Jiangqun Ni
Orcid: 0000-0002-7520-9031
According to our database1,
Jiangqun Ni
authored at least 112 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
ACM Trans. Multim. Comput. Commun. Appl., November, 2024
Lite Localization Network and DUE-Based Watermarking for Color Image Copyright Protection.
IEEE Trans. Circuits Syst. Video Technol., October, 2024
Domain Transformation of Distortion Costs for Efficient JPEG Steganography with Symmetric Embedding.
Symmetry, May, 2024
Multim. Tools Appl., January, 2024
Efficient Audio Steganography Using Generalized Audio Intrinsic Energy With Micro-Amplitude Modification Suppression.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Signal Process. Lett., 2024
Signal Process., 2024
An efficient distortion cost function design for image steganography in spatial domain using quaternion representation.
Signal Process., 2024
CoRR, 2024
Fake It till You Make It: Curricular Dynamic Forgery Augmentations towards General Deepfake Detection.
CoRR, 2024
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Fine-Grained Depth Knowledge Distillation for Cloth-Changing Person Re-identification.
Proceedings of the International Joint Conference on Neural Networks, 2024
Diff-IFL: Towards General Image Forgery Localization using Diffusion Probabilistic Model.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024
Fake It till You Make It: Curricular Dynamic Forgery Augmentations Towards General Deepfake Detection.
Proceedings of the Computer Vision - ECCV 2024, 2024
DiffForensics: Leveraging Diffusion Prior to Image Forgery Detection and Localization.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Multiple Histograms-Based Reversible Data Hiding Using Fast Performance Optimization and Adaptive Pixel Distribution.
Comput. J., November, 2023
A Customized Deep Network Based Encryption-Then-Lossy-Compression Scheme of Color Images Achieving Arbitrary Compression Ratios.
IEEE Trans. Circuits Syst. Video Technol., August, 2023
Efficient Video Steganalytic Feature Design by Exploiting Local Optimality and Lagrangian Cost Quotient.
Symmetry, February, 2023
A Novel Encryption-Then-Lossy-Compression Scheme of Color Images Using Customized Residual Dense Spatial Network.
IEEE Trans. Multim., 2023
A Novel Deep Video Watermarking Framework with Enhanced Robustness to H.264/AVC Compression.
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023
2022
Dual-Domain Generative Adversarial Network for Digital Image Operation Anti-Forensics.
IEEE Trans. Circuits Syst. Video Technol., 2022
A Novel Video Steganographic Scheme Incorporating the Consistency Degree of Motion Vectors.
IEEE Trans. Circuits Syst. Video Technol., 2022
A stable meaningful image encryption scheme using the newly-designed 2D discrete fractional-order chaotic map and Bayesian compressive sensing.
Signal Process., 2022
Corrigendum to 'Evading generated-image detectors: A deep dithering approach' [Signal Processing 197(2022) 108558].
Signal Process., 2022
Signal Process., 2022
A visually secure image encryption scheme using adaptive-thresholding sparsification compression sensing model and newly-designed memristive chaotic map.
Inf. Sci., 2022
Towards improving the security of image steganography via minimizing the spatial embedding impact.
Digit. Signal Process., 2022
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022
Effective JPEG Steganalysis Using Non-Linear Pre-Processing and Residual Channel-Spatial Attention.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
Image Steganography With Symmetric Embedding Using Gaussian Markov Random Field Model.
IEEE Trans. Circuits Syst. Video Technol., 2021
Multi-semantic CRF-based attention model for image forgery detection and localization.
Signal Process., 2021
Efficient Anti-Glare Ceramic Decals Defect Detection by Incorporating Homomorphic Filtering.
Comput. Syst. Sci. Eng., 2021
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021
Self-supervised Domain Adaptation for Forgery Localization of JPEG Compressed Images.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021
2020
IEEE Trans. Circuits Syst. Video Technol., 2020
Comput. J., 2020
IEEE Access, 2020
Proceedings of the IEEE International Conference on Multimedia and Expo, 2020
A Dense U-Net with Cross-Layer Intersection for Detection and Localization of Image Forgery.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020
2019
Signal Process., 2019
An Efficient JPEG Steganographic Scheme Design Using Domain Transformation of Embedding Cost.
CoRR, 2019
Image Steganography Using an Eight-Element Neighborhood Gaussian Markov Random Field Model.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019
A Customized Convolutional Neural Network with Low Model Complexity for JPEG Steganalysis.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
A New Distortion Function Design for JPEG Steganography Using the Generalized Uniform Embedding Strategy.
IEEE Trans. Circuits Syst. Video Technol., 2018
IEEE Signal Process. Lett., 2018
J. Electronic Imaging, 2018
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
2017
Blind Forensics of Successive Geometric Transformations in Digital Images Using Spectral Method: Theory and Applications.
IEEE Trans. Image Process., 2017
IEEE Trans. Inf. Forensics Secur., 2017
Rate and Distortion Optimization for Reversible Data Hiding Using Multiple Histogram Shifting.
IEEE Trans. Cybern., 2017
IEEE Signal Process. Lett., 2017
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017
2016
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering.
Signal Process. Image Commun., 2016
Multim. Tools Appl., 2016
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016
Efficient HS based Reversible Data Hiding Using Multi-feature Complexity Measure and Optimized Histogram.
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
A Tunable Bound of the Embedding Level for Reversible Data Hiding with Contrast Enhancement.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
2015
J. Signal Process. Syst., 2015
IEEE Trans. Inf. Forensics Secur., 2015
Signal Process. Image Commun., 2015
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015
2014
IEEE Trans. Inf. Forensics Secur., 2014
IEEE Signal Process. Lett., 2014
An efficient reversible data hiding scheme using prediction and optimal side information selection.
J. Vis. Commun. Image Represent., 2014
2013
Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach.
IEEE Trans. Image Process., 2013
Region duplication detection based on Harris corner points and step sector statistics.
J. Vis. Commun. Image Represent., 2013
Counteracting geometrical attacks on robust image watermarking by constructing a deformable pyramid transform.
EURASIP J. Adv. Signal Process., 2013
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013
2012
IEEE Trans. Inf. Forensics Secur., 2012
An Adaptive JPEG Steganographic Scheme Based on the Block Entropy of DCT Coefficients.
Int. J. Digit. Crime Forensics, 2012
An Image Region Description Method Based on Step Sector Statistics and its Application in Image Copy-Rotate/Flip-Move Forgery Detection.
Int. J. Digit. Crime Forensics, 2012
Improved Histogram Shifting Technique for Low Payload Embedding by Using a Rate-Distortion Model and Optimal Side Information Selection.
IEICE Trans. Inf. Syst., 2012
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
Proceedings of the Information Hiding - 14th International Conference, 2012
An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012
2011
A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011
2010
Proceedings of the Information Hiding - 12th International Conference, 2010
A New Spread Spectrum Watermarking Scheme to Achieve a Trade-Off between Security and Robustness.
Proceedings of the Information Hiding - 12th International Conference, 2010
A geometrically resilient robust image watermarking scheme using deformable multi-scale transform.
Proceedings of the International Conference on Image Processing, 2010
A fast performance estimation scheme for histogram shifting based multi-layer embedding.
Proceedings of the International Conference on Image Processing, 2010
2009
IEEE Trans. Consumer Electron., 2009
Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009
2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Proceedings of the Digital Watermarking, 7th International Workshop, 2008
Security Analysis for Spread-Spectrum Watermarking Incorporating Statistics of Natural Images.
Proceedings of the Advances in Visual Computing, 4th International Symposium, 2008
Proceedings of the Information Hiding, 10th International Workshop, 2008
2007
A Modified Kernels-Alternated Error Diffusion Watermarking Algorithm for Halftone Images.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007
Robust and High Capacity Image Watermarking Based on Jointly Coding and Embedding Optimization.
Proceedings of the Information Hiding, 9th International Workshop, 2007
A GA-Based Joint Coding and Embedding Optimization for Robust and High Capacity Image Watermarking.
Proceedings of the IEEE International Conference on Acoustics, 2007
2006
A Rotation-Invariant Secure Image Watermarking Algorithm Incorporating Steerable Pyramid Transform.
Proceedings of the Digital Watermarking, 5th International Workshop, 2006
Performance Enhancement for DWT-HMM Image Watermarking with Content-Adaptive Approach.
Proceedings of the International Conference on Image Processing, 2006
2005
A RST-Invariant Robust DWT-HMM Watermarking Algorithm Incorporating Zernike Moments and Template.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
Proceedings of the Digital Watermarking, 4th International Workshop, 2005