Trails:

Cyberspace of Shujun LI >> Publications

Shortcuts

Categories

Books Peer-Reviewed Papers PhD Thesis Book Chapters emotion icon Standardization Contributions Patents emotion icon Magazine/E-Letter Articles E-Prints Other Early Papers emotion icon Scientific Software

Books

Handbook of Digital Forensics of Multimedia Data and DevicesAnthony T. S. Ho and Shujun Li (Editors), Handbook of Digital Forensics of Multimedia Data and Devices (e-book @ MyLibrary; e-book @ Wiley, Apple iBooks, e-book @ Google Books, book @ Amazon), 680 pages (e-book 704 pages), 16 chapters, ISBN: 978-1-118-64050-0 (e-book ISBN: 978-1-118-70579-7), September 2015 (Companion Website) © John Wiley & Sons, Inc. and IEEE Press

LaTeX入门与提高陈志杰、赵书钦、李树钧、万福永,《LATEX入门与提高》(第二版),高等教育出版社,中国北京,2006年5月,ISBN:7-04-019379-5,238页,附ChinaTEX CD版光盘(20060111版)一张,定价:人民币44.8元 [在线销售地址]
Zhijie Chen, Shuqin Zhao, Shujun Li, Fuyong Wan, LATEX: From a Starter to a Master, 2nd edition, Higher Education Press, Beijing, China, May 2006, ISBN: 7-04-019379-5, 238 pages, with a ChinaTEX CD (built on 20060111), price: RMB 44.8 [online sale link]

Journal Special Issues Edited

Ongoing

Security and Communication NetworksDing Wang, Shujun Li and Qi Jiang, Security and Communication Networks, Special Section on User Authentication in the IoE Era: Attacks, Challenges, Evaluation, and New Designs, to be published in 2018 © Wiley Hindawi Partnership
Journal of Visual Communication and Image RepresentationAnderson Rocha, Shujun Li, C.-C. Jay Kuo, Alessandro Piva and Jiwu Huang, Journal of Visual Communication and Image Representation, Special Section on Data-driven Multimedia Forensics and Security, to be published in 2017 or 2018 © Elsevier Science B. V.

Published

Journal of Information Security and ApplicationsShujun Li, Konrad Rieck and Alan Woodward, Journal of Information Security and Applications, Special Section on Threat Detection, Analysis & Defense, vol. 19, no. 3, pp. 163-244, July 2014 (Editorial) © Elsevier Science B. V.

Information Security Technical ReportShujun Li and Edgar Weippl, Information Security Technical Report (renamed to Journal of Information Security and Applications in May 2013), Special Issue: ARES 2012 7th International Conference on Availability, Reliability and Security, vol. 17, no. 4, pp. 129-252, May 2013 (Editorial) © Elsevier Science B. V.

