Bin Li

Orcid: 0000-0002-2613-5451

Affiliations:
  • Shenzhen University, College of Information Engineering, Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen Key Laboratory of Media Security, Shenzhen, China
  • Sun Yat-sen University, Guangzhou, China (PhD 2009)
  • New Jersey Institute of Technology, Newark, NJ, USA (2007 - 2008)


According to our database1, Bin Li authored at least 130 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
General Forensics for Aligned Double JPEG Compression Based on the Quantization Interference.
IEEE Trans. Circuits Syst. Video Technol., June, 2024

Payload-Independent Direct Cost Learning for Image Steganography.
IEEE Trans. Circuits Syst. Video Technol., March, 2024

Audio Multi-View Spoofing Detection Framework Based on Audio-Text-Emotion Correlations.
IEEE Trans. Inf. Forensics Secur., 2024

Joint Cost Learning and Payload Allocation With Image-Wise Attention for Batch Steganography.
IEEE Trans. Inf. Forensics Secur., 2024

Efficient Audio Steganography Using Generalized Audio Intrinsic Energy With Micro-Amplitude Modification Suppression.
IEEE Trans. Inf. Forensics Secur., 2024

DF-RAP: A Robust Adversarial Perturbation for Defending Against Deepfakes in Real-World Social Network Scenarios.
IEEE Trans. Inf. Forensics Secur., 2024

Employing Reinforcement Learning to Construct a Decision-Making Environment for Image Forgery Localization.
IEEE Trans. Inf. Forensics Secur., 2024

ForensicsForest Family: A Series of Multi-Scale Hierarchical Cascade Forests for Detecting GAN-Generated Faces.
IEEE Trans. Inf. Forensics Secur., 2024

Constructing an Intrinsically Robust Steganalyzer via Learning Neighboring Feature Relationships and Self-Adversarial Adjustment.
IEEE Trans. Inf. Forensics Secur., 2024

DRAW: Dual-Decoder-Based Robust Audio Watermarking Against Desynchronization and Replay Attacks.
IEEE Trans. Inf. Forensics Secur., 2024

Spatial-Frequency Feature Fusion Network for Lightweight and Arbitrary-Sized JPEG Steganalysis.
IEEE Signal Process. Lett., 2024

An Efficient Watermarking Method for Latent Diffusion Models via Low-Rank Adaptation.
CoRR, 2024

Towards General Deepfake Detection with Dynamic Curriculum.
CoRR, 2024

FreqBlender: Enhancing DeepFake Detection by Blending Frequency Knowledge.
CoRR, 2024

Improving VGG-Style Convnet for JPEG Steganalysis.
Proceedings of the IEEE International Conference on Acoustics, 2024

Towards Generic Deepfake Detection with Dynamic Curriculum.
Proceedings of the IEEE International Conference on Acoustics, 2024

A Keyless Extraction Framework Targeting at Deep Learning Based Image-Within-Image Models.
Proceedings of the IEEE International Conference on Acoustics, 2024

Fake It till You Make It: Curricular Dynamic Forgery Augmentations Towards General Deepfake Detection.
Proceedings of the Computer Vision - ECCV 2024, 2024

DiffForensics: Leveraging Diffusion Prior to Image Forgery Detection and Localization.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

CMA: A Chromaticity Map Adapter for Robust Detection of Screen-Recapture Document Images.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

2023
Robust image steganography against lossy JPEG compression based on embedding domain selection and adaptive error correction.
Expert Syst. Appl., November, 2023

Learning Deep Co-Occurrence Features.
IEEE Trans. Circuits Syst. Video Technol., April, 2023

Learning Features of Intra-Consistency and Inter-Diversity: Keys Toward Generalizable Deepfake Detection.
IEEE Trans. Circuits Syst. Video Technol., March, 2023

Reinforcement learning of non-additive joint steganographic embedding costs with attention mechanism.
Sci. China Inf. Sci., March, 2023

Dynamic Difference Learning With Spatio-Temporal Correlation for Deepfake Video Detection.
IEEE Trans. Inf. Forensics Secur., 2023

ReLOAD: Using Reinforcement Learning to Optimize Asymmetric Distortion for Additive Steganography.
IEEE Trans. Inf. Forensics Secur., 2023

