Dr Shujun Li
Senior Lecturer
Qualifications: BE (XJTU, 1997), PhD (XJTU, 2003), SMIEEE, MACM
Email: shujun.li@surrey.ac.uk
Phone: Work: 01483 68 6057
Room no: 16 BB 02
Office hours
Thursday 11:00 - 13:00Further information
Biography
Dr Shujun Li joined the University of Surrey in September 2011. He is a member of the Multimedia Security and Forensics (MSF) Group. Dr Li is leading two research areas of the MSF group, Multimedia Coding and Visual Quality Assessment, Usable Security, and also involved in other three research areas of the MSF group on Watermarking and Authentication, Steganography and Steganalysis, and Multimedia Forensics.
Dr Li received his BE degree in Information Science and Engineering from the Xi'an Jiaotong University in 1997, and his PhD degree in Information and Communication Engineering in 2003 from the same university. During September 2003 to January 2005, he was a postdoctoral Research Assistant with the City University of Hong Kong. From June 2005 to January 2007, he was a postdoctoral fellow under The Hong Kong Polytechnic University's Postdoctoral Fellowships Scheme. From March 2007 to June 2008, he was a Humboldt Research Fellow and doing his research at the FernUniversität in Hagen, Germany. From July 2008 to August 2011, he was a fellow of the Zukunftskolleg, Universität Konstanz, Germany, also a junior faculty member of the Department of Computer and Information Science.
Dr Li has published around 80 scientific papers in international journals and conference proceedings. He is currently on the editorial boards of Journal of Visual Communication and Image Representation (2012-), International Journal of Bifurcation and Chaos (2012-2014) and Information Security Technical Report (2012-2014). He was/is serving on the technical program committees of a number of international conferences like ICC, GLOBECOM, ICME, ISCAS, DASIP, ARES, INTRUST and some others. He is a Senior Member of the IEEE and a member of several IEEE societies (Computer Society, Communications Society, Signal Processing Society, Circuits and Systems Circuits, Consumer Electronics Society). He is a member of the IEEE Communications Society Technical Committee on Multimedia Communications and of the IEEE Circuits and Systems Society Technical Committee on Nonlinear Circuits & Systems. He is also a Professional Member of the ACM and several of its special interests groups (SIGSAC, SIGMM, SIGCHI, SIGCOMM). He is an active contributor to the ISO/IEC RVC Standard as a member of the MPEG (ISO/IEC JCT 1/SC 29/WG11) since 2010.
Shujun's main research interests are interplays among security, multimedia, humans, networking and nonlinearity. The following word cloud shows keywords of his research topics and selected publications. For more detail about this, click "Research" Tab of this page.

More information about Dr Shujun Li and his research can be found at his personal web site http://www.hooklee.com.
Research Interests
Dr Li's main research interests are mainly interplays among several different research areas: security, multimedia, human, networking, nonlinearity. Some research directions he is currently working on include usable security (human factors in computer security systems e.g. graphical passwords, CAPTCHAs and user authentication against observer attacks), multimedia security, security economy (e.g. e-banking security and anti-phishing solutions), visual quality assessment and performance evaluation of digital imaging and rendering devices (still cameras, camcorders, displays, scanners, printers, etc.), digital and multimedia forensics, multimedia coding (particularly MPEG Reconfigurable Video Coding and its applications in cryptography), applications of chaos and fractals in computing. He is also interested in computer security and human computing in general.Research Collaborations
(Co-)Supervised PhD Students
- Mr Ahmad Natour, University of Surrey, UK (2012-present)
- Mr Junaid Jameel Ahmad, Universität Konstanz, Germany (2009-present)
- Ms Kongfeng Zhu, Universität Konstanz, Germany (2010-2012)
- Mr Rajib Ahsan, Universität Konstanz, Germany (2010-2012)
Researcher Partners
- Universität Konstanz, Germany
- Technische Universität Darmstadt, Germany
- Hochschule der Medien in Stuttgart (Stuttgart Media University), Germany
- École Polytechnique Fédérale de Lausanne (EPFL), Switzerland
- National University of Sciences and Technology (NUST), Pakistan
- Macquarie University, Australia
- University of Split, Croatia
- University of Southern California, USA
- Xiangtan University, China
Publications
Scientometrics
h-index (and g-index): Thomson Reuters' ResearcherID Google Scholar Citation Microsoft Academic Search Arnetminer
Erdös Number = 3: Charles K. Chui => Guanrong Chen => Shujun Li; Ron C. Mullin => Spyros S. Magliveras => Shujun Li
A Note
Preprints of almost all papers and one book chapter can be found at his personal web site: http://www.hooklee.com/default.asp?t=Publications. Some recently accepted papers and other book chapters do not have preprints available because of either 1) the final editions are still not available; 2) the copyright transfer terms forbid posting preprints on web.