Book Chapters

  1. Shjun Li and Anthony T.S. Ho, "Digital Forensics Laboratories in Operation: How are Multimedia Data and Devices Handled?" Chapter 1 of Handbook of Digital Forensics of Multimedia Data and Devices, edited by Anthony T.S. Ho and Shujun Li, pp. 3-37, September 2015 © John Wiley & Sons, Inc. and IEEE Press
  2. Shjun Li, Mandeep K. Dhami and Anthony T.S. Ho, "Standards and Best Practices in Digital and Multimedia Forensics," Chapter 2 of Handbook of Digital Forensics of Multimedia Data and Devices, edited by Anthony T.S. Ho and Shujun Li, pp. 38-93, September 2015 © John Wiley & Sons, Inc. and IEEE Press
  3. Shujun Li, "Perceptual Encryption of Digital Images and Videos," in Perceptual Digital Imaging: Methods and Applications, edited by Rastislav Lukac, Chapter 14, pp. 431-468, ISBN: 978-1-43-986856-0 (e-Book ISBN-13: 978-1-43-986893-5), October 2012 © CRC Press (part of Taylor & Francis Group, LLC)
  4. Shujun Li, "On the Performance of Secret Entropy Coding: A Perspective Beyond Security," in Autonomous Systems: Developments and Trends, edited by Herwig Unger, Kyandoghere Kyamaky and Janusz Kacprzyk, Studies in Computational Intelligence, vol. 391, pp. 389-401, ISBN: 978-3-642-24805-4 (e-book ISBN: 978-3-642-24806-1), 2011 © Springer
  5. Gonzalo Alvarez, José María Amigó, David Arroyo and Shujun Li, "Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers," in Chaos-Based Cryptography: Theory, Algorithms and Applications, edited by Ljupco Kocarev and Shiguo Lian, Studies in Computational Intelligence, vol. 354, pp. 257-295, ISBN: 978-3-642-20541-5 (e-book ISBN: 978-3-642-20542-2), June 2011 © Springer
  6. Shujun Li, Zhong Li and Wolfgang A. Halang, "Multimedia Encryption," article in Encyclopedia of Multimedia Technology and Networking, edited by Margherita Pagani, Volume II, pp. 972-977, ISBN: 978-1-60566-014-1 (e-book ISBN: 978-1-60566-015-8), August 2008 © IGI Global
  7. Shujun Li, Guanrong Chen and Xuan Zheng, "Chaos-Based Encryption for Digital Images and Videos," Chapter 4 of Multimedia Security Handbook (online version), edited by Borko Furht and Darko Kirovski, pp. 133-167, ISBN: 978-0-84-932773-5 (e-book ISBN: 978-1-42-003826-2), December 2004 © CRC Press (currently part of Taylor & Francis Group, LLC)
    This book was republished in March 2006 by Auerbach Publications (also part of Taylor & Francis Group, LLC) with a different title "Multimedia Encryption and Authentication Techniques and Applications" (ISBN: 978-0-84-937212-4).

Peer-Reviewed Papers

Note: The underlined names like "Shujun Li" and "Gonzalo Alvarez" denote corresponding authors (and presenters as well in case of conference papers). For MPEG standardization contributions, the underlined names include principal contributor(s)/editors and the presenter(s).

2017

2016

2015

  1. Hassan Jameel Asghar, Ron Steinfeld, Shujun Li, Mohamed Ali Kaafar and Josef Pieprzyk, "On the Linearization of Human Identification Protocols: Attacks based on Linear Algebra, Coding Theory and Lattices," IEEE Transactions on Information Forensics and Security, vol. 10, no. 8, pp. 1643-1655, 2015 [Full Edition: IACR ePrint 2014/767] © IEEE
  2. Mario Čagalja, Toni Perković, Marin Bugarić and Shujun Li, "Fortune cookies and smartphones: Weakly unrelayable channels to counter relay attacks," Pervasive and Mobile Computing, vol. 20, pp. 64-81, 2015 © Elsevier Science B. V.

2014

  1. Roland Schmitz, Shujun Li, Christos Grecos and Xinpeng Zhang, "Towards Robust Invariant Commutative Watermarking-Encryption based on Image Histograms," International Journal of Multimedia Data Engineering and Management (IJMDEM), vol. 5, no. 4, pp. 36-52, 2014 © IGI Global
  2. Hui Wang, Anthony TS Ho and Shujun Li, "A Novel Image Restoration Scheme Based on Structured Side Information and Its Application to Image Watermarking," Signal Processing: Image Communication, vol. 29, no. 7, pp. 773-787, 2014 © Elsevier Science B. V.

