Profile image of Chang-Tsun Li

Prof Chang-Tsun Li

STAFF PROFILE

Position

Professor, Cyber Security

Faculty

Faculty of Sci Eng & Built Env

Department

School of Info Technology

Campus

Geelong Waurn Ponds Campus

Contact

changtsun.li@deakin.edu.au
+61 3 522 73559

Biography

Chang-Tsun Li received the BSc degree in electrical engineering from National Defense University, Taiwan, the MSc degree in computer science from U.S. Naval Postgraduate School, USA, and the PhD degree in computer science from the University of Warwick, UK. He is currently Professor of Cyber Security at Deakin University and Director of Research of Deakin’s Cyber Security Research and Innovation Centre (CSRI). He has had over 20 years research experience in multimedia forensics and security, biometrics, machine learning, data analytics, computer vision, image processing, pattern recognition, bioinformatics and content-based image retrieval. The outcomes of his research have been translated into award-winning commercial products protected by a series of international patents and have been used by a number of law enforcement agencies, national security institutions and companies around the world, including INTERPOL (Lyon, France), UK Home Office, Metropolitan Police Service (UK), Sussex Police Service (UK), Guildford Crown Court (UK), and US Department of Homeland Security. In addition to his active contribution to the advancement of his field of research through publication, Chang-Tsun Li is also enthusiastically serving the international cyber security community. He is currently Vice Chair of Computational Forensics Technical Committee of the International Association of Pattern Recognition (IAPR), Member of IEEE Information Forensics and Security Technical Committee, Associate Editor of IEEE Access, the EURASIP Journal of Image and Video Processing and IET Biometrics. In the past 8 years, Chang-Tsun has been active in facilitating the cross-fertilisation of multimedia forensics and biometrics through his leadership in a number of multinational projects.

Read more on Chang-Tsun's profile

Research interests

Cyber Security, Multimedia Forensics & Security, Biometrics, Machine Learning, Computer Vision, Image Processing, Data Analytics, Pattern Recognition, Content-Based Image Retrieval,  Computer Vision, Image Processing, Huma-Computer Interaction, Bioinformatics

Knowledge areas

Cyber Security, Multimeida Forensics & Security, Biometrics, Data Analytics, Machine Learning, Image Processing, Computer Vision, Pattern Recogntion

Professional activities

Conference Organisation:

  1. General Co-Chair of the 7th IAPR/IEEE International Workshop on Biometrics and Forensics, Cancun, Mexico,2-3 May 2019
  2. Co-Chair of the 16th Australasian Data Mining Conference, Bathurst, NSW, Australia, 28-30 November 2018
  3. Co-Organiser of the 7th IAPR International Workshop on Computational Forensics, 20 August, 2018, Beijing, China
  4. Co-Challenge Chair of the 15th IEEE International Conference on Advanced Video and Signal-based Surveillance (AVSS), Auckland, New Zealand, 27-30 November 2018
  5. Co-Chair of Scientific Committee of the First International Workshop on Computational Document Forensics, Kyoto, Japan, 12 November 2017
  6. Co-Organiser of Special Session on Linking Biometrics with Forensic Science, the 2017 IAPR/IEEE International Joint Conference on Biometrics (IJCB), October 2017, Denver, USA
  7. General Chair of the Fifth International Workshop on Biometrics and Forensics, Coventry, UK, 4-5 April 2017
  8. Special Session Co-Organiser, Biometrics and Multimedia Forensics, IEEE International Conference on Biometrics: Theory, Applications, and Systems (BTAS), September 6th - 9th 2016
  9. Area Chair on Other Biometrics and Fusion, IAPR International Conference on Biometrics, Halmstad, Sweden, June 13-16, 2016
  10. Co-Chair of Program Committee of the International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP’15), Adelaide, Australia, September 23-25, 2015
  11. Area Chair on Forensics and Security,  IAPR/IEEE International Conference on Biometrics, Phuket, Thailand, May 2015
  12. Co-Chair of the International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), Kitakyushu, Japan, August 27-29, 2014
  13. Chair of the Track on Network Security and Privacy, the 17th International Conference on Network-Based Information Systems (NBiS), Salerno, Italy, 10 - 12 September 2014
  14. Co-Chair of Technical Programme Committee of the Second International Workshop on Biometrics and Forensics, Valletta, Malta, 27-28 March 2014
  15. Advisory Board Member of the First International Workshop on Biometrics and Forensics, Lisbon, Portugal, 4-5 April 2013
  16. General Chair of 14th ACM Multimedia & Security, Coventry , UK, 6 – 7 September 2012
  17. Chair of Special Track on Security Technologies, the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS), Perth, Australia, 1 - 2 September 2011
  18. Co-Organiser of Workshop on Digital Forensic Technologies, Coventry, UK, 6 June 2011
  19. Co-Chair of Special Session on Digital Forensics, IEEE International Symposium on Circuits and Systems (ISCAS), Paris, France, 30 May - 2 June 2010.
  20. Chair of Technical Programme Committee, International Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, Adelaide, Australia, 19 - 21, January, 2009.
  21. Co-Chair of International Publicity Liaisons Committee, the 8th International Workshop on Digital Watermarking (IWDW 2009), Guildford, UK, 24 - 26 August, 2009.
  22. Co-Chair of Special Session on Multimedia Security and Forensics in conjunction with the 16th International Conference on Digital Signal Processing (DSP 2009), Santorini, Greece, 5 - 7 July, 2009.
  23. Co-Chair of Technical Programme Committee, International Workshop on Forensics for Future Generation Communication Environments (F2GC-08), Hainan Island, China, 13 ~ 15, December, 2008.
  24. Chair of Technical Program Committee, the First International Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, Adelaide, Australia, 21 - 24, January, 2008.