Selected Publications
- Hassan Jameel Asghar, Shujun Li, Ron Steinfeld and Josef Pieprzyk, "Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks," in Proceedings of 20th Annual Network & Distributed System Security Symposium (NDSS 2013), February 24-27, 2013, San Diego, CA, USA, Internet Society (Acceptance rate: 47/250=18.8%)
- Shujun Li, Ahmad-Reza Sadeghi, Soeren Heisrath, Roland Schmitz and Junaid Jameel Ahmad, "hPIN/hTAN: A Lightweight and Low-Cost e-Banking Solution against Untrusted Computers," in Financial Cryptography and Data Security: 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers, Lecture Notes in Computer Science, vol. 7035, pp. 235-249, Springer, 2012 (Acceptance rate of long papers: 15/74=20.3%)
- Toni Perković, Asma Mumtaz, Yousra Javed, Shujun Li, Syed Ali Khayam and Mario Čagalj, “Breaking Undercover: Exploiting Design Flaws and Nonuniform Human Behavior,” in Proceedings of 7th Symposium On Usable Privacy and Security (SOUPS 2011, Pittsburgh, PA, USA, July 20-22, 2011), ACM, 2011 (Acceptance rate: 15/45=33.3%)
- Shujun Li, Andreas Karrenbauer, Dietmar Saupe and C.-C. Jay Kuo, “Recovering Missing Coefficients in DCT-Transformed Images,” in Proceedings of 18th IEEE International Conference on Image Processing (ICIP 2011, Brussels, Belgium, September 11-14, 2011), pp. 1569-1572, IEEE, 2011
- Shujun Li, Syed Amier Haider Shah, Muhammad Asad Usman Khan, Syed Ali Khayam, Ahmad-Reza Sadeghi and Roland Schmitz, “Breaking e-Banking CAPTCHAs,” in Proceedings of 26th Annual Computer Security Applications Conference (ACSAC 2010, Austin, TX, USA, December 6-10, 2010), pp. 171-180, 2010, ACM, 2010 (Acceptance rate: 39/227=17.2%)
- Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, Ahmad-Reza Sadeghi, Roland Schmitz and Huaxiong Wang, “On the Security of PAS (Predicate-based Authentication Service),” in Proceedings of 25th Annual Computer Security Applications Conference (ACSAC 2009), pp. 209-218, IEEE Computer Society, 2009 [Full paper: http://eprint.iacr.org/2009/476] (Acceptance rate: 44/224=19.6%)
- Shujun Li and Roland Schmitz, “A Novel Anti-Phishing Framework Based on Honeypots,” in Proceedings of 4th Annual APWG eCrime Researchers Summit (eCRS 2009, Tacoma, WA, USA, October 20 & 21, 2009), 13 pages, IEEE, 2009 (Acceptance rate: 35%)
- Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Alvarez and Guanrong Chen, “On the security defects of an image encryption scheme,” Image and Vision Computing, vol. 27, no. 9, pp. 1371-1381, Elsevier, 2009
- Shujun Li, Chengqing Li, Kwok-Tung Lo and Guanrong Chen, “Cryptanalysis of an Image Scrambling Scheme without Bandwidth Expansion,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 18, no. 3, pp. 338-349, IEEE, 2008
- Shujun Li, Chengqing Li, Kwok-Tung Lo and Guanrong Chen, “Cryptanalyzing an Encryption Scheme Based on Blind Source Separation,” IEEE Transactions on Circuits and Systems—I: Regular Papers, vol. 55, no. 4, pp. 1055-1063, IEEE, 2008
Shujun Li, Chengqing Li, Guanrong Chen, Nikolaos G. Bourbakis and Kwok-Tung Lo, “A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks,” Signal Processing: Image Communication, vol. 23, no. 3, pp. 212-223, Elsevier, 2008 - Shujun Li, Guanrong Chen, Albert Cheung, Bharat Bhargava and Kwok-Tung Lo, “On the Design of Perceptual MPEG-Video Encryption Algorithms,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 17, no. 2, pp. 214-223, IEEE, 2007
- Gonzalo Álvarez and Shujun Li, “Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems,” International Journal of Bifurcation and Chaos, vol. 16, no. 8, pp. 2129-2151, World Scientific, 2006
- Shujun Li, Guanrong Chen and Xuanqin Mou, “On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps,” International Journal of Bifurcation and Chaos, vol. 15, no. 10, pp. 3119-3151, World Scientific, 2005
- Shujun Li, Guanrong Chen and Xuanqin Mou, “On the Security of the Yi-Tan-Siew Chaotic Cipher,” IEEE Transactions on Circuits and Systems—II: Express Briefs, vol. 51, no. 12, pp. 665-669, IEEE, 2004
Book Chapters
- Shujun Li, “Perceptual Encryption of Digital Images and Videos,” in Perceptual Digital Imaging: Methods and Applications, edited by Rastislav Lukac, to be published by CRC LLC in Spring 2012
- Gonzalo Alvarez, José María Amigó, David Arroyo and Shujun Li, “Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers,” in Chaos-Based Cryptography: Theory, Algorithms and Applications, edited by Ljupco Kocarev and Shiguo Lian, Studies in Computational Intelligence, vol. 354, pp. 257-295, ISBN: 978-3-642-20541-5, Springer, June 2011
- Shujun Li, Zhong Li and Wolfgang A. Halang, “Multimedia Encryption,” in Encyclopedia of Multimedia Technology and Networking, 2nd edition, edited by Margherita Pagani, Volume II, pp. 972-977, ISBN: 9781605660141, Idea Group, August 2008
- Shujun Li, Guanrong Chen and Xuan Zheng, “Chaos-Based Encryption for Digital Images and Videos,” Chapter 4 of Multimedia Security Handbook, pp. 133-167, edited by Borko Burht and Darko Kirovski, ISBN: 9780849327735, CRC Press (part of Taylor & Francis), 2004
This book was republished in March 2006 by Auerbach Publications (also part of Taylor & Francis) with a different title Multimedia Encryption and Authentication Techniques and Applications (ISBN: 9780849372124).
