Asian Science Citation Index is committed to provide an authoritative, trusted and significant information by the coverage of the most important and influential journals to meet the needs of the global scientific community.  
ASCI Database
308-Lasani Town,
Sargodha Road,
Faisalabad, Pakistan
Fax: +92-41-8815544
Contact Via Web
Suggest a Journal
Articles by Yuling Liu
Total Records ( 5 ) for Yuling Liu
  Hong Wang , Xingming Sun , Yuling Liu and Yongping Liu
  In this study, a novel natural language watermarking scheme of Chinese texts based on syntactic transformations is proposed. In the proposed scheme, the so-called sentence weight defined in the study is used to carry the watermark bit. During the embedding process, the transformable sentences are first grouped and then their sequence is permuted to enhance the imperceptibility of watermark bit hiding positions. To improve watermarking reliability and capacity, error correcting coding is also applied.
  Yuling Liu , Xingming Sun , Yongping Liu and Chang-Tsun Li
  Communications via Microsoft Power Point (PPT for short) documents are commonplace, so it is crucial to take advantage of PPT documents for information security and digital forensics. In this study, we propose a new method of text steganography, called MIMIC-PPT, which combines text mimicking technique with characteristics of PPT documents. Firstly, a dictionary and some sentence templates are automatically created by parsing the body text of a PPT document. Then, cryptographic information is converted into innocuous sentences by using the dictionary and the sentence templates. Finally, the sentences are written into the note pages of the PPT document. With MIMIC-PPT, there is no need for the communication parties to share the dictionary and sentence templates while the efficiency and security are greatly improved.
  Zhijie Liu , Xingming Sun , Yuling Liu , Lincong Yang , Zhangjie Fu , Zhihua Xia and Wei Liang
  In some critical application areas, it is not allowed to modify the contents of the text, like military, legal and literature fields. Therefore, restoring the original contents of the text becomes a practical and important issue for text watermarking. This study aims to deal with this problem. We firstly present the concept of reversible text watermarking and then bring forth an effective scheme to achieve reversible text watermarking. Based on the synonym substitution method, the proposed algorithm applies an invertible transform to embed watermark, extract watermark and recover the original contents of the text. By using the reversible watermarking scheme, one can not only protect the interests of the author of the text, but also get the original contents of the text, if the receiver has the wish and right to revert the original contents of the text. Moreover, the scheme improves the payload capacity via using high embedding level, compressing the watermark or repeating the algorithm more than one time.
  Lingyun Xiang , Xingming Sun , Yuling Liu and Hengfu Yang
  In this study, a novel secure steganographic method was proposed by taking advantage of Multiple-Choice Questions (MCQs). Selecting a series of MCQs to automatically generate a stego text could conceal secret information. The proposed method could achieve a considerable embedding bit rate while being able to hide more information by reordering the options of the generated MCQs. The final outputting stego texts were kept the same linguistic and statistic characteristics as normal texts, thus the hidden information had good imperceptibility and could survive under potential steganalysis attacks, which was also demonstrated by experiments. More experimental results showed that the average embedding bit rate achieved more than 1 bit per sentence, which was superior to the bit rate of most existing linguistic steganographic methods.
  Xiaoliang Wang , Yuling Liu and Hengfu Yang
  In P2P network, the existing researches focus on protecting the security of information transmission, or ensuring users’ privacy. Security certification is a basic demand of P2P network, including the general authenticity, credibility, integrity and so on. Privacy protection for transactions is the high-level requirement of security, including confidentiality, copyright management, access control. One-sided pursuit of certification will affect the privacy rights of users while one-sided pursuit of anonymous will bring a series of anonymous abuse problems. However, little research has paid attention to urgency of this dilemma, leading to the emergence of a large number of problems in the applications. This study presents an anonymous authentication scheme based on homomorphic encryption, called FHET (Fully homomorphic encryption trust). FHET makes use of trust certificates and can also be combined with existing P2P reputation system which effectively prevents the selfish behavior of peers and ensures scalability, portability and practicality.
Copyright   |   Desclaimer   |    Privacy Policy   |   Browsers   |   Accessibility