Chengsheng Yuan

Chengsheng Yuan
Nanjing University of Information Science & Technology · School of Computer and Software

PhD

About

45
Publications
7,535
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
895
Citations
Citations since 2017
36 Research Items
877 Citations
2017201820192020202120222023050100150
2017201820192020202120222023050100150
2017201820192020202120222023050100150
2017201820192020202120222023050100150
Introduction
We encourage researchers to formulate innovative learning theories, feature representations, and end-to-end biometric application systems based on deep learning. We also encourage new theories and processes for dealing with large scale biometric datasets through deep learning architectures. https://www.frontiersin.org/research-topics/48549/media-forensics-and-security

Publications

Publications (45)
Article
With the development of cloud computing, reversible data hiding in encrypted images (RDHEI) has attracted increasing attention. In this paper, a high-performance RDHEI algorithm with Adaptive Huffman Code (RDHEI-AHC) is proposed for cloud computing. First, multi-MSB (Most Significant Bit) of each pixel is predicted by geometric correction, which ta...
Article
Full-text available
Twitter has become a major social media platform and has attracted considerable interest among researchers in sentiment analysis. Research into Twitter Sentiment Analysis (TSA) is an active subfield of text mining. TSA refers to the use of computers to process the subjective nature of Twitter data, including its opinions and sentiments. In this res...
Chapter
Recently, with the widespread application of mobile communication devices, fingerprint identification is the most prevalent in all types of mobile computing. While they bring a huge convenience to our lives, the resulting security and privacy issues have caused widespread concern. Fraudulent attack using forged fingerprint is one of the typical att...
Article
The development of cloud computing attracts enterprises and individuals to outsource their data, such as images, to the cloud server. However, direct outsourcing causes the extensive concern of privacy leakage, as images often contain rich sensitive information. A straightforward way to protect privacy is to encrypt the images using the standard cr...
Article
Automatic fingerprint identification system (AFIS) uses fingerprint to authenticate users, which is legal if the user is enrolled. However, numerous studies reveal that it is susceptible to spoofing attacks where a third person might freely synthesize counterfeit fingerprints to trick the scanner. To resist spoofing attacks, it makes fingerprint li...
Article
Biometrics spoofing attack (BsSA) frequently occurs when an adversary impersonates a lawful user to access to the biometric system by means of some forged or synthetic samples, especially in fingerprint or face authentication. In allusion to the problem above, the mainstream countermeasure, called biometrics liveness detection (BLD), is raised. In...
Chapter
As an individual’s unique biometric, fingerprints are widely used for identification. In recent years, attacks based on forged fingerprints have caused many hidden security risks. Therefore, the detection of forged fingerprints is significant, and fingerprint liveness detection is proposed. Methods based on neural networks have achieved great resul...
Chapter
While fingerprint identification systems have been widely applied to daily life, how to protect them from presentation attacks has become a hot topic in the field of biometric verification. A feasible strategy of fingerprint recognition, called Fingerprint Liveness Detection (FLD), has attracted a lot of attention from researchers. Convolutional Ne...
Article
Full-text available
To fundamentally resist the steganalysis, coverless information hiding has been proposed, and it has become a research hotspot in the field of covert communication. However, the current methods not only require a huge image database, but also have a very low hidden capacity, making it difficult to apply practically. In order to solve the above prob...
Chapter
Recently, fingerprint recognition systems are widely deployed in our daily life. However, spoofing via using special materials such as silica, gelatin, Play-Doh, clay, etc., is one of the most common methods of attacking fingerprint recognition systems. To handle the above defects, a fingerprint liveness detection (FLD) technique is proposed. In th...
Article
Full-text available
Currently, intelligent devices with fingerprint identification are widely deployed in our daily life. However, they are vulnerable to attack by fake fingerprints made of special materials. To elevate the security of these intelligent devices, many fingerprint liveness detection (FLD) algorithms have been explored. In this paper, we propose a novel...
Conference Paper
Recently, fingerprint recognition systems are widely deployed in our daily life. However, spoofing via using special materials such as silica, gelatin, Play-Doh, clay, etc., is one of the most common methods of attacking fingerprint recognition systems. In order to solve these defects, fingerprint liveness detection (FLD) technique has been raised....
Article
The popularity of biometric authentication technology benefits from the rapid development of smart mobile devices in recent years, and fingerprints, which are inherent human traits and neither easily revealed nor deciphered, can be used for real-time individual authentication systems. However, the main security issue of real-time fingerprint authen...
Article
Privacy-preserving is one of the most important concerns of cloud computing users. Encryption guarantees data security but makes data processing less convenient. Although many calculations in ciphertext domain are supported by some cryptosystems, the magnitude relation comparison over encrypted data is still difficult to be solved. In this paper, w...
Article
Full-text available