Peer-Reviewed Journal Papers
In Press
- Hassan Jammel Asghar, Shujun Li, Josef Pieprzyk and Huaxiong Wang, "Cryptanalysis of the Convex Hull Click Human Identification Protocol," accepted to International Journal of Information Security in March 2012, to be published by Springer
2011
- Roland Schmitz and Shujun Li, "Neue Entwicklungen in der e-Banking Security," ("Recent Developments in e-Banking Security,") PIK - Praxis der Informationsverarbeitung und Kommunikation, vol. 34, no. 4, pp. 176-184, Walter de Gruyter GmbH & Co. KG, 2011 (in German)
- Chengqing Li, Shujun Li and Kwok-Tung Lo, “Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps,” Communications in Nonlinear Science and Numerical Simulations, vol. 16, no. 2, pp. 837-843, Elsevier, 2011
- David Arroyo and Gonzalo Alvarez and José María Amigó and Shujun Li, “Cryptanalysis of a family of self-synchronizing chaotic stream ciphers,” Communications in Nonlinear Science and Numerical Simulations, , vol. 16, no. 2, pp. 805-813, Elsevier, 2011
2010
- Chengqing Li, Shujun Li, Kwok-Tung Lo and Kyandoghere Kyamakya, “A differential cryptanalysis of Yen-Chen-Wu multimedia cryptography system,” Journal of Systems and Software, vol. 83, no. 8, pp. 1443-1452, Elsevier, 2010
- A.B. Orue, G. Alvarez, G. Pastor, M. Romera, F. Montoya and Shujun Li, “A new parameter determination method for some double-scroll chaotic systems and its applications to chaotic cryptanalysis,” Communications in Nonlinear Science and Numerical Simulations, vol. 15, no. 11, pp. 3471-3483, Elsevier, 2010
- David Arroyo, Shujun Li, Gonzalo Alvarez, José María Amigó and Rhouma Rhouma, “Comments on ‘Image encryption with chaotically coupled chaotic maps’,” Physica D, vol. 239, no. 12, pp. 1002-1006, Elsevier, 2010
2009
- Rhouma Rhouma, Ercan Solak, David Arroyo, Shujun Li, Gonzalo Alvarez and Safya Belghitha, “Comment on “Modified Baptista type chaotic cryptosystem via matrix secret key” [Phys. Lett. A 372 (2008) 5427],” Physics Letters A, vol. 373, no. 37, pp. 3398-3400, Elsevier , 2009
- A.B. Orue, V. Fernandez, G. Alvarez, G. Pastor, M. Romera, F. Montoya, C. Sanchez-Avila and Shujun Li, “Breaking a SC-CNN-based Chaotic Masking Secure Communication System,” International Journal of Bifurcation and Chaos, vol. 19, no. 4, pp. 1329-1338, World Scientific, 2009
- David Arroyo, Gonzalo Alvarez, Shujun Li, Chengqing Li and Veronica Fernandez, “Cryptanalysis of a New Chaotic Cryptosystem Based on Ergodicity,” International Journal of Modern Physics B, vol. 23, no. 5, pp. 651-659, World Scientific, 2009
- David Arroyo, Chengqing Li, Shujun Li, Gonzalo Alvarez and Wolfgang A. Halang, “Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm,” Chaos, Solitons & Fractals, vol. 14, no. 11, pp. 2613-2616, Elsevier, 2009
- G. Alvarez and Shujun Li, “Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption,” Communications in Nonlinear Science and Numerical Simulations, vol. 14, no. 11, pp. 3743-3749, Elsevier, 2009
- Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Alvarez and Guanrong Chen, “On the security defects of an image encryption scheme,” Image and Vision Computing, vol. 27, no. 9, pp. 1371-1381, Elsevier, 2009
- Chengqing Li, Shujun Li, Guanrong Chen and Wolfgang A. Halang, “Cryptanalysis of an image encryption scheme based on a compound chaotic sequence,” Image and Vision Computing, vol. 27, no. 8, pp. 1035-1039, Elsevier, 2009
- David Arroyo, Chengqing Li, Shujun Li, Gonzalo Alvarez, “Cryptanalysis of a computer cryptography scheme based on a filter bank,” Chaos, Solitons & Fractals, vol. 41, no. 1, pp. 410-413, Elsevier, 2009
2008
- David Arroyo, Rhouma Rhouma, Gonzalo Alvarez, Shujun Li and Veronica Fernandez, “On the security of a new image encryption scheme based on chaotic map lattices,” Chaos: An Interdisciplinary Journal of Nonlinear Science, vol. 18, no. 3, art. no. 033112, American Institute of Physics, 2008
- A.B. Orue, V. Fernandez, G. Alvarez, G. Pastor, M. Romera, Shujun Li and F. Montoya, “Determination of the parameters for a Lorenz system and application to break the security of two-channel chaotic cryptosystems,” Physics Letters A, vol. 372, no. 34, pp. 5588-5592, Elsevier, 2008
- Shujun Li, Chengqing Li, Guanrong Chen and Kwok-Tung Lo, “Cryptanalysis of RCES/RSES Image Encryption Scheme,” Journal of Systems and Software, vol. 81, no. 7, pp. 1130-1143, Elsevier, 2008
- Shujun Li, Chengqing Li, Kwok-Tung Lo and Guanrong Chen, “Cryptanalyzing an Encryption Scheme Based on Blind Source Separation,” IEEE Transactions on Circuits and Systems—I: Regular Papers, vol. 55, no. 4, pp. 1055-1063, IEEE, 2008
- Shujun Li, Chengqing Li, Guanrong Chen, Nikolaos G. Bourbakis and Kwok-Tung Lo, “A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks,” Signal Processing: Image Communication, vol. 23, no. 3, pp. 212-223, Elsevier, 2008
