Feng Liu
 
   
  My research interests include: strategic and economic aspects of information security, visual cryptography, network security and formal analysis of security protocols, besides my future research interests may include the following topics: coding theory, secret sharing, image processing, digital anti-counterfeiting and watermarking.  
Current research projects
  1. "Youth Innovation Promotion Association", Chinese Academy of Sciences, 2013-2017.
  2. "Strategic Priority Research Program" of the Chinese Academy of Sciences, 2012-2016.
  3. GF Innovation Program of the Chinese Academy of Sciences, 2015-2016.
  4. National Top Think Tank Pilot Major Projects, 2016.
  5. National Natural Science Foundation of China, No. 61671448, 2017-2020.
  Past  research projects
  1. China-New Zealand Scientist Exchange Programme, 2013.
  2. National Natural Science Foundation of China, No. 60903210, 2010-2012.
  3. Knowledge Innovation Program of the Chinese Academy of Sciences.
  4. Innovation Projects of Institute of Information Engineering.
  5. Young Talents Project of Institute of Information Engineering.
 
 

Books & Chapters

Monographs

  1. Feng Liu and Weiqi Yan. Visual Cryptography for Image Processing and Security - Theory, Methods, and Applications . Springer-Verlag London, 2014. (e-version, and 2nd Edition 2015)
  2. Feng Liu etc. Overview of the Cybersecurity System in USA. Science Press, 2015. 刘峰等著,《美国网络空间安全体系》,科学出版社,2015。

Books Edited

  1. Shi, Y.Q., Kim, H.J., Perez-Gonzalez, F., Liu, F. Proceedings of 15th International Workshop on Digital Forensics and Watermarking, IWDW2016, Beijing, China, September 17-19, 2016. (e-version)
  2. Feng Liu and Weiqi Yan. Special Issue on Visual Cryptography of Springer Transactions on Data Hiding and Multimedia Security. Contains 7 papers selected from 21 submissions, Springer LNCS 8363 , 2014. (e-version)
  3. Dongdai Lin, Feng Liu. Special Issue on cryptography of Communications of the CCISA. Contains 4 review and progress articles. To appear in 2015.

Chapters

  1. Feng Liu. Chapter 3: Cryptology and security protocol", in book "Security Fundamentals of Internet of Things, pages 30-75. Science Press, 2013.刘峰,密码学与安全协议基础,《物联网安全基础》,页30-75,科学出版社,2013。
  2. Feng Liu. The optimization problem of visual cryptography scheme. In book "10000 Selected Problems in Sciences Information Sciences", Science Press, 2011.刘峰,视觉密码方案的最优化问题,《10000个科学难题?#20449;息科学卷》,科学出版社,2011。
  3. Feng Liu. Resolving the Alignment Problem in Visual Cryptography. In book "Visual Cryptography and Secret Image Sharing", pages 297-328, CRC press Taylor & Francis LLC, ISBN: 9781439837214 , 2011.
  4. Feng Liu. On the progress of Visual Cryptography. In book "Progress of Cryptography in China", pages 32-67, Publishing House of Electronics Industry, 2010. 刘峰,视觉密码学研究进展,《中国密码学发展报告2010 》,页32-67,电子工业出版社,2010.
  5. Feng Liu. Visual Cryptography. To appear in Dictionary of Mathematics, 2013. 刘峰,视觉密码学,《数学大词典》,2013.