Projects

  1. R-DIPS: Real-time Detection of Concealment of Intent for Passenger Screening - Phase 2: funded by UK Ministry of Defence through its DASA scheme, Grant: £289,000 (CTLi as the PI at Deakin with a share of £139,000), Partners: V Sanchez and C Maple at the University of Warwick
  2. R-DIPS: Real-time Detection of Concealment of Intent for Passenger Screening - Phase 1: funded by UK Ministry of Defence through its DASA scheme, Grant: £145,000 (CTLi as the PI at Deakin with a share of £66,250), Partners: V Sanchez and C Maple at the University of Warwick
  3. Computer Vision Enabled Multimedia Forensics and People Identification (IDENTITY): January 2016 – Dec 2019; funded by EU Horizon 2020; C.-T. Li’s role: Coordinator & Principal Investigator; Project partners: 4 EU universities, 4 EU SMEs and 8 non-EU universities; Project ID.: 690907; Grant: €2,025,000; https://cordis.europa.eu/project/rcn/200056/factsheet/en  
  4. Academic Centre of Excellence in Cyber Security Research - University of Warwick: funded by Engineering and Physical Sciences Research Council (EPSRC UK), 01/07/2017 – 30/06/2022, Project ID: EP/R007195/1, C.-T. Li’s role: Co-Investigator; Grant: £81,965
  5. Image Processing Steps to Enhance Facial Recognition Systems Performance: commissioned by the Metropolitan Police Service (London), Feb 2017 – Nov 2017, C.-T. Li’s role: C.-T. Li’s role: Consultant; Consultancy fee: £37,500
  6. MIUSS: Machine Intelligence in Urban Security Systems: 01 June 2016 to March 2017, funded by EPSRC Institutional Award (Global Challenges Research Fund (GCRF); PI: Victor Sanchez, CI: C.-T. Li; Grant: £51,989
  7. Gesture Recognition for Automotive Applications (GRAAppl): October 2015 – June 2016; funded by Innovate UK; C.-T. Li’s role: Principal Investigator; Grant: £39,497 
  8. Hand Gesture Recognition (HGR) and Applications - Proof of Concept Awards: May 2013 - October 2014; funded by Warwick Impact Fund; C.-T. Li’s role: Principal Investigator; Grant: £31,793
  9. Digital Image and Video Forensics: June 2010 – May 2014; funded by EU FP7 Marie Curie Actions: Industry-Academia Partnerships and Pathways; C.-T. Li’s role: Coordinator & Principal Investigator; Project ID: 251677; Grant: €1,559,077; https://cordis.europa.eu/project/rcn/95060/factsheet/en 
  10. Non-Intrusive Multimedia Authentication and Integrity Verification (EPSRC Industrial CASE Award): September 2010 – March 2014; funded by EPSRC & Forensic Pathways Ltd; C.-T. Li’s role: Principal Investigator; Grant: £93,117
  11. Provenance Inference of Digital Images for Digital Forensic Investigations: July 2012 – June 2014; funded by The Royal Society under International Exchange Programme; C.-T. Li’s role: Principal Investigator; Grant: £12,000
  12. Milamber Digital: April 2011 – March 2013; funded by Technology Strategy Board (UK); C.-T. Li’s role: Academic Principal Investigator; Partners: Pearson Education, Milamber Group, RedTray Ltd, 2sms Ltd, Lifecycle Software Ltd, Ashridge Trust; Grant: £736,206

Publications

Filter by

2020

ENF based video forgery detection algorithm

Y Wang, Y Hu, A Liew, C Li

(2020), Vol. 12, pp. 131-156, International Journal of Digital Crime and Forensics, Hershey, N.Y., C1

journal

Manifold learning for user profiling and identity verification using motion sensors

G Santos, P Pisani, R Leyva, C Li, T Tavares, A Rocha

(2020), Vol. 106, pp. 1-16, Pattern Recognition, Amsterdam, The Netherlands, C1

journal
2019

Contention-aware prediction for performance impact of task co-running in multicore computers

S Ren, L He, J Li, Z Chen, P Jiang, C Li

(2019), pp. 1-8, Wireless networks, Berlin, Germany, C1

journal

WolfPath: accelerating iterative traversing-based graph processing algorithms on GPU

H Zhu, L He, S Fu, R Li, X Han, Z Fu, Y Hu, C Li

(2019), Vol. 47, pp. 644-667, International journal of parallel programming, Berlin, Germany, C1-1

journal

Privacy-preserving reversible watermarking for data exfiltration prevention through lexicographic permutations

C Chang, C Li

(2019), Vol. 109, pp. 330-339, IIH-MSP 2018 : Proceedings of the 14th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Sendai, Japan, E1-1

conference

Provenance analysis for instagram photos

Y Quan, X Lin, ChangTsun Li

(2019), Vol. 996, pp. 372-383, AusDM 2018 : Australasian Conference on Data Mining, Bathurst, N.S.W., E1-1

conference

Social network identification through image classification with CNN

I Amerini, C Li, R Caldelli

(2019), Vol. 7, pp. 35264-35273, IEEE access, Piscataway, N.J., C1-1

journal

Homogeneous feature transfer and heterogeneous location fine-tuning for cross-city property appraisal framework

Y Guo, S Lin, X Ma, J Bal, C Li

(2019), Vol. 996, pp. 161-174, AusDM 2018 : Proceedings of the 16th Australasian Data Mining Conference 2018, Bathurst, N.S.W., E1-1

conference

Algebraic secret sharing using privacy homomorphisms for IoT-based healthcare systems