- Shujun Li, Chengqing Li, Kwok-Tung Lo and Guanrong Chen, “Cryptanalysis of an Image Scrambling Scheme without Bandwidth Expansion,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 18, no. 3, pp. 338-349, IEEE, 2008
- Chengqing Li, Shujun Li, Gonzalo Álvarez, Guanrong Chen and Kwok-Tung Lo, “Cryptanalysis of a chaotic block cipher with external key and its improved version,” Chaos, Solitons & Fractals, vol. 37, no. 1, pp. 299-307, Elsevier, 2008
- David Arroyo, Gonzalo Alvarez, Shujun Li, Chengqing Li and Juana Nunez, “Cryptanalysis of a discrete-time synchronous chaotic encryption system,” Physics Letters A, vol. 372, no. 7, pp. 1034-1039, Elsevier, 2008
2007
- Chengqing Li, Shujun Li, Gonzalo Álvarez, Guanrong Chen and Kwok-Tung Lo, “Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations,” Physics Letters A, vol. 369, no. 1-2, pp. 23-30, Elsevier, 2007
- Shujun Li, Guanrong Chen, Albert Cheung, Bharat Bhargava and Kwok-Tung Lo, “On the Design of Perceptual MPEG-Video Encryption Algorithms,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 17, no. 2, pp. 214-223, IEEE, 2007
- Gonzalo Álvarez, Shujun Li and Luis Hernandez, “Analysis of security problems in a medical image encryption system,” Computers in Biology and Medicine, vol. 37, no. 3, pp. 424-427, Elsevier, 2007
- Shujun Li and Kwok-Tung Lo, “Security Problems with Improper Implementations of Improved FEA-M,” Journal of Systems and Software, vol. 80, no. 5, pp. 791-794, Elsevier, 2007
2006
- Shujun Li, Chengqing Li, Kwok-Tung Lo and Guanrong Chen, “Cryptanalysis of an Image Encryption Scheme,” Journal of Electronic Imaging, vol. 15, no. 4, article number 043012, SPIE / IS&T, 2006
- Gonzalo Álvarez and Shujun Li, “Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems,” International Journal of Bifurcation and Chaos, vol. 16, no. 8, pp. 2129-2151, World Scientific, 2006
- Shujun Li, Guanrong Chen and Gonzalo Álvarez, “Return-Map Cryptanalysis Revisited,” International Journal of Bifurcation and Chaos, vol. 16, no. 5, pp. 1157-1168, World Scientific, 2006
- Gonzalo Álvarez and Shujun Li, “Breaking an encryption scheme based on chaotic Baker map,” Physics Letters A, vol. 352, no. 1-2, pp. 78-82, Elsevier, 2006
- Chengqing Li, Shujun Li, Der-Chyuan Lou and Dan Zhang, “On the security of the Yen-Guo’s domino signal encryption algorithm (DSEA),” Journal of Systems and Software, vol. 79, no. 2, pp. 253-258, Elsevier, 2006
- Chengqing Li, Shujun Li, Dan Zhang and Guanrong Chen, “Cryptanalysis of a data security protection scheme for VoIP,” IEE Proceedings-Vision, Image & Signal Processing, vol. 153, no. 1, pp. 1-10, IEE, 2006
2005
- Shujun Li, Guanrong Chen and Xuanqin Mou, “On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps,” International Journal of Bifurcation and Chaos, vol. 15, no. 10, pp. 3119-3151, World Scientific, 2005
- Kwok-wo Wong, Kwan-Pok Man, Shujun Li and Xiaofeng Liao, “A More Secure Chaotic Cryptographic Scheme based on Dynamic Look-up Table,” Circuits, Systems & Signal Processing, vol. 24, no. 5, pp. 571-584, Birkhaüser (part of Springer), 2005
- Gonzalo Álvarez, Luis Hernádez, Jaime Muñóz, Fausto Montoya and Shujun Li, “Security analysis of communication system based on the synchronization of different order chaotic systems,” Physics Letters A, vol. 345, no. 4-6, pp 245-250, Elsevier, 2005
- Chengqing Li, Shujun Li, Guanrong Chen, Gang Chen and Lei Hu, “Cryptanalysis of a New Signal Security System for Multimedia Data Transmission,” EURASIP Journal on Applied Signal Processing, vol. 2005, no. 8, pp. 1277-1288, Hindawi, 2005
- Shujun Li, Gonzalo Álvarez, Guanrong Chen and Xuanqin Mou, “Breaking a chaos-noise-based secure communication scheme,” Chaos: An Interdisciplinary Journal of Nonlinear Science, vol. 15, no. 1, article 013703 (10 pages), American Institute of Physics, 2005
- Shujun Li, Gonzalo Álvarez and Guanrong Chen, “Breaking a chaos-based secure communication scheme designed by an improved modulation method,” Chaos, Solitons & Fractals, vol. 25, no. 1, pp. 109-120, Elsevier, 2005
- Gonzalo Álvarez and Shujun Li, F. Montoya, G. Pastor and M. Romera, “Breaking projective chaos synchronization secure communication using filtering and generalized synchronization,” Chaos, Solitons & Fractals, vol. 24, no. 3, pp. 775-783, Elsevier, 2005
2004
- Shujun Li, Guanrong Chen and Xuanqin Mou, “On the Security of the Yi-Tan-Siew Chaotic Cipher,” IEEE Transactions on Circuits and Systems—II: Express Briefs, vol. 51, no. 12, pp. 665-669, IEEE, 2004
Shujun Li, Guanrong Chen, Kwok-Wo Wong, Xuanqin Mou and Yuanlong Cai, “Baptista-type chaotic cryptosystems: Problems and countermeasures,” Physics Letters A, vol. 332, no. 5-6, pp. 368-375, Elsevier, 2004 - Gonzalo Álvarez and Shujun Li, “Breaking network security based on synchronized chaos,” Computer Communications, vol. 27, no.16, pp. 1679-1681, Elsevier, 2004
2003