2013

  1. Junaid Jameel Ahmad, Shujun Li, Richard Thavot and Marco Mattavelli, "Secure Computing with the MPEG RVC Framework," Signal Processing: Image Communication, vol. 28, no. 10 (special issue on Recent Advances on MPEG Codec Configuration Framework), pp. 1315-1334, 2013 © Elsevier Science B. V.
  2. Hassan Jameel Asghar, Shujun Li, Josef Pieprzyk and Huaxiong Wang, "Cryptanalysis of the Convex Hull Click Human Identification Protocol," International Journal of Information Security, vol. 12, no. 2, pp. 83-96, 2013 © Springer

2012

2011

  1. Roland Schmitz and Shujun Li, "Neue Entwicklungen in der e-Banking Security," ("Recent Developments in e-Banking Security,") PIK - Praxis der Informationsverarbeitung und Kommunikation, vol. 34, no. 4, pp. 176-184, 2011 © Walter de Gruyter GmbH & Co. KG
  2. Chengqing Li, Shujun Li and Kwok-Tung Lo, "Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps," Communications in Nonlinear Science and Numerical Simulation, vol. 16, no. 2, pp. 837-843, 2011 © Elsevier Science B. V.
  3. David Arroyo, Gonzalo Alvarez, José María Amigó and Shujun Li, "Cryptanalysis of a family of self-synchronizing chaotic stream ciphers," Communications in Nonlinear Science and Numerical Simulation, vol. 16, no. 2, pp. 805-813, 2011 © Elsevier Science B. V.

2010

  1. Chengqing Li, Shujun Li, Kwok-Tung Lo and Kyandoghere Kyamakya, "A differential cryptanalysis of Yen-Chen-Wu multimedia cryptography system," Journal of Systems and Software, vol. 83, no. 8, pp. 1443-1452, 2010 © Elsevier Science B. V.
  2. A.B. Orue, G. Alvarez, G. Pastor, M. Romera, F. Montoya and Shujun Li, "A new parameter determination method for some double-scroll chaotic systems and its applications to chaotic cryptanalysis," Communications in Nonlinear Science and Numerical Simulation, vol. 15, no. 11, pp. 3471-3483, 2010 © Elsevier Science B. V.
  3. David Arroyo, Shujun Li, Gonzalo Alvarez, José María Amigó and Rhouma Rhouma, "Comments on 'Image encryption with chaotically coupled chaotic maps'," Physica D: Nonlinear Phenomena, vol. 239, no. 12, pp. 1002-1006, 2010 © Elsevier Science B. V.

2009

  1. Rhouma Rhouma, Ercan Solak, David Arroyo, Shujun Li, Gonzalo Alvarez and Safya Belghitha, "Comment on “Modified Baptista type chaotic cryptosystem via matrix secret key” [Phys. Lett. A 372 (2008) 5427]," Physics Letters A, vol. 373, no. 37, pp. 3398-3400, 2009 © Elsevier Science B. V.
  2. A.B. Orue, V. Fernandez, G. Alvarez, G. Pastor, M. Romera, F. Montoya, C. Sanchez-Avila and Shujun Li, "Breaking a SC-CNN-based Chaotic Masking Secure Communication System," International Journal of Bifurcation and Chaos, vol. 19, no. 4, pp. 1329-1338, 2009 © World Scientific Publishing Co.
  3. David Arroyo, Gonzalo Alvarez, Shujun Li, Chengqing Li and Veronica Fernandez, "Cryptanalysis of a New Chaotic Cryptosystem Based on Ergodicity," International Journal of Modern Physics B, vol. 23, no. 5, pp. 651-659, 2009 © World Scientific Publishing Co.
  4. David Arroyo, Chengqing Li, Shujun Li, Gonzalo Alvarez and Wolfgang A. Halang, "Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm," Chaos, Solitons & Fractals, vol. 41, no. 5, pp. 2613-2616, 2009 © Elsevier Science B. V.
  5. G. Alvarez and Shujun Li, "Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption," Communications in Nonlinear Science and Numerical Simulation, vol. 14, no. 11, pp. 3743-3749, 2009 © Elsevier Science B. V.
  6. Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Alvarez and Guanrong Chen, "On the security defects of an image encryption scheme," Image and Vision Computing, vol. 27, no. 9, pp. 1371-1381, 2009 © Elsevier Science B. V.
  7. Chengqing Li, Shujun Li, Guanrong Chen and Wolfgang A. Halang, "Cryptanalysis of an image encryption scheme based on a compound chaotic sequence," Image and Vision Computing, vol. 27, no. 8, pp. 1035-1039, 2009 © Elsevier Science B. V.
  8. David Arroyo, Chengqing Li, Shujun Li, Gonzalo Alvarez, "Cryptanalysis of a computer cryptography scheme based on a filter bank," Chaos, Solitons & Fractals, vol. 41, no. 1, pp. 410-413, 2009 © Elsevier Science B. V.