C Chang, C Li

(2019), Vol. 16, pp. 3367-3381, Mathematical biosciences and engineering, Springfield, Mo., C1

journal

Privacy-preserving reversible information hiding based on arithmetic of quadratic residues

C Chang, C Li, K Chen

(2019), Vol. 7, pp. 54117-54132, IEEE access, Piscataway, N.J., C1

journal

Social network forensics through smartphones and shared images

R Rouhi, F Bertini, D Montesi, C Li

(2019), IWBF 2019 : Proceedings of the 7th International Workshop on Biometrics and Forensics, Cancun, Mexico, E1

conference

Learning temporal information from spatial information using CapsNets for human action recognition

A Algamdi, V Sanchez, C Li

(2019), pp. 3867-3871, ICASSP 2019 : Proceedings of the 2019 44th IEEE International Conference on Acoustics, Speech and Signal Processing, Brighton, Eng., E1

conference

Auto-zooming CNN-based framework for real-time pedestrian detection in outdoor surveillance videos

S Alfasly, B Liu, Y Hu, Y Wang, C Li

(2019), Vol. 7, pp. 105816-105826, IEEE access, Piscataway, N.J., C1

journal

Compact and low-complexity binary feature descriptor and Fisher Vectors for video analytics

R Leyva, V Sanchez, C Li

(2019), Vol. 28, pp. 6169-6184, IEEE transactions on image processing, Piscataway, N.J., C1

journal

Accelerometer dense trajectories for activity recognition and people identification

R Leyva, G Santos, A Rocha, V Sanchez, C Li

(2019), pp. 1-6, IWBF 2019 : Proceedings of the 7th International Workshop on Biometrics and Forensics (IWBF), Cancu?n, Mexico, E1-1

conference

Hybrid clustering of shared images on social networks for digital forensics

R Rouhi, F Bertini, D Montesi, X Lin, Y Quan, C Li

(2019), Vol. 7, pp. 87288-87302, IEEE Access, Piscataway, N.J., C1

journal

3DPalsyNet: a facial palsy grading and motion recognition framework using fully 3D convolutional neural networks

Gary Storey, Richard Jiang, Shelagh Keogh, Ahmed Bouridane, Chang-Tsun Li

(2019), Vol. 7, pp. 121655-121664, IEEE access, PIscataway, N.J., C1

journal
2018

Privacy-aware reversible watermarking in cloud computing environments

C Chang, C Li, Y Shi

(2018), Vol. 6, pp. 70720-70733, IEEE access, Piscataway, N.J., C1-1

journal

Active learning in multi-domain collaborative filtering recommender systems

X Guan, C Li, Y Guan

(2018), pp. 1351-1357, SAC 2018 : Proceedings of the 33rd Annual ACM Symposium on Applied Computing, Pau, France, E1-1

conference

On view-invariant gait recognition: a feature selection solution

N Jia, V Sanchez, C Li

(2018), Vol. 7, pp. 287-295, IET biometrics, Stevenage, Eng., C1-1

journal

Learning optimised representations for view-invariant gait recognition

N Jia, V Sanchez, C Li

(2018), pp. 774-780, IJCB 2017 : Proceedings of the 2017 International Joint Conference on Biometrics, Denver, Colo., E1-1

conference

Fast fragile watermark embedding and iterative mechanism with high self-restoration performance

S Bravo-Solorio, F Calderon, C Li, A Nandi

(2018), Vol. 73, pp. 83-92, Digital signal processing, Amsterdam, The Netherlands, C1-1

journal

Inference of a compact representation of sensor fingerprint for source camera identification

R Li, C Li, Y Guan

(2018), Vol. 74, pp. 556-567, Pattern recognition, Amsterdam, The Netherlands, C1-1

journal

Fast detection of abnormal events in videos with binary features

R Leyva, V Sanchez, C Li

(2018), pp. 1318-1322, ICASSP 2018 : Proceedings of the 2018 IEEE International Conference on Acoustics, Speech, and Signal Processing, Calgary, Alta., E1-1

conference

PRNU-based image classification of origin social network with CNN

R Caldelli, I Amerini, C Li

(2018), pp. 1357-1361, EUSIPCO 2018 : Proceedings of the 26th European Signal Processing Conference, Rome, Italy, E1-1

conference

Modelling and developing conflict-aware scheduling on large-scale data centres

B Wang, C Chen, L He, B Gao, J Ren, Z Fu, S Fu, Y Hu, C Li

(2018), Vol. 86, pp. 995-1007, Future generation computer systems, Amsterdam, The Netherlands, C1-1

journal

Rotation-invariant binary representation of sensor pattern noise for source-oriented image and video clustering

X Lin, C Li

(2018), pp. 1-6, AVSS 2018 : Proceedings of the 15th IEEE International Conference on Advanced Video and Signal Based Surveillance 2018, Auckland, N.Z., E1-1

conference

Detecting small objects in high resolution images with integral fisher score

R Leyva, V Sanchez, C Li

(2018), pp. 316-320, ICIP 2018 : Proceedings of the 2018 25th IEEE International Conference on Image Processing, Athens, Greece, E1-1

conference

Fusion network for face-based age estimation

H Wang, X Wei, V Sanchez, C Li

(2018), pp. 2675-2679, ICIP 2018 : Proceedings of the 2018 25th IEEE International Conference on Image Processing, Athens, Greece, E1-1

conference

A multi-task learning CNN for image steganalysis

X Yu, H Tan, H Liang, C Li, G Liao

(2018), pp. 1-7, WIFS 2018 Proceedings of the 10th IEEE International Workshop on Information Forensics and Security 2018, Hong Kong, China, E1-1

conference

Multi-task mid-level feature alignment network for unsupervised cross-dataset person re-identification