- Shujun Li, Xuanqin Mou, Boliya L. Yang, Zhen Ji and Jihong Zhang, “Problems with a Probabilistic Encryption Scheme based on Chaotic Systems,” International Journal of Bifurcation and Chaos, vol. 13, no. 10, pp. 3063-3077, World Scientific, 2003
- Shujun Li, Xuanqin Mou, Yuanlong Cai, Zhen Ji and Jihong Zhang, “On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision,” Computer Physics Communications, vol. 153, no. 1, pp. 52-58, Elsevier, 2003
- Shujun Li, Xuanqin Mou, Zhen Ji, Jihong Zhang and Yuanlong Cai, “Performance analysis of Jakimoski-Kocarev attack on a class of chaotic cryptosystems,” Physics Letters A, vol. 307, no. 1, pp. 22-28, Elsevier, 2003 (an erratum has been published in Physics Letters A, vol. 309, no. 1-2, pp. 165, Elsevier, 2003)
- Shujun Li, Xuanqin Mou, Zhen Ji and Jihong Zhang, “Cryptanalysis of a Class of Chaotic Stream Ciphers,” Journal of Electronics & Information Technology, vol. 25, no. 4, pp. 473-478, Science Press / Institute of Electronics, Chinese Academy of Sciences, 2003 (in Chinese)
2001
- Shujun Li, Xuanqin Mou and Yuanlong Cai, “Improving security of a chaotic encryption approach,” Physics Letters A, vol. 290, no. 3-4, pp. 127-133, Elsevier, 2001
Peer-Reviewed Conference Papers
2013
- Hassan Jameel Asghar, Shujun Li, Ron Steinfeld and Josef Pieprzyk, "Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks," in Proceedings of 20th Annual Network & Distributed System Security Symposium (NDSS 2013), February 24-27, 2013, San Diego, CA, USA, Internet Society (Acceptance rate: 47/250=18.8%)
2012
- Roman Byshko and Shujun Li, "Characterization of iPhone Displays: A Comparative Study," in Proceedings of the 18th German Color Group Workshop on Color Image Processing (Tagungsband vor 18. Workshop Farbbildverarbeitung 2012, September 27-28, 2012 in Darmstadt, Germany), pp. 49-60, Technische Universität Darmstadt, 2012, ISBN: 978-3-00-039639-7
- Roland Schmitz, Shujun Li, Christos Grecos and Xinpeng Zhang, "A New Approach to Commutative Watermarking-Encryption," in Communications and Multimedia Security: 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012. Proceedings, Lecture Notes in Computer Science, vol. 7394, pp. 117-130, Springer, 2012
- Junaid Jameel Ahmad, Shujun Li, Ahmad-Reza Sadeghi and Thomas Schneider, "CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm," in Financial Cryptography and Data Security: 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers, Lecture Notes in Computer Science, vol. 7397, pp. 299-313, Springer, 2012 (Acceptance rate of long papers: 23/88=26.1%)
- Kongfeng Zhu, Shujun Li and Dietmar Saupe, "An objective method of measuring texture preservation for camcorder performance evaluation," in Image Quality and System Performance IX (part of IS&T/SPIE Electronic Imaging 2012, Burlingame, CA, USA, January 22-26, 2012), Proceedings of SPIE, vol. 8293, Article Number 829304, SPIE, 2012
- Sabine Cornelsen, Andreas Karrenbauer and Shujun Li, "Leveling the Grid," in Proceedings of the Meeting on Algorithm Engineering & Experiments, Kyoto, Japan, January 16, 2012 (ALENEX 2012), pp. 45-54, SIAM, 2012 (Acceptance rate: 15/48=31%)
- Shujun Li, Ahmad-Reza Sadeghi, Soeren Heisrath, Roland Schmitz and Junaid Jameel Ahmad, "hPIN/hTAN: A Lightweight and Low-Cost e-Banking Solution against Untrusted Computers," in Financial Cryptography and Data Security: 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers, Lecture Notes in Computer Science, vol. 7035, pp. 235-249, Springer, 2012
2011
- Yousra Javed, Maliha Nazir, Muhammad Murtaza Khan, Syed Ali Khayam and Shujun Li, "Captchæcker: Reconfigurable CAPTCHAs Based on Automated Security and Usability Analysis," in Proceedings of 2011 4th Symposium on Configuration Analytics and Automation (SafeConfig 2011, October 31 - November 1, 2011, Arlington, VA, USA), IEEE, 2011 (Acceptance rate: 10/29=34.5%)
- Junaid Jameel Ahmad, Shujun Li, Ihab Amer and Marco Mattavelli, "Building Multimedia Security Applications in the MPEG Reconfigurable Video Coding (RVC) Framework," in Proceedings of 13th ACM Workshop on Multimedia and Security (ACM MM&Sec 2011, Buffalo, NY, USA, September 29-30, 2011), 2011
- Toni Perković, Asma Mumtaz, Yousra Javed, Shujun Li, Syed Ali Khayam and Mario Čagalj, "Breaking Undercover: Exploiting Design Flaws and Nonuniform Human Behavior," in Proceedings of 7th Symposium On Usable Privacy and Security (SOUPS 2011, Carnegie Mellon University in Pittsburgh, PA, USA, July 20-22, 2011), ACM, 2011, DOI: 10.1145/2078827.2078834 (Acceptance rate: 15/45=33.3%)
- Shujun Li, Chengqing Li and C.-C. Jay Kuo, "On the Security of a Secure Lempel-Ziv-Welch (LZW) Algorithm," in Proceedings of 2011 IEEE International Conference on Multimedia and Expo (ICME 2011, Barcelona, Spain, July 11-15, 2011), 2011
- Hassan Jammel Asghar, Shujun Li, Josef Pieprzyk and Huaxiong Wang, "Cryptanalysis of the Convex Hull Click Human Identification Protocol," in Information Security: 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, Lecture Notes in Computer Science, vol. 6531, pp. 24-30, Springer, 2011 (Acceptance rate: 37/134=27.6%)