2008

  1. David Arroyo, Rhouma Rhouma, Gonzalo Alvarez, Shujun Li and Veronica Fernandez, "On the security of a new image encryption scheme based on chaotic map lattices," Chaos, vol. 18, no. 3, art. no. 033112, 2008 © AIP
  2. A.B. Orue, V. Fernandez, G. Alvarez, G. Pastor, M. Romera, Shujun Li and F. Montoya, "Determination of the parameters for a Lorenz system and application to break the security of two-channel chaotic cryptosystems," Physics Letters A, vol. 372, no. 34, pp. 5588-5592, 2008 © Elsevier Science B. V.
  3. Shujun Li, Chengqing Li, Guanrong Chen and Kwok-Tung Lo, "Cryptanalysis of the RCES/RSES image encryption scheme," Journal of Systems and Software, vol. 81, no. 7, pp. 1130-1143, 2008 © Elsevier Science B. V.
  4. Shujun Li, Chengqing Li, Kwok-Tung Lo and Guanrong Chen, "Cryptanalyzing an Encryption Scheme Based on Blind Source Separation," IEEE Transactions on Circuits and Systems-I: Regular Papers, vol. 55, no. 4, pp. 1055-1063, April 2008 © IEEE
  5. Shujun Li, Chengqing Li, Guanrong Chen, Nikolaos G. Bourbakis and Kwok-Tung Lo, "A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks," Signal Processing: Image Communication, vol. 23, no. 3, pp. 212-223, 2008 © Elsevier Science B. V.
  6. Shujun Li, Chengqing Li, Kwok-Tung Lo and Guanrong Chen, "Cryptanalysis of an Image Scrambling Scheme without Bandwidth Expansion," IEEE Transactions on Circuits and Systems for Video Technology, vol. 18, no. 3, pp, 338-349, 2008 (Regular Transaction Paper) © IEEE
  7. Chengqing Li, Shujun Li, Gonzalo Álvarez, Guanrong Chen and Kwok-Tung Lo, "Cryptanalysis of a chaotic block cipher with external key and its improved version," Chaos, Solitons & Fractals, vol. 37, no. 1, pp. 299-307, 2008 © Elsevier Science B. V.
  8. David Arroyo, Gonzalo Alvarez, Shujun Li, Chengqing Li and Juana Nunez, "Cryptanalysis of a discrete-time synchronous chaotic encryption system," Physics Letters A, vol. 372, no. 7, pp. 1034-1039, 2008 © Elsevier Science B. V.

2007

  1. Chengqing Li, Shujun Li, Gonzalo Álvarez, Guanrong Chen and Kwok-Tung Lo, "Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations," Physics Letters A, vol. 369, no. 1-2, pp. 23-30, 2007 © Elsevier Science B. V.
  2. Shujun Li, Guanrong Chen, Albert Cheung, Bharat Bhargava and Kwok-Tung Lo, "On the Design of Perceptual MPEG-Video Encryption Algorithms," IEEE Transactions on Circuits and Systems for Video Technology, vol. 17, no. 2, pp. 214-223, 2007 (Regular Transaction Paper) © IEEE
  3. Gonzalo Álvarez, Shujun Li and Luis Hernandez, "Analysis of security problems in a medical image encryption system," Computers in Biology and Medicine, vol. 37, no. 3, pp. 424-427, 2007 © Elsevier Science B. V.
  4. Shujun Li and Kwok-Tung Lo, "Security problems with improper implementations of improved FEA-M," Journal of Systems and Software, vol. 80, no. 5, pp. 791-794, 2007 © Elsevier Science B. V.