Quaternary Quantized Gaussian Modulation With Optimal Polarity Map Selection for JPEG Steganography.
IEEE Trans. Inf. Forensics Secur., 2023

STD-NET: Search of Image Steganalytic Deep-Learning Architecture via Hierarchical Tensor Decomposition.
IEEE Trans. Dependable Secur. Comput., 2023

Learning Traces by Yourself: Blind Image Forgery Localization via Anomaly Detection With ViT-VAE.
IEEE Signal Process. Lett., 2023

Watching the BiG artifacts: Exposing DeepFake videos via Bi-granularity artifacts.
Pattern Recognit., 2023

Evading Detection Actively: Toward Anti-Forensics against Forgery Localization.
CoRR, 2023

Forensics Forest: Multi-scale Hierarchical Cascade Forest for Detecting GAN-generated Faces.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

Learning to Locate the Text Forgery in Smartphone Screenshots.
Proceedings of the IEEE International Conference on Acoustics, 2023

Detection of Photoplethysmography Manipulation in Video Forgery.
Proceedings of the 31st European Signal Processing Conference, 2023

Poster: Query-efficient Black-box Attack for Image Forgery Localization via Reinforcement Learning.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Deep Multi-image Hiding with Random Key.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

2022
Self-Adversarial Training Incorporating Forgery Attention for Image Forgery Localization.
IEEE Trans. Inf. Forensics Secur., 2022

Improving Cost Learning for JPEG Steganography by Exploiting JPEG Domain Knowledge.
IEEE Trans. Circuits Syst. Video Technol., 2022

Gradually Enhanced Adversarial Perturbations on Color Pixel Vectors for Image Steganography.
IEEE Trans. Circuits Syst. Video Technol., 2022

One-Class Double Compression Detection of Advanced Videos Based on Simple Gaussian Distribution Model.
IEEE Trans. Circuits Syst. Video Technol., 2022

Hybrid deep-learning framework for object-based forgery detection in video.
Signal Process. Image Commun., 2022

Clustering-Based Representation Learning through Output Translation and Its Application to Remote-Sensing Images.
Remote. Sens., 2022

ISP-GAN: inception sub-pixel deconvolution-based lightweight GANs for colorization.
Multim. Tools Appl., 2022

GAN-based image steganography for enhancing security via adversarial attack and pixel-wise deep fusion.
Multim. Tools Appl., 2022

Metric of choosing the optimal parameter setting for edge aware filtering.
IET Image Process., 2022

Long-term variable Q transform: A novel time-frequency transform algorithm for synthetic speech detection.
Digit. Signal Process., 2022

Learning General Gaussian Mixture Model with Integral Cosine Similarity.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Adversarial Example Defense via Perturbation Grading Strategy.
Proceedings of the Digital Multimedia Communications - The 19th International Forum, 2022

Individual Property Inference Over Collaborative Learning in Deep Feature Space.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

Source-ID-Tracker: Source Face Identity Protection in Face Swapping.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

Towards Generalizable DEEPFAKE Face Forgery Detection with Semi-Supervised Learning and Knowledge Distillation.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

Exploiting temporal information to prevent the transferability of adversarial examples against deep fake detectors.
Proceedings of the IEEE International Joint Conference on Biometrics, 2022

Exposing Face Forgery Clues via Retinex-Based Image Enhancement.
Proceedings of the Computer Vision - ACCV 2022, 2022

2021
Image Tampering Localization Using a Dense Fully Convolutional Network.
IEEE Trans. Inf. Forensics Secur., 2021

An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning.
IEEE Trans. Inf. Forensics Secur., 2021

CALPA-NET: Channel-Pruning-Assisted Deep Residual Network for Steganalysis of Digital Images.
IEEE Trans. Inf. Forensics Secur., 2021

MCTSteg: A Monte Carlo Tree Search-Based Reinforcement Learning Framework for Universal Non-Additive Steganography.
IEEE Trans. Inf. Forensics Secur., 2021

Detail-enhanced image inpainting based on discrete wavelet transforms.
Signal Process., 2021

Detecting facial manipulated videos based on set convolutional neural networks.
J. Vis. Commun. Image Represent., 2021