Journal Papers
  1. Tao Xu, Chuankun Wu, Feng Liu, Ruoxin Zhao "Protecting White-Box Cryptographic Implementations with Obfuscated Round Boundaries ", accepted by SCIENCE CHINA Information Sciences, 2017.
  2. Gang Shen, Feng Liu, Zhengxin Fu and Bin Yu "Visual Cryptograms of Random Grids via Linear Algebra", accepted by Multimedia Tools and Applications, 2017.
  3. Huashan Chen, Xiuyan Zhao, Feng Liu, Shouhuai Xu and Wenlian Lu "Optimizing interconnections to maximize the spectral radius of interdependent networks", Physical Review E, volume 95, 032308 , 2017.
  4. Tao Xu, Feng Liu and Chuankun Wu "A White-Box AES-Like Implementation Based on Key-Dependent Substitution-Linear Transformations", accepted by Multimedia Tools and Applications .
  5. Teng Guo, Jian Jiao, Feng Liu and Wen Wang "On the Pixel Expansion of Visual Cryptography Scheme" International Journal of Digital Crime and Forensics, volume 9 issue 2, pages 38-44, , 2017.
  6. Gang Shen, Feng Liu, Zhengxin Fu and Bi-n Yu "Perfect Contrast XOR-based Visual Cryptography Schemes via Linear Algebra", Designs, Codes and Cryptography, volume 85, issue 1, pages 15-37, 2017. 
  7. Gang Shen, Feng Liu, Zhengxin Fu and Bin Yu "New insight into linear algebraic technique to construct visual cryptography scheme for general access structure", Multimedia Tools and Applications , volume 54, pages 140-151, 2017. 
  8. Yawei Ren, Feng Liu etc. "Cheating prevention visual cryptography scheme using Latin square" IET Information Security, volume 11 issue 4, page 211-219, 2017.
  9. Guangyu Wang, Feng Liu, Weiqi Yan "Basic Visual Cryptography Using Braille" International Journal of Digital Crime and Forensics, volume 8 issue 3, pages 85-93, , 2016.
  10. Guangyu Wang, Feng Liu, Weiqi Yan "2D Barcodes for Visual Cryptography" Multimedia Tools and Applications, volume 75, issue 2, pages 1223-1241, November, 2014. (DOI)
  11. Teng Guo, Feng Liu and Chuankun Wu. k out of k extended visual cryptography scheme by random grids. Signal Processing (Elsevier), volume 94, pages 90–101, January 2014.
  12. Feng Liu, Weiqi Yan, Peng Li and Chuankun Wu. ESSVCS: An Enriched Secret Sharing Visual Cryptography. Springer Transactions on Data Hiding and Multimedia Security, LNCS 8363, pages 1-24, 2014.
  13. Feng Liu, Teng Guo, Chuankun Wu and Ching-Nung Yang. Flexible Visual Cryptography Scheme Without Distortion and Its Application. Springer Transactions on Data Hiding and Multimedia Security, LNCS 8363, pages 110-130, 2014.
  14. Teng Guo, Feng Liu and Chuankun Wu. Threshold visual secret sharing by random grids with improved contrast. Journal of Systems and Software, volume 86, issue 8, pages 2094–2109, 2013.
  15. Feng Liu, Teng Guo and Chuankun Wu and Lina Qian. Improving the Visual Quality of Size Invariant Visual Cryptography Scheme. Journal of Visual Communication and Image Representation, volume 23, pages 331-342, 2012.
  16. Feng Liu and Chuankun Wu. Embedded Extended Visual Cryptography Schemes. IEEE Transactions on Information Forensics & Security, volume 6, No. 2, pages 307-322, 2011, also available at ePrint Archive 2010/439.
  17. Feng Liu, Chuankun Wu and Xijun Lin. Cheating Immune Visual Cryptography Scheme. IET Information Security, volume 5, issue 1, pages 51-59, 2011.