2006

  1. Shujun Li, Chengqing Li, Kwok-Tung Lo and Guanrong Chen, "Cryptanalysis of an image encryption scheme," Journal of Electronic Imaging, vol. 15, no. 4, article number 043012, 2006 © SPIE
  2. Gonzalo Álvarez and Shujun Li, "Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems," International Journal of Bifurcation and Chaos (Tutorial-Review Section), vol. 16, no. 8, pp. 2129-2151, 2006 © World Scientific Publishing Co.
  3. Shujun Li, Guanrong Chen and Gonzalo Álvarez, "Return-Map Cryptanalysis Revisited," International Journal of Bifurcation and Chaos, vol. 16, no. 5, pp. 1557-1568, 2006 © World Scientific Publishing Co.
  4. Gonzalo Álvarez and Shujun Li, "Breaking an encryption scheme based on chaotic Baker map," Physics Letters A, vol. 352, no. 1-2, pp. 78-82, 2006 © Elsevier Science B. V.
  5. Chengqing Li, Shujun Li, Der-Chyuan Lou and Dan Zhang, "On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)", Journal of Systems and Software, vol. 79, no. 2, pp. 253-258, 2006 © Elsevier Science B. V.
  6. Chengqing Li, Shujun Li, Guanrong Chen and Dan Zhang, "Cryptanalysis of a data security protection scheme for VoIP," IEE Proceedings - Vision, Image & Signal Processing (now succeeded by IET Image Processing, IET Signal Processing and IET Computer Vision), vol. 153, no. 1, pp. 1-10, 2006 © IET (former IEE)

2005

  1. Shujun Li, Guanrong Chen and Xuanqin Mou, "On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps," International Journal of Bifurcation and Chaos (Tutorial-Review Section), vol. 15, no. 10, pp. 3119-3151, 2005 © World Scientific Publishing Co.
  2. Kwok-wo Wong, Kwan-Pok Man, Shujun Li and Xiaofeng Liao, "A More Secure Chaotic Cryptographic Scheme based on the Dynamic Look-up Table," Circuits, Systems & Signal Processing, vol. 24, no. 5, pp. 571-584, 2005 © Birkhäuser Boston Inc. (Part of Springer)
  3. Gonzalo Álvarez, Luis Hernández, Jaime Muñóz, Fausto Montoya and Shujun Li, "Security analysis of communication system based on the synchronization of different order chaotic systems," Physics Letters A, vol. 345, no. 4-6, pp. 245-250, 2005 © Elsevier Science B. V.
  4. Chengqing Li, Shujun Li, Guanrong Chen, Gang Chen and Lei Hu, "Cryptanalysis of a New Signal Security System for Multimedia Data Transmission," EURASIP Journal on Applied Signal Processing, vol. 2005, no. 8, pp. 1277-1288, 2005 © Hindawi Publishing Corporation
  5. Shujun Li, Gonzalo Álvarez, Guanrong Chen and Xuanqin Mou, "Breaking a chaos-noise-based secure communication scheme," Chaos, vol. 15, no. 1, article 013703 (10 pages), March 2005 © AIP
  6. Shujun Li, Gonzalo Álvarez and Guanrong Chen, "Breaking a chaos-based secure communication scheme designed by an improved modulation method," Chaos, Solitons & Fractals, vol. 25, no. 1, pp. 109-120, 2005 © Elsevier Science B. V.
  7. G. Álvarez, Shujun Li, F. Montoya, G. Pastor and M. Romera, "Breaking projective chaos synchronization secure communication using filtering and generalized synchronization," Chaos, Solitons & Fractals, vol. 24, no. 3, pp. 775-783, 2005 © Elsevier Science B. V.

