Fangjun Huang

Orcid: 0000-0002-3098-3373

According to our database1, Fangjun Huang authored at least 58 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
MaGAT: Mask-Guided Adversarial Training for Defending Face Editing GAN Models From Proactive Defense.
IEEE Signal Process. Lett., 2024

Face Omron Ring: Proactive defense against face forgery with identity awareness.
Neural Networks, 2024

Fast hypercomplex continuous orthogonal moments.
Expert Syst. Appl., 2024

Patch Attacks on Vision Transformer via Skip Attention Gradients.
Proceedings of the Pattern Recognition and Computer Vision - 7th Chinese Conference, 2024

Evading DeepFake Detectors via Conditional Diffusion Models.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2024

Enhancing Adversarial Transferability on Vision Transformer by Permutation-Invariant Attacks.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024

LOFT: Latent Space Optimization and Generator Fine-Tuning for Defending Against Deepfakes.
Proceedings of the IEEE International Conference on Acoustics, 2024

IDGuard: Robust, General, Identity-Centric POI Proactive Defense Against Face Editing Abuse.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

2023
Average Gradient-Based Adversarial Attack.
IEEE Trans. Multim., 2023

Adversarial Attack Based on Prediction-Correction.
CoRR, 2023

2022
New CNN-Based Predictor for Reversible Data Hiding.
IEEE Signal Process. Lett., 2022

Reversible data hiding in JPEG images based on coefficient-first selection.
Signal Process., 2022

Towards improving the security of image steganography via minimizing the spatial embedding impact.
Digit. Signal Process., 2022

Adaptive Robust Watermarking Method Based on Deep Neural Networks.
Proceedings of the Digital Forensics and Watermarking - 21st International Workshop, 2022

2021
PID-Based Approach to Adversarial Attacks.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Reversible data hiding for JPEG images based on pairwise nonzero AC coefficient expansion.
Signal Process., 2020

Reversible Data Hiding Based on Adaptive Block Selection Strategy.
Int. J. Digit. Crime Forensics, 2020

A Torus-Chaotic System and Its Pseudorandom Properties.
Complex., 2020

Reversible Data Hiding Based on Prediction-Error-Ordering.
Proceedings of the Pattern Recognition and Computer Vision, Third Chinese Conference, 2020

2019
Reversible Data Hiding With Automatic Brightness Preserving Contrast Enhancement.
IEEE Trans. Circuits Syst. Video Technol., 2019

Reversible Data Hiding Based on Multiple Two-Dimensional Histograms Modification.
IEEE Signal Process. Lett., 2019

Digital image forensics of non-uniform deblurring.
Signal Process. Image Commun., 2019

Designing adaptive JPEG steganography based on the statistical properties in spatial domain.
Multim. Tools Appl., 2019

Reversible data hiding in JPEG images based on zero coefficients and distortion cost function.
Multim. Tools Appl., 2019

Reversible Data Hiding in JPEG Images Using Quantized DC.
Entropy, 2019

Reversible Data Hiding Based on Partitioning the Prediction Values.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

JPEG Reversible Data Hiding with Matrix Embedding.
Proceedings of the Image and Graphics - 10th International Conference, 2019

Reversible Data Hiding in JPEG Images Based on Multiple Histograms Modification.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

2018
Reversible data hiding in encrypted images with high capacity by bitplane operations and adaptive embedding.
Multim. Tools Appl., 2018

Reversible Data Hiding in JPEG Images Based on Two-Dimensional Histogram Modification.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Improved reversible data hiding in JPEG images based on new coefficient selection strategy.
EURASIP J. Image Video Process., 2017

A New Universal Steganalyzer for JPEG Images.
Proceedings of the Machine Learning and Intelligent Communications, 2017

2016
New Framework for Reversible Data Hiding in Encrypted Domain.
IEEE Trans. Inf. Forensics Secur., 2016

Reversible Data Hiding in JPEG Images.
IEEE Trans. Circuits Syst. Video Technol., 2016

Framework for improving the security performance of ordinary distortion functions of JPEG steganography.
Multim. Tools Appl., 2016

2015
Local pixel patterns.
Comput. Vis. Media, 2015

Feature Selection for High Dimensional Steganalysis.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

2014
Reversible Data Hiding Based on Combined Predictor and Prediction Error Expansion.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Detection of double compression with the same bit rate in MPEG-2 videos.
Proceedings of the IEEE China Summit & International Conference on Signal and Information Processing, 2014

2013
Improved Algorithm of Edge Adaptive Image Steganography Based on LSB Matching Revisited Algorithm.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Distortion function designing for JPEG steganography with uncompressed side-image.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

2012
New Channel Selection Rule for JPEG Steganography.
IEEE Trans. Inf. Forensics Secur., 2012

New Channel Selection Criterion for Spatial Domain Steganography.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

2011
A more secure steganography based on adaptive pixel-value differencing scheme.
Multim. Tools Appl., 2011

Steganalysis of JPEG steganography with complementary embedding strategy.
IET Inf. Secur., 2011

2010
Image Steganalysis.
Proceedings of the Intelligent Multimedia Analysis for Security Applications, 2010

Edge adaptive image steganography based on LSB matching revisited.
IEEE Trans. Inf. Forensics Secur., 2010

Detecting Double JPEG Compression With the Same Quantization Matrix.
IEEE Trans. Inf. Forensics Secur., 2010

An experimental study on the security performance of YASS.
IEEE Trans. Inf. Forensics Secur., 2010

New JPEG Steganographic Scheme with High Security Performance.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010

2009
Calibration based universal JPEG steganalysis.
Sci. China Ser. F Inf. Sci., 2009

2008
A New General Transparency Model for Block-based Watermarking Method.
Int. J. Netw. Secur., 2008

A study on security performance of YASS.
Proceedings of the International Conference on Image Processing, 2008

Universal JPEG steganalysis based on microscopic and macroscopic calibration.
Proceedings of the International Conference on Image Processing, 2008

2007
Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

Steganalysis of LSB Greedy Embedding Algorithm for JPEG Images using Coefficient Symmetry.
Proceedings of the International Conference on Image Processing, 2007

Attack LSB Matching Steganography by Counting Alteration Rate of the Number of Neighbourhood Gray Levels.
Proceedings of the International Conference on Image Processing, 2007

2004
A hybrid SVD-DCT watermarking method based on LPSNR.
Pattern Recognit. Lett., 2004


  Loading...