A novel deep learning framework for double JPEG compression detection of small size blocks.
J. Vis. Commun. Image Represent., 2021

Boosting CNN-based primary quantization matrix estimation of double JPEG images via a classification-like architecture.
EURASIP J. Inf. Secur., 2021

On Designing Good Representation Learning Models.
CoRR, 2021

Image Steganography based on Iteratively Adversarial Samples of A Synchronized-directions Sub-image.
CoRR, 2021

SEINet: Semantic-Edge Interaction Network for Image Manipulation Localization.
Proceedings of the Pattern Recognition and Computer Vision - 4th Chinese Conference, 2021

Image Tampering Localization Using Unified Two-Stream Features Enhanced with Channel and Spatial Attention.
Proceedings of the Pattern Recognition and Computer Vision - 4th Chinese Conference, 2021

Anti-forensics for Double JPEG Compression Based on Generative Adversarial Network.
Proceedings of the Image and Graphics - 11th International Conference, 2021

Image Steganography Based on Iterative Adversarial Perturbations Onto a Synchronized-Directions Sub-Image.
Proceedings of the IEEE International Conference on Acoustics, 2021

2020
Detection of HEVC Double Compression With the Same Coding Parameters Based on Analysis of Intra Coding Quality Degradation Process.
IEEE Trans. Inf. Forensics Secur., 2020

Identification of VoIP Speech With Multiple Domain Deep Features.
IEEE Trans. Inf. Forensics Secur., 2020

A New Payload Partition Strategy in Color Image Steganography.
IEEE Trans. Circuits Syst. Video Technol., 2020

Exposing Fake Bitrate Videos Using Hybrid Deep-Learning Network From Recompression Error.
IEEE Trans. Circuits Syst. Video Technol., 2020

CNN-based steganalysis and parametric adversarial embedding: A game-theoretic framework.
Signal Process. Image Commun., 2020

Identification of deep network generated images using disparities in color components.
Signal Process., 2020

2019
WISERNet: Wider Separate-Then-Reunion Network for Steganalysis of Color Images.
IEEE Trans. Inf. Forensics Secur., 2019

CNN-Based Adversarial Embedding for Image Steganography.
IEEE Trans. Inf. Forensics Secur., 2019

Detecting double JPEG compression and its related anti-forensic operations with CNN.
Multim. Tools Appl., 2019

A Novel Steganography for Spatial Color Images Based on Pixel Vector Cost.
IEEE Access, 2019

Adversarial CNN Training Under JPEG Laundering Attacks: a Game-Theoretic Approach.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2019

A New Spatial Steganographic Scheme by Modeling Image Residuals with Multivariate Gaussian Model.
Proceedings of the IEEE International Conference on Acoustics, 2019

Non-structured Pruning for Deep-learning based Steganalytic Frameworks.
Proceedings of the 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2019

2018
Large-Scale JPEG Image Steganalysis Using Hybrid Deep-Learning Framework.
IEEE Trans. Inf. Forensics Secur., 2018

New Steganalytic Features for Spatial Image Steganography Based on Derivative Filters and Threshold LBP Operator.
IEEE Trans. Inf. Forensics Secur., 2018

A Spatial Image Steganography Method Based on Nonnegative Matrix Factorization.
IEEE Signal Process. Lett., 2018

ReST-Net: Diverse Activation Modules and Parallel Subnets-Based CNN for Spatial Image Steganalysis.
IEEE Signal Process. Lett., 2018

Detection of Deep Network Generated Images Using Disparities in Color Components.
CoRR, 2018

CNN Based Adversarial Embedding with Minimum Alteration for Image Steganography.
CoRR, 2018

A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks.
IEEE Access, 2018

An Inception-Based Data-Driven Ensemble Approach to Camera Model Identification.
Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, 2018

Content-Adaptive Steganalysis via Augmented Utilization of Selection-Channel Information.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018

VPCID - A VoIP Phone Call Identification Database.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018

A New Steganographic Distortion Function with Explicit Considerations of Modification Interactions.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Fake Colorized Image Detection with Channel-wise Convolution based Deep-learning Framework.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