2004

  1. Shujun Li, Guanrong Chen and Xuanqin Mou, "On the Security of the Yi-Tan-Siew Chaotic Cipher," IEEE Transactions on Circuits and Systems-II: Express Briefs, vol. 51, no. 12, pp. 665-669, 2004 © IEEE
  2. Shujun Li, Guanrong Chen, Kwok-Wo Wong, Xuanqin Mou and Yuanlong Cai, "Baptista-type chaotic cryptosystems: problems and countermeasures," Physics Letters A, vol. 332, no. 5-6, pp. 368-375, 2004 © Elsevier Science B. V.
  3. Gonzalo Álvarez and Shujun Li, "Breaking network security based on synchronized chaos," Computer Communications, vol. 27, no. 16, pp. 1679-1681, 2004 © Elsevier Science B. V.

2003

  1. Shujun Li, Xuanqin Mou, Boliya L. Yang, Zhen Ji and Jihong Zhang, "Problems with a Probabilistic Encryption Scheme Based on Chaotic Systems", International Journal of Bifurcation and Chaos, vol. 13, no. 10, pp. 3063-3077, 2003 © World Scientific Publishing Co.
  2. Shujun Li, Xuanqin Mou, Yuanlong Cai, Zhen Ji and Jihong Zhang, "On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision," Computer Physics Communications, vol. 153, no.1, pp. 52-58, 2003 © Elsevier Science B. V.
  3. Shujun Li, Xuanqin Mou, Zhen Ji, Jihong Zhang and Yuanlong Cai, "Performance analysis of Jakimoski-Kocarev attack on a class of chaotic cryptosystems," Physics Letters A, vol. 307, no. 1, pp. 22-28, 2003 © Elsevier Science B. V.
  4. Shujun Li, Xuanqin Mou, Zhen Ji and Jihong Zhang, "Cryptanalysis of a Class of Chaotic Stream Ciphers (一类混沌流密码的分析)", Journal of Electronics & Information Technology (《电子与信息学报》), vol. 25, no. 4, pp. 473-478, 2003 © Institute of Electronics, Chinese Academy of Sciences (中科院电子所)

2002

2001

  1. Shujun Li, Xuanqin Mou and Yuanlong Cai, "Improving security of a chaotic encryption approach," Physics Letters A, vol. 290, no. 3-4, pp. 127-133, 2001 © Elsevier Science B. V.

PhD Thesis

Analyses and New Designs of Digital Chaotic Ciphers (数字化混沌密码的分析与设计)Shujun Li, "Analyses and New Designs of Digital Chaotic Ciphers (数字化混沌密码的分析与设计)," PhD thesis, School of Electronic and Information Engineering, Xi'an Jiaotong University, supervised by Prof. Yuanlong Cai and Prof. Xuanqin Mou, submitted in April 2003, defense passed on 13 June 2003, approved on 30 June 2003 (last modified on 16 November 2007, to correct minor errors and to update references)
Note: The survey on chaotic cryptography included in Chapter 2 of the thesis has been outdated to some extent, see the following two talks that Shujun LI delivered in 2005 for more information: Digital Chaotic Ciphers (, 1.03MB), Analog Chaos-Based Secure Communications (, 4.34MB). For an extended version of Chapter 3, see the paper "On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps" () published in International Journal of Bifurcation and Chaos in 2005.

Standardization Contributions

International Standard Co-Edited

Input Documents

2011

2010

2009

Output Documents

2011

2010

Magazine/E-Letter Articles

2009

2004

E-Prints

Full List of All e-prints on arXiv

Intrusion Detection

Digital Watermarking

SecHCI

Multimedia Encryption

Cryptanalysis of Digital Chaotic Ciphers

Cryptanalysis of Chaos-Based Secure Communications

Chaos Theory

Pure Mathematics

Other Early Papers

Scientific Software

Patents

Only one revision exists, which was created (or modified) by hooklee at Sunday, April 16, 2017 2:46:11 AM.
This page was locked and can only be edited by administrators.

HomeIndexRecent ChangesPreference

Google

Google PageRank Checker
Valid XHTML 1.0 Transitional
Locations of visitors to this page
ip-location map zoom
Germany

China

GMT (London)