Lm Cheng
Lm Cheng
Associate Professor of Electronic Engineeing, Cit University of Hong Kong
Verified email at
Cited by
Cited by
Hiding data in images by simple LSB substitution
CK Chan, LM Cheng
Pattern recognition 37 (3), 469-474, 2004
Cryptanalysis of a remote user authentication scheme using smart cards
CK Chan, LM Cheng
IEEE Transactions on Consumer Electronics 46 (4), 992-993, 2000
Cryptanalysis of a modified remote user authentication scheme using smart cards
KC Leung, LM Cheng, AS Fong, CK Chan
IEEE Transactions on Consumer Electronics 49 (4), 1243-1245, 2003
Improved hiding data in images by optimal moderately-significant-bit replacement
CK Chan, LM Cheng
Electronics Letters 37 (16), 1, 2001
Cryptanalysis of a timestamp-based password authentication scheme
CK Chan, LM Cheng
Computers & Security 21 (1), 74-76, 2001
A secure communication scheme based on the phase synchronization of chaotic systems
JY Chen, KW Wong, LM Cheng, JW Shuai
Chaos: An Interdisciplinary Journal of Nonlinear Science 13 (2), 508-514, 2003
A new symmetric probabilistic encryption scheme based on chaotic attractors of neural networks
D Guo, LM Cheng, LL Cheng
Applied Intelligence 10, 71-84, 1999
Multipurpose watermarking based on multiscale curvelet transform
C Zhang, LL Cheng, Z Qiu, LM Cheng
IEEE Transactions on Information Forensics and Security 3 (4), 611-619, 2008
Synchronization of spatiotemporal chaos with positive conditional Lyapunov exponents
JW Shuai, KW Wong, LM Cheng
Physical Review E 56 (2), 2272, 1997
Lightweight and privacy-preserving template generation for palm-vein-based human recognition
F Ahmad, LM Cheng, A Khan
IEEE Transactions on Information Forensics and Security 15, 184-194, 2019
A novel image-hiding scheme based on block difference
SL Li, KC Leung, LM Cheng, CK Chan
Pattern Recognition 39 (6), 1168-1176, 2006
Fast elliptic scalar multiplication using new double-base chain and point halving
KW Wong, ECW Lee, LM Cheng, X Liao
Applied mathematics and computation 183 (2), 1000-1007, 2006
Adaptive water marking
KK Wong, CH Tse, KS Ng, TH Lee, LM Cheng
IEEE Transactions on Consumer Electronics 43 (4), 1003-1009, 1997
Adaptive reversible data hiding based on block median preservation and modification of prediction errors
HY Leung, LM Cheng, F Liu, QK Fu
Journal of Systems and Software 86 (8), 2204-2219, 2013
The convergence properties of a clipped Hopfield network and its application in the design of keystream generator
CK Chan, LM Cheng
IEEE Transactions on Neural Networks 12 (2), 340-348, 2001
Data hiding in images by adaptive LSB substitution based on the pixel-value differencing
SL Li, KC Leung, LM Cheng, CK Chan
First International Conference on Innovative Computing, Information and …, 2006
Digital watermarking based on frequency random position insertion
LM Cheng, LL Cheng, CK Chan, KW Ng
ICARCV 2004 8th Control, Automation, Robotics and Vision Conference, 2004. 2 …, 2004
High-efficiency cosine-approximated binary Gabor zone plate
CM Choy, LM Cheng
Applied optics 33 (5), 794-799, 1994
A robust watermarking scheme using selective curvelet coefficients
HY Leung, LM Cheng, LL Cheng
International Journal of Wavelets, Multiresolution and Information …, 2009
Sequence generator and method of generating a pseudo random sequence
LM Cheng, CK Chan
US Patent 7,142,675, 2006
The system can't perform the operation now. Try again later.
Articles 1–20