Relocated I-Frames Detection in H.264 Double Compressed Videos Based on Genetic-CNN.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

Detection of Double JPEG Compression with the Same Quantization Matrix Based on Convolutional Neural Networks.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

Can Forensic Detectors Identify GAN Generated Images?
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

2017
Pixel-Decimation-Assisted Steganalysis of Synchronize-Embedding-Changes Steganography.
IEEE Trans. Inf. Forensics Secur., 2017

Detection of Double Compressed AMR Audio Using Stacked Autoencoder.
IEEE Trans. Inf. Forensics Secur., 2017

Automatic Steganographic Distortion Learning Using a Generative Adversarial Network.
IEEE Signal Process. Lett., 2017

MSE period based estimation of first quantization step in double compressed JPEG images.
Signal Process. Image Commun., 2017

Frame-wise detection of relocated I-frames in double compressed H.264 videos based on convolutional neural network.
J. Vis. Commun. Image Represent., 2017

A multi-branch convolutional neural network for detecting double JPEG compression.
CoRR, 2017

Pre-training via fitting deep neural network to rich-model features extraction procedure and its effect on deep learning for steganalysis.
Proceedings of the Media Watermarking, Security, and Forensics 2017, Burlingame, CA, USA, 29 January 2017, 2017

2016
Automatic Detection of Object-Based Forgery in Advanced Video.
IEEE Trans. Circuits Syst. Video Technol., 2016

Clustering Steganographic Modification Directions for Color Components.
IEEE Signal Process. Lett., 2016

Large-scale JPEG steganalysis using hybrid deep-learning framework.
CoRR, 2016

2015
Statistical Model of JPEG Noises and Its Application in Quantization Step Estimation.
IEEE Trans. Image Process., 2015

A Strategy of Clustering Modification Directions in Spatial Image Steganography.
IEEE Trans. Inf. Forensics Secur., 2015

Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis.
IEEE Trans. Inf. Forensics Secur., 2015

Steganalysis of LSB replacement for multivariate Gaussian covers.
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015

A new detector of LSB matching steganography based on likelihood ratio test for multivariate Gaussian covers.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2015

GOP based automatic detection of object-based forgery in advanced video.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2015

2014
Investigation on Cost Assignment in Spatial Image Steganography.
IEEE Trans. Inf. Forensics Secur., 2014

JPEG Noises beyond the First Compression Cycle.
CoRR, 2014

A new cost function for spatial image steganography.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

Stacked convolutional auto-encoders for steganalysis of digital images.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2014

2013
General Framework to Histogram-Shifting-Based Reversible Data Hiding.
IEEE Trans. Image Process., 2013

Steganalysis of a PVD-based content adaptive image steganography.
Signal Process., 2013

High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion.
Signal Process., 2013

2012
Targeted Steganalysis of Edge Adaptive Image Steganography Based on LSB Matching Revisited Using B-Spline Fitting.
IEEE Signal Process. Lett., 2012

Targeted steganalysis of adaptive pixel-value differencing steganography.
Proceedings of the 19th IEEE International Conference on Image Processing, 2012

2011
A Survey on Image Steganography and Steganalysis.
J. Inf. Hiding Multim. Signal Process., 2011

2010
Image Steganalysis.
Proceedings of the Intelligent Multimedia Analysis for Security Applications, 2010

2009
Steganalysis of YASS.
IEEE Trans. Inf. Forensics Secur., 2009

2008
Steganalysis of Multiple-Base Notational System Steganography.
IEEE Signal Process. Lett., 2008

Textural features based universal steganalysis.
Proceedings of the Security, 2008

Detecting doubly compressed JPEG images by using Mode Based First Digit Features.
Proceedings of the International Workshop on Multimedia Signal Processing, 2008

Universal JPEG steganalysis based on microscopic and macroscopic calibration.
Proceedings of the International Conference on Image Processing, 2008

2007
Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

Steganalysis of LSB Greedy Embedding Algorithm for JPEG Images using Coefficient Symmetry.
Proceedings of the International Conference on Image Processing, 2007

Attack LSB Matching Steganography by Counting Alteration Rate of the Number of Neighbourhood Gray Levels.
Proceedings of the International Conference on Image Processing, 2007


  Loading...