Chan, LM Cheng IEEE Transactions on Consumer Electronics 46 (4), 992-993, 2000 | 286 | 2000 |
Cryptanalysis of a modified remote user authentication scheme using smart cards KC Leung, LM Cheng, AS Fong, CK Chan IEEE Transactions on Consumer Electronics 49 (4), 1243-1245, 2003 | 152 | 2003 |
Improved hiding data in images by optimal moderately-significant-bit replacement CK Chan, LM Cheng Electronics Letters 37 (16), 1, 2001 | 137 | 2001 |
Cryptanalysis of a timestamp-based password authentication scheme CK Chan, LM Cheng Computers & Security 21 (1), 74-76, 2001 | 119 | 2001 |
A secure communication scheme based on the phase synchronization of chaotic systems JY Chen, KW Wong, LM Cheng, JW Shuai Chaos: An Interdisciplinary Journal of Nonlinear Science 13 (2), 508-514, 2003 | 99 | 2003 |
A new symmetric probabilistic encryption scheme based on chaotic attractors of neural networks D Guo, LM Cheng, LL Cheng Applied Intelligence 10, 71-84, 1999 | 93 | 1999 |
Multipurpose watermarking based on multiscale curvelet transform C Zhang, LL Cheng, Z Qiu, LM Cheng IEEE Transactions on Information Forensics and Security 3 (4), 611-619, 2008 | 90 | 2008 |
Synchronization of spatiotemporal chaos with positive conditional Lyapunov exponents JW Shuai, KW Wong, LM Cheng Physical Review E 56 (2), 2272, 1997 | 64 | 1997 |
Lightweight and privacy-preserving template generation for palm-vein-based human recognition F Ahmad, LM Cheng, A Khan IEEE Transactions on Information Forensics and Security 15, 184-194, 2019 | 58 | 2019 |
A novel image-hiding scheme based on block difference SL Li, KC Leung, LM Cheng, CK Chan Pattern Recognition 39 (6), 1168-1176, 2006 | 48 | 2006 |
Fast elliptic scalar multiplication using new double-base chain and point halving KW Wong, ECW Lee, LM Cheng, X Liao Applied mathematics and computation 183 (2), 1000-1007, 2006 | 47 | 2006 |
Adaptive water marking KK Wong, CH Tse, KS Ng, TH Lee, LM Cheng IEEE Transactions on Consumer Electronics 43 (4), 1003-1009, 1997 | 45 | 1997 |
Adaptive reversible data hiding based on block median preservation and modification of prediction errors HY Leung, LM Cheng, F Liu, QK Fu Journal of Systems and Software 86 (8), 2204-2219, 2013 | 44 | 2013 |
The convergence properties of a clipped Hopfield network and its application in the design of keystream generator CK Chan, LM Cheng IEEE Transactions on Neural Networks 12 (2), 340-348, 2001 | 40 | 2001 |
Data hiding in images by adaptive LSB substitution based on the pixel-value differencing SL Li, KC Leung, LM Cheng, CK Chan First International Conference on Innovative Computing, Information and …, 2006 | 35 | 2006 |
Multivariate cryptography based on clipped hopfield neural network J Wang, LM Cheng, T Su IEEE Transactions on Neural Networks and Learning Systems 29 (2), 353-363, 2016 | 33 | 2016 |
Digital watermarking based on frequency random position insertion LM Cheng, LL Cheng, CK Chan, KW Ng ICARCV 2004 8th Control, Automation, Robotics and Vision Conference, 2004. 2 …, 2004 | 33 | 2004 |
A robust watermarking scheme using selective curvelet coefficients HY Leung, LM Cheng, LL Cheng International Journal of Wavelets, Multiresolution and Information …, 2009 | 28 | 2009 |
Sequence generator and method of generating a pseudo random sequence LM Cheng, CK Chan US Patent 7,142,675, 2006 | 28 | 2006 |