New Mexico Tech

New Mexico Tech
Qingzhong Liu

Home

Research

Publications

Teaching

Resume

Resouce

Downloads

 

 

Some codes in our articles are available only for academic research purpose

  1. Q. Liu, A. Sung, and M. Qiao, "Novel Stream Mining for Audio Steganalysis", ACM MM-09 , pp. 95-104.

    The code is available soon.

  2. Q. Liu, A. Sung, and M. Qiao, "Improved Detection and Evaluation for JPEG Steganalysis", ACM MM-09 , pp. 873-876.

    The MATLAB code for feature extraction used in the paper is here . Please cite the above paper when you use this code.

  3. Q. Liu, J. Yang, Z. Chen, M. Yang, A. Sung, X. Huang(2008) , "Supervised-Learning based TagSNPs for Genome-wide Disease Classification", BMC Genomics 9(Suppl 1):S6, doi:10.1186/1471-2164-9-S1-S6.

    The code is available upon request.

Uncompressed image database and audio database constructed by ourselves are available only for academic research purpose

  1. Q. Liu, A. H. Sung, B. Ribeiro, M. Wei, Z. Chen, J. Xu (2008), "Image Complexity and Feature Mining for Steganalysis of Least Significant Bit Matching Steganography", Information Sciences 178(1): 21-36. doi: 10.1016/j.ins.2007.08.007.
  2. Q. Liu, A. H. Sung, Z. Chen, J. Xu (2008), "Feature Mining and Pattern Classification for Steganalysis of LSB Matching Steganography in Grayscale Images", Pattern Recognition 41 (1): 56-66. doi: 10.1016/j.patcog.2007.06.005.
  3. Q. Liu, A. H. Sung, M. Qiao, Z. Chen, B. Ribeiro(2010), "An Improved Approach to Steganalysis of JPEG Images". Informaton Sciences 180(9): 1643-1655.

    a. The code of SVMRFE used in this paper for feature selection in steganalysis is here . Please cite the above paper when you use this code.

    b. Our image database, containing 5150 never compressed raw color images (without any hidden data), is freely downloaded here for only academic study purpose. Please cite above papers when you download and test these images.

  4. Q. Liu, A. H. Sung and M. Qiao (2009), "Temporal Derivative Based Spectrum and Mel-Cepstrum Audio Steganalysis", IEEE Transactions on Information Forensics and Security, 4(3): 359-368.
  5. M. Qiao, A. H. Sung, and Q. Liu (2009), "Steganalysis of MP3stego", Proc. 22nd International Joint Conference on Neural Network (IJCNN), pp. 2566-2571.
  6. Q. Liu, A. H. Sung, and M. Qiao, "Detection of MP3 Double Compression", Cognitive Computation (ISNN 2010 special issue), accpeted for publication.
  7. Q. Liu, A. H. Sung, and M. Qiao, "Derivative based Audio Steganalysis", ACM Transactions on Multimedia Computing, Communications and Applications , accepted for publication.
  8. M. Qiao, A. Sung and Q. Liu, "Revealing Real Quality of Double Compressed MP3 Audio", Proc. ACM-MM 2010 , in press.

    The audio covers, containing thousands of WAV files, are freely downloaded. Due to the large storage size, we provide 3.6 GB never-compressed WAV audio files here . More never-compressed WAV files will be provided soon. Please cite above papers when you download and test these audio files.

    Due to the large size of WAV files in our experiments, we only provide two sets of small cover audio files, 1000 mono audio covers and 1000 two-channel audio covers , respectively. Accordingly, the audio stego files produced by using steghide algorithm, are provided here: 1000 mono steghide audio steganograms and 1000 two-channel steghide steganograms .

    The audio covers, containing thousands of WAV files, are freely downloaded. Due to the large storage size, we provide 3.6 GB never-compressed WAV audio files here . More never-compressed WAV files will be provided soon. Please cite above papers when you download and test these audio files.

    Another 1000 two-channel audio covers are provided by clcking the following links: set 1 and set 2 .


This web site is created and maintained by Qingzhong Liu. All rights reserved 2006