2010
- Shujun Li, Syed Amier Haider Shah, Muhammad Asad Usman Khan, Syed Ali Khayam, Ahmad-Reza Sadeghi and Roland Schmitz, “Breaking e-Banking CAPTCHAs,” in Proceedings of 26th Annual Computer Security Applications Conference (ACSAC 2010, Austin, TX, USA, December 6-10, 2010), pp. 171-180, ACM, 2010 (Acceptance rate: 39/227=17.2%)
- Shujun Li, Junaid Jameel Ahmad, Dietmar Saupe and C.-C. Jay Kuo, “An Improved DC Recovery Method from AC Coefficients of DCT-Transformed Images,” in Proceedings of 17th IEEE International Conference on Image Processing (ICIP 2010, Hong Kong, China, September 26-29, 2010), pp. 2085-2088, IEEE, 2010
- David Arroyo, Alvarez, José María Amigó, Shujun Li and Gonzalo Alvarez, “On the inadequacy of unimodal maps for cryptographic applications,” in Proceedings of 11th Spanish Meeting on Cryptology and Information Security (RECSI 2010), pp. 37-42, Universitat Rovira i Virgili, 2010
- Shujun Li, Syed Ali Khayam, Ahmad-Reza Sadeghi and Roland Schmitz, “Breaking Randomized Linear Generation Functions based Virtual Password System,” in Proceedings of 35th IEEE International Conference on Communications (ICC 2010, Communication and Information Systems Security Symposium, Cape Town, South Africa, May 23-27, 2010), IEEE, 2010
2009
- Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, Ahmad-Reza Sadeghi, Roland Schmitz and Huaxiong Wang, “On the Security of PAS (Predicate-based Authentication Service),” in Proceedings of 25th Annual Computer Security Applications Conference (ACSAC 2009, Honolulu, Hawaii, USA, December 7-11, 2009), pp. 209-218, IEEE, 2009 [Full paper: http://eprint.iacr.org/2009/476] (Acceptance rate: 44/224=19.6%)
- Shujun Li and Roland Schmitz, “A Novel Anti-Phishing Framework Based on Honeypots,” in Proceedings of 4th Annual APWG eCrime Researchers Summit (eCRS 2009, Tacoma, WA, USA, October 20 & 21, 2009), 13 pages, IEEE, 2009 (Acceptance rate: 35%)
- David Arroyo, Gonzalo Alvarez and Shujun Li, “Some Hints for the Design of Digital Chaos-Based Cryptosystems: Lessons Learned from Cryptanalysis,” presented at the 2nd IFAC Meeting on Analysis and Control of Chaotic Systems (CHAOS 2009, Queen Mary, University of London, June 22-24, 2009), paper ID TD1_2
- Shujun Li, Guanrong Chen, Albert Cheung, Kwok-Tung Lo and Mohan Kankanhalli, “On the Security of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables,” in Advances in Image and Video Technology - Third Pacific Rim Symposium, PSIVT 2009, Tokyo, Japan, January 13-16, 2009. Proceedings, Lecture Notes in Computer Science, vol. 5414, pp. 898-909, Springer, 2009
2007
- Shujun Li, Gonzalo Álvarez, Zhong Li and Wolfgang A. Halang, “Analog Chaos-based Secure Communications and Cryptanalysis: A Brief Survey,” in The 3rd International IEEE Scientific Conference on Physics and Control (PhysCon 2007), September 3rd-7th 2007 at the University of Potsdam (Abstract Collection), page 92, 2007 [Full paper: http://lib.physcon.ru/?item=1368]
2005
- Daniel Socek, Shujun Li, Spyros S. Magliveras and Borko Furht, “Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption,” in Proceedings of the First IEEE/CreateNet International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm 2005, Athens, Greece, September 5-9, 2005), pp. 406-408 (short paper), IEEE Computer Society, 2005
- Chengqing Li, Shujun Li, Dan Zhang and Guanrong Chen, “Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher,” in Advances in Neural Networks – ISNN 2005: Second International Symposium on Neural Networks, Chongqing, China, May 30 - June 1, 2005, Proceedings, Part II, Lecture Notes in Computer Science, vol. 3497, pp. 630-636, Springer, 2005
- Chengqing Li, Xinxiao Li, Shujun Li and Guanrong Chen, “Cryptanalysis of a Multistage Encryption System,” in Proceedings of the 2005 IEEE International Symposium on Circuits and Systems (ISCAS 2005, Kobe Japan, May 23-26, 2005), pp. 880-883, IEEE, 2005
2004
- Chengqing Li, Shujun Li, Dan Zhang and Guanrong Chen, “Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme,” in Advances in Multimedia Information Processing - PCM 2004: 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30 - December 3, 2004. Proceedings, Part III, Lecture Notes in Computer Science, vol. 3333, pp. 418-425, Springer, 2004
2002
- Shujun Li and Xuan Zheng, “On the security of an image encryption method,” in Proceedings of the 2002 IEEE International Conference on Image Processing (ICIP 2002, Rochester, New York, USA, September 22-25, 2002), vol. 2 of 3, pp. 925-928, IEEE, 2002
- Shujun Li and Xuan Zheng, “Cryptanalysis of a chaotic image encryption method,” in Proceedings of the 2002 IEEE International Symposium on Circuits and Systems (ISCAS 2002, Scottsdale, AZ, USA, May 26-29, 2002), vol. 2 of 5, pp. 708-711, IEEE, 2002