  18. Ching-Nung Yang, Chih-Cheng Wu and Feng Liu. Construction of General (k, n) Probabilistic Visual Cryptography Schemes. Journal of Electronic Science and Technology, volume 9, No. 4, pages 317-324, 2011.
  19. Peng Li, Peijun Ma and Feng Liu. Multi-Threshold Image Secret Sharing Scheme. Journal of Electronics, volume 40, issue 3, pages 518-524, 2012. 李鹏、马培军、刘峰,多重门限的图像秘密共享方案,《电子学报》,卷40,期3,页518-524,2012。
  20. Junqing Liang, XiJun Lin and Feng Liu. CLPKE: Against A Variation of Key Replacement Attack without Bilinear Pairing. JCIT: Journal of Convergence Information Technology, volume 7, No. 3, pages 137-145, 2012.
  21. Feng Liu, Chuankun Wu and Xijun Lin. Step Construction of Visual Cryptography Schemes. IEEE Transactions on Information Forensics & Security, volume 5, No. 1, pages 27-38, 2010.
  22. Feng Liu, Chuankun Wu and Xijun Lin. A New Definition of the Contrast of Visual Cryptography Scheme. Information Processing Letters, volume 110, pages 241-246, 2010.
  23. Feng Liu, Chuankun Wu and Xijun Lin. Some Extensions on Threshold Visual Cryptography Schemes. The Computer Journal, volume 53, issue 1, pages 107-119, 2010.
  24. Feng Liu and Chuankun Wu. A Robust Visual Cryptography Based Watermarking Scheme for Multiple Cover Images and Multiple Owners. IET Information Security, volume 5, issue 2, pages 121–128, 2010.
  25. Feng Liu, Chuankun Wu and Xijun Lin. The Alignment Problem of the Visual Cryptography Scheme. Designs, codes and cryptography, volume 50, issue 2, pages 215-227, 2009.
  26. Xijun Lin, Chuankun Wu and Feng Liu. Many-to-one Encryption and Authentication Scheme and Its Application" Journal of Communications and Networks Volume 10, No. 1, pages 18-27, 2008.
  27. Xijun Lin, Chuankun Wu and Feng Liu. Analysis of An Authenticated Identity-based Multicast Scheme. IET Proceedings-Communications Volume 2, issue 7, pages 935-937, 2008.
  28. Feng Liu, Chuankun Wu and Xijun Lin. Colour Visual Cryptography Schemes. IET Information Security Volume 2, issue 4, pages 151-165, 2008.
  29. Feng Liu, Peng Li and Chuankun Wu. Encrypting More Information in Visual Cryptography Scheme. available at ePrint Archive 2011/340, 2011. An updated version of the paper has been accepted to be published in IWDW2012.
Conference Papers
  1. Wen Wang, Feng Liu, Teng Guo and Yawei Ren. Temporal Integration Based Visual Cryptography Scheme and Its Application. Accepted by IWDW2017 (16th International Workshop on Digital-forensics and Watermarking, Magdeburg, Germany 23-25 August), 2017.
  2. Wenlun Pan, Zhenzhen Bao, Dongdai Lin and Feng Liu. The Distribution of $2^n$-Periodic Binary Sequences with Fixed $k$-Error Linear Complexity. ISPEC2016 (12th International Conference on Information Security Practice and Experience , Zhangjiajie, China, 16-18 November), LNCS 10060, pages 13-36, 2016.
  3. Wenlun Pan, Zhenzhen Bao, Dongdai Lin and Feng Liu. The Linear Complexity and $2$-error Linear Complexity Distribution of $2^n$-Periodic Binary Sequences with Fixed Hamming Weight . ICICS2016 (18th IEEE International Conference on Information and Communications Security, Singapore, 29 november-2 December), LNCS 9977, pages 107-123, 2016.
  4. Teng Guo, Feng Liu and Wen Wang. Privacy monitor. IWDW2016 (15th International Workshop on Digital-forensics and Watermarking, Beijing, China 17-19 September),  LNCS 10082, pages 187-197, 2017.
  5. Gang Shen, Feng Liu, Zhengxin Fu and Bin Yu. Halftone Visual Cryptography with Complementary Cover Images. IWDW2016 (15th International Workshop on Digital-forensics and Watermarking, Beijing, China 17-19 September), LNCS 10082, pages 223-237, 2017.
  6. Yawei Ren, Feng Liu and Wen Wang. Collusive Attacks to Partition Authentication Visual Cryptography Scheme. IWDW2016 (15th International Workshop on Digital-forensics and Watermarking, Beijing, China 17-19 September), LNCS 10082, pages 238-250, 2017.
  7. Wen Wang, Feng Liu, Teng Guo, Yawei Ren and Gang Shen. Information Security Display Technology with Cheating Effect. IWDW2016 (15th International Workshop on Digital-forensics and Watermarking, Beijing, China 17-19 September), LNCS 10082, pages 198-208, 2017.
  8. Jiaxin Yin, Rui Wang, Yuanfang Guo and Feng Liu. An Adaptive Reversible Data Hiding Scheme for JPEG Images. IWDW2016 (15th International Workshop on Digital-forensics and Watermarking, Beijing, China 17-19 September), LNCS 10082, pages 456-469, 2017.
  9. Weiqi Yan and Feng Liu, Event Analogy Based Privacy Preservation in Visual Surveillance. International Workshop on Video Surveillance of The 7th Pacific-Rim Symposium on Image and Video Technology (PSIVT 2015),  Auckland, New Zealand 23-27 November), LNCS 9555, pages 357-368, 2016.
  10. Wen Wang, Feng Liu, Wei Qi Yan, Gang Shen and Teng Guo. An Improved Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Pixel Expansion. IWDW2015 (14th International Workshop on Digital-forensics and Watermarking, Tokyo, Japan 7-10 October), LNCS 9569, pages 418-432, 2016.
  11. Yawei Ren, Feng Liu, Dongdai Lin, Rongquan Feng and Wen Wang. A New Construction of Tagged Visual Cryptography Scheme . IWDW2015 (14th International Workshop on Digital-forensics and Watermarking, Tokyo, Japan 7-10 October), LNCS 9569, pages 433-445, 2016.
  12. Guangyu Wang, Feng Liu and Weiqi Yan. Braille For Visual Cryptography. ISM2014 (IEEE International Symposium on Multimedia, Taichung, Taiwan December 10-12, 2014). IEEE, pages 175-276, 2014.
  13. Feng Liu and Chuankun Wu. Optimal XOR based (2,n)-Visual Cryptography Schemes. Accepted by IWDW2014, full version of the paper also available at ePrint Archive 2010/545, 2014.(slides)
  14. Teng Guo, Feng Liu, Chuankun Wu, Young-Chang Hou, Yawei Ren and Wen Wang, The Security Defect of a Multi-pixel Encoding Method. ISC2013 (The 16th Information Security Conference, Dallas, Texas, November 13-15, 2013), LNCS 7807, pages39-48, 2015.
  15. Teng Guo, Feng Liu and ChuanKun Wu, On (k, n) Visual Cryptography Scheme with Several Essential Parties. ICITS 2013 (The 7th International Conference on Information Theoretic Security, November 28-30, 2013, NTU, Singapore), LNCS pages 56-68, 2014.
  16. Teng Guo, Feng Liu, Chuankun Wu and Ching-Nung Yang, Threshold Secret Image Sharing. Accepted by ICICS 2013 (15th International Conference on Information and Communications Security, 20-22 November 2013, Beijing, China). LNCS 8233, pages 404-412, 2013.
  17. Teng Guo, Feng Liu, Chuankun Wu, Yawei Ren and Wen Wang. On the Randomness of Visual Cryptography Scheme. Processing of IIH-MSP2013 IEEE, pp. 391-394  (The Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, October 16-18, 2013, Beijing, China).
  18. Teng Guo, Feng Liu and Chuankun Wu. Visual Cryptography for Natural Images and Visual Voting. Inscrypt2012  (The 8th China International Conference on Information Security and Cryptology), Beijing, China, Nov. 28 - Dec. 1, 2012. LNCS 7763, pages 90-101, 2013.
  19. Feng Liu, Weiqi Yan, Peng Li and Chuankun Wu. A Secret Enriched Visual Cryptography Scheme. Accepted by IWDW 2012 (11th International Workshop on Digital-forensics and Watermarking), Lecture Notes in Computer Science Volume 7809, 2013, pp 464-484, Shanghai China, 31 Oct.-3 Nov. 2012. LNCS 7809, pages 464-484, 2013. (slides)
  20. Teng Guo, Feng Liu and Chuankun Wu. On the Equivalence of Two Definitions of Visual Cryptography Scheme. ISPEC 2012, pages 217-227, LNCS 7232, Hangzhou, China, April 9-12, 2012.
  21. Feng Liu, Teng Guo, Chuankun Wu and Ching-Nung Yang. Flexible Visual Cryptography Scheme Without Distortion. IWDW2011 (10th International Workshop on Digital-forensics and Watermarking), Lecture Notes in Computer Science, volume 7128/2012, pages 211-227, Atlantic City USA, 23-26 October 2011.(slides)
  22. Teng Guo, Feng Liu and Chuankun Wu. Multi-pixel Encryption Visual Cryptography. Inscrypt2011,Lecture Notes in Computer Science 7537(2012), pp.86-92, Beijing China, 30 November - 3 December 2011.
  23. Qinggang Yue, Rui Xue and Feng Liu. Some Improvements to the Cost-Based Framework for Analyzing Denial of Service Attack. INTRUST2011, LNCS 7222(2012), pages 84-101, Beijing China, 27-29 November 2011.
  24. Jianhua Peng, Feng Liu, Zhenju Zhao, Danqing Huang and Rui Xue. Layered model checking of Kerberos protocol. Accepted by CryptoForma'11, Limerick UK, on 21 June 2011.
  25. Zhenju Zhao, Feng Liu, Jianhua Peng, Danqing Huang, Rui Xue and Zhenfeng Zhang. Some Improvements on Model Checking CoreASM Specifications of Security Protocols. ISDPE 2010 (The 2nd International Symposium on Data, Privacy and E-Commerce), pp. 66-71, Buffalo/Niagara Falls USA on Sept 13th-14th 2010. (AR=10%)
  26. Danqing Huang, Rui Xue, Feng Liu, Jianhua Peng, Zhenju Zhao and Dongyao Ji. Formal Verification of HMQV Using ASM-SPV. IIH-MSP 2010 (The Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing), pp. 458-461, Darmstadt, Germany on October 15-17, 2010.
  27. Jianhua Peng, Feng Liu, Zhenju Zhao, Danqing Huang and Rui Xue. ASM-SPV: A Model Checker for Security Protocols. IIH-MSP 2010 (The Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing), pp. 486-489, Darmstadt, Germany on October 15-17, 2010.
Articles and Essays
  1. Lan Pi, Feng Liu, Dongdai Lin, A Preliminary Understanding of the Privacy Protection In the Big Data Era. China Information Security, volume 9, pages 90-93, 2015. 皮兰、刘峰、林东岱,大数据时代的隐私保护初探,《中国信息安全》,期9,页90-93,2015。
  2. Huashan Chen, Lan Pi, Feng Liu, Dongdai Lin "Research Frontier and Trends of Science of Cybersecurity", volume 3, pages 1-5, 2015. 陈华山、皮兰、刘峰、林东岱,网络空间安全科学基础的研究前沿及发展趋势,《信息网络安全》,第3期,第1-5页,2015。
  3. Feng Liu and Miao Liu "Comments on the FICIC framework of USA" China Information Security. To appear. 刘峰、刘淼, 美国《FICIC框架》及其影响力分析,《中国信息安全》,2014。
  4. Wenhao Wang, Feng Liu, Qian Zhao, From MH370 to the Protection of Critical Infrastructure in China. China Information Security, volume 6, pages 98-101, 2014. 王文浩、刘峰、赵倩,从MH370事件看我国关键基础设施保护,《中国信息安全》,期6,页98-101,2014。
  5. Qian Zhao, Feng Liu and Dongdai Lin. About the National Initiative for Cybersecurity Education of the United States.  China Information Security, volume 8, pages 91-94, 2014. 赵倩、刘峰、林东岱,美国网络空间安全教育战略计划,《中国信息安全》,第8期,第91-94页, 2014。
  6. Dongdai Lin and Feng Liu. A Preliminary Understanding of the United States Information Security System. Security Science and Technology, volume 7, pages 6-13, 2012. 林东岱、刘峰,美国信息安全保密体系初探,《保密科学与技术》,卷7,页6-13,2012。
Talks Given to Public
  1. "Strategic Research of Cybersecurity",  Chendu Library and Information Center, Chengdu, China, Nov. 20, 2017.
  2. "Strategic Research of Cybersecurity",  Guizhou Normal University, Guiyang, China, Mar. 10, 2017.
  3. "Strategic Research of Cybersecurity", Seminar of Strategic Research of Chinese Academy of Engineering, Haikou, China, Feb. 4, 2016.
  4. "Overview of the Cybersecurity System in USA", CN-CERT, Beijing China, Jan. 12 2016.
  5. "Visual Security", Auckland University of Technolgoy, Auckland, New Zealand, Nov. 2015.
  6. Audioslides for "Improving the visual quality of size invariant visual cryptography scheme", for the Top 25 viewed papers in Journal of Visual Communication and Image Representation, 2013.
  7. "A Brief Introduction of CAS & IIE & SKLOIS & VC", Auckland University of Technology, Oct. 1 2013.
  8. "A Secret Enriched Visual Cryptography Scheme", IWDW 2012 (11th International Workshop on Digital-forensics and Watermarking), Shanghai China, 31 Oct.-3 Nov. 2012.
  9. "Flexible Visual Cryptography Scheme Without Distortion", IWDW2011, Atlantic City USA, October 23-26, 2011.
  10. "On the progress of Visual Cryptography" (In Chinese), to appear in CASC2010, Jinan China, August, 21-23, 2010.
  11. "Design and Realization of ASM-SPV for Analyzing Security Protocols" (In Chinese), to appear in NASAC2010 or Journal of Software, Suzhou China, November, 5-6, 2010.
  12. Some Improvements on Model Checking CoreASM Specifications of Security Protocols, ISDPE 2010, Buffalo/Niagara Falls USA on Sept 13th-14th 2010.
  13. "Color Visual Cryptography Schemes." (In Chinese), 2nd Conference on Computer Mathematics, Qingdao China, October, 24-26, 2008.
Teaching
  1. "Cybersecurity stragety research, School of Cybersecurity, University of Chinese Academy of Sciences. 2017.2-2.17.5.
  2. "Cybersecurity stragety research, School of Cybersecurity, University of Chinese Academy of Sciences. 2018.2-2.18.5.

 

Patents
  1. “A method for secure display and the security display system with cheating prevention ” with Application No.2017107899619. 防偷窥的安全显示方法、具有欺伪效果的安全显示方法及安全显示系统 , 2017
  2. “A method of constructing of visual cryptography based privacy protecting display” with No.201410542752.0 . 一种基于视觉密码的隐私保护显示器实现方法, 2014
  3. “A visual cryptography based visual anti-copying technique”, with No. 201210075522.9, 2012. 一种基于视觉密码的可视防复印技术,专利号201210075522.9, 2012。
  4. “A method of formal analyzing security protocols”, with No. 201010578947.2, 2010. 一种安全协议的形式化分析方法,专利号 201010578947.2, 2010。
Software copyrights
  1. “ASM-SPV: Abstract State Machines based Security Protocol Verifier”, with software copyright license No. 2010SRBJ1727, 2010.
  2. “SSPV: Symbolic Security Protocol Verifier”, with software copyright license No. 2011SR013510, 2011.
 
 
Most of my academic papers and patents are listed in this page. To access the draft version of my paper, please email me.