With the growing use of fingerprint identification systems in recent years, preventing fingerprint identification systems from being spoofed by artificial fake fingerprints has become a critical problem. In this paper, we put forward a novel method to detect fingerprint liveness based on BP neural network, which is used for the first time in the fi...
Article
Nowadays, fingerprint recognition technology has aroused wide attention in the society, especially in the application of identity authentication with smart phone as the carrier. However, the disadvantage of these devices is that the identification sensors are vulnerable to spoofing attacks from artificial replicas made from clay, gelatin, silicon,...
Article
Full-text available
Due to the lack of pre-judgment of fingerprints, fingerprint authentication systems are frequently vulnerable to artificial replicas. Anonymous people can impersonate authorized users to complete various authentication operations, thereby disrupting the order of life and causing tremendous economic losses to society. Therefore, to ensure that autho...
Article
At present, the coverless information hiding has been developed. However, due to the limited mapping relationship between secret information and feature selection, it is challenging to further enhance the hiding capacity of coverless information hiding. At the same time, the steganography algorithm based on object detection only hides secret inform...
Article
Full-text available
With the development of data science and technology, information security has been further concerned. In order to solve privacy problems such as personal privacy being peeped and copyright being infringed, information hiding algorithms has been developed. Image information hiding is to make use of the redundancy of the cover image to hide secret in...
Article
Sign language images such as American Sign Language (ASL) images carry effective information for communication based on gestures. The significance of sign language recognition is that it can help hearing impaired people to communicate with others successfully. To facilitate the ASL images recognition for the hearing impaired people, a proper image...
Article
Full-text available
Sign language images such as American Sign Language (ASL) images carry effective information for communication based on gestures. The significance of sign language recognition is that it can help hearing impaired people to communicate with others successfully. To facilitate the ASL images recognition for the hearing impaired people, a proper image...
Article
In recent years, fingerprint authentication systems are convenient for us to verify the identity of the user by extracting and analysing these biometric features, so they have been rapidly developed in our daily life. However, current existing problem is that fingerprint authentication systems are vulnerable to spoofing attacks, such as artificial...
Article
In recent years, fingerprint authentication systems have been extensively deployed in various applications, including attendance systems, authentications on smartphones, mobile payment authorizations, as well as various safety certifications. However, similar to the other biometric identification technologies, fingerprint recognition is vulnerable...
Article
Fingerprint authentication systems are widely used in civilian applications and governments. However, current problem is that fingerprints are easy to be imitated by artificial materials. Thus, spoof fingerprint detection has become increasingly significant. To solve the problem, a anti-spoofing mechanism, called FLD (fingerprint liveness detection...
Article
In order to realize secret communication, conventional steganography techniques can embed the secret message into carrier images by modifying the content and structure of carrier images. Although steganography techniques provide us with some more secure communication, the modification traces will be detected through using these brand-new steganalys...
Article
Fingerprint-spoofing attack often occurs when imposters gain access illegally by using artificial fingerprints, which are made of common fingerprint materials, such as silicon, latex, etc. Thus, to protect our privacy, many fingerprint liveness detection methods are put forward to discriminate fake or true fingerprint. Current work on liveness dete...
Article
Fingerprint authentication systems have been widely deployed in both civilian and government applications, however, whether fingerprint authentication systems is security or not has been an important issue under fraudulent attempts through artificial spoof fingerprints. In this paper, inspired by popular feature descriptors such as gray level coocc...
Article
Fingerprint-based recognition systems have been widely deployed in numerous civilian and government applications. However, the fingerprint recognition systems can be deceived by using an accurate imitation of a real fingerprint such as an artificially made fingerprint. In this paper, we propose a novel software-based fingerprint liveness detection...
Article
Fingerprint authentication system is used to verify users' identification according to the characteristics of their fingerprints. However, this system has some security and privacy problems. For example, some artificial fingerprints can trick the fingerprint authentication system and access information using real users' identification. Therefore, a...
Article
Fingerprint identification systems have been widely applied in both civilian and governmental applications due to its satisfying performance. However, the fingerprint identification systems can be easily cheated by the presentation of artificial fingerprints made from common materials. Therefore, it reduces the reliability and misleads the decision...
Article
Fingerprint authentication system may verify the identity of the user according to the features of fingerprint. It has been widely used in government departments and national security departments. However, there are some security and privacy problems: Fingerprint authentication system may be easily tricked by fake fingers which are produced through...

Network

Cited By