S Lin, H Li, C Li, A Kot

(2018), BMVC 2018: Proceedings of the 29th British Machine Vision Conference, Newcastle upon Tyne, England, E1-1

conference
2017

Secure secret sharing in the cloud

C Chang, C Li

(2017), pp. 358-361, ISM 2017 : Proceedings of the 2017 IEEE International Symposium on Multimedia, Taichung, Taiwan, E1-1

conference

Matrix factorization with rating completion: an enhanced SVD model for collaborative filtering recommender systems

X Guan, C Li, Y Guan

(2017), Vol. 5, pp. 27668-27678, IEEE access, Piscataway, N.J., C1-1

journal

End-to-end correspondence and relationship learning of mid-level deep features for person re-identification

S Lin, C Li

(2017), pp. 1-6, DICTA 2017 : Proceedings of the International Conference on Digital Image Computing: Techniques and Applications, Sydney, New South Wales, E1

conference

Fast and robust framework for view-invariant gait recognition

N Jia, C Li, V Sanchez, A Liew

(2017), pp. 1-6, IWBF 2017 : Proceedings of the 5th International Workshop on Biometrics and Forensics, Coventry, England, E1-1

conference

The LV dataset: a realistic surveillance video dataset for abnormal event detection

R Leyva, V Sanchez, C Li

(2017), pp. 1-6, IWBF 2017 : Proceedings of the 2017 5th International Workshop on Biometrics and Forensics, Coventry, Eng., E1-1

conference

Reversible data hiding in JPEG images based on adjustable padding

C Chang, C Li

(2017), pp. 1-6, IWBF 2017 : Proceedings of the 5th International Workshop on Biometrics and Forensics 2017, Coventry, Eng., E1-1

conference

An adaptive tri-pixel unit steganographic algorithm using the least two significant bits

X Yu, H Liang, M Li, C Li

(2017), pp. 1-6, IWBF 2017 Proceedings of the 5th International Workshop on Biometrics and Forensics, Coventry, England, E1-1

conference

Video anomaly detection with compact feature sets for online performance

Roberto Leyva, Victor Sanchez, Chang-Tsun Li

(2017), Vol. 26, pp. 3463-3478, IEEE transactions on image processing, Piscataway, N.J., C1-1

journal

Weighted level set evolution based on local edge features for medical image segmentation

Alaa Khadidos, Victor Sanchez, Chang-Tsun Li

(2017), Vol. 26, pp. 1979-1991, IEEE transactions on image processing, Piscataway, N.J., C1-1

journal

Large-scale image clustering based on camera fingerprints

X Lin, C Li

(2017), Vol. 12, pp. 793-808, IEEE transactions on information forensics and security, Piscataway, N.J., C1-1

journal

Face recognition technologies for evidential evaluation of video traces

X Wei, C Li

(2017), pp. 177-193, Handbook of biometrics for forensic science, Cham, Switzerland, B1-1

chapter

Abnormal event detection in videos using binary features

R Leyva, V Sanchez, C Li

(2017), pp. 621-625, TSP 2017 : Proceedings of the 40th International Conference on Telecommunications and Signal Processing, Barcelona, Spain, E1-1

conference

A fast source-oriented image clustering method for digital forensics

C Li, X Lin

(2017), Vol. 2017, pp. 1-16, EURASIP Journal on image and video processing, Berlin, Germany, C1-1

journal

Patch-based segmentation of overlapping cervical cells using active contour with local edge information

A Khadidos, V Sanchez, C Li

(2017), pp. 1058-1062, 2017 ICASSP : Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, New Orleans, La., E1-1

conference

Hierarchical relaxed partitioning system for activity recognition

Faisal Azhar, Chang-Tsun Li

(2017), Vol. 47, pp. 784-795, IEEE transactions on cybernetics, Piscataway, N.J., C1-1

journal
2016

Enhanced SVD for collaborative filtering

X Guan, C Li, Y Guan

(2016), Vol. 9652, pp. 503-514, PAKDD 2016 : Proceedings of the 20th Pacific Asia Conference on Knowledge Discovery and Data Mining 2016, Auckland, N.Z., E1-1

conference

Gait recognition based on the golden ratio

Y Liang, C Li, Y Guan, Y Hu

(2016), Vol. 2016, pp. 1-8, EURASIP journal on image and video processing, Berlin, Germany, C1-1

journal

Enhancing sensor pattern noise via filtering distortion removal

X Lin, C Li

(2016), Vol. 23, pp. 381-385, IEEE signal processing letters, Piscataway, N.J., C1-1

journal

Preprocessing reference sensor pattern noise via spectrum equalization

X Lin, C Li

(2016), Vol. 11, pp. 126-140, IEEE transactions on information forensics and security, Piscataway, N.J., C1-1

journal

Fast binary-based video descriptors for action recognition

R Leyva, V Sanchez, Chang Li

(2016), pp. 1-8, DICTA 2016 : Proceedings of the 2016 International Conference on Digital Image Computing: Techniques and Applications, Gold Coast, Qld., E1-1

conference

A novel online Bayes classifier

T Nguyen, T Nguyen, X Pham, A Liew, Y Hu, T Liang, C Li

(2016), pp. 1-6, DICTA 2016 : Proceedings of the 2016 International Conference on Digital Image Computing: Techniques and Applications, Gold Coast, Qld., E1-1

conference

A fast binary pair-based video descriptor for action recognition

R Leyva, V Sanchez, C Li

(2016), pp. 4185-4189, ICIP 2016 : Proceedings of the 2016 IEEE International Conference on Image Processing, Phoenix, Ariz., E1-1

conference

Refining PRNU-based detection of image forgeries

X Lin, C Li

(2016), pp. 222-226, DMIAF 2016 : Proceedings of the 2016 Digital Media Industry & Academic Forum, Santorini, Greece, E1-1

conference
2015

On reducing the effect of covariate factors in gait recognition: a classifier ensemble method

