Jiwu Huang
Orcid: 0000-0002-7625-5689Affiliations:
- Shenzhen University, Guangdong Key Laboratory of Intelligent Information Processing, China
- Chinese Academy of Science, Institute of Automation, Beijing, China (PhD 1998)
According to our database1,
Jiwu Huang
authored at least 360 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Awards
IEEE Fellow
IEEE Fellow 2016, "For contributions to multimedia data hiding and forensics".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Int. J. Comput. Vis., November, 2024
IEEE Trans. Comput. Soc. Syst., October, 2024
Interactive Generative Adversarial Networks With High-Frequency Compensation for Facial Attribute Editing.
IEEE Trans. Circuits Syst. Video Technol., September, 2024
IEEE Trans. Neural Networks Learn. Syst., July, 2024
Fundus Image Enhancement via Semi-Supervised GAN and Anatomical Structure Preservation.
IEEE Trans. Emerg. Top. Comput. Intell., February, 2024
IEEE Trans. Inf. Forensics Secur., 2024
Audio Multi-View Spoofing Detection Framework Based on Audio-Text-Emotion Correlations.
IEEE Trans. Inf. Forensics Secur., 2024
Color Image Steganalysis Based on Pixel Difference Convolution and Enhanced Transformer With Selective Pooling.
IEEE Trans. Inf. Forensics Secur., 2024
Joint Cost Learning and Payload Allocation With Image-Wise Attention for Batch Steganography.
IEEE Trans. Inf. Forensics Secur., 2024
Employing Reinforcement Learning to Construct a Decision-Making Environment for Image Forgery Localization.
IEEE Trans. Inf. Forensics Secur., 2024
Beyond the Prior Forgery Knowledge: Mining Critical Clues for General Face Forgery Detection.
IEEE Trans. Inf. Forensics Secur., 2024
One-Class Neural Network With Directed Statistics Pooling for Spoofing Speech Detection.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Distortion Model-Based Spectral Augmentation for Generalized Recaptured Document Detection.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Signal Process. Lett., 2024
A knowledge distillation based deep learning framework for cropped images detection in spatial domain.
Signal Process. Image Commun., 2024
Signal Process., 2024
An efficient distortion cost function design for image steganography in spatial domain using quaternion representation.
Signal Process., 2024
Expert Syst. Appl., 2024
GAN-based Symmetric Embedding Costs Adjustment for Enhancing Image Steganographic Security.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
A Novel Universal Image Forensics Localization Model Based on Image Noise and Segment Anything Model.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2024
A Keyless Extraction Framework Targeting at Deep Learning Based Image-Within-Image Models.
Proceedings of the IEEE International Conference on Acoustics, 2024
CMA: A Chromaticity Map Adapter for Robust Detection of Screen-Recapture Document Images.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
IEEE Trans. Circuits Syst. Video Technol., November, 2023
Reinforcement learning of non-additive joint steganographic embedding costs with attention mechanism.
Sci. China Inf. Sci., March, 2023
IEEE Trans. Inf. Forensics Secur., 2023
Dynamic Difference Learning With Spatio-Temporal Correlation for Deepfake Video Detection.
IEEE Trans. Inf. Forensics Secur., 2023
Query-Efficient Adversarial Attack With Low Perturbation Against End-to-End Speech Recognition Systems.
IEEE Trans. Inf. Forensics Secur., 2023
ReLOAD: Using Reinforcement Learning to Optimize Asymmetric Distortion for Additive Steganography.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
An Adaptive IPM-Based HEVC Video Steganography via Minimizing Non-Additive Distortion.
IEEE Trans. Dependable Secur. Comput., 2023
STD-NET: Search of Image Steganalytic Deep-Learning Architecture via Hierarchical Tensor Decomposition.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Non-Interactive Privacy-Preserving Frequent Itemset Mining Over Encrypted Cloud Data.
IEEE Trans. Cloud Comput., 2023
IEEE Signal Process. Lett., 2023
CoRR, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the Digital Forensics and Watermarking - 22nd International Workshop, 2023
Poster: Query-efficient Black-box Attack for Image Forgery Localization via Reinforcement Learning.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the Artificial Intelligence Security and Privacy, 2023
2022
Eyes in the Skies: A Data-driven Fusion Approach to Identifying Drug Crops from Remote Sensing Images Dataset.
Dataset, May, 2022
Self-Adversarial Training Incorporating Forgery Attention for Image Forgery Localization.
IEEE Trans. Inf. Forensics Secur., 2022
Universal Deep Network for Steganalysis of Color Image Based on Channel Representation.
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Inf. Forensics Secur., 2022
Secret Sharing Based Reversible Data Hiding in Encrypted Images With Multiple Data-Hiders.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Cybern., 2022
IEEE Trans. Cybern., 2022
IEEE Trans. Circuits Syst. Video Technol., 2022
IEEE Trans. Circuits Syst. Video Technol., 2022
Gradually Enhanced Adversarial Perturbations on Color Pixel Vectors for Image Steganography.
IEEE Trans. Circuits Syst. Video Technol., 2022
A Novel Video Steganographic Scheme Incorporating the Consistency Degree of Motion Vectors.
IEEE Trans. Circuits Syst. Video Technol., 2022
One-Class Double Compression Detection of Advanced Videos Based on Simple Gaussian Distribution Model.
IEEE Trans. Circuits Syst. Video Technol., 2022
IEEE Signal Process. Lett., 2022
Signal Process. Image Commun., 2022
Corrigendum to 'Evading generated-image detectors: A deep dithering approach' [Signal Processing 197(2022) 108558].
Signal Process., 2022
Signal Process., 2022
Efficient image tampering localization using semi-fragile watermarking and error control codes.
Signal Process., 2022
Multim. Tools Appl., 2022
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022
Proceedings of the IEEE International Conference on Acoustics, 2022
2021
IEEE Trans. Image Process., 2021
IEEE Trans. Inf. Forensics Secur., 2021
Robust Privacy-Preserving Motion Detection and Object Tracking in Encrypted Streaming Video.
IEEE Trans. Inf. Forensics Secur., 2021
An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning.
IEEE Trans. Inf. Forensics Secur., 2021
CALPA-NET: Channel-Pruning-Assisted Deep Residual Network for Steganalysis of Digital Images.
IEEE Trans. Inf. Forensics Secur., 2021
MCTSteg: A Monte Carlo Tree Search-Based Reinforcement Learning Framework for Universal Non-Additive Steganography.
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Circuits Syst. Video Technol., 2021
IEEE Trans. Circuits Syst. Video Technol., 2021
IEEE Trans. Circuits Syst. Video Technol., 2021
J. Vis. Commun. Image Represent., 2021
A novel deep learning framework for double JPEG compression detection of small size blocks.
J. Vis. Commun. Image Represent., 2021
Image Steganography based on Iteratively Adversarial Samples of A Synchronized-directions Sub-image.
CoRR, 2021
Image Steganography Based on Iterative Adversarial Perturbations Onto a Synchronized-Directions Sub-Image.
Proceedings of the IEEE International Conference on Acoustics, 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
Face Spoofing Detection Based on Local Ternary Label Supervision in Fully Convolutional Networks.
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Circuits Syst. Video Technol., 2020
IEEE Trans. Circuits Syst. Video Technol., 2020
IEEE Trans. Circuits Syst. Video Technol., 2020
IEEE Trans. Circuits Syst. Video Technol., 2020
A novel selective encryption scheme for H.264/AVC video with improved visual security.
Signal Process. Image Commun., 2020
Identification of deep network generated images using disparities in color components.
Signal Process., 2020
Editorial: Media Authentication and Forensics - New Solutions and Research Opportunities.
IEEE J. Sel. Top. Signal Process., 2020
J. Inf. Secur. Appl., 2020
Sci. China Inf. Sci., 2020
IEEE Access, 2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
IEEE Trans. Inf. Forensics Secur., 2019
Robust Copy-Move Detection of Speech Recording Using Similarities of Pitch and Formant.
IEEE Trans. Inf. Forensics Secur., 2019
IEEE Trans. Inf. Forensics Secur., 2019
Patchwork-Based Audio Watermarking Robust Against De-Synchronization and Recapturing Attacks.
IEEE Trans. Inf. Forensics Secur., 2019
IEEE Trans. Circuits Syst. Video Technol., 2019
Eyes in the Skies: A Data-Driven Fusion Approach to Identifying Drug Crops From Remote Sensing Images.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2019
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2019
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019
A New Spatial Steganographic Scheme by Modeling Image Residuals with Multivariate Gaussian Model.
Proceedings of the IEEE International Conference on Acoustics, 2019
2018
ACM Trans. Multim. Comput. Commun. Appl., 2018
IEEE Trans. Multim., 2018
Efficient Encrypted Images Filtering and Transform Coding With Walsh-Hadamard Transform and Parallelization.
IEEE Trans. Image Process., 2018
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Trans. Circuits Syst. Video Technol., 2018
Signal Process. Image Commun., 2018
Detecting median filtering via two-dimensional AR models of multiple filtered residuals.
Multim. Tools Appl., 2018
J. Vis. Commun. Image Represent., 2018
Neurocomputing, 2018
Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control.
Future Gener. Comput. Syst., 2018
CoRR, 2018
CoRR, 2018
Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, 2018
A Controllable Efficient Content Distribution Framework Based on Blockchain and ISODATA.
Proceedings of the 17th IEEE International Conference On Trust, 2018
A Privacy-Preserving Multipurpose Watermarking Scheme for Audio Authentication and Protection.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018
Edge Detection and Image Segmentation on Encrypted Image with Homomorphic Encryption and Garbled Circuit.
Proceedings of the 2018 IEEE International Conference on Multimedia and Expo, 2018
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018
2017
ACM Trans. Multim. Comput. Commun. Appl., 2017
Pixel-Decimation-Assisted Steganalysis of Synchronize-Embedding-Changes Steganography.
IEEE Trans. Inf. Forensics Secur., 2017
IEEE Trans. Inf. Forensics Secur., 2017
IEEE Trans. Inf. Forensics Secur., 2017
IEEE Trans. Inf. Forensics Secur., 2017
IEEE Trans. Inf. Forensics Secur., 2017
IEEE Trans. Inf. Forensics Secur., 2017
IEEE Signal Process. Lett., 2017
Multim. Tools Appl., 2017
Multim. Tools Appl., 2017
J. Vis. Commun. Image Represent., 2017
Ciphertext policy attribute-based encryption supporting unbounded attribute space from R-LWE.
KSII Trans. Internet Inf. Syst., 2017
Anti-Forensics of Camera Identification and the Triangle Test by Improved Fingerprint-Copy Attack.
CoRR, 2017
Pre-training via fitting deep neural network to rich-model features extraction procedure and its effect on deep learning for steganalysis.
Proceedings of the Media Watermarking, Security, and Forensics 2017, Burlingame, CA, USA, 29 January 2017, 2017
Proceedings of the International Conference on Video and Image Processing, 2017
2016
ACM Trans. Multim. Comput. Commun. Appl., 2016
Multi-Scale Fusion for Improved Localization of Malicious Tampering in Digital Images.
IEEE Trans. Image Process., 2016
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Circuits Syst. Video Technol., 2016
IEEE Trans. Circuits Syst. Video Technol., 2016
IEEE Signal Process. Lett., 2016
IEEE Signal Process. Lett., 2016
Improved Tampering Localization in Digital Image Forensics Based on Maximal Entropy Random Walk.
IEEE Signal Process. Lett., 2016
Robust image watermarking based on Tucker decomposition and Adaptive-Lattice Quantization Index Modulation.
Signal Process. Image Commun., 2016
Authentication and recovery algorithm for speech signal based on digital watermarking.
Signal Process., 2016
Signal Process., 2016
Quantum Inf. Process., 2016
J. Vis. Commun. Image Represent., 2016
IEEE Access Special Section Editorial: Latest Advances and Emerging Applications of Data Hiding.
IEEE Access, 2016
Evaluation of random field models in multi-modal unsupervised tampering localization.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016
Proceedings of the Computer Vision - ACCV 2016, 2016
2015
Statistical Model of JPEG Noises and Its Application in Quantization Step Estimation.
IEEE Trans. Image Process., 2015
IEEE Trans. Inf. Forensics Secur., 2015
Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis.
IEEE Trans. Inf. Forensics Secur., 2015
Multim. Tools Appl., 2015
J. Vis. Commun. Image Represent., 2015
J. Vis. Commun. Image Represent., 2015
Digit. Signal Process., 2015
Digit. Signal Process., 2015
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015
2014
ACM Trans. Multim. Comput. Commun. Appl., 2014
ACM Trans. Multim. Comput. Commun. Appl., 2014
IEEE Trans. Inf. Forensics Secur., 2014
IEEE Trans. Inf. Forensics Secur., 2014
IEEE Trans. Circuits Syst. Video Technol., 2014
Geometric invariant features in the Radon transform domain for near-duplicate image detection.
Pattern Recognit., 2014
Detecting video frame-rate up-conversion based on periodic properties of inter-frame similarity.
Multim. Tools Appl., 2014
Digit. Signal Process., 2014
A framework for identifying shifted double JPEG compression artifacts with application to non-intrusive digital image forensics.
Sci. China Inf. Sci., 2014
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014
Proceedings of the 22nd International Conference on Pattern Recognition, 2014
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014
Fast and accurate Nearest Neighbor search in the manifolds of symmetric positive definite matrices.
Proceedings of the IEEE International Conference on Acoustics, 2014
Proceedings of the IEEE International Conference on Acoustics, 2014
Proceedings of the IEEE China Summit & International Conference on Signal and Information Processing, 2014
2013
Discrete Wavelet Transform and Data Expansion Reduction in Homomorphic Encrypted Domain.
IEEE Trans. Image Process., 2013
Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach.
IEEE Trans. Image Process., 2013
Region duplication detection based on Harris corner points and step sector statistics.
J. Vis. Commun. Image Represent., 2013
Proceedings of the ACM Multimedia Conference, 2013
Improved Algorithm of Edge Adaptive Image Steganography Based on LSB Matching Revisited Algorithm.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013
Proceedings of the IEEE International Conference on Image Processing, 2013
Proceedings of the IEEE International Conference on Image Processing, 2013
Proceedings of the IEEE International Conference on Acoustics, 2013
Proceedings of the IEEE International Conference on Acoustics, 2013
2012
ACM Trans. Multim. Comput. Commun. Appl., 2012
ACM Trans. Multim. Comput. Commun. Appl., 2012
IEEE Trans. Inf. Forensics Secur., 2012
IEEE Trans. Inf. Forensics Secur., 2012
Enhancing Source Camera Identification Performance With a Camera Reference Phase Sensor Pattern Noise.
IEEE Trans. Inf. Forensics Secur., 2012
IEEE Trans. Inf. Forensics Secur., 2012
Controllable Secure Watermarking Technique for Tradeoff Between Robustness and Security.
IEEE Trans. Inf. Forensics Secur., 2012
IEEE Trans. Circuits Syst. Video Technol., 2012
Reversible image watermarking on prediction errors by efficient histogram modification.
Signal Process., 2012
Pattern Recognit., 2012
Sci. China Inf. Sci., 2012
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012
Walsh-Hadamard Transform in the Homomorphic Encrypted Domain and Its Application in Image Watermarking.
Proceedings of the Information Hiding - 14th International Conference, 2012
Proceedings of the Information Hiding - 14th International Conference, 2012
Proceedings of the 19th IEEE International Conference on Image Processing, 2012
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012
Identifying Shifted Double JPEG Compression Artifacts for Non-intrusive Digital Image Forensics.
Proceedings of the Computational Visual Media - First International Conference, 2012
2011
IEEE Trans. Multim., 2011
IEEE Signal Process. Lett., 2011
Signal Process. Image Commun., 2011
Signal Process., 2011
Multim. Tools Appl., 2011
Multim. Tools Appl., 2011
J. Inf. Hiding Multim. Signal Process., 2011
IET Inf. Secur., 2011
Implementation of the discrete wavelet transform and multiresolution analysis in the encrypted domain.
Proceedings of the 19th International Conference on Multimedia 2011, Scottsdale, AZ, USA, November 28, 2011
Proceedings of the Media Forensics and Security III, 2011
Proceedings of the Media Forensics and Security III, 2011
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011
Proceedings of the 18th IEEE International Conference on Image Processing, 2011
Proceedings of the 18th IEEE International Conference on Image Processing, 2011
2010
Proceedings of the Intelligent Multimedia Analysis for Security Applications, 2010
IEEE Trans. Inf. Forensics Secur., 2010
Detection of Quantization Artifacts and Its Applications to Transform Encoder Identification.
IEEE Trans. Inf. Forensics Secur., 2010
IEEE Trans. Inf. Forensics Secur., 2010
IEEE Trans. Inf. Forensics Secur., 2010
Efficient general print-scanning resilient data hiding based on uniform log-polar mapping.
IEEE Trans. Inf. Forensics Secur., 2010
IEEE Trans. Inf. Forensics Secur., 2010
IEEE Trans. Inf. Forensics Secur., 2010
Audio Watermarking Scheme Robust against Desynchronization Based on the Dyadic Wavelet Transform.
EURASIP J. Adv. Signal Process., 2010
EURASIP J. Adv. Signal Process., 2010
Proceedings of the Media Forensics and Security II, 2010
Discriminating Computer Graphics Images and Natural Images Using Hidden Markov Tree Model.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010
Proceedings of the Digital Watermarking - 9th International Workshop, 2010
Proceedings of the Information Hiding - 12th International Conference, 2010
A New Spread Spectrum Watermarking Scheme to Achieve a Trade-Off between Security and Robustness.
Proceedings of the Information Hiding - 12th International Conference, 2010
Provably Secure Spread-Spectrum Watermarking Schemes in the Known Message Attack Framework.
Proceedings of the Information Hiding - 12th International Conference, 2010
A geometrically resilient robust image watermarking scheme using deformable multi-scale transform.
Proceedings of the International Conference on Image Processing, 2010
Proceedings of the International Conference on Image Processing, 2010
2009
IEEE Trans. Inf. Forensics Secur., 2009
Discriminating between photorealistic computer graphics and natural images using fractal geometry.
Sci. China Ser. F Inf. Sci., 2009
Sci. China Ser. F Inf. Sci., 2009
Proceedings of the Multimedia and Security Workshop, 2009
Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009
Proceedings of the Information Hiding, 11th International Workshop, 2009
Proceedings of the International Conference on Image Processing, 2009
2008
IEEE Trans. Multim., 2008
Invariant Image Watermarking Based on Statistical Features in the Low-Frequency Domain.
IEEE Trans. Circuits Syst. Video Technol., 2008
IEEE Signal Process. Lett., 2008
Signal Process., 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Sci. China Ser. F Inf. Sci., 2008
Proceedings of the Security, 2008
Proceedings of the International Workshop on Multimedia Signal Processing, 2008
Proceedings of the 10th workshop on Multimedia & Security, 2008
Proceedings of the Digital Watermarking, 7th International Workshop, 2008
Proceedings of the Digital Watermarking, 7th International Workshop, 2008
Proceedings of the Digital Watermarking, 7th International Workshop, 2008
Proceedings of the Digital Watermarking, 7th International Workshop, 2008
Proceedings of the Information Hiding, 10th International Workshop, 2008
Proceedings of the International Conference on Image Processing, 2008
Proceedings of the International Conference on Image Processing, 2008
Proceedings of the International Conference on Image Processing, 2008
A convolutive mixing model for shifted double JPEG compression with application to passive image authentication.
Proceedings of the IEEE International Conference on Acoustics, 2008
2007
Histogram-Based Audio Watermarking Against Time-Scale Modification and Cropping Attacks.
IEEE Trans. Multim., 2007
Robust Image Watermarking Based on Multiband Wavelets and Empirical Mode Decomposition.
IEEE Trans. Image Process., 2007
Frontiers Comput. Sci. China, 2007
Audio watermarking robust to geometrical distortions based on dyadic wavelet transform.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007
Proceedings of the 9th workshop on Multimedia & Security, 2007
Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007
Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
Robust and High Capacity Image Watermarking Based on Jointly Coding and Embedding Optimization.
Proceedings of the Information Hiding, 9th International Workshop, 2007
Proceedings of the International Conference on Image Processing, 2007
Steganalysis of LSB Greedy Embedding Algorithm for JPEG Images using Coefficient Symmetry.
Proceedings of the International Conference on Image Processing, 2007
Attack LSB Matching Steganography by Counting Alteration Rate of the Number of Neighbourhood Gray Levels.
Proceedings of the International Conference on Image Processing, 2007
A GA-Based Joint Coding and Embedding Optimization for Robust and High Capacity Image Watermarking.
Proceedings of the IEEE International Conference on Acoustics, 2007
Proceedings of the IEEE International Conference on Acoustics, 2007
2006
IEEE Trans. Circuits Syst. Video Technol., 2006
Int. J. Netw. Secur., 2006
IACR Cryptol. ePrint Arch., 2006
Sci. China Ser. F Inf. Sci., 2006
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006
Proceedings of the Advances in Multimedia Information Processing, 2006
Proceedings of the Digital Watermarking, 5th International Workshop, 2006
A Rotation-Invariant Secure Image Watermarking Algorithm Incorporating Steerable Pyramid Transform.
Proceedings of the Digital Watermarking, 5th International Workshop, 2006
Time-Scale Invariant Audio Watermarking Based on the Statistical Features in Time Domain.
Proceedings of the Information Hiding, 8th International Workshop, 2006
Near-Duplicate Image Recognition and Content-based Image Retrieval using Adaptive Hierarchical Geometric Centroids.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006
Steganalysis of JPEG2000 Lazy-Mode Steganography using the Hilbert-Huang Transform Based Sequential Analysis.
Proceedings of the International Conference on Image Processing, 2006
Performance Enhancement for DWT-HMM Image Watermarking with Content-Adaptive Approach.
Proceedings of the International Conference on Image Processing, 2006
Proceedings of the International Conference on Image Processing, 2006
2005
Efficiently self-synchronized audio watermarking for assured audio data transmission.
IEEE Trans. Broadcast., 2005
Int. J. Image Graph., 2005
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
A RST-Invariant Robust DWT-HMM Watermarking Algorithm Incorporating Zernike Moments and Template.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
Proceedings of the Digital Watermarking, 4th International Workshop, 2005
Proceedings of the Digital Watermarking, 4th International Workshop, 2005
A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005
Proceedings of the Information Security Practice and Experience, 2005
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005
Proceedings of the 2005 International Conference on Image Processing, 2005
Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform.
Proceedings of the Digital Rights Management: Technologies, 2005
Proceedings of the Digital Rights Management: Technologies, 2005
Reversible Data Hiding for Image Based on Histogram Modification of Wavelet Coefficients.
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005
A Secure Semi-Fragile Watermarking for Image Authentication Based on Integer Wavelet Transform with Parameters Abstract.
Proceedings of the ACSW Frontiers 2005, 2005 ACSW Workshops, 2005
2004
Self-synchronized audio watermark in DWT domain.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004
Using invisible watermarks to protect visibly watermarked images.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004
CDMA-based watermarking resisting to cropping.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004
Proceedings of the 2004 International Conference on Image Processing, 2004
Proceedings of the 2004 International Conference on Image Processing, 2004
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
2003
A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression.
IEEE Trans. Circuits Syst. Video Technol., 2003
Proceedings of the Digital Watermarking, Second International Workshop, 2003
Proceedings of the Digital Watermarking, Second International Workshop, 2003
2-D and 3-D successive packing interleaving techniques and their applications to image and video data hiding.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003
Proceedings of the Information Security and Cryptology, 2003
Proceedings of the Information Security and Cryptology, 2003
2002
Proceedings of the Digital Watermarking, First International Workshop, 2002
Proceedings of the Digital Watermarking, First International Workshop, 2002
2001
Proceedings of the 2001 International Symposium on Circuits and Systems, 2001
Proceedings of the 2001 IEEE International Conference on Multimedia and Expo, 2001
Proceedings of the 2001 IEEE International Conference on Multimedia and Expo, 2001
2000
IEEE Trans. Circuits Syst. Video Technol., 2000
1998
Proceedings of the Second IEEE Workshop on Multimedia Signal Processing, 1998