- Shujun Li, Xuan Zheng, Xuanqin Mou and Yuanlong Cai, “Chaotic encryption scheme for real-time digital video,” in Real-Time Imaging VI (IS&T/SPIE Electronic Imaging 2002), Proceedings of SPIE, vol. 4666, pp. 149-160, SPIE/IS&T, 2002
2001
- Shujun Li, Xuanqin Mou and Yuanlong Cai, “Pseudo-Random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography,” in Progress in Cryptology - INDOCRYPT 2001: Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001. Proceedings, Lecture Notes in Computer Science, vol. 2247, pp. 316-329, Springer, 2001
- Shujun Li, Qi Li, Wenmin Li, Xuanqin Mou and Yuanlong Cai, “Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding,” in Cryptography and Coding: 8th IMA International Conference, Cirencester, UK, December 17-19, 2001. Proceedings, Lecture Notes in Computer Science, vol. 2260, pp. 205-221, Springer, 2001
2000
- Shujun Li, Peng Wang, Xuanqin Mu and Yuanlong Cai, “Research on non-linear dynamic systems employing color space,” in 2000 5th International Conference on Signal Processing Proceedings (ICSP 2000, Beijing, China, August 21-25, 2000), vol. 1 of 3, pp. 285-289, IEEE / Publishing House of Electronics Industry (China), 2000
Peer-Reviewed Conference Posters
- Maliha Nazir, Yousra Javed, Muhammad Murtaza Khan, Syed Ali Khayam and Shujun Li, "Poster: Captchæcker – Automating Usability-Security Evaluation of Textual CAPTCHAs," in Proceedings of 7th Symposium On Usable Privacy and Security (SOUPS 2011, Carnegie Mellon University in Pittsburgh, PA, USA, July 20-22, 2011), ACM, 2011
- Shujun Li, Ahmad-Reza Sadeghi and Roland Schmitz, “hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers,” in Financial Cryptography and Data Security: 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers, Lecture Notes in Computer Science, vol. 6052, pp. 429, Springer, 2010
Standard Contributions
Input Documents
- Junaid Jameel Ahmad and Shujun Li, “Extending the Comparative Study on the Performance of C Code Automatically Generated by ORCC from RVC-CAL Code to a Resource-Constrained Embedded System,” ISO/IEC JTC1/SC29/WG11, MPEG2011/m21289, 97th MPEG Meeting, Torino, Italy, July 2011
- Junaid Jameel Ahmad and Shujun Li, “Performance Benchmarking of C Code Automatically Generated by ORCC from RVC-CAL Code on a Quad-Core Machine,” ISO/IEC JTC1/SC29/WG11, MPEG2011/m21250, 97th MPEG Meeting, Torino, Italy, July 2011
- Junaid Jameel Ahmad and Shujun Li, “Evaluating the Support of Handling Huge XDF Networks by the Open RVC-CAL Compiler (ORCC) and the Graphiti-Editor,” ISO/IEC JTC1/SC29/WG11, MPEG2011/m21249, 97th MPEG Meeting, Torino, Italy, July 2011
- Junaid Jameel Ahmad, Shujun Li, Endri Bezati and Marco Mattavelli, “Building Joint Image Encryption-Encoding (JIEE) and Compressed Domain Image Watermarking Systems in the RVC Framework,” ISO/IEC JTC1/SC29/WG11, MPEG2011/m21188, 97th MPEG Meeting, Torino, Italy, July 2011
- Junaid Jameel Ahmad, Shujun Li, Ihab Amer, and Marco Mattavelli, “Building Joint MPEG-4 AVC Video Encryption-Encoding (JVEE) System in the RVC Framework,” ISO/IEC JTC1/SC29/WG11, MPEG2011/m21185, 97th MPEG Meeting, Torino, Italy, July 2011
- Junaid Jameel Ahmad and Shujun Li, “A comparative study on the performance of C code automatically generated by ORCC from RVC-CAL code,” ISO/IEC JTC1/SC29/WG11, MPEG2011/m19383, 95th MPEG Meeting, Daegu, Korea, January 2011
- Marco Mattavelli, Mickaël Raulet, Shujun Li and Jörn W. Janneck, “Proposed requirements for RVC and RGC specification languages and solution,” ISO/IEC JTC1/SC29/WG11, MPEG2010/m18614, 94th MPEG Meeting, Guangzhou, China, October 2010
- Jörn W. Janneck, Marco Mattavelli, Matthieu Wipliez, Mickaël Raulet, Shujun Li, Johan Eker, Carl Von Platen, Ghislain Roquier, Ihab Amer, Christophe Lucarz, Pascal Faure and Junaid Jameel Ahmad, “A proposal of RVC-CAL extensions for improved support of I/O processing,” ISO/IEC JTC1/SC29/WG11, MPEG2010/m18460, 94th MPEG Meeting, Guangzhou, China, October 2010
- Jörn W. Janneck, Mickael Raulet, Matthieu Wiplietz, Johan Eker, Ghislain Roquier, Ihab Amer, Christophe Lucarz, Shujun Li, Junaid Jameel Ahmad and Marco Mattavelli, “Writing dataflow networks components (FUs) with different models of computations using RVC-CAL: a tutorial,” ISO/IEC JTC1/SC29/WG11, MPEG2010/m18458, 94th MPEG Meeting, Guangzhou, China, October 2010
- Junaid Jameel Ahmad, Shujun Li, Marco Mattavelli, Matthieu Wipliez, Mickaël Raulet, “Crypto Tools Library (CTL): Applying RVC-CAL to Multimedia Security Applications,” ISO/IEC JTC1/SC29/WG11, MPEG2010/m18404, 94th MPEG Meeting, Guangzhou, China, October 2010
- Shujun Li, Marco Mattavelli, Mickaël Raulet, Matthieu Wipliez, Jörn W. Janneck, Johan Eker, Carl Von Platen, Ghislain Roquier, Beilu Shao, Christophe Lucarz and Pascal Faure, “Proposed corrections and new changes to ISO/IEC 23001-4:2009,” ISO/IEC JTC1/SC29/WG11, MPEG2010/m17806, 93rd MPEG Meeting, Geneva, Switzerland, July 2010
