Qingzhong Liu | Sam Houston State University (original) (raw)

Papers by Qingzhong Liu

Research paper thumbnail of Exposing seam carving forgery under recompression attacks by hybrid large feature mining

2016 23rd International Conference on Pattern Recognition (ICPR), 2016

While seam carving has been widely used in computer vision and multimedia processing, it is also ... more While seam carving has been widely used in computer vision and multimedia processing, it is also used for tampering illusions. Although several methods have been proposed to detect seam carving-based forgery, to this date, the detection of the seam carving forgery under recompression attacks in JPEG images has not been explored. To fill this gap, we proposed a hybrid large scale feature mining-based detection method to distinguish the doctored JPEG images from the untouched JPEG images under recompression attacks. Over one hundred thousand features from the spatial domain and from the DCT transform domain are extracted. Ensemble learning is used to deal with the high dimensionality and to avoid overfitting that may occur with some traditional learning classifier for the detection. Our study demonstrates the efficacy of proposed approach to exposing the seam-carving forgery under recompression attacks, especially from a lower quality level or on the same quality recompression.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Detection of misaligned cropping and recompression with the same quantization matrix and relevant forgery

Proceedings of the 3rd international ACM workshop on Multimedia in forensics and intelligence - MiFor '11, 2011

ABSTRACT Image tampering, being widely facilitated and proliferated by today's digital te... more ABSTRACT Image tampering, being widely facilitated and proliferated by today's digital techniques, is increasingly causing problems concerning the authenticity of digital images. As one of the most favorable compressed media, JPEG image can be easily tampered without leaving any visible clues. JPEG-based forensics, including the detection of double compression, interpolation, rotation, etc, has been actively performed. However, the detection of misaligned cropping and recompression, with the same quantization matrix that was once used to encode original JPEG images, has not been effectively expressed or ignored to some extent. Aiming to detect such manipulations for forensics purpose, in this paper, we propose an approach based on block artifacts caused by the manipulation with JPEG compression. Specifically, we propose a shift-recompression based detection method to identify the inconsistency of the block artifacts in doctored JPEG images. The learning classifiers are applied for classification. Experimental results show that our approach is very promising to detect misaligned cropping and recompression with the same quantization matrix and greatly improves the existing methods. Our detection method is also very effective to detect relevant copy-paste and composite forgery in JPEG images.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Using Expanded Markov Process and Joint Distribution Features for JPEG Steganalysis

Icaart, 2009

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Fraud Detection System Based on Behavior Mining and Anomaly Detection

Iicai, 2005

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Comparison Study of Cost-Sensitive Classifier Evaluations

Lecture Notes in Computer Science, 2012

ABSTRACT

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Spam Detection in Twitter. Session Chair: William Yang. http://www.world-academy-of-science.org/worldcomp15/ws/program/csc_ser28

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Detecting Hidden Information in the Wavelet Domain

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A new approach for JPEG resize and image splicing detection

Proceedings of the First ACM workshop on Multimedia in forensics - MiFor '09, 2009

... Keywords JPEG, forgery detection, splicing, image resize, joint density, generalized Gaussian... more ... Keywords JPEG, forgery detection, splicing, image resize, joint density, generalized Gaussian distribution, SVM ... as a new and exciting field [4]. In image tampering, the process of resampling the original image to create a convincing composite generally introduces ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Detect Information-Hiding Type and Length in JPEG Images by Using Neuro-fuzzy Inference Systems

2008 Congress on Image and Signal Processing, 2008

In this paper, we present a scheme of steganalysis of JPEG images with the use of polynomial fitt... more In this paper, we present a scheme of steganalysis of JPEG images with the use of polynomial fitting and computational intelligence techniques. Based on the Generalized Gaussian Distribution (GGD) model in the quantized DCT coefficients, the errors between the logarithmic domain of the histogram of the DCT coefficients and the polynomial fitting are extracted as features to detect the adulterated JPEG images and the untouched ones. Computational intelligence techniques such as Support Vector Machines (SVM), neuro-fuzzy inference system, etc. are utilized. Results show that, the designed method is successful in detecting the information-hiding types and the information-hiding length in the multi-class JPEG images.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Method to Detect JPEG-Based Double Compression

Lecture Notes in Computer Science, 2011

Digital multimedia forensics is an emerging field that has important applications in law enforcem... more Digital multimedia forensics is an emerging field that has important applications in law enforcement, the protection of public safety, and notational security. As a popular image compression standard, the JPEG format is widely adopted; however, the tampering of JPEG images can be easily performed without leaving visible clues, and it is increasingly necessary to develop reliable methods to detect forgery

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Fraud Detection System Based on Behavior Mining and Anomaly Detection

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Scalable Secure MJPEG Video Streaming

2012 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

In today's world, more and more applications are developed for mobile devices and ever-in... more In today's world, more and more applications are developed for mobile devices and ever-increasing amount of communication happens over mobile devices and mobile networks. Though providing mobility and convenience, mobile devices generally do not offer intensive computations like their wired counterparts. In this paper we propose a set of methods that aims to protect video, specifically Motion JPEG (MJPEG) video

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An improved approach to detecting content-aware scaling-based tampering in JPEG images

2013 IEEE China Summit and International Conference on Signal and Information Processing, 2013

ABSTRACT

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Shift recompression-based feature mining for detecting content-aware scaled forgery in JPEG images

Proceedings of the Twelfth International Workshop on Multimedia Data Mining - MDMKDD '12, 2012

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Gene order computation using Alzheimer's DNA microarray gene expression data and the Ant Colony Optimisation algorithm

International journal of data mining and bioinformatics, 2012

As Alzheimer's Disease (AD) is the most common form of dementia, the study of AD-related gene... more As Alzheimer's Disease (AD) is the most common form of dementia, the study of AD-related genes via biocomputation is an important research topic. One method of studying AD-related gene is to cluster similar genes together into a gene order. Gene order is a good clustering method as the results can be optimal globally while other clustering methods are only optimal locally. Herein we use the Ant Colony Optimisation (ACO)-based algorithm to calculate the gene order from an Alzheimer's DNA microarray dataset. We test it with four distance measurements: Pearson distance, Spearmen distance, Euclidean distance, and squared Euclidean distance. Our computing results indicate: a different distance formula generated a different quality of gene order, the squared Euclidean distance approach produced the optimal AD-related gene order.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Detecting associated single-nucleotide polymorphisms on the X chromosome in case control genome-wide association studies

Statistical methods in medical research, Jan 24, 2014

In the past decade, hundreds of genome-wide association studies have been conducted to detect the... more In the past decade, hundreds of genome-wide association studies have been conducted to detect the significant single-nucleotide polymorphisms that are associated with certain diseases. However, most of the data from the X chromosome were not analyzed and only a few significant associated single-nucleotide polymorphisms from the X chromosome have been identified from genome-wide association studies. This is mainly due to the lack of powerful statistical tests. In this paper, we propose a novel statistical approach that combines the information of single-nucleotide polymorphisms on the X chromosome from both males and females in an efficient way. The proposed approach avoids the need of making strong assumptions about the underlying genetic models. Our proposed statistical test is a robust method that only makes the assumption that the risk allele is the same for both females and males if the single-nucleotide polymorphism is associated with the disease for both genders. Through simul...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of “Meta Cloud Discovery” Model: An Approach to Integrity Monitoring for Cloud-Based Disaster Recovery Planning

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Implementing Secure Communication on Short Text Messaging

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Finding Critical Samples for Mining Big Data

Bookmarks Related papers MentionsView impact

Research paper thumbnail of VoIP Forgery Detection

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Exposing seam carving forgery under recompression attacks by hybrid large feature mining

2016 23rd International Conference on Pattern Recognition (ICPR), 2016

While seam carving has been widely used in computer vision and multimedia processing, it is also ... more While seam carving has been widely used in computer vision and multimedia processing, it is also used for tampering illusions. Although several methods have been proposed to detect seam carving-based forgery, to this date, the detection of the seam carving forgery under recompression attacks in JPEG images has not been explored. To fill this gap, we proposed a hybrid large scale feature mining-based detection method to distinguish the doctored JPEG images from the untouched JPEG images under recompression attacks. Over one hundred thousand features from the spatial domain and from the DCT transform domain are extracted. Ensemble learning is used to deal with the high dimensionality and to avoid overfitting that may occur with some traditional learning classifier for the detection. Our study demonstrates the efficacy of proposed approach to exposing the seam-carving forgery under recompression attacks, especially from a lower quality level or on the same quality recompression.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Detection of misaligned cropping and recompression with the same quantization matrix and relevant forgery

Proceedings of the 3rd international ACM workshop on Multimedia in forensics and intelligence - MiFor '11, 2011

ABSTRACT Image tampering, being widely facilitated and proliferated by today's digital te... more ABSTRACT Image tampering, being widely facilitated and proliferated by today's digital techniques, is increasingly causing problems concerning the authenticity of digital images. As one of the most favorable compressed media, JPEG image can be easily tampered without leaving any visible clues. JPEG-based forensics, including the detection of double compression, interpolation, rotation, etc, has been actively performed. However, the detection of misaligned cropping and recompression, with the same quantization matrix that was once used to encode original JPEG images, has not been effectively expressed or ignored to some extent. Aiming to detect such manipulations for forensics purpose, in this paper, we propose an approach based on block artifacts caused by the manipulation with JPEG compression. Specifically, we propose a shift-recompression based detection method to identify the inconsistency of the block artifacts in doctored JPEG images. The learning classifiers are applied for classification. Experimental results show that our approach is very promising to detect misaligned cropping and recompression with the same quantization matrix and greatly improves the existing methods. Our detection method is also very effective to detect relevant copy-paste and composite forgery in JPEG images.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Using Expanded Markov Process and Joint Distribution Features for JPEG Steganalysis

Icaart, 2009

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Fraud Detection System Based on Behavior Mining and Anomaly Detection

Iicai, 2005

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Comparison Study of Cost-Sensitive Classifier Evaluations

Lecture Notes in Computer Science, 2012

ABSTRACT

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Spam Detection in Twitter. Session Chair: William Yang. http://www.world-academy-of-science.org/worldcomp15/ws/program/csc_ser28

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Detecting Hidden Information in the Wavelet Domain

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A new approach for JPEG resize and image splicing detection

Proceedings of the First ACM workshop on Multimedia in forensics - MiFor '09, 2009

... Keywords JPEG, forgery detection, splicing, image resize, joint density, generalized Gaussian... more ... Keywords JPEG, forgery detection, splicing, image resize, joint density, generalized Gaussian distribution, SVM ... as a new and exciting field [4]. In image tampering, the process of resampling the original image to create a convincing composite generally introduces ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Detect Information-Hiding Type and Length in JPEG Images by Using Neuro-fuzzy Inference Systems

2008 Congress on Image and Signal Processing, 2008

In this paper, we present a scheme of steganalysis of JPEG images with the use of polynomial fitt... more In this paper, we present a scheme of steganalysis of JPEG images with the use of polynomial fitting and computational intelligence techniques. Based on the Generalized Gaussian Distribution (GGD) model in the quantized DCT coefficients, the errors between the logarithmic domain of the histogram of the DCT coefficients and the polynomial fitting are extracted as features to detect the adulterated JPEG images and the untouched ones. Computational intelligence techniques such as Support Vector Machines (SVM), neuro-fuzzy inference system, etc. are utilized. Results show that, the designed method is successful in detecting the information-hiding types and the information-hiding length in the multi-class JPEG images.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Method to Detect JPEG-Based Double Compression

Lecture Notes in Computer Science, 2011

Digital multimedia forensics is an emerging field that has important applications in law enforcem... more Digital multimedia forensics is an emerging field that has important applications in law enforcement, the protection of public safety, and notational security. As a popular image compression standard, the JPEG format is widely adopted; however, the tampering of JPEG images can be easily performed without leaving visible clues, and it is increasingly necessary to develop reliable methods to detect forgery

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Fraud Detection System Based on Behavior Mining and Anomaly Detection

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Scalable Secure MJPEG Video Streaming

2012 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

In today's world, more and more applications are developed for mobile devices and ever-in... more In today's world, more and more applications are developed for mobile devices and ever-increasing amount of communication happens over mobile devices and mobile networks. Though providing mobility and convenience, mobile devices generally do not offer intensive computations like their wired counterparts. In this paper we propose a set of methods that aims to protect video, specifically Motion JPEG (MJPEG) video

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An improved approach to detecting content-aware scaling-based tampering in JPEG images

2013 IEEE China Summit and International Conference on Signal and Information Processing, 2013

ABSTRACT

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Shift recompression-based feature mining for detecting content-aware scaled forgery in JPEG images

Proceedings of the Twelfth International Workshop on Multimedia Data Mining - MDMKDD '12, 2012

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Gene order computation using Alzheimer's DNA microarray gene expression data and the Ant Colony Optimisation algorithm

International journal of data mining and bioinformatics, 2012

As Alzheimer's Disease (AD) is the most common form of dementia, the study of AD-related gene... more As Alzheimer's Disease (AD) is the most common form of dementia, the study of AD-related genes via biocomputation is an important research topic. One method of studying AD-related gene is to cluster similar genes together into a gene order. Gene order is a good clustering method as the results can be optimal globally while other clustering methods are only optimal locally. Herein we use the Ant Colony Optimisation (ACO)-based algorithm to calculate the gene order from an Alzheimer's DNA microarray dataset. We test it with four distance measurements: Pearson distance, Spearmen distance, Euclidean distance, and squared Euclidean distance. Our computing results indicate: a different distance formula generated a different quality of gene order, the squared Euclidean distance approach produced the optimal AD-related gene order.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Detecting associated single-nucleotide polymorphisms on the X chromosome in case control genome-wide association studies

Statistical methods in medical research, Jan 24, 2014

In the past decade, hundreds of genome-wide association studies have been conducted to detect the... more In the past decade, hundreds of genome-wide association studies have been conducted to detect the significant single-nucleotide polymorphisms that are associated with certain diseases. However, most of the data from the X chromosome were not analyzed and only a few significant associated single-nucleotide polymorphisms from the X chromosome have been identified from genome-wide association studies. This is mainly due to the lack of powerful statistical tests. In this paper, we propose a novel statistical approach that combines the information of single-nucleotide polymorphisms on the X chromosome from both males and females in an efficient way. The proposed approach avoids the need of making strong assumptions about the underlying genetic models. Our proposed statistical test is a robust method that only makes the assumption that the risk allele is the same for both females and males if the single-nucleotide polymorphism is associated with the disease for both genders. Through simul...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of “Meta Cloud Discovery” Model: An Approach to Integrity Monitoring for Cloud-Based Disaster Recovery Planning

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Implementing Secure Communication on Short Text Messaging

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Finding Critical Samples for Mining Big Data

Bookmarks Related papers MentionsView impact

Research paper thumbnail of VoIP Forgery Detection

Bookmarks Related papers MentionsView impact