default search action
Jiwu Huang
Person information
- affiliation: Shenzhen University, Guangdong Key Laboratory of Intelligent Information Processing, China
- affiliation (PhD 1998): Chinese Academy of Science, Institute of Automation, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j201]Israr Hussain, Shunquan Tan, Jiwu Huang:
A semi-supervised deep learning approach for cropped image detection. Expert Syst. Appl. 243: 122832 (2024) - [j200]Qilin Yin, Wei Lu, Xiaochun Cao, Xiangyang Luo, Yicong Zhou, Jiwu Huang:
Fine-Grained Multimodal DeepFake Classification via Heterogeneous Graphs. Int. J. Comput. Vis. 132(11): 5255-5269 (2024) - [j199]Qingliang Liu, Wenkang Su, Jiangqun Ni, Xianglei Hu, Jiwu Huang:
An efficient distortion cost function design for image steganography in spatial domain using quaternion representation. Signal Process. 219: 109370 (2024) - [j198]Yuanfeng Pan, Jiangqun Ni, Qingliang Liu, Wenkang Su, Jiwu Huang:
Efficient JPEG image steganography using pairwise conditional random field model. Signal Process. 221: 109493 (2024) - [j197]Israr Hussain, Shunquan Tan, Jiwu Huang:
A knowledge distillation based deep learning framework for cropped images detection in spatial domain. Signal Process. Image Commun. 124: 117117 (2024) - [j196]Pei Yan, Shunquan Tan, Miaohui Wang, Jiwu Huang:
Enhanced Dynamic Analysis for Malware Detection With Gradient Attack. IEEE Signal Process. Lett. 31: 2825-2829 (2024) - [j195]Xiangli Xiao, Yushu Zhang, Leo Yu Zhang, Zhongyun Hua, Zhe Liu, Jiwu Huang:
FairCMS: Cloud Media Sharing With Fair Copyright Protection. IEEE Trans. Comput. Soc. Syst. 11(5): 6192-6209 (2024) - [j194]Wenmin Huang, Weiqi Luo, Xiaochun Cao, Jiwu Huang:
Interactive Generative Adversarial Networks With High-Frequency Compensation for Facial Attribute Editing. IEEE Trans. Circuits Syst. Video Technol. 34(9): 8215-8229 (2024) - [j193]Xianhao Tian, Peijia Zheng, Jiwu Huang:
Secure Deep Learning Framework for Moving Object Detection in Compressed Video. IEEE Trans. Dependable Secur. Comput. 21(4): 2836-2851 (2024) - [j192]Hao-Tian Wu, Xin Cao, Ying Gao, Kaihan Zheng, Jiwu Huang, Jiankun Hu, Zhihong Tian:
Fundus Image Enhancement via Semi-Supervised GAN and Anatomical Structure Preservation. IEEE Trans. Emerg. Top. Comput. Intell. 8(1): 313-326 (2024) - [j191]Dongxia Huang, Weiqi Luo, Minglin Liu, Weixuan Tang, Jiwu Huang:
Steganography Embedding Cost Learning With Generative Multi-Adversarial Network. IEEE Trans. Inf. Forensics Secur. 19: 15-29 (2024) - [j190]Anwei Luo, Chenqi Kong, Jiwu Huang, Yongjian Hu, Xiangui Kang, Alex C. Kot:
Beyond the Prior Forgery Knowledge: Mining Critical Clues for General Face Forgery Detection. IEEE Trans. Inf. Forensics Secur. 19: 1168-1182 (2024) - [j189]Changsheng Chen, Bokang Li, Rizhao Cai, Jishen Zeng, Jiwu Huang:
Distortion Model-Based Spectral Augmentation for Generalized Recaptured Document Detection. IEEE Trans. Inf. Forensics Secur. 19: 1283-1298 (2024) - [j188]Guoyuan Lin, Weiqi Luo, Da Luo, Jiwu Huang:
One-Class Neural Network With Directed Statistics Pooling for Spoofing Speech Detection. IEEE Trans. Inf. Forensics Secur. 19: 2581-2593 (2024) - [j187]Weixuan Tang, Zhili Zhou, Bin Li, Kim-Kwang Raymond Choo, Jiwu Huang:
Joint Cost Learning and Payload Allocation With Image-Wise Attention for Batch Steganography. IEEE Trans. Inf. Forensics Secur. 19: 2826-2839 (2024) - [j186]Rongxuan Peng, Shunquan Tan, Xianbo Mo, Bin Li, Jiwu Huang:
Employing Reinforcement Learning to Construct a Decision-Making Environment for Image Forgery Localization. IEEE Trans. Inf. Forensics Secur. 19: 4820-4834 (2024) - [j185]Junyan Wu, Qilin Yin, Ziqi Sheng, Wei Lu, Jiwu Huang, Bin Li:
Audio Multi-View Spoofing Detection Framework Based on Audio-Text-Emotion Correlations. IEEE Trans. Inf. Forensics Secur. 19: 7133-7146 (2024) - [j184]Zhaoyang Zhang, Shen Wang, Guopu Zhu, Dechen Zhan, Jiwu Huang:
Adversarial Perturbation Prediction for Real-Time Protection of Speech Privacy. IEEE Trans. Inf. Forensics Secur. 19: 8701-8716 (2024) - [j183]Kangkang Wei, Weiqi Luo, Jiwu Huang:
Color Image Steganalysis Based on Pixel Difference Convolution and Enhanced Transformer With Selective Pooling. IEEE Trans. Inf. Forensics Secur. 19: 9970-9983 (2024) - [j182]Wei Lu, Lingyi Liu, Bolin Zhang, Junwei Luo, Xianfeng Zhao, Yicong Zhou, Jiwu Huang:
Detection of Deepfake Videos Using Long-Distance Attention. IEEE Trans. Neural Networks Learn. Syst. 35(7): 9366-9379 (2024) - [c141]Wenmin Huang, Weiqi Luo, Jiwu Huang, Xiaochun Cao:
SDGAN: Disentangling Semantic Manipulation for Facial Attribute Editing. AAAI 2024: 2374-2381 - [c140]Changsheng Chen, Liangwei Lin, Yongqi Chen, Bin Li, Jishen Zeng, Jiwu Huang:
CMA: A Chromaticity Map Adapter for Robust Detection of Screen-Recapture Document Images. CVPR 2024: 15577-15586 - [c139]Rongxuan Peng, Xianbo Mo, Shunquan Tan, Bin Li, Jiwu Huang:
A Keyless Extraction Framework Targeting at Deep Learning Based Image-Within-Image Models. ICASSP 2024: 12846-12850 - [c138]Yang Su, Shunquan Tan, Jiwu Huang:
A Novel Universal Image Forensics Localization Model Based on Image Noise and Segment Anything Model. IH&MMSec 2024: 149-158 - [c137]Miaoxin Ye, Saixing Zhou, Weiqi Luo, Shunquan Tan, Jiwu Huang:
GAN-based Symmetric Embedding Costs Adjustment for Enhancing Image Steganographic Security. ACM Multimedia 2024: 7046-7054 - 2023
- [j181]Weixuan Tang, Bin Li, Weixiang Li, Yuangen Wang, Jiwu Huang:
Reinforcement learning of non-additive joint steganographic embedding costs with attention mechanism. Sci. China Inf. Sci. 66(3) (2023) - [j180]Bingyuan Huang, Sanshuai Cui, Jiwu Huang, Xiangui Kang:
Discriminative Frequency Information Learning for End-to-End Speech Anti-Spoofing. IEEE Signal Process. Lett. 30: 185-189 (2023) - [j179]Peijia Zheng, Ziyan Cheng, Xianhao Tian, Hongmei Liu, Weiqi Luo, Jiwu Huang:
Non-Interactive Privacy-Preserving Frequent Itemset Mining Over Encrypted Cloud Data. IEEE Trans. Cloud Comput. 11(4): 3452-3468 (2023) - [j178]Xiaolin Yin, Shaowu Wu, Ke Wang, Wei Lu, Yicong Zhou, Jiwu Huang:
Anti-Rounding Image Steganography With Separable Fine-Tuned Network. IEEE Trans. Circuits Syst. Video Technol. 33(11): 7066-7079 (2023) - [j177]Minglin Liu, Tingting Song, Weiqi Luo, Peijia Zheng, Jiwu Huang:
Adversarial Steganography Embedding via Stego Generation and Selection. IEEE Trans. Dependable Secur. Comput. 20(3): 2375-2389 (2023) - [j176]Shunquan Tan, Qiushi Li, Laiyuan Li, Bin Li, Jiwu Huang:
STD-NET: Search of Image Steganalytic Deep-Learning Architecture via Hierarchical Tensor Decomposition. IEEE Trans. Dependable Secur. Comput. 20(3): 2657-2673 (2023) - [j175]Jie Wang, Xuemei Yin, Yifang Chen, Jiwu Huang, Xiangui Kang:
An Adaptive IPM-Based HEVC Video Steganography via Minimizing Non-Additive Distortion. IEEE Trans. Dependable Secur. Comput. 20(4): 2896-2912 (2023) - [j174]Shen Wang, Zhaoyang Zhang, Guopu Zhu, Xinpeng Zhang, Yicong Zhou, Jiwu Huang:
Query-Efficient Adversarial Attack With Low Perturbation Against End-to-End Speech Recognition Systems. IEEE Trans. Inf. Forensics Secur. 18: 351-364 (2023) - [j173]Xianbo Mo, Shunquan Tan, Weixuan Tang, Bin Li, Jiwu Huang:
ReLOAD: Using Reinforcement Learning to Optimize Asymmetric Distortion for Additive Steganography. IEEE Trans. Inf. Forensics Secur. 18: 1524-1538 (2023) - [j172]Wenbo Fang, Junjiang He, Wenshan Li, Xiaolong Lan, Yang Chen, Tao Li, Jiwu Huang, Linlin Zhang:
Comprehensive Android Malware Detection Based on Federated Learning Architecture. IEEE Trans. Inf. Forensics Secur. 18: 3977-3990 (2023) - [j171]Qilin Yin, Wei Lu, Bin Li, Jiwu Huang:
Dynamic Difference Learning With Spatio-Temporal Correlation for Deepfake Video Detection. IEEE Trans. Inf. Forensics Secur. 18: 4046-4058 (2023) - [j170]Peiyu Zhuang, Haodong Li, Rui Yang, Jiwu Huang:
ReLoc: A Restoration-Assisted Framework for Robust Image Tampering Localization. IEEE Trans. Inf. Forensics Secur. 18: 5243-5257 (2023) - [c136]Wei Zhang, Weixuan Tang, Yuan Rao, Bin Li, Jiwu Huang:
Deep Multi-image Hiding with Random Key. AIS&P (1) 2023: 33-41 - [c135]Xianbo Mo, Shunquan Tan, Bin Li, Jiwu Huang:
Poster: Query-efficient Black-box Attack for Image Forgery Localization via Reinforcement Learning. CCS 2023: 3552-3554 - [c134]Jinkun Huang, Weiqi Luo, Wenmin Huang, Ziyi Xi, Kangkang Wei, Jiwu Huang:
Multi-Scale Enhanced Dual-Stream Network for Facial Attribute Editing Localization. IWDW 2023: 151-165 - [c133]Dongxia Huang, Weiqi Luo, Peijia Zheng, Jiwu Huang:
Automatic Asymmetric Embedding Cost Learning via Generative Adversarial Networks. ACM Multimedia 2023: 8316-8326 - [i34]Anwei Luo, Chenqi Kong, Jiwu Huang, Yongjian Hu, Xiangui Kang, Alex C. Kot:
Beyond the Prior Forgery Knowledge: Mining Critical Clues for General Face Forgery Detection. CoRR abs/2304.12489 (2023) - [i33]Anwei Luo, Rizhao Cai, Chenqi Kong, Xiangui Kang, Jiwu Huang, Alex C. Kot:
Forgery-aware Adaptive Vision Transformer for Face Forgery Detection. CoRR abs/2309.11092 (2023) - [i32]Long Zhuo, Shenghai Luo, Shunquan Tan, Han Chen, Bin Li, Jiwu Huang:
Evading Detection Actively: Toward Anti-Forensics against Forgery Localization. CoRR abs/2310.10036 (2023) - [i31]Pei Yan, Shunquan Tan, Miaohui Wang, Jiwu Huang:
Prompt Engineering-assisted Malware Dynamic Analysis Using GPT-4. CoRR abs/2312.08317 (2023) - 2022
- [j169]Long Zhuo, Shunquan Tan, Bin Li, Jiwu Huang:
ISP-GAN: inception sub-pixel deconvolution-based lightweight GANs for colorization. Multim. Tools Appl. 81(17): 24977-24994 (2022) - [j168]Wenkang Su, Jiangqun Ni, Xianglei Hu, Jiwu Huang:
New design paradigm of distortion cost function for efficient JPEG steganography. Signal Process. 190: 108319 (2022) - [j167]Pascal Lefèvre, Philippe Carré, Caroline Fontaine, Philippe Gaborit, Jiwu Huang:
Efficient image tampering localization using semi-fragile watermarking and error control codes. Signal Process. 190: 108342 (2022) - [j166]Hao Xie, Jiangqun Ni, Jian Zhang, Weizhe Zhang, Jiwu Huang:
Evading generated-image detectors: A deep dithering approach. Signal Process. 197: 108558 (2022) - [j165]Hao Xie, Jiangqun Ni, Jian Zhang, Weizhe Zhang, Jiwu Huang:
Corrigendum to 'Evading generated-image detectors: A deep dithering approach' [Signal Processing 197(2022) 108558]. Signal Process. 200: 108670 (2022) - [j164]Shunquan Tan, Baoying Chen, Jishen Zeng, Bin Li, Jiwu Huang:
Hybrid deep-learning framework for object-based forgery detection in video. Signal Process. Image Commun. 105: 116695 (2022) - [j163]Sanshuai Cui, Bingyuan Huang, Jiwu Huang, Xiangui Kang:
Synthetic Speech Detection Based on Local Autoregression and Variance Statistics. IEEE Signal Process. Lett. 29: 1462-1466 (2022) - [j162]Qiushi Li, Shengda Chen, Shunquan Tan, Bin Li, Jiwu Huang:
One-Class Double Compression Detection of Advanced Videos Based on Simple Gaussian Distribution Model. IEEE Trans. Circuits Syst. Video Technol. 32(4): 2496-2500 (2022) - [j161]Weixuan Tang, Bin Li, Mauro Barni, Jin Li, Jiwu Huang:
Improving Cost Learning for JPEG Steganography by Exploiting JPEG Domain Knowledge. IEEE Trans. Circuits Syst. Video Technol. 32(6): 4081-4095 (2022) - [j160]Ying Liu, Jiangqun Ni, Weizhe Zhang, Jiwu Huang:
A Novel Video Steganographic Scheme Incorporating the Consistency Degree of Motion Vectors. IEEE Trans. Circuits Syst. Video Technol. 32(7): 4905-4910 (2022) - [j159]Xinghong Qin, Bin Li, Shunquan Tan, Weixuan Tang, Jiwu Huang:
Gradually Enhanced Adversarial Perturbations on Color Pixel Vectors for Image Steganography. IEEE Trans. Circuits Syst. Video Technol. 32(8): 5110-5123 (2022) - [j158]Yuan Yuan, Gene Cheung, Pascal Frossard, H. Vicky Zhao, Jiwu Huang:
Landmarking for Navigational Streaming of Stored High-Dimensional Media. IEEE Trans. Circuits Syst. Video Technol. 32(8): 5663-5679 (2022) - [j157]Wei Lu, Junjia Chen, Junhong Zhang, Jiwu Huang, Jian Weng, Yicong Zhou:
Secure Halftone Image Steganography Based on Feature Space and Layer Embedding. IEEE Trans. Cybern. 52(6): 5001-5014 (2022) - [j156]Wei Lu, Qin Zhang, Shangjun Luo, Yicong Zhou, Jiwu Huang, Yun-Qing Shi:
Robust Estimation of Upscaling Factor on Double JPEG Compressed Images. IEEE Trans. Cybern. 52(10): 10814-10826 (2022) - [j155]Bing Chen, Wei Lu, Jiwu Huang, Jian Weng, Yicong Zhou:
Secret Sharing Based Reversible Data Hiding in Encrypted Images With Multiple Data-Hiders. IEEE Trans. Dependable Secur. Comput. 19(2): 978-991 (2022) - [j154]Long Zhuo, Shunquan Tan, Bin Li, Jiwu Huang:
Self-Adversarial Training Incorporating Forgery Attention for Image Forgery Localization. IEEE Trans. Inf. Forensics Secur. 17: 819-834 (2022) - [j153]Zhaoxu Hu, Changsheng Chen, Wai Ho Mow, Jiwu Huang:
Document Recapture Detection Based on a Unified Distortion Model of Halftone Cells. IEEE Trans. Inf. Forensics Secur. 17: 2800-2815 (2022) - [j152]Changsheng Chen, Shuzheng Zhang, Fengbo Lan, Jiwu Huang:
Domain-Agnostic Document Authentication Against Practical Recapturing Attacks. IEEE Trans. Inf. Forensics Secur. 17: 2890-2905 (2022) - [j151]Kangkang Wei, Weiqi Luo, Shunquan Tan, Jiwu Huang:
Universal Deep Network for Steganalysis of Color Image Based on Channel Representation. IEEE Trans. Inf. Forensics Secur. 17: 3022-3036 (2022) - [c132]Shujin Wei, Haodong Li, Jiwu Huang:
Deep Video Inpainting Localization Using Spatial and Temporal Traces. ICASSP 2022: 8957-8961 - [c131]Peijia Zheng, Zhiwei Cai, Huicong Zeng, Jiwu Huang:
Keyword Spotting in the Homomorphic Encrypted Domain Using Deep Complex-Valued CNN. ACM Multimedia 2022: 1474-1483 - [d2]Anselmo Ferreira, Siovani Cintra Felipussi, Ramon Pires, Geise Santos, Sandra Avila, Jorge Albuquerque Lambert, Jiwu Huang, Anderson Rocha:
Eyes in the Skies: A Data-driven Fusion Approach to Identifying Drug Crops from Remote Sensing Images Dataset. IEEE DataPort, 2022 - [i30]Shunquan Tan, Qiushi Li, Laiyuan Li, Bin Li, Jiwu Huang:
STD-NET: Search of Image Steganalytic Deep-learning Architecture via Hierarchical Tensor Decomposition. CoRR abs/2206.05651 (2022) - [i29]Changsheng Chen, Lin Zhao, Rizhao Cai, Zitong Yu, Jiwu Huang, Alex C. Kot:
Forensicability Assessment of Questioned Images in Recapturing Detection. CoRR abs/2209.01935 (2022) - [i28]Peiyu Zhuang, Haodong Li, Rui Yang, Jiwu Huang:
ReLoc: A Restoration-Assisted Framework for Robust Image Tampering Localization. CoRR abs/2211.03930 (2022) - [i27]Qingliang Liu, Jiangqun Ni, Weizhe Zhang, Xiangyang Luo, Jiwu Huang:
A Robust Image Steganographic Scheme against General Scaling Attacks. CoRR abs/2212.02822 (2022) - 2021
- [j150]Zhaopeng Xu, Jiarui Liu, Wei Lu, Bozhi Xu, Xianfeng Zhao, Bin Li, Jiwu Huang:
Detecting facial manipulated videos based on set convolutional neural networks. J. Vis. Commun. Image Represent. 77: 103119 (2021) - [j149]Israr Hussain, Shunquan Tan, Bin Li, Xinghong Qin, Dostdar Hussain, Jiwu Huang:
A novel deep learning framework for double JPEG compression detection of small size blocks. J. Vis. Commun. Image Represent. 80: 103269 (2021) - [j148]Yuan-Gen Wang, Guopu Zhu, Jin Li, Mauro Conti, Jiwu Huang:
Defeating Lattice-Based Data Hiding Code Via Decoding Security Hole. IEEE Trans. Circuits Syst. Video Technol. 31(1): 76-87 (2021) - [j147]Xiaolin Yin, Wei Lu, Wanteng Liu, Jing-Ming Guo, Jiwu Huang, Yun-Qing Shi:
Reversible Data Hiding in Halftone Images Based on Dynamic Embedding States Group. IEEE Trans. Circuits Syst. Video Technol. 31(7): 2631-2645 (2021) - [j146]Wei Lu, Junhong Zhang, Xianfeng Zhao, Weiming Zhang, Jiwu Huang:
Secure Robust JPEG Steganography Based on AutoEncoder With Adaptive BCH Encoding. IEEE Trans. Circuits Syst. Video Technol. 31(7): 2909-2922 (2021) - [j145]Wei Lu, Yingjie Xue, Yuileong Yeung, Hongmei Liu, Jiwu Huang, Yun Q. Shi:
Secure Halftone Image Steganography Based on Pixel Density Transition. IEEE Trans. Dependable Secur. Comput. 18(3): 1137-1149 (2021) - [j144]Shunquan Tan, Weilong Wu, Zilong Shao, Qiushi Li, Bin Li, Jiwu Huang:
CALPA-NET: Channel-Pruning-Assisted Deep Residual Network for Steganalysis of Digital Images. IEEE Trans. Inf. Forensics Secur. 16: 131-146 (2021) - [j143]Weixuan Tang, Bin Li, Mauro Barni, Jin Li, Jiwu Huang:
An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning. IEEE Trans. Inf. Forensics Secur. 16: 952-967 (2021) - [j142]Peiyu Zhuang, Haodong Li, Shunquan Tan, Bin Li, Jiwu Huang:
Image Tampering Localization Using a Dense Fully Convolutional Network. IEEE Trans. Inf. Forensics Secur. 16: 2986-2999 (2021) - [j141]Xianbo Mo, Shunquan Tan, Bin Li, Jiwu Huang:
MCTSteg: A Monte Carlo Tree Search-Based Reinforcement Learning Framework for Universal Non-Additive Steganography. IEEE Trans. Inf. Forensics Secur. 16: 4306-4320 (2021) - [j140]Xianglei Hu, Jiangqun Ni, Weizhe Zhang, Jiwu Huang:
Efficient JPEG Batch Steganography Using Intrinsic Energy of Image Contents. IEEE Trans. Inf. Forensics Secur. 16: 4544-4558 (2021) - [j139]Minglin Liu, Weiqi Luo, Peijia Zheng, Jiwu Huang:
A New Adversarial Embedding Method for Enhancing Image Steganography. IEEE Trans. Inf. Forensics Secur. 16: 4621-4634 (2021) - [j138]Xianhao Tian, Peijia Zheng, Jiwu Huang:
Robust Privacy-Preserving Motion Detection and Object Tracking in Encrypted Streaming Video. IEEE Trans. Inf. Forensics Secur. 16: 5381-5396 (2021) - [j137]Lin Zhao, Changsheng Chen, Jiwu Huang:
Deep Learning-Based Forgery Attack on Document Images. IEEE Trans. Image Process. 30: 7964-7979 (2021) - [c130]Xinghong Qin, Shunquan Tan, Weixuan Tang, Bin Li, Jiwu Huang:
Image Steganography Based on Iterative Adversarial Perturbations Onto a Synchronized-Directions Sub-Image. ICASSP 2021: 2705-2709 - [i26]Xinghong Qin, Shunquan Tan, Bin Li, Weixuan Tang, Jiwu Huang:
Image Steganography based on Iteratively Adversarial Samples of A Synchronized-directions Sub-image. CoRR abs/2101.05209 (2021) - [i25]Lin Zhao, Changsheng Chen, Jiwu Huang:
Deep Learning-based Forgery Attack on Document Images. CoRR abs/2102.00653 (2021) - [i24]Xianbo Mo, Shunquan Tan, Bin Li, Jiwu Huang:
MCTSteg: A Monte Carlo Tree Search-based Reinforcement Learning Framework for Universal Non-additive Steganography. CoRR abs/2103.13689 (2021) - [i23]Yuan Yuan, Gene Cheung, Pascal Frossard, H. Vicky Zhao, Jiwu Huang:
Landmarking for Navigational Streaming of Stored High-Dimensional Media. CoRR abs/2104.06876 (2021) - [i22]Weixuan Tang, Bin Li, Mauro Barni, Jin Li, Jiwu Huang:
Improving Cost Learning for JPEG Steganography by Exploiting JPEG Domain Knowledge. CoRR abs/2105.03867 (2021) - [i21]Yushu Zhang, Xiangli Xiao, Leo Yu Zhang, Zhe Liu, Jiwu Huang:
CREAMS: Copyrighted Cloud Media Sharing. CoRR abs/2105.08899 (2021) - [i20]Wei Lu, Lingyi Liu, Junwei Luo, Xianfeng Zhao, Yicong Zhou, Jiwu Huang:
Detection of Deepfake Videos Using Long Distance Attention. CoRR abs/2106.12832 (2021) - [i19]Long Zhuo, Shunquan Tan, Bin Li, Jiwu Huang:
Self-Adversarial Training incorporating Forgery Attention for Image Forgery Localization. CoRR abs/2107.02434 (2021) - [i18]Xianhao Tian, Peijia Zheng, Jiwu Huang:
Robust Privacy-Preserving Motion Detection and Object Tracking in Encrypted Streaming Video. CoRR abs/2108.13141 (2021) - [i17]Kangkang Wei, Weiqi Luo, Shunquan Tan, Jiwu Huang:
Universal Deep Network for Steganalysis of Color Image based on Channel Representation. CoRR abs/2111.12231 (2021) - 2020
- [j136]Irene Amerini, Chang-Tsun Li, Nasir D. Memon, Jiwu Huang:
IEEE Access Special Section: Digital Forensics Through Multimedia Source Inference. IEEE Access 8: 209657-209659 (2020) - [j135]Bolin Chen, Haodong Li, Weiqi Luo, Jiwu Huang:
Image processing operations identification via convolutional neural network. Sci. China Inf. Sci. 63(3) (2020) - [j134]Bolin Chen, Weiqi Luo, Peijia Zheng, Jiwu Huang:
Universal stego post-processing for enhancing image steganography. J. Inf. Secur. Appl. 55: 102664 (2020) - [j133]Edward J. Delp, Jiwu Huang, Nasir D. Memon, Anderson Rocha, Matt Turek, Luisa Verdoliva:
Editorial: Media Authentication and Forensics - New Solutions and Research Opportunities. IEEE J. Sel. Top. Signal Process. 14(5): 906-909 (2020) - [j132]Haodong Li, Bin Li, Shunquan Tan, Jiwu Huang:
Identification of deep network generated images using disparities in color components. Signal Process. 174: 107616 (2020) - [j131]Junhui He, Yuzhang Xu, Weiqi Luo, Shaohua Tang, Jiwu Huang:
A novel selective encryption scheme for H.264/AVC video with improved visual security. Signal Process. Image Commun. 89: 115994 (2020) - [j130]Xianjin Liu, Wei Lu, Qin Zhang, Jiwu Huang, Yun-Qing Shi:
Downscaling Factor Estimation on Pre-JPEG Compressed Images. IEEE Trans. Circuits Syst. Video Technol. 30(3): 618-631 (2020) - [j129]Yuileong Yeung, Wei Lu, Yingjie Xue, Jiwu Huang, Yun Qing Shi:
Secure Binary Image Steganography With Distortion Measurement Based on Prediction. IEEE Trans. Circuits Syst. Video Technol. 30(5): 1423-1434 (2020) - [j128]Wei Lu, Ruipeng Li, Lingwen Zeng, Junjia Chen, Jiwu Huang, Yun-Qing Shi:
Binary Image Steganalysis Based on Histogram of Structuring Elements. IEEE Trans. Circuits Syst. Video Technol. 30(9): 3081-3094 (2020) - [j127]Jianting Guo, Peijia Zheng, Jiwu Huang:
Efficient Privacy-Preserving Anomaly Detection and Localization in Bitstream Video. IEEE Trans. Circuits Syst. Video Technol. 30(9): 3268-3281 (2020) - [j126]Jianhua Yang, Danyang Ruan, Jiwu Huang, Xiangui Kang, Yun-Qing Shi:
An Embedding Cost Learning Framework Using GAN. IEEE Trans. Inf. Forensics Secur. 15: 839-851 (2020) - [j125]Changsheng Chen, Mulin Li, Anselmo Ferreira, Jiwu Huang, Rizhao Cai:
A Copy-Proof Scheme Based on the Spectral and Spatial Barcoding Channel Models. IEEE Trans. Inf. Forensics Secur. 15: 1056-1071 (2020) - [j124]Yuankun Huang, Bin Li, Mauro Barni, Jiwu Huang:
Identification of VoIP Speech With Multiple Domain Deep Features. IEEE Trans. Inf. Forensics Secur. 15: 2253-2267 (2020) - [j123]Wenyun Sun, Yu Song, Changsheng Chen, Jiwu Huang, Alex C. Kot:
Face Spoofing Detection Based on Local Ternary Label Supervision in Fully Convolutional Networks. IEEE Trans. Inf. Forensics Secur. 15: 3181-3196 (2020)
2010 – 2019
- 2019
- [j122]Anselmo Ferreira, Siovani Cintra Felipussi, Ramon Pires, Sandra Avila, Geise Santos, Jorge Albuquerque Lambert, Jiwu Huang, Anderson Rocha:
Eyes in the Skies: A Data-Driven Fusion Approach to Identifying Drug Crops From Remote Sensing Images. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 12(12): 4773-4786 (2019) - [j121]Junhui He, Junxi Chen, Weiqi Luo, Shaohua Tang, Jiwu Huang:
A Novel High-Capacity Reversible Data Hiding Scheme for Encrypted JPEG Bitstreams. IEEE Trans. Circuits Syst. Video Technol. 29(12): 3501-3515 (2019) - [j120]Zhenghui Liu, Yuankun Huang, Jiwu Huang:
Patchwork-Based Audio Watermarking Robust Against De-Synchronization and Recapturing Attacks. IEEE Trans. Inf. Forensics Secur. 14(5): 1171-1180 (2019) - [j119]Weixuan Tang, Bin Li, Shunquan Tan, Mauro Barni, Jiwu Huang:
CNN-Based Adversarial Embedding for Image Steganography. IEEE Trans. Inf. Forensics Secur. 14(8): 2074-2087 (2019) - [j118]Qi Yan, Rui Yang, Jiwu Huang:
Robust Copy-Move Detection of Speech Recording Using Similarities of Pitch and Formant. IEEE Trans. Inf. Forensics Secur. 14(9): 2331-2341 (2019) - [j117]Qi Yan, Rui Yang, Jiwu Huang:
Detection of Speech Smoothing on Very Short Clips. IEEE Trans. Inf. Forensics Secur. 14(9): 2441-2453 (2019) - [j116]Jishen Zeng, Shunquan Tan, Guangqing Liu, Bin Li, Jiwu Huang:
WISERNet: Wider Separate-Then-Reunion Network for Steganalysis of Color Images. IEEE Trans. Inf. Forensics Secur. 14(10): 2735-2748 (2019) - [c129]Xinghong Qin, Bin Li, Jiwu Huang:
A New Spatial Steganographic Scheme by Modeling Image Residuals with Multivariate Gaussian Model. ICASSP 2019: 2617-2621 - [c128]Haodong Li, Jiwu Huang:
Localization of Deep Inpainting Using High-Pass Fully Convolutional Network. ICCV 2019: 8300-8309 - [c127]Huaxiao Mo, Tingting Song, Bolin Chen, Weiqi Luo, Jiwu Huang:
Enhancing JPEG Steganography using Iterative Adversarial Examples. WIFS 2019: 1-6 - [d1]Haiqiang Wang, Ioannis Katsavounidis, Xin Zhou, Jiwu Huang, Man-On Pun, Xin Jin, Ronggang Wang, Xu Wang, Yun Zhang, Jeong-Hoon Park, Jiantong Zhou, Shawmin Lei, Sam Kwong, C.-C. Jay Kuo:
VideoSet. IEEE DataPort, 2019 - [i16]Huaxiao Mo, Tingting Song, Bolin Chen, Weiqi Luo, Jiwu Huang:
Enhancing JPEG Steganography using Iterative Adversarial Examples. CoRR abs/1909.07556 (2019) - [i15]Shunquan Tan, Weilong Wu, Zilong Shao, Qiushi Li, Bin Li, Jiwu Huang:
CALPA-NET: Channel-pruning-assisted Deep Residual Network for Steganalysis of Digital Images. CoRR abs/1911.04657 (2019) - [i14]Bolin Chen, Weiqi Luo, Jiwu Huang:
Universal Stego Post-processing for Enhancing Image Steganography. CoRR abs/1912.03878 (2019) - 2018