- Shujun Li, Junaid Jameel Ahmad, Ihab Amer and Marco Mattavelli, “Extending RVC for Wireless Multimedia Sensor Networks and Cryptography Applications,” ISO/IEC JTC1/SC29/WG11, MPEG2009/m16989, 90th MPEG Meeting, October 2009, Xi’an, China
Output Documents
- Shujun Li, Marco Mattavelli and Mickaël Raulet, “Text of ISO/IEC 23001-4/COR1,” ISO/IEC JTC1/SC29/WG11, MPEG2010/w11813, 95th MPEG Meeting, Daegu, South Korea, January 2011
- Hwa Seon Shin, Kazuo Sugimoto, Ihab Amer, Marco Mattavelli, Gwo Giun Lee and Shujun Li, “Description of Core Experiments in RVC (Reconfigurable Video Coding),” ISO/IEC JTC1/SC29/WG11, MPEG2010/w11628, 94th MPEG Meeting, Guangzhou, China, October 2010
- Mickaël Raulet and Shujun Li, “Working Draft of ISO/IEC 23001-4/Amd.1,” ISO/IEC JTC1/SC29/WG11, MPEG2010/w11623, 94th MPEG Meeting, Guangzhou, China, October 2010
- Shujun Li, Mickaël Raulet and Marco Mattavelli, “Text of ISO/IEC 23001-4/DCOR1,” ISO/IEC JTC1/SC29/WG11, MPEG2010/w11622, 94th MPEG Meeting, Guangzhou, China, October 2010
- Shujun Li, “Process for Extending MPEG RVC VTL and Corresponding Verification Testing Procedures,” ISO/IEC JTC1/SC29/WG11, MPEG2010/w11474, 93rd MPEG Meeting, Geneva, Switzerland, July 2010
Hwa Seon Shin, Kazuo Sugimoto, Ihab Amer, Marco Mattavelli, Gwo Giun Lee and Shujun Li, “Description of Core Experiments in RVC,” ISO/IEC JTC1/SC29/WG11, MPEG2010/w11473, 93rd MPEG Meeting, Geneva, Switzerland, July 2010 - Shujun Li, “Defect Report on ISO/IEC 23001-4,” ISO/IEC JTC1/SC29/WG11, MPEG2010/w11469, 93rd MPEG Meeting, Geneva, Switzerland, July 2010
Teaching
- COM1025: Web Publishing and Databases (2012-2013, jointly with Dr Norman Poh)
- COMM028: Technologies and Applications (2012-2013, jointly with Prof Anthony TS Ho)
- COM1030: Professional Studies (2012-2013, jointly with Dr Steve Wesemeyer)
- COMM023: Introduction to Multimedia Security (2011-2013)
- COM1025: Web Publishing and Databases (2011-2012)
- COM2030: Advanced Algorithms (2011-2012, jointly with Prof. Yaochu Jin)
Departmental Duties
- Departmental MSc Admission Tutor (May 2012 - present)
- Departmental Web Coordinator (September 2011 - present)
- Departmental Seminar Series Organiser (September 2011 - March 2012)
Affiliations
Professional Memberships
- Senior Member, Institute of Electrical and Electronic Engineers (IEEE)
- Professional Member, Association for Computing Machinery (ACM)
- Member, ISO/IEC JTC 1/ SG 29/WG 11 (MPEG)
Editorships
- Editor Board Member, Journal of Visual Communication and Image Representation (2012-)
- Editorial Board Member, Information Security Technical Report (2012-2014)
- Associate Editor, International Journal of Bifurcation and Chaos (2012-2014)
- Guest Associate Editor, International Journal of Bifurcation and Chaos (2010-2011)
Conference Organisation and TPC Memberships
- GLOBECOM 2013 (56th IEEE Global Communications Conference, Exhibition and Industry Forum)
- UKCI 2013 (13th Annual UK Workshop on Computational Intelligence) (Publicity Co-Chair)
- ARES 2013 (8th International Conference on Availability, Reliability and Security)
- ICME 2013 (IEEE International Conference on Multimedia and Expo)
- ICC 2013 (38th IEEE International Conference on Communications)
- IWCC 2013 (2nd International Workshop on Cyber Crime)
- INTRUST 2012 (4th International Conference on Trusted Systems)
- GLOBECOM 2012 (55th IEEE Global Communications Conference, Exhibition and Industry Forum)
- DASIP 2012 (6th Conference on Design and Architectures for Signal and Image Processing)
- ARES 2012 (7th International Conference on Availability, Reliability and Security)
- ICME 2012 (13th IEEE International Conference on Multimedia & Expo)
- ISCAS 2012 (IEEE International Symposium on Circuits and Systems)
- ICC 2012 (37th IEEE International Conference on Communications)
- ICNC 2012 (International Conference on Computing, Networking and Communications)
- GLOBECOM 2011 (54th IEEE Global Communications Conference, Exhibition and Industry Forum)
- INTRUST 2011 (3rd International Conference on Trusted Systems)
- SafeConfig 2011 (4th Symposium on Configuration Analytics and Automation)
- DASIP 2011 (5th Conference on Design and Architectures for Signal and Image Processing)
- ICME 2011 (12th IEEE International Conference on Multimedia & Expo)
- ICC 2011 (36th IEEE International Conference on Communications)
- INTRUST 2010 (2nd International Conference on Trusted Systems) (Invited Speaker and Session Chair)
- GLOBECOM 2010 (53rd IEEE Global Communications Conference, Exhibition and Industry Forum)
- APWCCS 2010 (5th Asia-Pacific Workshop on Chaos Control and Synchronization)
- ICME 2010 (11th IEEE International Conference on Multimedia & Expo)
- ICCCAS 2009 (7th International Conference on Communication, Circuits and Systems)
- ICCCAS 2006 (4th International Conference on Communications, Circuits and Systems)