Yu Guan, Chang Li, Fabio Roli

(2015), Vol. 37, pp. 1521-1528, IEEE transactions on pattern analysis and machine intelligence, Piscataway, N.J., C1-1

journal

The influence of segmentation on individual gait recognition

N Jia, V Sanchez, C Li, H Mansour

(2015), WIFS 2015 : Proceedings of the IEEE International Workshop on Information Forensics and Security, Rome, Italy, E1-1

conference

Incremental update of feature extractor for camera identification

R Li, C Li, Y Guan

(2015), pp. 324-328, ICIP 2015 : Proceedings of the IEEE International Conference on Image Processing, Quebec City, Canada, E1-1

conference

Random subspace method for source camera identification

R Li, C Kotropoulos, C Li, Y Guan

(2015), MLSP 2015 : Proceedings of the IEEE 25th International Workshop on Machine Learning for Signal Processing, Boston, Massachusetts, E1-1

conference

On reducing the effect of silhouette quality on individual gait recognition: a feature fusion approach

N Jia, V Sanchez, C Li, H Mansour

(2015), BIOSIG 2015 : Proceedings of the International Conference of the Biometrics Special Interest Group, Darmstadt, Germany, E1-1

conference

Hand gesture recognition and spotting in uncontrolled environments based on classifier weighting

Y Yao, C Li

(2015), pp. 3082-3086, ICIP 2015 : Proceedings of the IEEE International Conference on Image Processing, Quebec City, Canada, E1-1

conference

A compact representation of sensor fingerprint for camera identification and fingerprint matching

R Li, C Li, Y Guan

(2015), pp. 1777-1781, ICASSP 2015 : Proceedings of the IEEE International Conference on Acoustics, Speech and Signal, Brisbane, Queensland, E1-1

conference

Fast source camera identification using matching signs between query and reference fingerprints

Yongjian Hu, Chang Li, Zhimao Lai

(2015), Vol. 74, pp. 7405-7428, Multimedia tools and applications, New York, N.Y., C1-1

journal
2014

Gait recognition using low spatial and temporal resolution videos

S Choudhury, Y Guan, C Li

(2014), pp. 1-6, IWBF2014 2014 : Proceedings of the 2nd International Workshop on Biometrics and Forensics, Valletta, Malta, E1-1

conference

HPS: histogram preserving steganography in spatial domain

Y Wang, W Chen, Y Li, W Wang, C Li

(2014), pp. 1-4, IWBF2014 : Proceedings of the 2nd International Workshop on Biometrics and Forensics, Valletta, Malta, E1-1

conference

PCA-based denoising of Sensor Pattern Noise for source camera identification

R Li, Y Guan, C Li

(2014), pp. 436-440, ChinaSIP 2014 : Proceedings of the 2014 IEEE China Summit & International Conference on Signal and Information Processing, Xi'an, China, E1-1

conference

On the generalization power of face and gait in gender recognition

Y Guan, X Wei, C Li

(2014), Vol. 6, pp. 1-8, International journal of digital crime and forensics, Hershey, Pa., C1-1

journal

Dynamic image-to-class warping for occluded face recognition

X Wei, C Li, Z Lei, D Yi, S Li

(2014), Vol. 9, pp. 2035-2050, IEEE transactions on information forensics and security, Piscataway, N.J., C1

journal

A reference estimator based on composite sensor pattern noise for source device identification

R Li, C Li, Y Guan

(2014), Vol. 9028, pp. 90280O-1-90280O-7, SPIE 2014 : Proceedings of the 2014 Media Watermarking, Security and Forensics Conference, San Fransisco, Calif., E1-1

conference

Active contours based on weighted gradient vector flow and balloon forces for medical image segmentation

A Khadidos, V Sanchez, C Li

(2014), pp. 902-906, ICIP 2014 : Proceedings of the 2014 IEEE International Conference on Image Processing, Paris, France, E1-1

conference

Video anomaly detection based on wake motion descriptors and perspective grids

R Leyva, V Sanchez, C Li

(2014), pp. 209-214, WIFS 2014 : Proceedings of the IEEE International Workshop on Information Forensics and Security 2014, Atlanta, Ga., E1-1

conference

People identification and tracking through fusion of facial and gait features

Y Guan, X Wei, C Li, Y Keller

(2014), Vol. 8897, pp. 209-221, BIOMET2014 : Proceedings of the 1st International Workshop on Biometrics 2014, Sofia, Bulgaria, E1-1

conference

Human gait identification from extremely low-quality videos: an enhanced classifier ensemble method

Y Guan, Y Sun, C Li, M Tistarelli

(2014), Vol. 3, pp. 84-93, IET biometrics, Stevenage, Eng., C1-1

journal

Two improved forensic methods of detecting contrast enhancement in digital images

X Lin, X Wei, C Li

(2014), Vol. 9028, pp. 90280X-1-90280X-10, Proceedings of the 2014 Media Watermarking, Security, and Forensics Conference, San Fransisco, Calif., E1-1

conference

Digital forensic readiness: are we there yet?

A Mouhtaropoulos, C Li, M Grobler

(2014), Vol. 9, pp. 173-179, Journal of international commercial law and technology, Hellerup, Denmark, C1-1

journal
2013

Audio forensic authentication based on MOCC between ENF and reference signals

Z Lv, Y Hu, C Li, B Liu

(2013), pp. 427-431, IEEE ChinaSIP : Proceedings of the 2013 IEEE China Summit and International Conference on Signal and Information Processing, Beijing, China, E1-1

conference

A robust speed-invariant gait recognition system for walker and runner identification

Y Guan, C Li

(2013), ICB 2013 : Proceedings of the 6th IAPR International Conference on Biometrics, Madrid, Spain, E1-1

conference

Audio forgery detection based on max offsets for cross correlation between ENF and reference signal

Y Hu, C Li, Z Lv, B Liu

(2013), Vol. 7809, pp. 253-266, IWDW12 : Proceedings of the International Workshop on Digital Forensics and Watermarking 2012, Shanghai, China, E1-1

conference

An improved fingerprinting algorithm for detection of video frame duplication forgery

Y Hu, Y Wang, C Li, B Liu

(2013), pp. 64-76, Emerging digital forensics applications for crime detection, prevention, and security, Hershey, Pa., B1-1

chapter

Exposing image forgery through the detection of contrast enhancement

X Lin, C Li, Y Hu

(2013), pp. 4467-4471, ICIP 2013 : Proceedings of the 2013 IEEE International Conference on Image Processing, Melbourne, Vic., E1-1

conference

A framework for real-time hand gesture recognition in uncontrolled environments with partition matrix model based on hidden conditional random fields

Y Yao, C Li

(2013), pp. 1205-1210, SMC 2013: Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, Manchester, England, E1-1

conference

Applying a digital forensic readiness framework: three case studies

A Mouhtaropoulos, P Dimotikalis, C Li

(2013), pp. 217-223, HST 2013 : Proceedings of the 2013 IEEE International Conference on Technologies for Homeland Security, Waltham, Mass., E1-1

conference

Hand gesture segmentation in uncontrolled environments with partition matrix and a spotting scheme based on hidden conditional random fields

Y Yao, C Li

(2013), pp. 842-846, ACPR 2013 : Proceedings of the 2013 2nd IAPR Asian Conference on Pattern Recognition, Naha, Japan, E1-1

conference

Combining gait and face for tackling the elapsed time challenges

Y Guan, X Wei, C Li, G Marcialis, F Roli, M Tistarelli

(2013), pp. 1-8, BTAS 2013 : Proceedings of the 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems, Washington, D.C., E1-1

conference

Real-time hand gesture recognition for uncontrolled environments using adaptive SURF tracking and hidden conditional random fields

Y Yao, C Li

(2013), Vol. 8034, pp. 542-551, ISVC 2013 : Proceedings of the 9th International Symposium on Visual Computing, Rethymnon, Crete, Greece, E1-1

conference

Fixation and saccade based face recognition from single image per person with various occlusions and expressions

X Wei, C Li

(2013), pp. 70-75, CVPRW 2013 : Proceedings of the 2013 IEEE Conference on Computer Vision and Pattern Recognition Workshops, Portland, Or., E1-1

conference

Face recognition with occlusion using Dynamic Image-to-Class Warping (DICW)

X Wei, C Li, Y Hu

(2013), pp. 1-6, FG13 : Proceedings of the 2013 10th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition, Shanghai, China, E1-1

conference

Robust face recognition with occlusions in both reference and query images

X Wei, C Li, Y Hu

(2013), pp. 1-4, IWBF 2013 : Proceedings of the 2013 International Workshop on Biometrics and Forensics, Lisbon, Portugal, E1-1

conference

Robust gait recognition from extremely low frame-rate videos

Y Guan, C Li, S Choudhury

(2013), pp. 1-4, IWBF 2013 : Proceedings of the 2013 International Workshop on Biometrics and Forensics, Lisbon, Portugal, E1-1

conference
2012

Color-decoupled photo response non-uniformity for digital image forensics

C Li, Y Li

(2012), Vol. 22, pp. 260-271, IEEE transactions on circuits and systems for video technology, Piscataway, N.J., C1-1

journal

Empirical investigation into the correlation between vignetting effect and the quality of sensor pattern noise

C Li, R Satta

(2012), Vol. 6, pp. 560-566, IET computer vision, Stevenage, Eng., C1-1

journal

Watermarking with lowembedding distortion and self-propagating restoration capabilities

S Bravo-Solorio, C Li, A Nandi

(2012), pp. 2197-2200, Proceedings - International Conference on Image Processing, ICIP, E1-1

conference

Robust face recognition under varying illumination and occlusion considering structured sparsity

X Wei, C Li, Y Hu

(2012), 2012 International Conference on Digital Image Computing Techniques and Applications, DICTA 2012, E1-1

conference

Watermarking method with exact self-propagating restoration capabilities

S Bravo-Solorio, C Li, A Nandi

(2012), pp. 217-222, WIFS 2012 - Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, E1-1

conference

Random subspace method for gait recognition

Y Guan, C Li, Y Hu

(2012), pp. 284-289, Proceedings of the 2012 IEEE International Conference on Multimedia and Expo Workshops, ICMEW 2012, E1-1

conference

Fast camera fingerprint search algorithm for source camera identification

Y Hu, C Li, Z Lai, S Zhang

(2012), 5th International Symposium on Communications Control and Signal Processing, ISCCSP 2012, E1-1

conference

An improved fingerprinting algorithm for detection of video frame duplication forgery

Y Hu, C Li, Y Wang, B Liu

(2012), Vol. 4, pp. 20-32, International journal of digital crime and forensics, Hershey, Pa., C1-1

journal
2011

Directed partial correlation: inferring large-scale gene regulatory network through induced topology disruptions

Yinyin Yuan, Chang-Tsun Li, Oliver Windram

(2011), Vol. 6, PLoS one, San Francisco, Calif., C1-1

journal

Source camera identification issues: forensic features selection and robustness

Y Hu, C Li, C Zhou, X Lin

(2011), Vol. 3, pp. 1-15, International journal of digital crime and forensics, Hershey, Pa., C1-1

journal

Optimized digital library for digital forenisc based on decomposed PRNU

Y Li, C Li

(2011), pp. 610-613, 2011 International Conference on Multimedia Technology, ICMT 2011, E1-1

conference
2010

A temporal precedence based clustering method for gene expression microarray data

Ritesh Krishna, Chang-Tsun Li, Vicky Buchanan-Wollaston

(2010), Vol. 11, pp. 1-25, BMC bioinformatics, London, Eng., C1-1

journal

A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation

F Peng, R Guo, C Li, M Long

(2010), Vol. 42, pp. 1207-1216, Computer-aided design, Amsterdam, The Netherlands, C1-1

journal

Progressive exponential clustering-based steganography

C Li, Y Li

(2010), Vol. 2010, pp. 1-14, EURASIP journal on advances in signal processing, Cairo, Egypt, C1-1

journal

A conditional random field approach to unsupervised texture image segmentation

C Li

(2010), Vol. 2010, pp. 1-12, EURASIP journal on advances in signal processing, Cairo, Egypt, C1-1

journal

Source camera identification using enhanced sensor pattern noise

C Li

(2010), Vol. 5, pp. 280-287, IEEE transactions on information forensics and security, Piscataway, N.J., C1-1

journal

Digital camera identification using colour-decoupled photo response non-uniformity noise pattern

C Li, Y Li

(2010), pp. 3052-3055, ISCAS 2010 - 2010 IEEE International Symposium on Circuits and Systems: Nano-Bio Circuit Fabrics and Systems, E1-1

conference

Unsupervised classification of digital images using enhanced sensor pattern noise

C Li

(2010), pp. 3429-3432, ISCAS 2010 - 2010 IEEE International Symposium on Circuits and Systems: Nano-Bio Circuit Fabrics and Systems, E1-1

conference

Using improved imaging sensor pattern noise for source camera identification

Y Hu, C Jian, C Li

(2010), pp. 1481-1486, 2010 IEEE International Conference on Multimedia and Expo, ICME 2010, E1-1

conference
2009

Authenticating medical images through repetitive index modulation based watermarking

C Li, Y Li

(2009), Vol. 8 LNICST, pp. 153-159, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, E1-1

conference

Decomposed photo response non-uniformity for digital forensic analysis

Y Li, C Li

(2009), Vol. 8 LNICST, pp. 166-172, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, E1-1

conference

A contrast-sensitive reversible visible image watermarking technique

Y Yang, X Sun, H Yang, C Li, R Xiao

(2009), Vol. 19, pp. 656-667, IEEE Transactions on Circuits and Systems for Video Technology, Piscataway, N.J., C1-1

journal

Inferring causal relations from multivariate time series: A fast method for large-scale gene expression data

Y Yuan, C Li

(2009), pp. 92-99, Proceedings of the 2009 9th IEEE International Conference on Bioinformatics and BioEngineering, BIBE 2009, E1-1

conference

Detection of block artifacts for digital forensic analysis

C Li

(2009), Vol. 8 LNICST, pp. 173-178, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, E1-1

conference

Interaction based functional clustering of genomic data

R Krishna, C Li, V Buchanan-Wollaston

(2009), pp. 130-137, Proceedings of the 2009 9th IEEE International Conference on Bioinformatics and BioEngineering, BIBE 2009, E1-1

conference

Source camera identification using enahnced sensor pattern noise

C Li

(2009), pp. 1509-1512, Proceedings - International Conference on Image Processing, ICIP, E1-1

conference

Trademark image retrieval using synthetic features for describing global shape and interior structure

C Wei, Y Li, W Chau, C Li

(2009), Vol. 42, pp. 386-394, Pattern Recognition, Amsterdam, The Netherlands, C1-1

journal
2008

Partial mixture model for tight clustering of gene expression time-course

Yinyin Yuan, Chang Li, Roland Wilson

(2008), Vol. 9, pp. 1-17, BMC bioinformatics, London, Eng., C1-1

journal

An unsupervised conditional random fields approach for clustering gene expression time series

C Li, Y Yuan, R Wilson

(2008), Vol. 24, pp. 2467-2473, Bioinformatics, Oxford, Eng., C1-1

journal

A Bayes random field approach for integrative large-scale regulatory network analysis

Y Yuan, C Li

(2008), Vol. 5, Journal of integrative bioinformatics, Berlin, Germany, C1-1

journal

Probabilistic framework for gene expression clustering validation based on gene ontology and graph theory

Y Yuan, C Li

(2008), pp. 625-628, ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, E1-1

conference

CBIR approach to building image retrieval based on invariant characteristics in Hough domain

X Yuan, C Li

(2008), pp. 1209-1212, ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, E1-1

conference

MIMIC-PPT: Mimicking-based steganography for microsoft power Point document

Y Liu, X Sun, Y Liu, C Li

(2008), Vol. 7, pp. 654-660, Information Technology Journal, Faisalabad, Pakistan, C1-1

journal

Removable visible image watermarking algorithm in the discrete cosine transform domain

Y Yang, X Sun, H Yang, C Li

(2008), Vol. 17, pp. 1-11, Journal of Electronic Imaging, Bellingham, Wash., C1-1

journal
2007

Protection of mammograms using blind steganography and watermarking

Y Li, C Li, C Wei

(2007), pp. 496-499, Proceedings - IAS 2007 3rd Internationl Symposium on Information Assurance and Security, E1-1

conference

Steganographic method for colour image using expandable progressive exponential clustering

C Li, Y Li

(2007), pp. 495-500, Proceedings of the 2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference, DEST 2007, E1-1

conference

Unsupervised clustering of gene expression time series with conditional random fields

Y Yuan, C Li

(2007), pp. 571-576, Proceedings of the 2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference, DEST 2007, E1-1

conference

Wavelet-based fragile watermarking scheme for image authentication

C Li, H Si

(2007), Vol. 16, Journal of electronic imaging, Bellingham, Wash., C1-1

journal

Effective extraction of Gabor features for adaptive mammogram retrieval

C Wei, Y Li, C Li

(2007), pp. 1503-1506, Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, ICME 2007, E1-1

conference

Structural digital signature and semi-fragile fingerprinting for image authentication in wavelet domain

Y Zhu, C Li, H Zhao

(2007), pp. 478-483, Proceedings - IAS 2007 3rd Internationl Symposium on Information Assurance and Security, E1-1

conference

Partial mixture model for tight clustering in exploratory gene expression analysis

Y Yuan, C Li

(2007), pp. 1061-1065, Proceedings of the 7th IEEE International Conference on Bioinformatics and Bioengineering, BIBE, E1-1

conference
2006

Calcification descriptor and relevance feedback learning algorithms for content-based mammogram retrieval

C Wei, C Li

(2006), Vol. 4046 LNCS, pp. 307-314, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), E1-1

conference

Digital watermarking scheme exploiting nondeterministic dependence for image authentication

C Li, Y Yuan

(2006), Vol. 45, Optical engineering, Bellingham, Wash., C1-1

journal

CBIR approach to building image retrieval based on linear edge distribution

X Yuan, C Li

(2006), Proceedings - IEEE International Conference on Video and Signal Based Surveillance 2006, AVSS 2006, E1-1

conference

Learning pathological characteristics from user's relevance feedback for content-based mammogram retrieval

C Wei, C Li

(2006), pp. 738-741, ISM 2006 - 8th IEEE International Symposium on Multimedia, E1-1

conference

Steganographic scheme for VQ compressed images using progressive exponential clustering

Y Li, C Li

(2006), Proceedings - IEEE International Conference on Video and Signal Based Surveillance 2006, AVSS 2006, E1-1

conference

Skin colour-based face detection in colour images

W Lai, C Li

(2006), Proceedings - IEEE International Conference on Video and Signal Based Surveillance 2006, AVSS 2006, E1-1

conference
2005

A palette-based image steganographic method using colour quantisation

X Wang, Z Yao, C Li

(2005), Vol. 2, pp. 1090-1093, Proceedings - International Conference on Image Processing, ICIP, E1-1

conference

High efficiency abrasive machining process and its key technologies

C Li, G Cai, S Xiu

(2005), pp. 516-519, PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS 1 AND 2, Northeastern Univ, Shenyang, PEOPLES R CHINA, E1-1

conference
2004

Fragile watermarking scheme exploiting non-deterministic block-wise dependency

Y Yuan, C Li

(2004), Vol. 4, pp. 849-852, Proceedings - International Conference on Pattern Recognition, E1-1

conference

Semi-fragile watermarking scheme for authentication of JPEG images

C Ho, C Li

(2004), Vol. 1, pp. 7-11, International Conference on Information Technology: Coding Computing, ITCC, E1-1

conference
2003

One-dimensional neighborhood forming strategy for fragile watermarking

C Li, F Yang

(2003), Vol. 12, pp. 284-291, Journal of electronic imaging, Bellingham, Wash., C1-1

journal

Multiresolution image segmentation integrating Gibbs sampler and region merging algorithm

C Li

(2003), Vol. 83, pp. 67-78, Signal processing, Amsterdam, The Netherlands, C1-1

journal

A class of discrete multiresolution random fields and its application to image segmentation

R Wilson, C Li

(2003), Vol. 25, pp. 42-56, IEEE transactions on pattern analysis and machine intelligence, Piscataway, N.J., C1-1

journal

Multiresolution genetic clustering algorithm for texture segmentation

C Li, R Chiao

(2003), Vol. 21, pp. 955-966, Image and vision computing, Amsterdam, The Netherlands, C1-1

journal

Unsupervised texture segmentation using multiresolution hybrid genetic algorithm

C Li, R Chiao

(2003), Vol. 2, pp. 1033-1036, IEEE International Conference on Image Processing, E1-1

conference
2002

Oblivious fragile watermarking scheme for image authentication

C Li, F Yang, C Lee

(2002), Vol. 4, pp. 3445-3448, ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, E1-1

conference
2001

Approach to reducing the labeling cost of Markov random fields within an infinite label space

C Li

(2001), Vol. 81, pp. 609-620, Signal processing, Amsterdam, The Netherlands, C1-1

journal
1999

Edge detection based on the Multiresolution Fourier Transform

C Li, D Lou

(1999), pp. 686-693, IEEE Workshop on Signal Processing Systems, SiPS: Design and Implementation, E1-1

conference

Hidden multiresolution random fields and their application to image segmentation

R Wilson, C Li

(1999), pp. 346-351, Proceedings - International Conference on Image Analysis and Processing, ICIAP 1999, E1-1

conference
1998

Image segmentation based on a multiresolution Bayesian framework

C Li, R Wilson

(1998), Vol. 3, pp. 761-765, IEEE International Conference on Image Processing, E1-1

conference

Funded Projects at Deakin

Industry and Other Funding

R-DIPS: Real-time Detection of Concealment of Intent for Passenger Screening.

Prof Chang-Tsun Li

  • 2020: $131,751

Supervisions

No completed student supervisions to report