- [j115]Zehong Chen, Fangguo Zhang, Peng Zhang, Joseph K. Liu, Jiwu Huang, Hanbang Zhao, Jian Shen:
Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control. Future Gener. Comput. Syst. 87: 712-724 (2018) - [j114]Ligang Zheng, Guoping Qiu, Jiwu Huang:
Riemannian competitive learning for symmetric positive definite matrices clustering. Neurocomputing 295: 153-164 (2018) - [j113]Anderson Rocha, Shujun Li, C.-C. Jay Kuo, Alessandro Piva, Jiwu Huang:
Data-driven multimedia forensics and security. J. Vis. Commun. Image Represent. 55: 447-448 (2018) - [j112]Jianquan Yang, Honglei Ren, Guopu Zhu, Jiwu Huang, Yun-Qing Shi:
Detecting median filtering via two-dimensional AR models of multiple filtered residuals. Multim. Tools Appl. 77(7): 7931-7953 (2018) - [j111]Hao-Tian Wu, Shaohua Tang, Jiwu Huang, Yun-Qing Shi:
A novel reversible data hiding method with image contrast enhancement. Signal Process. Image Commun. 62: 64-73 (2018) - [j110]Haodong Li, Weiqi Luo, Xiaoqing Qiu, Jiwu Huang:
Identification of Various Image Operations Using Residual-Based Features. IEEE Trans. Circuits Syst. Video Technol. 28(1): 31-45 (2018) - [j109]Jishen Zeng, Shunquan Tan, Bin Li, Jiwu Huang:
Large-Scale JPEG Image Steganalysis Using Hybrid Deep-Learning Framework. IEEE Trans. Inf. Forensics Secur. 13(5): 1200-1214 (2018) - [j108]Da Luo, Pawel Korus, Jiwu Huang:
Band Energy Difference for Source Attribution in Audio Forensics. IEEE Trans. Inf. Forensics Secur. 13(9): 2179-2189 (2018) - [j107]Peijia Zheng, Jiwu Huang:
Efficient Encrypted Images Filtering and Transform Coding With Walsh-Hadamard Transform and Parallelization. IEEE Trans. Image Process. 27(5): 2541-2556 (2018) - [j106]Junhui He, Shuhao Huang, Shaohua Tang, Jiwu Huang:
JPEG Image Encryption With Improved Format Compatibility and File Size Preservation. IEEE Trans. Multim. 20(10): 2645-2658 (2018) - [j105]Weiqi Luo, Haodong Li, Qi Yan, Rui Yang, Jiwu Huang:
Improved Audio Steganalytic Feature and Its Applications in Audio Forensics. ACM Trans. Multim. Comput. Commun. Appl. 14(2): 43:1-43:14 (2018) - [c126]Yao Sun, Hong Jia, Jiwu Huang:
Ensemble Clustering with Novel Weighting Strategy. CIS 2018: 155-159 - [c125]Delin Chen, Wenhao Chen, Jian Chen, Peijia Zheng, Jiwu Huang:
Edge Detection and Image Segmentation on Encrypted Image with Homomorphic Encryption and Garbled Circuit. ICME 2018: 1-6 - [c124]Yuankun Huang, Shunquan Tan, Bin Li, Jiwu Huang:
VPCID - A VoIP Phone Call Identification Database. IWDW 2018: 307-321 - [c123]Jian Chen, Ziyang Chen, Peijia Zheng, Jianting Guo, Wei Zhang, Jiwu Huang:
Encrypted Domain Mel-Frequency Cepstral Coefficient and Fragile Audio Watermarking. TrustCom/BigDataSE 2018: 68-73 - [c122]Jian Chen, Peijia Zheng, Jianting Guo, Wei Zhang, Jiwu Huang:
A Privacy-Preserving Multipurpose Watermarking Scheme for Audio Authentication and Protection. TrustCom/BigDataSE 2018: 86-91 - [c121]Yangxin Wu, Peijia Zheng, Jianting Guo, Wei Zhang, Jiwu Huang:
A Controllable Efficient Content Distribution Framework Based on Blockchain and ISODATA. TrustCom/BigDataSE 2018: 1698-1701 - [c120]Anselmo Ferreira, Han Chen, Bin Li, Jiwu Huang:
An Inception-Based Data-Driven Ensemble Approach to Camera Model Identification. WIFS 2018: 1-7 - [e1]Jiafu Wan, Kai Lin, Delu Zeng, Jin Li, Yang Xiang, Xiaofeng Liao, Jiwu Huang, Zheli Liu:
Cloud Computing, Security, Privacy in New Computing Environments - 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25-26, and December 15-16, 2016, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 197, Springer 2018, ISBN 978-3-319-69604-1 [contents] - [i13]Jishen Zeng, Shunquan Tan, Guangqing Liu, Bin Li, Jiwu Huang:
WISERNet: Wider Separate-then-reunion Network for Steganalysis of Color Images. CoRR abs/1803.04805 (2018) - [i12]Weixuan Tang, Bin Li, Shunquan Tan, Mauro Barni, Jiwu Huang:
CNN Based Adversarial Embedding with Minimum Alteration for Image Steganography. CoRR abs/1803.09043 (2018) - [i11]Haodong Li, Bin Li, Shunquan Tan, Jiwu Huang:
Detection of Deep Network Generated Images Using Disparities in Color Components. CoRR abs/1808.07276 (2018) - 2017
- [j104]Zehong Chen, Peng Zhang, Fangguo Zhang, Jiwu Huang:
Ciphertext policy attribute-based encryption supporting unbounded attribute space from R-LWE. KSII Trans. Internet Inf. Syst. 11(4): 2292-2309 (2017) - [j103]Haiqiang Wang, Ioannis Katsavounidis, Jiantong Zhou, Jeong-Hoon Park, Shawmin Lei, Xin Zhou, Man-On Pun, Xin Jin, Ronggang Wang, Xu Wang, Yun Zhang, Jiwu Huang, Sam Kwong, C.-C. Jay Kuo:
VideoSet: A large-scale compressed video quality dataset based on JND measurement. J. Vis. Commun. Image Represent. 46: 292-302 (2017) - [j102]Zhenghui Liu, Jiwu Huang, Xingming Sun, Chuanda Qi:
A security watermark scheme used for digital speech forensics. Multim. Tools Appl. 76(7): 9297-9317 (2017) - [j101]Zhenghui Liu, Da Luo, Jiwu Huang, J. Wang, Chuanda Qi:
Tamper recovery algorithm for digital speech signal based on DWT and DCT. Multim. Tools Appl. 76(10): 12481-12504 (2017) - [j100]Weixuan Tang, Shunquan Tan, Bin Li, Jiwu Huang:
Automatic Steganographic Distortion Learning Using a Generative Adversarial Network. IEEE Signal Process. Lett. 24(10): 1547-1551 (2017) - [j99]Da Luo, Rui Yang, Bin Li, Jiwu Huang:
Detection of Double Compressed AMR Audio Using Stacked Autoencoder. IEEE Trans. Inf. Forensics Secur. 12(2): 432-444 (2017) - [j98]Pawel Korus, Jiwu Huang:
Multi-Scale Analysis Strategies in PRNU-Based Tampering Localization. IEEE Trans. Inf. Forensics Secur. 12(4): 809-824 (2017) - [j97]Haodong Li, Weiqi Luo, Xiaoqing Qiu, Jiwu Huang:
Image Forgery Localization via Integrating Tampering Possibility Maps. IEEE Trans. Inf. Forensics Secur. 12(5): 1240-1252 (2017) - [j96]Shunquan Tan, Haojie Zhang, Bin Li, Jiwu Huang:
Pixel-Decimation-Assisted Steganalysis of Synchronize-Embedding-Changes Steganography. IEEE Trans. Inf. Forensics Secur. 12(7): 1658-1670 (2017) - [j95]Anselmo Ferreira, Luca Bondi, Luca Baroffio, Paolo Bestagini, Jiwu Huang, Jefersson A. dos Santos, Stefano Tubaro, Anderson Rocha:
Data-Driven Feature Characterization Techniques for Laser Printer Attribution. IEEE Trans. Inf. Forensics Secur. 12(8): 1860-1873 (2017) - [j94]Haodong Li, Weiqi Luo, Jiwu Huang:
Localization of Diffusion-Based Inpainting in Digital Images. IEEE Trans. Inf. Forensics Secur. 12(12): 3050-3064 (2017) - [j93]Jianting Guo, Peijia Zheng, Jiwu Huang:
An Efficient Motion Detection and Tracking Scheme for Encrypted Surveillance Videos. ACM Trans. Multim. Comput. Commun. Appl. 13(4): 61:1-61:23 (2017) - [c119]Shan Bian, Weiqi Luo, Jiwu Huang:
Exposing Video Forgeries by Detecting Misaligned Double Compression. ICVIP 2017: 44-48 - [c118]Jishen Zeng, Shunquan Tan, Bin Li, Jiwu Huang:
Pre-training via fitting deep neural network to rich-model features extraction procedure and its effect on deep learning for steganalysis. Media Watermarking, Security, and Forensics 2017: 44-49 - [i10]Haiqiang Wang, Ioannis Katsavounidis, Jiantong Zhou, Jeong-Hoon Park, Shawmin Lei, Xin Zhou, Man-On Pun, Xin Jin, Ronggang Wang, Xu Wang, Yun Zhang, Jiwu Huang, Sam Kwong, C.-C. Jay Kuo:
VideoSet: A Large-Scale Compressed Video Quality Dataset Based on JND Measurement. CoRR abs/1701.01500 (2017) - [i9]Haodong Li, Weiqi Luo, Quanquan Rao, Jiwu Huang:
Anti-Forensics of Camera Identification and the Triangle Test by Improved Fingerprint-Copy Attack. CoRR abs/1707.07795 (2017) - 2016
- [j92]Yong Xiang, Jiwu Huang, Fernando Pérez-González, Guang Hua, Hafiz Malik:
IEEE Access Special Section Editorial: Latest Advances and Emerging Applications of Data Hiding. IEEE Access 4: 9740-9742 (2016) - [j91]Hao-Tian Wu, Yiu-ming Cheung, Jiwu Huang:
Reversible data hiding in Paillier cryptosystem. J. Vis. Commun. Image Represent. 40: 765-771 (2016) - [j90]Zhiwei Sun, Jiwu Huang, Ping Wang:
Efficient multiparty quantum key agreement protocol based on commutative encryption. Quantum Inf. Process. 15(5): 2101-2111 (2016) - [j89]Zhenghui Liu, Fan Zhang, Jing Wang, Hongxia Wang, Jiwu Huang:
Authentication and recovery algorithm for speech signal based on digital watermarking. Signal Process. 123: 157-166 (2016) - [j88]Guang Hua, Jiwu Huang, Yun Q. Shi, Jonathan Goh, Vrizlynn L. L. Thing:
Twenty years of digital audio watermarking - a comprehensive review. Signal Process. 128: 222-242 (2016) - [j87]Bingwen Feng, Wei Lu, Wei Sun, Jiwu Huang, Yun-Qing Shi:
Robust image watermarking based on Tucker decomposition and Adaptive-Lattice Quantization Index Modulation. Signal Process. Image Commun. 41: 1-14 (2016) - [j86]Pawel Korus, Jiwu Huang:
Improved Tampering Localization in Digital Image Forensics Based on Maximal Entropy Random Walk. IEEE Signal Process. Lett. 23(1): 169-173 (2016) - [j85]Weixuan Tang, Bin Li, Weiqi Luo, Jiwu Huang:
Clustering Steganographic Modification Directions for Color Components. IEEE Signal Process. Lett. 23(2): 197-201 (2016) - [j84]Da Luo, Mengmeng Sun, Jiwu Huang:
Audio Postprocessing Detection Based on Amplitude Cooccurrence Vector Feature. IEEE Signal Process. Lett. 23(5): 688-692 (2016) - [j83]Fangjun Huang, Xiaochao Qu, Hyoung Joong Kim, Jiwu Huang:
Reversible Data Hiding in JPEG Images. IEEE Trans. Circuits Syst. Video Technol. 26(9): 1610-1621 (2016) - [j82]Shengda Chen, Shunquan Tan, Bin Li, Jiwu Huang:
Automatic Detection of Object-Based Forgery in Advanced Video. IEEE Trans. Circuits Syst. Video Technol. 26(11): 2138-2151 (2016) - [j81]Weixuan Tang, Haodong Li, Weiqi Luo, Jiwu Huang:
Adaptive Steganalysis Based on Embedding Probabilities of Pixels. IEEE Trans. Inf. Forensics Secur. 11(4): 734-745 (2016) - [j80]Fangjun Huang, Jiwu Huang, Yun-Qing Shi:
New Framework for Reversible Data Hiding in Encrypted Domain. IEEE Trans. Inf. Forensics Secur. 11(12): 2777-2789 (2016) - [j79]Pawel Korus, Jiwu Huang:
Multi-Scale Fusion for Improved Localization of Malicious Tampering in Digital Images. IEEE Trans. Image Process. 25(3): 1312-1326 (2016) - [j78]Haojun Wu, Yong Wang, Jiwu Huang:
Identification of Reconstructed Speech. ACM Trans. Multim. Comput. Commun. Appl. 13(1): 10:1-10:20 (2016) - [c117]Ligang Zheng, Guoping Qiu, Jiwu Huang:
Clustering Symmetric Positive Definite Matrices on the Riemannian Manifolds. ACCV (1) 2016: 400-415 - [c116]Pawel Korus, Jiwu Huang:
Evaluation of random field models in multi-modal unsupervised tampering localization. WIFS 2016: 1-6 - [i8]Jishen Zeng, Shunquan Tan, Bin Li, Jiwu Huang:
Large-scale JPEG steganalysis using hybrid deep-learning framework. CoRR abs/1611.03233 (2016) - 2015
- [j77]Fangjun Huang, Xiaochao Qu, Hyoung Joong Kim, Jiwu Huang:
Local pixel patterns. Comput. Vis. Media 1(2): 157-170 (2015) - [j76]Da Luo, Rui Yang, Jiwu Huang:
Identification of AMR decompressed audio. Digit. Signal Process. 37: 85-91 (2015) - [j75]Jianquan Yang, Guopu Zhu, Jiwu Huang, Xi Zhao:
Estimating JPEG compression history of bitmaps based on factor histogram. Digit. Signal Process. 41: 90-97 (2015) - [j74]Yong Wang, Haojun Wu, Jiwu Huang:
Verification of hidden speaker behind transformation disguised voices. Digit. Signal Process. 45: 84-95 (2015) - [j73]Jianting Guo, Peijia Zheng, Jiwu Huang:
Secure watermarking scheme against watermark attacks in the encrypted domain. J. Vis. Commun. Image Represent. 30: 125-135 (2015) - [j72]Hao-Tian Wu, Jiwu Huang, Yun-Qing Shi:
A reversible data hiding method with contrast enhancement for medical images. J. Vis. Commun. Image Represent. 31: 146-153 (2015) - [j71]Haodong Li, Weiqi Luo, Jiwu Huang:
Anti-forensics of double JPEG compression with the same quantization matrix. Multim. Tools Appl. 74(17): 6729-6744 (2015) - [j70]Bin Li, Tian-Tsong Ng, Xiaolong Li, Shunquan Tan, Jiwu Huang:
Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis. IEEE Trans. Inf. Forensics Secur. 10(3): 558-573 (2015) - [j69]Bin Li, Ming Wang, Xiaolong Li, Shunquan Tan, Jiwu Huang:
A Strategy of Clustering Modification Directions in Spatial Image Steganography. IEEE Trans. Inf. Forensics Secur. 10(9): 1905-1917 (2015) - [j68]Bin Li, Tian-Tsong Ng, Xiaolong Li, Shunquan Tan, Jiwu Huang:
Statistical Model of JPEG Noises and Its Application in Quantization Step Estimation. IEEE Trans. Image Process. 24(5): 1471-1484 (2015) - [c115]Da Luo, Haojun Wu, Jiwu Huang:
Audio recapture detection using deep learning. ChinaSIP 2015: 478-482 - [c114]Qi Yan, Rui Yang, Jiwu Huang:
Copy-move detection of audio recording with pitch similarity. ICASSP 2015: 1782-1786 - [c113]Yanping Tan, Fangjun Huang, Jiwu Huang:
Feature Selection for High Dimensional Steganalysis. IWDW 2015: 134-144 - [i7]Haodong Li, Weiqi Luo, Xiaoqing Qiu, Jiwu Huang:
Identification of Image Operations Based on Steganalytic Features. CoRR abs/1503.04718 (2015) - 2014
- [j67]Bin Liu, Ralph R. Martin, Ji-Wu Huang, Shi-Min Hu:
Structure Aware Visual Cryptography. Comput. Graph. Forum 33(7): 141-150 (2014) - [j66]Zhenhua Qu, Weiqi Luo, Jiwu Huang:
A framework for identifying shifted double JPEG compression artifacts with application to non-intrusive digital image forensics. Sci. China Inf. Sci. 57(2): 1-18 (2014) - [j65]Yuan-Gen Wang, Guopu Zhu, Jiwu Huang:
An improved sample projection approach for image watermarking. Digit. Signal Process. 24: 135-143 (2014) - [j64]Shan Bian, Weiqi Luo, Jiwu Huang:
Detecting video frame-rate up-conversion based on periodic properties of inter-frame similarity. Multim. Tools Appl. 72(1): 437-451 (2014) - [j63]Yanqiang Lei, Ligang Zheng, Jiwu Huang:
Geometric invariant features in the Radon transform domain for near-duplicate image detection. Pattern Recognit. 47(11): 3630-3640 (2014) - [j62]Shan Bian, Weiqi Luo, Jiwu Huang:
Exposing Fake Bit Rate Videos and Estimating Original Bit Rates. IEEE Trans. Circuits Syst. Video Technol. 24(12): 2144-2154 (2014) - [j61]Haojun Wu, Yong Wang, Jiwu Huang:
Identification of Electronic Disguised Voices. IEEE Trans. Inf. Forensics Secur. 9(3): 489-500 (2014) - [j60]Bin Li, Shunquan Tan, Ming Wang, Jiwu Huang:
Investigation on Cost Assignment in Spatial Image Steganography. IEEE Trans. Inf. Forensics Secur. 9(8): 1264-1277 (2014) - [j59]Da Luo, Weiqi Luo, Rui Yang, Jiwu Huang:
Identifying Compression History of Wave Audio and Its Applications. ACM Trans. Multim. Comput. Commun. Appl. 10(3): 30:1-30:19 (2014) - [j58]Yanqiang Lei, Guoping Qiu, Ligang Zheng, Jiwu Huang:
Fast Near-Duplicate Image Detection Using Uniform Randomized Trees. ACM Trans. Multim. Comput. Commun. Appl. 10(4): 35:1-35:15 (2014) - [c112]Zhensheng Huang, Fangjun Huang, Jiwu Huang:
Detection of double compression with the same bit rate in MPEG-2 videos. ChinaSIP 2014: 306-309 - [c111]Da Luo, Rui Yang, Jiwu Huang:
Detecting double compressed AMR audio using deep learning. ICASSP 2014: 2669-2673 - [c110]Ligang Zheng, Guoping Qiu, Jiwu Huang, Jiang Duan:
Fast and accurate Nearest Neighbor search in the manifolds of symmetric positive definite matrices. ICASSP 2014: 3804-3808 - [c109]Bin Li, Ming Wang, Jiwu Huang, Xiaolong Li:
A new cost function for spatial image steganography. ICIP 2014: 4206-4210 - [c108]Hao-Tian Wu, Yuan Liu, Jiwu Huang, Xin-Yu Yang:
Improved steganalysis algorithm against motion vector based video steganography. ICIP 2014: 5512-5516 - [c107]Chao Chen, Haodong Li, Weiqi Luo, Rui Yang, Jiwu Huang:
Anti-forensics of JPEG Detectors via Adaptive Quantization Table Replacement. ICPR 2014: 672-677 - [c106]Weixuan Tang, Haodong Li, Weiqi Luo, Jiwu Huang:
Adaptive steganalysis against WOW embedding algorithm. IH&MMSec 2014: 91-96 - [c105]Xiaoqing Qiu, Haodong Li, Weiqi Luo, Jiwu Huang:
A universal image forensic strategy based on steganalytic model. IH&MMSec 2014: 165-170 - [i6]Bin Li, Tian-Tsong Ng, Xiaolong Li, Shunquan Tan, Jiwu Huang:
JPEG Noises beyond the First Compression Cycle. CoRR abs/1405.7571 (2014) - 2013
- [j57]Likai Chen, Wei Lu, Jiangqun Ni, Wei Sun, Jiwu Huang:
Region duplication detection based on Harris corner points and step sector statistics. J. Vis. Commun. Image Represent. 24(3): 244-254 (2013) - [j56]Peijia Zheng, Jiwu Huang:
Discrete Wavelet Transform and Data Expansion Reduction in Homomorphic Encrypted Domain. IEEE Trans. Image Process. 22(6): 2455-2468 (2013) - [j55]Chenglong Chen, Jiangqun Ni, Jiwu Huang:
Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach. IEEE Trans. Image Process. 22(12): 4699-4710 (2013) - [c104]Haojun Wu, Yong Wang, Jiwu Huang:
Blind detection of electronic disguised voice. ICASSP 2013: 3013-3017 - [c103]Zhenhua Qu, Xiangui Kang, Jiwu Huang, Yinxiang Li:
Forensic sensor pattern noise extraction from large image data set. ICASSP 2013: 3023-3027 - [c102]Hui Zeng, Xiangui Kang, Jiwu Huang:
Mixed-strategy Nash equilibrium in the camera source identification game. ICIP 2013: 4472-4476 - [c101]Shan Bian, Weiqi Luo, Jiwu Huang:
Exposing fake bitrate video and its original bitrate. ICIP 2013: 4492-4496 - [c100]Fangjun Huang, Weiqi Luo, Jiwu Huang, Yun-Qing Shi:
Distortion function designing for JPEG steganography with uncompressed side-image. IH&MMSec 2013: 69-76 - [c99]Fangjun Huang, Yane Zhong, Jiwu Huang:
Improved Algorithm of Edge Adaptive Image Steganography Based on LSB Matching Revisited Algorithm. IWDW 2013: 19-31 - [c98]Peijia Zheng, Jiwu Huang:
An efficient image homomorphic encryption scheme with small ciphertext expansion. ACM Multimedia 2013: 803-812 - 2012
- [j54]Shijun Xiang, Jianquan Yang, Jiwu Huang:
Perceptual video hashing robust against geometric distortions. Sci. China Inf. Sci. 55(7): 1520-1527 (2012) - [j53]Zhongwei He, Wei Lu, Wei Sun, Jiwu Huang:
Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recognit. 45(12): 4292-4299 (2012) - [j52]Hao-Tian Wu, Jiwu Huang:
Reversible image watermarking on prediction errors by efficient histogram modification. Signal Process. 92(12): 3000-3009 (2012) - [j51]Yanqiang Lei, Weiqi Luo, Yuan-Gen Wang, Jiwu Huang:
Video Sequence Matching Based on the Invariance of Color Correlation. IEEE Trans. Circuits Syst. Video Technol. 22(9): 1332-1343 (2012) - [j50]Xiangui Kang, Yinxiang Li, Zhenhua Qu, Jiwu Huang:
Enhancing Source Camera Identification Performance With a Camera Reference Phase Sensor Pattern Noise. IEEE Trans. Inf. Forensics Secur. 7(2): 393-402 (2012) - [j49]Jian Cao, Jiwu Huang:
Controllable Secure Watermarking Technique for Tradeoff Between Robustness and Security. IEEE Trans. Inf. Forensics Secur. 7(2): 821-826 (2012) - [j48]Chuntao Wang, Jiangqun Ni, Jiwu Huang:
An Informed Watermarking Scheme Using Hidden Markov Model in the Wavelet Domain. IEEE Trans. Inf. Forensics Secur. 7(3): 853-867 (2012) - [j47]Fangjun Huang, Jiwu Huang, Yun-Qing Shi:
New Channel Selection Rule for JPEG Steganography. IEEE Trans. Inf. Forensics Secur. 7(4): 1181-1191 (2012) - [j46]Ligang Zheng, Yanqiang Lei, Guoping Qiu, Jiwu Huang:
Near-Duplicate Image Detection in a Visually Salient Riemannian Space. IEEE Trans. Inf. Forensics Secur. 7(5): 1578-1593 (2012) - [j45]Jian Li, Hongmei Liu, Jiwu Huang, Yun Q. Shi:
Reference index-based H.264 video watermarking scheme. ACM Trans. Multim. Comput. Commun. Appl. 8(S2): 33:1-33:22 (2012) - [j44]Rui Yang, Zhenhua Qu, Jiwu Huang:
Exposing MP3 audio forgeries using frame offsets. ACM Trans. Multim. Comput. Commun. Appl. 8(S2): 35:1-35:20 (2012) - [c97]Zhenhua Qu, Weiqi Luo, Jiwu Huang:
Identifying Shifted Double JPEG Compression Artifacts for Non-intrusive Digital Image Forensics. CVM 2012: 1-8 - [c96]Ligang Zheng, Guoping Qiu, Jiwu Huang:
Efficient coarse-to-fine near-duplicate image detection in riemannian manifold. ICASSP 2012: 977-980 - [c95]Da Luo, Weiqi Luo, Rui Yang, Jiwu Huang:
Compression history identification for digital audio signal. ICASSP 2012: 1733-1736 - [c94]Haodong Li, Weiqi Luo, Jiwu Huang:
Countering anti-JPEG compression forensics. ICIP 2012: 241-244 - [c93]Chenglong Chen, Jiangqun Ni, Rongbin Huang, Jiwu Huang:
Blind Median Filtering Detection Using Statistics in Difference Domain. Information Hiding 2012: 1-15 - [c92]Peijia Zheng, Jiwu Huang:
Walsh-Hadamard Transform in the Homomorphic Encrypted Domain and Its Application in Image Watermarking. Information Hiding 2012: 240-254 - [c91]Yong Wang, Yanhong Deng, Haojun Wu, Jiwu Huang:
Blind Detection of Electronic Voice Transformation with Natural Disguise. IWDW 2012: 336-343 - 2011
- [j43]Fangjun Huang, Weiqi Luo, Jiwu Huang:
Steganalysis of JPEG steganography with complementary embedding strategy. IET Inf. Secur. 5(1): 10-18 (2011) - [j42]Bin Li, Junhui He, Jiwu Huang, Yun Qing Shi:
A Survey on Image Steganography and Steganalysis. J. Inf. Hiding Multim. Signal Process. 2(2): 142-172 (2011) - [j41]Weiqi Luo, Fangjun Huang, Jiwu Huang:
A more secure steganography based on adaptive pixel-value differencing scheme. Multim. Tools Appl. 52(2-3): 407-430 (2011) - [j40]Hongmei Liu, Xinzhi Yao, Jiwu Huang:
Minority codes with improved embedding efficiency for large payloads. Multim. Tools Appl. 52(2-3): 431-443 (2011) - [j39]Guopu Zhu, Sam Kwong, Jiwu Huang, Jianquan Yang:
Random Gray code and its performance analysis for image hashing. Signal Process. 91(9): 2178-2193 (2011) - [j38]Yanqiang Lei, Yuan-Gen Wang, Jiwu Huang:
Robust image hash in Radon transform domain for authentication. Signal Process. Image Commun. 26(6): 280-288 (2011) - [j37]Weiqi Luo, Yuan-Gen Wang, Jiwu Huang:
Security Analysis on Spatial ± 1 Steganography for JPEG Decompressed Images. IEEE Signal Process. Lett. 18(1): 39-42 (2011) - [j36]Xiangui Kang, Rui Yang, Jiwu Huang:
Geometric Invariant Audio Watermarking Based on an LCM Feature. IEEE Trans. Multim. 13(2): 181-190 (2011) - [c90]Ligang Zheng, Guoping Qiu, Jiwu Huang, Hao Fu:
Salient covariance for near-duplicate image and video detection. ICIP 2011: 2537-2540 - [c89]Hao-Tian Wu, Jiwu Huang:
Secure JPEG steganography by LSB+ matching and multi-band embedding. ICIP 2011: 2737-2740 - [c88]Hongmei Liu, Lei Li, Jian Li, Jiwu Huang:
Three Novel Algorithms for Hiding Data in PDF Files Based on Incremental Updates. IWDW 2011: 167-180 - [c87]Dandan Liao, Rui Yang, Hongmei Liu, Jian Li, Jiwu Huang:
Double H.264/AVC compression detection using quantized nonzero AC coefficients. Media Forensics and Security 2011: 78800Q - [c86]Xiangui Kang, Yinxiang Li, Zhenhua Qu, Jiwu Huang:
Enhancing ROC performance of trustworthy camera source identification. Media Forensics and Security 2011: 788009 - [c85]Peijia Zheng, Jiwu Huang:
Implementation of the discrete wavelet transform and multiresolution analysis in the encrypted domain. ACM Multimedia 2011: 413-422 - 2010
- [j35]Yong Wang, Jiwu Huang:
Robust AVS audio watermarking. Sci. China Inf. Sci. 53(3): 607-618 (2010) - [j34]Hongmei Liu, Xinzhi Yao, Jiwu Huang:
Semi-Fragile Zernike Moment-Based Image Watermarking for Authentication. EURASIP J. Adv. Signal Process. 2010 (2010) - [j33]Yong Wang, Shaoquan Wu, Jiwu Huang:
Audio Watermarking Scheme Robust against Desynchronization Based on the Dyadic Wavelet Transform. EURASIP J. Adv. Signal Process. 2010 (2010) - [j32]Xiangui Kang, Jiwu Huang, Wenjun Zeng:
Efficient general print-scanning resilient data hiding based on uniform log-polar mapping. IEEE Trans. Inf. Forensics Secur. 5(1): 1-12 (2010) - [j31]Guopu Zhu, Jiwu Huang, Sam Kwong, Jianquan Yang:
Fragility analysis of adaptive quantization-based image hashing. IEEE Trans. Inf. Forensics Secur. 5(1): 133-147 (2010) - [j30]Weiqi Luo, Fangjun Huang, Jiwu Huang:
Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inf. Forensics Secur. 5(2): 201-214 (2010) - [j29]Fangjun Huang, Jiwu Huang, Yun-Qing Shi:
An experimental study on the security performance of YASS. IEEE Trans. Inf. Forensics Secur. 5(3): 374-380 (2010) - [j28]Weiqi Luo, Jiwu Huang, Guoping Qiu:
JPEG error analysis and its applications to digital image forensics. IEEE Trans. Inf. Forensics Secur. 5(3): 480-491 (2010) - [j27]Weiqi Luo, Yuan-Gen Wang, Jiwu Huang:
Detection of Quantization Artifacts and Its Applications to Transform Encoder Identification. IEEE Trans. Inf. Forensics Secur. 5(4): 810-815 (2010) - [j26]Fangjun Huang, Jiwu Huang, Yun-Qing Shi:
Detecting Double JPEG Compression With the Same Quantization Matrix. IEEE Trans. Inf. Forensics Secur. 5(4): 848-856 (2010) - [c84]Yuan-Gen Wang, Yanqiang Lei, Jiwu Huang:
An image copy detection scheme based on radon transform. ICIP 2010: 1009-1012 - [c83]Chuntao Wang, Jiangqun Ni, Huashuo Zhuo, Jiwu Huang:
A geometrically resilient robust image watermarking scheme using deformable multi-scale transform. ICIP 2010: 3677-3680 - [c82]Dong Zhang, Jiangqun Ni, Qiping Zeng, Dah-Jye Lee, Jiwu Huang:
Security Analysis of ISS Watermarking Using Natural Scene Statistics. Information Hiding 2010: 235-248 - [c81]Jian Cao, Jiwu Huang:
Provably Secure Spread-Spectrum Watermarking Schemes in the Known Message Attack Framework. Information Hiding 2010: 249-261 - [c80]Jian Cao, Jiwu Huang, Jiangqun Ni:
A New Spread Spectrum Watermarking Scheme to Achieve a Trade-Off between Security and Robustness. Information Hiding 2010: 262-276 - [c79]Feng Pan, Jiwu Huang:
Discriminating Computer Graphics Images and Natural Images Using Hidden Markov Tree Model. IWDW 2010: 23-28 - [c78]Fangjun Huang, Yun-Qing Shi, Jiwu Huang:
New JPEG Steganographic Scheme with High Security Performance. IWDW 2010: 189-201 - [c77]Rui Yang, Yun Q. Shi, Jiwu Huang:
Detecting double compression of audio signal. Media Forensics and Security 2010: 75410K - [p1]Fangjun Huang, Bin Li, Yun-Qing Shi, Jiwu Huang, Guorong Xuan:
Image Steganalysis. Intelligent Multimedia Analysis for Security Applications 2010: 275-303
2000 – 2009
- 2009
- [j25]Fangjun Huang, Jiwu Huang:
Calibration based universal JPEG steganalysis. Sci. China Ser. F Inf. Sci. 52(2): 260-268 (2009) - [j24]Xiangui Kang, Jiwu Huang, Wenjun Zeng, Yun Q. Shi:
Non-ambiguity of blind watermarking: a revisit with analytical resolution. Sci. China Ser. F Inf. Sci. 52(2): 276-285 (2009) - [j23]Feng Pan, JiongBin Chen, Jiwu Huang:
Discriminating between photorealistic computer graphics and natural images using fractal geometry. Sci. China Ser. F Inf. Sci. 52(2): 329-337 (2009) - [j22]Bin Li, Jiwu Huang, Yun-Qing Shi:
Steganalysis of YASS. IEEE Trans. Inf. Forensics Secur. 4(3): 369-382 (2009) - [j21]Guopu Zhu, Jiwu Huang, Sam Kwong, Jianquan Yang:
A study on the randomness measure of image hashing. IEEE Trans. Inf. Forensics Secur. 4(4): 928-932 (2009) - [c76]Xinzhi Yao, Hongmei Liu, Wei Rui, Jiwu Huang:
Content-based authentication algorithm for binary images. ICIP 2009: 2893-2896 - [c75]Zhenhua Qu, Guoping Qiu, Jiwu Huang:
Detect Digital Image Splicing with Visual Cues. Information Hiding 2009: 247-261 - [c74]Yong Wang, Jiwu Huang:
Robust AVS Audio Watermarking. IWDW 2009: 29-38 - [c73]Chong Chen, Jiangqun Ni, Jiwu Huang:
Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping. IWDW 2009: 81-95 - [c72]Rui Yang, Yun-Qing Shi, Jiwu Huang:
Defeating fake-quality MP3. MM&Sec 2009: 117-124 - 2008
- [j20]Changan Zhao, Fangguo Zhang, Jiwu Huang:
Efficient Tate pairing computation using double-base chains. Sci. China Ser. F Inf. Sci. 51(8): 1096-1105 (2008) - [j19]Changan Zhao, Fangguo Zhang, Jiwu Huang:
All Pairings Are in a Group. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(10): 3084-3087 (2008) - [j18]Changan Zhao, Fangguo Zhang, Jiwu Huang:
A note on the Ate pairing. Int. J. Inf. Sec. 7(6): 379-382 (2008) - [j17]Xiangui Kang, Wenjun Zeng, Jiwu Huang:
A Multi-band Wavelet Watermarking Scheme. Int. J. Netw. Secur. 6(2): 121-126 (2008) - [j16]Shijun Xiang, Hyoung-Joong Kim, Jiwu Huang:
Audio watermarking robust against time-scale modification and MP3 compression. Signal Process. 88(10): 2372-2387 (2008) - [j15]Bin Li, Yanmei Fang, Jiwu Huang:
Steganalysis of Multiple-Base Notational System Steganography. IEEE Signal Process. Lett. 15: 493-496 (2008) - [j14]Shijun Xiang, Hyoung-Joong Kim, Jiwu Huang:
Invariant Image Watermarking Based on Statistical Features in the Low-Frequency Domain. IEEE Trans. Circuits Syst. Video Technol. 18(6): 777-790 (2008) - [j13]Xiangui Kang, Jiwu Huang, Wenjun Zeng:
Improving Robustness of Quantization-Based Image Watermarking via Adaptive Receiver. IEEE Trans. Multim. 10(6): 953-959 (2008) - [c71]Zhenhua Qu, Weiqi Luo, Jiwu Huang:
A convolutive mixing model for shifted double JPEG compression with application to passive image authentication. ICASSP 2008: 1661-1664 - [c70]Fangjun Huang, Bin Li, Jiwu Huang:
Universal JPEG steganalysis based on microscopic and macroscopic calibration. ICIP 2008: 2068-2071 - [c69]Xiangui Kang, Xiong Zhong, Jiwu Huang, Wenjun Zeng:
An efficient print-scanning resilient data hiding scheme based on a novel LPM. ICIP 2008: 2080-2083 - [c68]Fangjun Huang, Yun Q. Shi, Jiwu Huang:
A study on security performance of YASS. ICIP 2008: 2084-2087 - [c67]Jiangqun Ni, Rongyue Zhang, Chen Fang, Jiwu Huang, Chuntao Wang, Hyoung-Joong Kim:
Watermarking Security Incorporating Natural Scene Statistics. Information Hiding 2008: 132-146 - [c66]Jian Li, Hongmei Liu, Jiwu Huang, Yongping Zhang:
A Robust Watermarking Scheme for H.264. IWDW 2008: 1-15 - [c65]Rui Yang, Xiangui Kang, Jiwu Huang:
Robust Audio Watermarking Based on Log-Polar Frequency Index. IWDW 2008: 124-138 - [c64]Weiqi Luo, Jiwu Huang, Guoping Qiu:
A Novel Method for Block Size Forensics Based on Morphological Operations. IWDW 2008: 229-239 - [c63]Dong Zhang, Jiangqun Ni, Dah-Jye Lee, Jiwu Huang:
GSM Based Security Analysis for Add-SS Watermarking. IWDW 2008: 313-326 - [c62]Rui Yang, Zhenhua Qu, Jiwu Huang:
Detecting digital audio forgeries by checking frame offsets. MM&Sec 2008: 21-26 - [c61]Bin Li, Yun Q. Shi, Jiwu Huang:
Steganalysis of YASS. MM&Sec 2008: 139-148 - [c60]Bin Li, Yun Q. Shi, Jiwu Huang:
Detecting doubly compressed JPEG images by using Mode Based First Digit Features. MMSP 2008: 730-735 - [c59]Weiqi Luo, Min Wu, Jiwu Huang:
MPEG recompression detection based on block artifacts. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 68190X - [c58]Bin Li, Jiwu Huang, Yun Q. Shi:
Textural features based universal steganalysis. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 681912 - [i5]Changan Zhao, Fangguo Zhang, Jiwu Huang:
All Pairings Are in a Group. IACR Cryptol. ePrint Arch. 2008: 85 (2008) - 2007
- [j12]Changxiang Shen, Huanguo Zhang, Dengguo Feng, Zhenfu Cao, Jiwu Huang:
Survey of information security. Sci. China Ser. F Inf. Sci. 50(3): 273-298 (2007) - [j11]Weiqi Luo, Zhenhua Qu, Feng Pan, Jiwu Huang:
A survey of passive technology for digital image forensics. Frontiers Comput. Sci. China 1(2): 166-179 (2007) - [j10]Ning Bi, Qiyu Sun, Daren Huang, Zhihua Yang, Jiwu Huang:
Robust Image Watermarking Based on Multiband Wavelets and Empirical Mode Decomposition. IEEE Trans. Image Process. 16(8): 1956-1966 (2007) - [j9]Shijun Xiang, Jiwu Huang:
Histogram-Based Audio Watermarking Against Time-Scale Modification and Cropping Attacks. IEEE Trans. Multim. 9(7): 1357-1372 (2007) - [c57]Jiangqun Ni, Chuntao Wang, Jiwu Huang, Rongyue Zhang, Meiying Huang:
A GA-Based Joint Coding and Embedding Optimization for Robust and High Capacity Image Watermarking. ICASSP (2) 2007: 181-184 - [c56]Weiqi Luo, Zhenhua Qu, Jiwu Huang, Guoping Qiu:
A Novel Method for Detecting Cropped and Recompressed Image Block. ICASSP (2) 2007: 217-220 - [c55]Hongmei Liu, Wei Rui, Jiwu Huang:
Binary Image Authentication using Zernike Moments. ICIP (1) 2007: 385-388 - [c54]Fangjun Huang, Bin Li, Jiwu Huang:
Attack LSB Matching Steganography by Counting Alteration Rate of the Number of Neighbourhood Gray Levels. ICIP (1) 2007: 401-404 - [c53]Bin Li, Fangjun Huang, Jiwu Huang:
Steganalysis of LSB Greedy Embedding Algorithm for JPEG Images using Coefficient Symmetry. ICIP (1) 2007: 413-416 - [c52]Chuntao Wang, Jiangqun Ni, Jiwu Huang, Rongyue Zhang, Meiying Huang:
Robust and High Capacity Image Watermarking Based on Jointly Coding and Embedding Optimization. Information Hiding 2007: 65-79 - [c51]Zhe-Ming Lu, Hong-Yi Zheng, Ji-Wu Huang:
A Digital Watermarking Scheme Based on DCT and SVD. IIH-MSP 2007: 241-244 - [c50]Shunquan Tan, Jiwu Huang, Yun Q. Shi:
Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis. IWDW 2007: 112-126 - [c49]Bin Li, Fangjun Huang, Shunquan Tan, Jiwu Huang, Yun Q. Shi:
Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis. IWDW 2007: 143-157 - [c48]Shijun Xiang, Hyoung-Joong Kim, Jiwu Huang:
Histogram-based image hashing scheme robust against geometric deformations. MM&Sec 2007: 121-128 - [c47]Xiangui Kang, Chunhui Liu, Wenjun Zeng, Jiwu Huang, Congbai Liu:
Fast and automatic watermark resynchronization based on zernike moments. Security, Steganography, and Watermarking of Multimedia Contents 2007: 65050E - [c46]Yong Wang, Shaoquan Wu, Jiwu Huang:
Audio watermarking robust to geometrical distortions based on dyadic wavelet transform. Security, Steganography, and Watermarking of Multimedia Contents 2007: 65050A - [i4]Shijun Xiang, Jiwu Huang:
Robust Audio Watermarking Against the D/A and A/D conversions. CoRR abs/0707.0397 (2007) - [i3]Changan Zhao, Fangguo Zhang, Jiwu Huang:
A Note on the Ate Pairing. IACR Cryptol. ePrint Arch. 2007: 247 (2007) - 2006
- [j8]Junhui He, Jiwu Huang:
Steganalysis of stochastic modulation steganography. Sci. China Ser. F Inf. Sci. 49(3): 273-285 (2006) - [j7]Shijun Xiang, Jiwu Huang:
Analysis of Quantization-based Audio Watermarking to D/A and A/D Conversions. Int. J. Netw. Secur. 3(3): 230-238 (2006) - [j6]Yongjian Hu, Sam Kwong, Jiwu Huang:
An algorithm for removable visible watermarking. IEEE Trans. Circuits Syst. Video Technol. 16(1): 129-133 (2006) - [c45]Shunquan Tan, Jiwu Huang, Zhihua Yang, Yun Q. Shi:
Steganalysis of JPEG2000 Lazy-Mode Steganography using the Hilbert-Huang Transform Based Sequential Analysis. ICIP 2006: 101-104 - [c44]Jiangqun Ni, Chuntao Wang, Jiwu Huang, Rongyue Zhang:
Performance Enhancement for DWT-HMM Image Watermarking with Content-Adaptive Approach. ICIP 2006: 1377-1380 - [c43]Hongmei Liu, Ling Zhu, Jiwu Huang:
A Hybrid Watermarking Scheme for Video Authentication. ICIP 2006: 2569-2572 - [c42]Weiqi Luo, Jiwu Huang, Guoping Qiu:
Robust Detection of Region-Duplication Forgery in Digital Image. ICPR (4) 2006: 746-749 - [c41]Mai Yang, Guoping Qiu, Jiwu Huang, Dave Elliman:
Near-Duplicate Image Recognition and Content-based Image Retrieval using Adaptive Hierarchical Geometric Centroids. ICPR (2) 2006: 958-961 - [c40]Shijun Xiang, Jiwu Huang, Rui Yang:
Time-Scale Invariant Audio Watermarking Based on the Statistical Features in Time Domain. Information Hiding 2006: 93-108 - [c39]Shijun Xiang, Jiwu Huang, Rui Yang, Chuntao Wang, Hongmei Liu:
Robust Audio Watermarking Based on Low-Order Zernike Moments. IWDW 2006: 226-240 - [c38]Jiangqun Ni, Rongyue Zhang, Jiwu Huang, Chuntao Wang, Quanbo Li:
A Rotation-Invariant Secure Image Watermarking Algorithm Incorporating Steerable Pyramid Transform. IWDW 2006: 446-460 - [c37]Hongmei Liu, Huiying Fu, Jiwu Huang:
A Watermarking Algorithm for JPEG File. PCM 2006: 319-328 - [c36]Xiangui Kang, Yun Q. Shi, Jiwu Huang:
Achieving non-ambiguity of quantization-based watermarking. Security, Steganography, and Watermarking of Multimedia Contents 2006: 60720F - [i2]Changan Zhao, Fangguo Zhang, Jiwu Huang:
Efficient Tate Pairing Computation Using Double-Base Chains. IACR Cryptol. ePrint Arch. 2006: 201 (2006) - [i1]Changan Zhao, Fangguo Zhang, Jiwu Huang:
Speeding up the Bilinear Pairings Computation on Curves with Automorphisms. IACR Cryptol. ePrint Arch. 2006: 474 (2006) - 2005
- [j5]Hongmei Liu, Jiwu Huang, Yun Q. Shi:
Dwt-Based Video Data Hiding Robust To Mpeg Compression And Frame Loss. Int. J. Image Graph. 5(1): 111-134 (2005) - [j4]Shaoquan Wu, Jiwu Huang, Daren Huang, Yun Q. Shi:
Efficiently self-synchronized audio watermarking for assured audio data transmission. IEEE Trans. Broadcast. 51(1): 69-76 (2005) - [c35]Xiaoyun Wu, Junquan Hu, Zhixiong Gu, Jiwu Huang:
A Secure Semi-Fragile Watermarking for Image Authentication Based on Integer Wavelet Transform with Parameters Abstract. ACSW 2005: 75-80 - [c34]Limin Gu, Yanmei Fang, Jiwu Huang:
Revaluation of Error Correcting Coding in Watermarking Channel. CANS 2005: 274-287 - [c33]Xiaoping Liang, Xiaoyun Wu, Jiwu Huang:
Reversible Data Hiding for Image Based on Histogram Modification of Wavelet Coefficients. CIS (2) 2005: 573-580 - [c32]Hongmei Liu, Fenglian Shao, Jiwu Huang:
A MPEG-2 Video Watermarking Algorithm with Compensation in Bit Stream. DRMTICS 2005: 123-134 - [c31]Xiaoyun Wu, Xiaoping Liang, Hongmei Liu, Jiwu Huang, Guoping Qiu:
Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform. DRMTICS 2005: 135-145 - [c30]Yanmei Fang, Ning Bi, Daren Huang, Jiwu Huang:
The M-band wavelets in image watermarking. ICIP (1) 2005: 245-248 - [c29]Hongmei Liu, Junlong Lin, Jiwu Huang:
Image authentication using content based watermark. ISCAS (4) 2005: 4014-4017 - [c28]Yanmei Fang, Limin Gu, Jiwu Huang:
Performance Analysis of CDMA-Based Watermarking with Quantization Scheme. ISPEC 2005: 350-361 - [c27]Junhui He, Jiwu Huang, Guoping Qiu:
A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography. IWDW 2005: 1-14 - [c26]Jiangqun Ni, Rongyue Zhang, Jiwu Huang, Chuntao Wang:
A Robust Multi-bit Image Watermarking Algorithm Based on HMM in Wavelet Domain. IWDW 2005: 110-123 - [c25]Xiangui Kang, Yun Q. Shi, Jiwu Huang, Wenjun Zeng:
Multi-band Wavelet Based Digital Watermarking Using Principal Component Analysis. IWDW 2005: 139-146 - [c24]Shijun Xiang, Jiwu Huang, Xiaoyun Feng:
Analysis of Quantization-Based Audio Watermarking in DA/AD Conversions. KES (2) 2005: 587-592 - [c23]Xiaoyun Wu, Hongmei Liu, Jiwu Huang:
Semi-fragile Watermarking Based on Zernike Moments and Integer Wavelet Transform. KES (2) 2005: 1108-1114 - [c22]Jiangqun Ni, Chuntao Wang, Jiwu Huang, Rongyue Zhang:
A RST-Invariant Robust DWT-HMM Watermarking Algorithm Incorporating Zernike Moments and Template. KES (1) 2005: 1233-1239 - [c21]Junyi Xu, Changzhen Xiong, Dongxu Qi, Jiwu Huang:
Watermarking Parameters Feasible Region Model. MMSP 2005: 1-4 - 2004
- [c20]Zewen Chen, Jiwu Huang, Daren Huang, Jianhong Zhang, Yumin Wang:
Provably Secure and ID-Based Group Signature Scheme. AINA (2) 2004: 384-388 - [c19]Jiwu Huang, Junquan Hu, Daren Huang, Yun Q. Shi:
Improve security of fragile watermarking via parameterized wavelet. ICIP 2004: 721-724 - [c18]Xiangui Kang, Jiwu Huang, Yun Q. Shi:
Improve robustness of image watermarking via adaptive receiving. ICIP 2004: 2343-2346 - [c17]Yanmei Fang, Jiwu Huang, Shaoquan Wu:
CDMA-based watermarking resisting to cropping. ISCAS (2) 2004: 25-28 - [c16]Yongjian Hu, Sam Kwong, Jiwu Huang:
Using invisible watermarks to protect visibly watermarked images. ISCAS (5) 2004: 584-587 - [c15]Shaoquan Wu, Jiwu Huang, Daren Huang, Yun Q. Shi:
Self-synchronized audio watermark in DWT domain. ISCAS (5) 2004: 712-715 - 2003
- [j3]Xiangui Kang, Jiwu Huang, Yun Q. Shi, Yan Lin:
A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Trans. Circuits Syst. Video Technol. 13(8): 776-786 (2003) - [c14]Limin Gu, Jiwu Huang, Zewen Chen:
Analysis of the Bounds for Linear Block Codes in Watermark Channel. ICISC 2003: 294-304 - [c13]Zewen Chen, Jilin Wang, Yumin Wang, Jiwu Huang, Daren Huang:
An Efficient Revocation Algorithm in Group Signatures. ICISC 2003: 339-351 - [c12]Limin Gu, Jiwu Huang, Yun Q. Shi:
Analysis of the role played by error correcting coding in robust watermarking. ISCAS (3) 2003: 798-801 - [c11]Hongmei Liu, Zhang Zhefeng, Jiwu Huang, Huang Xialing, Yun Q. Shi:
A high capacity distortion-free data hiding algorithm for palette image. ISCAS (2) 2003: 916-919 - [c10]Yun Q. Shi, Zhicheng Ni, Nirwan Ansari, Jiwu Huang:
2-D and 3-D successive packing interleaving techniques and their applications to image and video data hiding. ISCAS (2) 2003: 924-927 - [c9]Yanmei Fang, Jiwu Huang, Yun Q. Shi:
Image watermarking algorithm applying CDMA. ISCAS (2) 2003: 948-951 - [c8]Yongjian Hu, Jiwu Huang, Sam Kwong, Yiu-Keung Chan:
Image Fusion Based Visible Watermarking Using Dual-Tree Complex Wavelet Transform. IWDW 2003: 86-100 - [c7]Xiangui Kang, Jiwu Huang, Yun Q. Shi, Jianxiang Zhu:
Robust Watermarking with Adaptive Receiving. IWDW 2003: 396-407 - 2002
- [j2]Jiwu Huang, Yun Q. Shi:
Reliable information bit hiding. IEEE Trans. Circuits Syst. Video Technol. 12(10): 916-920 (2002) - [c6]Junquan Hu, Jiwu Huang, Daren Huang, Yun Q. Shi:
A DWT-Based Fragile Watermarking Tolerant of JPEG Compression. IWDW 2002: 179-188 - [c5]Xiangui Kang, Jiwu Huang, Yun Q. Shi:
An Image Watermarking Algorithm Robust to Geometric Distortion. IWDW 2002: 212-223 - 2001
- [c4]Daren Huang, Jiufen Liu, Jiwu Huang, Hongmei Liu:
A Dwt-Based Image Watermarking Algorithm. ICME 2001 - [c3]Hongmei Liu, Jiwu Huang, Zi-mei Xiao:
An Adaptive Video Watermarking Algorithm. ICME 2001 - [c2]Jiwu Huang, Yun Q. Shi:
Embedding gray level images. ISCAS (5) 2001: 239-242 - 2000
- [j1]Jiwu Huang, Yun Q. Shi, Yi Shi:
Embedding image watermarks in dc components. IEEE Trans. Circuits Syst. Video Technol. 10(6): 974-979 (2000)
1990 – 1999
- 1998
- [c1]Jiwu Huang, George F. Elmasry, Yun Q. Shi:
Power constrained multiple signaling in digital image watermarking. MMSP 1998: 388-393
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint