Jiwu Huang

Orcid: 0000-0002-7625-5689

Affiliations:
  • Shenzhen University, Guangdong Key Laboratory of Intelligent Information Processing, China
  • Chinese Academy of Science, Institute of Automation, Beijing, China (PhD 1998)


According to our database1, Jiwu Huang authored at least 362 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Awards

IEEE Fellow

IEEE Fellow 2016, "For contributions to multimedia data hiding and forensics".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Fine-Grained Multimodal DeepFake Classification via Heterogeneous Graphs.
Int. J. Comput. Vis., November, 2024

FairCMS: Cloud Media Sharing With Fair Copyright Protection.
IEEE Trans. Comput. Soc. Syst., October, 2024

Interactive Generative Adversarial Networks With High-Frequency Compensation for Facial Attribute Editing.
IEEE Trans. Circuits Syst. Video Technol., September, 2024

Detection of Deepfake Videos Using Long-Distance Attention.
IEEE Trans. Neural Networks Learn. Syst., July, 2024

Fundus Image Enhancement via Semi-Supervised GAN and Anatomical Structure Preservation.
IEEE Trans. Emerg. Top. Comput. Intell., February, 2024

Adversarial Perturbation Prediction for Real-Time Protection of Speech Privacy.
IEEE Trans. Inf. Forensics Secur., 2024

Audio Multi-View Spoofing Detection Framework Based on Audio-Text-Emotion Correlations.
IEEE Trans. Inf. Forensics Secur., 2024

Color Image Steganalysis Based on Pixel Difference Convolution and Enhanced Transformer With Selective Pooling.
IEEE Trans. Inf. Forensics Secur., 2024

Joint Cost Learning and Payload Allocation With Image-Wise Attention for Batch Steganography.
IEEE Trans. Inf. Forensics Secur., 2024

Employing Reinforcement Learning to Construct a Decision-Making Environment for Image Forgery Localization.
IEEE Trans. Inf. Forensics Secur., 2024

Beyond the Prior Forgery Knowledge: Mining Critical Clues for General Face Forgery Detection.
IEEE Trans. Inf. Forensics Secur., 2024

One-Class Neural Network With Directed Statistics Pooling for Spoofing Speech Detection.
IEEE Trans. Inf. Forensics Secur., 2024

Steganography Embedding Cost Learning With Generative Multi-Adversarial Network.
IEEE Trans. Inf. Forensics Secur., 2024

Distortion Model-Based Spectral Augmentation for Generalized Recaptured Document Detection.
IEEE Trans. Inf. Forensics Secur., 2024

Secure Deep Learning Framework for Moving Object Detection in Compressed Video.
IEEE Trans. Dependable Secur. Comput., 2024

Enhanced Dynamic Analysis for Malware Detection With Gradient Attack.
IEEE Signal Process. Lett., 2024

A knowledge distillation based deep learning framework for cropped images detection in spatial domain.
Signal Process. Image Commun., 2024

Efficient JPEG image steganography using pairwise conditional random field model.
Signal Process., 2024

An efficient distortion cost function design for image steganography in spatial domain using quaternion representation.
Signal Process., 2024

A semi-supervised deep learning approach for cropped image detection.
Expert Syst. Appl., 2024

GAN-based Symmetric Embedding Costs Adjustment for Enhancing Image Steganographic Security.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

A Novel Universal Image Forensics Localization Model Based on Image Noise and Segment Anything Model.
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2024

Velocity Field-Based Surveillance Video Frame Deletion Detection Using Siamese Network.
Proceedings of the Pattern Recognition - 27th International Conference, 2024

A Keyless Extraction Framework Targeting at Deep Learning Based Image-Within-Image Models.
Proceedings of the IEEE International Conference on Acoustics, 2024

CMA: A Chromaticity Map Adapter for Robust Detection of Screen-Recapture Document Images.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

Two-Tier Data Packing in RLWE-based Homomorphic Encryption for Secure Federated Learning.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

SDGAN: Disentangling Semantic Manipulation for Facial Attribute Editing.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Anti-Rounding Image Steganography With Separable Fine-Tuned Network.
IEEE Trans. Circuits Syst. Video Technol., November, 2023

Reinforcement learning of non-additive joint steganographic embedding costs with attention mechanism.
Sci. China Inf. Sci., March, 2023

ReLoc: A Restoration-Assisted Framework for Robust Image Tampering Localization.
IEEE Trans. Inf. Forensics Secur., 2023

Dynamic Difference Learning With Spatio-Temporal Correlation for Deepfake Video Detection.
IEEE Trans. Inf. Forensics Secur., 2023

Query-Efficient Adversarial Attack With Low Perturbation Against End-to-End Speech Recognition Systems.
IEEE Trans. Inf. Forensics Secur., 2023

ReLOAD: Using Reinforcement Learning to Optimize Asymmetric Distortion for Additive Steganography.
IEEE Trans. Inf. Forensics Secur., 2023

Comprehensive Android Malware Detection Based on Federated Learning Architecture.
IEEE Trans. Inf. Forensics Secur., 2023

An Adaptive IPM-Based HEVC Video Steganography via Minimizing Non-Additive Distortion.
IEEE Trans. Dependable Secur. Comput., 2023

STD-NET: Search of Image Steganalytic Deep-Learning Architecture via Hierarchical Tensor Decomposition.
IEEE Trans. Dependable Secur. Comput., 2023

Adversarial Steganography Embedding via Stego Generation and Selection.
IEEE Trans. Dependable Secur. Comput., 2023

Non-Interactive Privacy-Preserving Frequent Itemset Mining Over Encrypted Cloud Data.
IEEE Trans. Cloud Comput., 2023

Discriminative Frequency Information Learning for End-to-End Speech Anti-Spoofing.
IEEE Signal Process. Lett., 2023

Prompt Engineering-assisted Malware Dynamic Analysis Using GPT-4.
CoRR, 2023

Evading Detection Actively: Toward Anti-Forensics against Forgery Localization.
CoRR, 2023

Forgery-aware Adaptive Vision Transformer for Face Forgery Detection.
CoRR, 2023

Automatic Asymmetric Embedding Cost Learning via Generative Adversarial Networks.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Multi-Scale Enhanced Dual-Stream Network for Facial Attribute Editing Localization.
Proceedings of the Digital Forensics and Watermarking - 22nd International Workshop, 2023

Poster: Query-efficient Black-box Attack for Image Forgery Localization via Reinforcement Learning.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Deep Multi-image Hiding with Random Key.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

2022
Eyes in the Skies: A Data-driven Fusion Approach to Identifying Drug Crops from Remote Sensing Images Dataset.
Dataset, May, 2022

Self-Adversarial Training Incorporating Forgery Attention for Image Forgery Localization.
IEEE Trans. Inf. Forensics Secur., 2022

Universal Deep Network for Steganalysis of Color Image Based on Channel Representation.
IEEE Trans. Inf. Forensics Secur., 2022

Document Recapture Detection Based on a Unified Distortion Model of Halftone Cells.
IEEE Trans. Inf. Forensics Secur., 2022

Domain-Agnostic Document Authentication Against Practical Recapturing Attacks.
IEEE Trans. Inf. Forensics Secur., 2022

Secret Sharing Based Reversible Data Hiding in Encrypted Images With Multiple Data-Hiders.
IEEE Trans. Dependable Secur. Comput., 2022

Robust Estimation of Upscaling Factor on Double JPEG Compressed Images.
IEEE Trans. Cybern., 2022

Secure Halftone Image Steganography Based on Feature Space and Layer Embedding.
IEEE Trans. Cybern., 2022

Landmarking for Navigational Streaming of Stored High-Dimensional Media.
IEEE Trans. Circuits Syst. Video Technol., 2022

Improving Cost Learning for JPEG Steganography by Exploiting JPEG Domain Knowledge.
IEEE Trans. Circuits Syst. Video Technol., 2022

Gradually Enhanced Adversarial Perturbations on Color Pixel Vectors for Image Steganography.
IEEE Trans. Circuits Syst. Video Technol., 2022

A Novel Video Steganographic Scheme Incorporating the Consistency Degree of Motion Vectors.
IEEE Trans. Circuits Syst. Video Technol., 2022

One-Class Double Compression Detection of Advanced Videos Based on Simple Gaussian Distribution Model.
IEEE Trans. Circuits Syst. Video Technol., 2022

Synthetic Speech Detection Based on Local Autoregression and Variance Statistics.
IEEE Signal Process. Lett., 2022

Hybrid deep-learning framework for object-based forgery detection in video.
Signal Process. Image Commun., 2022

Corrigendum to 'Evading generated-image detectors: A deep dithering approach' [Signal Processing 197(2022) 108558].
Signal Process., 2022

Evading generated-image detectors: A deep dithering approach.
Signal Process., 2022

New design paradigm of distortion cost function for efficient JPEG steganography.
Signal Process., 2022

Efficient image tampering localization using semi-fragile watermarking and error control codes.
Signal Process., 2022

ISP-GAN: inception sub-pixel deconvolution-based lightweight GANs for colorization.
Multim. Tools Appl., 2022

A Robust Image Steganographic Scheme against General Scaling Attacks.
CoRR, 2022

Forensicability Assessment of Questioned Images in Recapturing Detection.
CoRR, 2022

Keyword Spotting in the Homomorphic Encrypted Domain Using Deep Complex-Valued CNN.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Deep Video Inpainting Localization Using Spatial and Temporal Traces.
Proceedings of the IEEE International Conference on Acoustics, 2022

2021
Deep Learning-Based Forgery Attack on Document Images.
IEEE Trans. Image Process., 2021

Image Tampering Localization Using a Dense Fully Convolutional Network.
IEEE Trans. Inf. Forensics Secur., 2021

Robust Privacy-Preserving Motion Detection and Object Tracking in Encrypted Streaming Video.
IEEE Trans. Inf. Forensics Secur., 2021

An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning.
IEEE Trans. Inf. Forensics Secur., 2021

CALPA-NET: Channel-Pruning-Assisted Deep Residual Network for Steganalysis of Digital Images.
IEEE Trans. Inf. Forensics Secur., 2021

MCTSteg: A Monte Carlo Tree Search-Based Reinforcement Learning Framework for Universal Non-Additive Steganography.
IEEE Trans. Inf. Forensics Secur., 2021

A New Adversarial Embedding Method for Enhancing Image Steganography.
IEEE Trans. Inf. Forensics Secur., 2021

Efficient JPEG Batch Steganography Using Intrinsic Energy of Image Contents.
IEEE Trans. Inf. Forensics Secur., 2021

Secure Halftone Image Steganography Based on Pixel Density Transition.
IEEE Trans. Dependable Secur. Comput., 2021

Reversible Data Hiding in Halftone Images Based on Dynamic Embedding States Group.
IEEE Trans. Circuits Syst. Video Technol., 2021

Defeating Lattice-Based Data Hiding Code Via Decoding Security Hole.
IEEE Trans. Circuits Syst. Video Technol., 2021

Secure Robust JPEG Steganography Based on AutoEncoder With Adaptive BCH Encoding.
IEEE Trans. Circuits Syst. Video Technol., 2021

Detecting facial manipulated videos based on set convolutional neural networks.
J. Vis. Commun. Image Represent., 2021

A novel deep learning framework for double JPEG compression detection of small size blocks.
J. Vis. Commun. Image Represent., 2021

Detection of Deepfake Videos Using Long Distance Attention.
CoRR, 2021

CREAMS: Copyrighted Cloud Media Sharing.
CoRR, 2021

Image Steganography based on Iteratively Adversarial Samples of A Synchronized-directions Sub-image.
CoRR, 2021

Image Steganography Based on Iterative Adversarial Perturbations Onto a Synchronized-Directions Sub-Image.
Proceedings of the IEEE International Conference on Acoustics, 2021

2020
An Embedding Cost Learning Framework Using GAN.
IEEE Trans. Inf. Forensics Secur., 2020

Face Spoofing Detection Based on Local Ternary Label Supervision in Fully Convolutional Networks.
IEEE Trans. Inf. Forensics Secur., 2020

Identification of VoIP Speech With Multiple Domain Deep Features.
IEEE Trans. Inf. Forensics Secur., 2020

A Copy-Proof Scheme Based on the Spectral and Spatial Barcoding Channel Models.
IEEE Trans. Inf. Forensics Secur., 2020

Secure Binary Image Steganography With Distortion Measurement Based on Prediction.
IEEE Trans. Circuits Syst. Video Technol., 2020

Binary Image Steganalysis Based on Histogram of Structuring Elements.
IEEE Trans. Circuits Syst. Video Technol., 2020

Downscaling Factor Estimation on Pre-JPEG Compressed Images.
IEEE Trans. Circuits Syst. Video Technol., 2020

Efficient Privacy-Preserving Anomaly Detection and Localization in Bitstream Video.
IEEE Trans. Circuits Syst. Video Technol., 2020

A novel selective encryption scheme for H.264/AVC video with improved visual security.
Signal Process. Image Commun., 2020

Identification of deep network generated images using disparities in color components.
Signal Process., 2020

Editorial: Media Authentication and Forensics - New Solutions and Research Opportunities.
IEEE J. Sel. Top. Signal Process., 2020

Universal stego post-processing for enhancing image steganography.
J. Inf. Secur. Appl., 2020

Image processing operations identification via convolutional neural network.
Sci. China Inf. Sci., 2020

IEEE Access Special Section: Digital Forensics Through Multimedia Source Inference.
IEEE Access, 2020

2019

WISERNet: Wider Separate-Then-Reunion Network for Steganalysis of Color Images.
IEEE Trans. Inf. Forensics Secur., 2019

Detection of Speech Smoothing on Very Short Clips.
IEEE Trans. Inf. Forensics Secur., 2019

Robust Copy-Move Detection of Speech Recording Using Similarities of Pitch and Formant.
IEEE Trans. Inf. Forensics Secur., 2019

CNN-Based Adversarial Embedding for Image Steganography.
IEEE Trans. Inf. Forensics Secur., 2019

Patchwork-Based Audio Watermarking Robust Against De-Synchronization and Recapturing Attacks.
IEEE Trans. Inf. Forensics Secur., 2019

A Novel High-Capacity Reversible Data Hiding Scheme for Encrypted JPEG Bitstreams.
IEEE Trans. Circuits Syst. Video Technol., 2019

Eyes in the Skies: A Data-Driven Fusion Approach to Identifying Drug Crops From Remote Sensing Images.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2019

Universal Stego Post-processing for Enhancing Image Steganography.
CoRR, 2019

Enhancing JPEG Steganography using Iterative Adversarial Examples.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2019

Localization of Deep Inpainting Using High-Pass Fully Convolutional Network.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019

A New Spatial Steganographic Scheme by Modeling Image Residuals with Multivariate Gaussian Model.
Proceedings of the IEEE International Conference on Acoustics, 2019

2018
Improved Audio Steganalytic Feature and Its Applications in Audio Forensics.
ACM Trans. Multim. Comput. Commun. Appl., 2018

JPEG Image Encryption With Improved Format Compatibility and File Size Preservation.
IEEE Trans. Multim., 2018

Efficient Encrypted Images Filtering and Transform Coding With Walsh-Hadamard Transform and Parallelization.
IEEE Trans. Image Process., 2018

Large-Scale JPEG Image Steganalysis Using Hybrid Deep-Learning Framework.
IEEE Trans. Inf. Forensics Secur., 2018

Band Energy Difference for Source Attribution in Audio Forensics.
IEEE Trans. Inf. Forensics Secur., 2018

Identification of Various Image Operations Using Residual-Based Features.
IEEE Trans. Circuits Syst. Video Technol., 2018

A novel reversible data hiding method with image contrast enhancement.
Signal Process. Image Commun., 2018

Detecting median filtering via two-dimensional AR models of multiple filtered residuals.
Multim. Tools Appl., 2018

Data-driven multimedia forensics and security.
J. Vis. Commun. Image Represent., 2018

Riemannian competitive learning for symmetric positive definite matrices clustering.
Neurocomputing, 2018

Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control.
Future Gener. Comput. Syst., 2018

Detection of Deep Network Generated Images Using Disparities in Color Components.
CoRR, 2018

CNN Based Adversarial Embedding with Minimum Alteration for Image Steganography.
CoRR, 2018

An Inception-Based Data-Driven Ensemble Approach to Camera Model Identification.
Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, 2018

A Controllable Efficient Content Distribution Framework Based on Blockchain and ISODATA.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Privacy-Preserving Multipurpose Watermarking Scheme for Audio Authentication and Protection.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Encrypted Domain Mel-Frequency Cepstral Coefficient and Fragile Audio Watermarking.
Proceedings of the 17th IEEE International Conference On Trust, 2018

VPCID - A VoIP Phone Call Identification Database.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018

Edge Detection and Image Segmentation on Encrypted Image with Homomorphic Encryption and Garbled Circuit.
Proceedings of the 2018 IEEE International Conference on Multimedia and Expo, 2018

Ensemble Clustering with Novel Weighting Strategy.
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018

2017
An Efficient Motion Detection and Tracking Scheme for Encrypted Surveillance Videos.
ACM Trans. Multim. Comput. Commun. Appl., 2017

Pixel-Decimation-Assisted Steganalysis of Synchronize-Embedding-Changes Steganography.
IEEE Trans. Inf. Forensics Secur., 2017

Detection of Double Compressed AMR Audio Using Stacked Autoencoder.
IEEE Trans. Inf. Forensics Secur., 2017

Image Forgery Localization via Integrating Tampering Possibility Maps.
IEEE Trans. Inf. Forensics Secur., 2017

Localization of Diffusion-Based Inpainting in Digital Images.
IEEE Trans. Inf. Forensics Secur., 2017

Multi-Scale Analysis Strategies in PRNU-Based Tampering Localization.
IEEE Trans. Inf. Forensics Secur., 2017

Data-Driven Feature Characterization Techniques for Laser Printer Attribution.
IEEE Trans. Inf. Forensics Secur., 2017

Automatic Steganographic Distortion Learning Using a Generative Adversarial Network.
IEEE Signal Process. Lett., 2017

Tamper recovery algorithm for digital speech signal based on DWT and DCT.
Multim. Tools Appl., 2017

A security watermark scheme used for digital speech forensics.
Multim. Tools Appl., 2017

VideoSet: A large-scale compressed video quality dataset based on JND measurement.
J. Vis. Commun. Image Represent., 2017

Ciphertext policy attribute-based encryption supporting unbounded attribute space from R-LWE.
KSII Trans. Internet Inf. Syst., 2017

Anti-Forensics of Camera Identification and the Triangle Test by Improved Fingerprint-Copy Attack.
CoRR, 2017

Pre-training via fitting deep neural network to rich-model features extraction procedure and its effect on deep learning for steganalysis.
Proceedings of the Media Watermarking, Security, and Forensics 2017, Burlingame, CA, USA, 29 January 2017, 2017

Exposing Video Forgeries by Detecting Misaligned Double Compression.
Proceedings of the International Conference on Video and Image Processing, 2017

2016
Identification of Reconstructed Speech.
ACM Trans. Multim. Comput. Commun. Appl., 2016

Multi-Scale Fusion for Improved Localization of Malicious Tampering in Digital Images.
IEEE Trans. Image Process., 2016

Adaptive Steganalysis Based on Embedding Probabilities of Pixels.
IEEE Trans. Inf. Forensics Secur., 2016

New Framework for Reversible Data Hiding in Encrypted Domain.
IEEE Trans. Inf. Forensics Secur., 2016

Reversible Data Hiding in JPEG Images.
IEEE Trans. Circuits Syst. Video Technol., 2016

Automatic Detection of Object-Based Forgery in Advanced Video.
IEEE Trans. Circuits Syst. Video Technol., 2016

Clustering Steganographic Modification Directions for Color Components.
IEEE Signal Process. Lett., 2016

Audio Postprocessing Detection Based on Amplitude Cooccurrence Vector Feature.
IEEE Signal Process. Lett., 2016

Improved Tampering Localization in Digital Image Forensics Based on Maximal Entropy Random Walk.
IEEE Signal Process. Lett., 2016

Robust image watermarking based on Tucker decomposition and Adaptive-Lattice Quantization Index Modulation.
Signal Process. Image Commun., 2016

Authentication and recovery algorithm for speech signal based on digital watermarking.
Signal Process., 2016

Twenty years of digital audio watermarking - a comprehensive review.
Signal Process., 2016

Efficient multiparty quantum key agreement protocol based on commutative encryption.
Quantum Inf. Process., 2016

Reversible data hiding in Paillier cryptosystem.
J. Vis. Commun. Image Represent., 2016

Large-scale JPEG steganalysis using hybrid deep-learning framework.
CoRR, 2016

IEEE Access Special Section Editorial: Latest Advances and Emerging Applications of Data Hiding.
IEEE Access, 2016

Evaluation of random field models in multi-modal unsupervised tampering localization.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016

Clustering Symmetric Positive Definite Matrices on the Riemannian Manifolds.
Proceedings of the Computer Vision - ACCV 2016, 2016

2015
Statistical Model of JPEG Noises and Its Application in Quantization Step Estimation.
IEEE Trans. Image Process., 2015

A Strategy of Clustering Modification Directions in Spatial Image Steganography.
IEEE Trans. Inf. Forensics Secur., 2015

Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis.
IEEE Trans. Inf. Forensics Secur., 2015

Anti-forensics of double JPEG compression with the same quantization matrix.
Multim. Tools Appl., 2015

A reversible data hiding method with contrast enhancement for medical images.
J. Vis. Commun. Image Represent., 2015

Secure watermarking scheme against watermark attacks in the encrypted domain.
J. Vis. Commun. Image Represent., 2015

Estimating JPEG compression history of bitmaps based on factor histogram.
Digit. Signal Process., 2015

Verification of hidden speaker behind transformation disguised voices.
Digit. Signal Process., 2015

Identification of AMR decompressed audio.
Digit. Signal Process., 2015

Local pixel patterns.
Comput. Vis. Media, 2015

Identification of Image Operations Based on Steganalytic Features.
CoRR, 2015

Feature Selection for High Dimensional Steganalysis.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

Copy-move detection of audio recording with pitch similarity.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

Audio recapture detection using deep learning.
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015

2014
Identifying Compression History of Wave Audio and Its Applications.
ACM Trans. Multim. Comput. Commun. Appl., 2014

Fast Near-Duplicate Image Detection Using Uniform Randomized Trees.
ACM Trans. Multim. Comput. Commun. Appl., 2014

Identification of Electronic Disguised Voices.
IEEE Trans. Inf. Forensics Secur., 2014

Investigation on Cost Assignment in Spatial Image Steganography.
IEEE Trans. Inf. Forensics Secur., 2014

Exposing Fake Bit Rate Videos and Estimating Original Bit Rates.
IEEE Trans. Circuits Syst. Video Technol., 2014

Geometric invariant features in the Radon transform domain for near-duplicate image detection.
Pattern Recognit., 2014

Detecting video frame-rate up-conversion based on periodic properties of inter-frame similarity.
Multim. Tools Appl., 2014

An improved sample projection approach for image watermarking.
Digit. Signal Process., 2014

JPEG Noises beyond the First Compression Cycle.
CoRR, 2014

A framework for identifying shifted double JPEG compression artifacts with application to non-intrusive digital image forensics.
Sci. China Inf. Sci., 2014

Structure Aware Visual Cryptography.
Comput. Graph. Forum, 2014

Adaptive steganalysis against WOW embedding algorithm.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

A universal image forensic strategy based on steganalytic model.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

Anti-forensics of JPEG Detectors via Adaptive Quantization Table Replacement.
Proceedings of the 22nd International Conference on Pattern Recognition, 2014

Improved steganalysis algorithm against motion vector based video steganography.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

A new cost function for spatial image steganography.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

Fast and accurate Nearest Neighbor search in the manifolds of symmetric positive definite matrices.
Proceedings of the IEEE International Conference on Acoustics, 2014

Detecting double compressed AMR audio using deep learning.
Proceedings of the IEEE International Conference on Acoustics, 2014

Detection of double compression with the same bit rate in MPEG-2 videos.
Proceedings of the IEEE China Summit & International Conference on Signal and Information Processing, 2014

2013
Discrete Wavelet Transform and Data Expansion Reduction in Homomorphic Encrypted Domain.
IEEE Trans. Image Process., 2013

Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach.
IEEE Trans. Image Process., 2013

Region duplication detection based on Harris corner points and step sector statistics.
J. Vis. Commun. Image Represent., 2013

An efficient image homomorphic encryption scheme with small ciphertext expansion.
Proceedings of the ACM Multimedia Conference, 2013

Improved Algorithm of Edge Adaptive Image Steganography Based on LSB Matching Revisited Algorithm.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Distortion function designing for JPEG steganography with uncompressed side-image.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

Mixed-strategy Nash equilibrium in the camera source identification game.
Proceedings of the IEEE International Conference on Image Processing, 2013

Exposing fake bitrate video and its original bitrate.
Proceedings of the IEEE International Conference on Image Processing, 2013

Blind detection of electronic disguised voice.
Proceedings of the IEEE International Conference on Acoustics, 2013

Forensic sensor pattern noise extraction from large image data set.
Proceedings of the IEEE International Conference on Acoustics, 2013

2012
Exposing MP3 audio forgeries using frame offsets.
ACM Trans. Multim. Comput. Commun. Appl., 2012

Reference index-based H.264 video watermarking scheme.
ACM Trans. Multim. Comput. Commun. Appl., 2012

Near-Duplicate Image Detection in a Visually Salient Riemannian Space.
IEEE Trans. Inf. Forensics Secur., 2012

An Informed Watermarking Scheme Using Hidden Markov Model in the Wavelet Domain.
IEEE Trans. Inf. Forensics Secur., 2012

Enhancing Source Camera Identification Performance With a Camera Reference Phase Sensor Pattern Noise.
IEEE Trans. Inf. Forensics Secur., 2012

New Channel Selection Rule for JPEG Steganography.
IEEE Trans. Inf. Forensics Secur., 2012

Controllable Secure Watermarking Technique for Tradeoff Between Robustness and Security.
IEEE Trans. Inf. Forensics Secur., 2012

Video Sequence Matching Based on the Invariance of Color Correlation.
IEEE Trans. Circuits Syst. Video Technol., 2012

Reversible image watermarking on prediction errors by efficient histogram modification.
Signal Process., 2012

Digital image splicing detection based on Markov features in DCT and DWT domain.
Pattern Recognit., 2012

Perceptual video hashing robust against geometric distortions.
Sci. China Inf. Sci., 2012

Blind Detection of Electronic Voice Transformation with Natural Disguise.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

Walsh-Hadamard Transform in the Homomorphic Encrypted Domain and Its Application in Image Watermarking.
Proceedings of the Information Hiding - 14th International Conference, 2012

Blind Median Filtering Detection Using Statistics in Difference Domain.
Proceedings of the Information Hiding - 14th International Conference, 2012

Countering anti-JPEG compression forensics.
Proceedings of the 19th IEEE International Conference on Image Processing, 2012

Efficient coarse-to-fine near-duplicate image detection in riemannian manifold.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

Compression history identification for digital audio signal.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

Identifying Shifted Double JPEG Compression Artifacts for Non-intrusive Digital Image Forensics.
Proceedings of the Computational Visual Media - First International Conference, 2012

2011
Geometric Invariant Audio Watermarking Based on an LCM Feature.
IEEE Trans. Multim., 2011

Security Analysis on Spatial ± 1 Steganography for JPEG Decompressed Images.
IEEE Signal Process. Lett., 2011

Robust image hash in Radon transform domain for authentication.
Signal Process. Image Commun., 2011

Random Gray code and its performance analysis for image hashing.
Signal Process., 2011

A more secure steganography based on adaptive pixel-value differencing scheme.
Multim. Tools Appl., 2011

Minority codes with improved embedding efficiency for large payloads.
Multim. Tools Appl., 2011

A Survey on Image Steganography and Steganalysis.
J. Inf. Hiding Multim. Signal Process., 2011

Steganalysis of JPEG steganography with complementary embedding strategy.
IET Inf. Secur., 2011

Implementation of the discrete wavelet transform and multiresolution analysis in the encrypted domain.
Proceedings of the 19th International Conference on Multimedia 2011, Scottsdale, AZ, USA, November 28, 2011

Double H.264/AVC compression detection using quantized nonzero AC coefficients.
Proceedings of the Media Watermarking, 2011

Enhancing ROC performance of trustworthy camera source identification.
Proceedings of the Media Watermarking, 2011

Three Novel Algorithms for Hiding Data in PDF Files Based on Incremental Updates.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

Salient covariance for near-duplicate image and video detection.
Proceedings of the 18th IEEE International Conference on Image Processing, 2011

Secure JPEG steganography by LSB<sup>+</sup> matching and multi-band embedding.
Proceedings of the 18th IEEE International Conference on Image Processing, 2011

2010
Image Steganalysis.
Proceedings of the Intelligent Multimedia Analysis for Security Applications, 2010

Fragility analysis of adaptive quantization-based image hashing.
IEEE Trans. Inf. Forensics Secur., 2010

Detection of Quantization Artifacts and Its Applications to Transform Encoder Identification.
IEEE Trans. Inf. Forensics Secur., 2010

JPEG error analysis and its applications to digital image forensics.
IEEE Trans. Inf. Forensics Secur., 2010

Edge adaptive image steganography based on LSB matching revisited.
IEEE Trans. Inf. Forensics Secur., 2010

Efficient general print-scanning resilient data hiding based on uniform log-polar mapping.
IEEE Trans. Inf. Forensics Secur., 2010

Detecting Double JPEG Compression With the Same Quantization Matrix.
IEEE Trans. Inf. Forensics Secur., 2010

An experimental study on the security performance of YASS.
IEEE Trans. Inf. Forensics Secur., 2010

Audio Watermarking Scheme Robust against Desynchronization Based on the Dyadic Wavelet Transform.
EURASIP J. Adv. Signal Process., 2010

Semi-Fragile Zernike Moment-Based Image Watermarking for Authentication.
EURASIP J. Adv. Signal Process., 2010

Robust AVS audio watermarking.
Sci. China Inf. Sci., 2010

Detecting double compression of audio signal.
Proceedings of the Media Forensics and Security II, 2010

Discriminating Computer Graphics Images and Natural Images Using Hidden Markov Tree Model.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010

New JPEG Steganographic Scheme with High Security Performance.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010

Security Analysis of ISS Watermarking Using Natural Scene Statistics.
Proceedings of the Information Hiding - 12th International Conference, 2010

A New Spread Spectrum Watermarking Scheme to Achieve a Trade-Off between Security and Robustness.
Proceedings of the Information Hiding - 12th International Conference, 2010

Provably Secure Spread-Spectrum Watermarking Schemes in the Known Message Attack Framework.
Proceedings of the Information Hiding - 12th International Conference, 2010

A geometrically resilient robust image watermarking scheme using deformable multi-scale transform.
Proceedings of the International Conference on Image Processing, 2010

An image copy detection scheme based on radon transform.
Proceedings of the International Conference on Image Processing, 2010

2009
A study on the randomness measure of image hashing.
IEEE Trans. Inf. Forensics Secur., 2009

Steganalysis of YASS.
IEEE Trans. Inf. Forensics Secur., 2009

Discriminating between photorealistic computer graphics and natural images using fractal geometry.
Sci. China Ser. F Inf. Sci., 2009

Non-ambiguity of blind watermarking: a revisit with analytical resolution.
Sci. China Ser. F Inf. Sci., 2009

Calibration based universal JPEG steganalysis.
Sci. China Ser. F Inf. Sci., 2009

Defeating fake-quality MP3.
Proceedings of the Multimedia and Security Workshop, 2009

Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009

Detect Digital Image Splicing with Visual Cues.
Proceedings of the Information Hiding, 11th International Workshop, 2009

Content-based authentication algorithm for binary images.
Proceedings of the International Conference on Image Processing, 2009

2008
Improving Robustness of Quantization-Based Image Watermarking via Adaptive Receiver.
IEEE Trans. Multim., 2008

Invariant Image Watermarking Based on Statistical Features in the Low-Frequency Domain.
IEEE Trans. Circuits Syst. Video Technol., 2008

Steganalysis of Multiple-Base Notational System Steganography.
IEEE Signal Process. Lett., 2008

Audio watermarking robust against time-scale modification and MP3 compression.
Signal Process., 2008

A Multi-band Wavelet Watermarking Scheme.
Int. J. Netw. Secur., 2008

All Pairings Are in a Group.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Efficient Tate pairing computation using double-base chains.
Sci. China Ser. F Inf. Sci., 2008

MPEG recompression detection based on block artifacts.
Proceedings of the Security, 2008

Textural features based universal steganalysis.
Proceedings of the Security, 2008

Detecting doubly compressed JPEG images by using Mode Based First Digit Features.
Proceedings of the International Workshop on Multimedia Signal Processing, 2008

Detecting digital audio forgeries by checking frame offsets.
Proceedings of the 10th workshop on Multimedia & Security, 2008

GSM Based Security Analysis for Add-SS Watermarking.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

Robust Audio Watermarking Based on Log-Polar Frequency Index.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

A Novel Method for Block Size Forensics Based on Morphological Operations.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

A Robust Watermarking Scheme for H.264.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

Watermarking Security Incorporating Natural Scene Statistics.
Proceedings of the Information Hiding, 10th International Workshop, 2008

An efficient print-scanning resilient data hiding scheme based on a novel LPM.
Proceedings of the International Conference on Image Processing, 2008

A study on security performance of YASS.
Proceedings of the International Conference on Image Processing, 2008

Universal JPEG steganalysis based on microscopic and macroscopic calibration.
Proceedings of the International Conference on Image Processing, 2008

A convolutive mixing model for shifted double JPEG compression with application to passive image authentication.
Proceedings of the IEEE International Conference on Acoustics, 2008

2007
Histogram-Based Audio Watermarking Against Time-Scale Modification and Cropping Attacks.
IEEE Trans. Multim., 2007

Robust Image Watermarking Based on Multiband Wavelets and Empirical Mode Decomposition.
IEEE Trans. Image Process., 2007

A Note on the Ate Pairing.
IACR Cryptol. ePrint Arch., 2007

A survey of passive technology for digital image forensics.
Frontiers Comput. Sci. China, 2007

Robust Audio Watermarking Against the D/A and A/D conversions
CoRR, 2007

Survey of information security.
Sci. China Ser. F Inf. Sci., 2007

Audio watermarking robust to geometrical distortions based on dyadic wavelet transform.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Fast and automatic watermark resynchronization based on zernike moments.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Histogram-based image hashing scheme robust against geometric deformations.
Proceedings of the 9th workshop on Multimedia & Security, 2007

Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

A Digital Watermarking Scheme Based on DCT and SVD.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Robust and High Capacity Image Watermarking Based on Jointly Coding and Embedding Optimization.
Proceedings of the Information Hiding, 9th International Workshop, 2007

Binary Image Authentication using Zernike Moments.
Proceedings of the International Conference on Image Processing, 2007

Steganalysis of LSB Greedy Embedding Algorithm for JPEG Images using Coefficient Symmetry.
Proceedings of the International Conference on Image Processing, 2007

Attack LSB Matching Steganography by Counting Alteration Rate of the Number of Neighbourhood Gray Levels.
Proceedings of the International Conference on Image Processing, 2007

A GA-Based Joint Coding and Embedding Optimization for Robust and High Capacity Image Watermarking.
Proceedings of the IEEE International Conference on Acoustics, 2007

A Novel Method for Detecting Cropped and Recompressed Image Block.
Proceedings of the IEEE International Conference on Acoustics, 2007

2006
An algorithm for removable visible watermarking.
IEEE Trans. Circuits Syst. Video Technol., 2006

Analysis of Quantization-based Audio Watermarking to D/A and A/D Conversions.
Int. J. Netw. Secur., 2006

Speeding up the Bilinear Pairings Computation on Curves with Automorphisms.
IACR Cryptol. ePrint Arch., 2006

Steganalysis of stochastic modulation steganography.
Sci. China Ser. F Inf. Sci., 2006

Achieving non-ambiguity of quantization-based watermarking.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

A Watermarking Algorithm for JPEG File.
Proceedings of the Advances in Multimedia Information Processing, 2006

Robust Audio Watermarking Based on Low-Order Zernike Moments.
Proceedings of the Digital Watermarking, 5th International Workshop, 2006

A Rotation-Invariant Secure Image Watermarking Algorithm Incorporating Steerable Pyramid Transform.
Proceedings of the Digital Watermarking, 5th International Workshop, 2006

Time-Scale Invariant Audio Watermarking Based on the Statistical Features in Time Domain.
Proceedings of the Information Hiding, 8th International Workshop, 2006

Near-Duplicate Image Recognition and Content-based Image Retrieval using Adaptive Hierarchical Geometric Centroids.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

Robust Detection of Region-Duplication Forgery in Digital Image.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

Steganalysis of JPEG2000 Lazy-Mode Steganography using the Hilbert-Huang Transform Based Sequential Analysis.
Proceedings of the International Conference on Image Processing, 2006

Performance Enhancement for DWT-HMM Image Watermarking with Content-Adaptive Approach.
Proceedings of the International Conference on Image Processing, 2006

A Hybrid Watermarking Scheme for Video Authentication.
Proceedings of the International Conference on Image Processing, 2006

2005
Efficiently self-synchronized audio watermarking for assured audio data transmission.
IEEE Trans. Broadcast., 2005

Dwt-Based Video Data Hiding Robust To Mpeg Compression And Frame Loss.
Int. J. Image Graph., 2005

Watermarking Parameters Feasible Region Model.
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005

Analysis of Quantization-Based Audio Watermarking in DA/AD Conversions.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Semi-fragile Watermarking Based on Zernike Moments and Integer Wavelet Transform.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

A RST-Invariant Robust DWT-HMM Watermarking Algorithm Incorporating Zernike Moments and Template.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

A Robust Multi-bit Image Watermarking Algorithm Based on HMM in Wavelet Domain.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

Multi-band Wavelet Based Digital Watermarking Using Principal Component Analysis.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

Performance Analysis of CDMA-Based Watermarking with Quantization Scheme.
Proceedings of the Information Security Practice and Experience, 2005

Image authentication using content based watermark.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

The M-band wavelets in image watermarking.
Proceedings of the 2005 International Conference on Image Processing, 2005

Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform.
Proceedings of the Digital Rights Management: Technologies, 2005

A MPEG-2 Video Watermarking Algorithm with Compensation in Bit Stream.
Proceedings of the Digital Rights Management: Technologies, 2005

Reversible Data Hiding for Image Based on Histogram Modification of Wavelet Coefficients.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

Revaluation of Error Correcting Coding in Watermarking Channel.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

A Secure Semi-Fragile Watermarking for Image Authentication Based on Integer Wavelet Transform with Parameters Abstract.
Proceedings of the ACSW Frontiers 2005, 2005 ACSW Workshops, 2005

2004
Self-synchronized audio watermark in DWT domain.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004

Using invisible watermarks to protect visibly watermarked images.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004

CDMA-based watermarking resisting to cropping.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004

Improve robustness of image watermarking via adaptive receiving.
Proceedings of the 2004 International Conference on Image Processing, 2004

Improve security of fragile watermarking via parameterized wavelet.
Proceedings of the 2004 International Conference on Image Processing, 2004

Provably Secure and ID-Based Group Signature Scheme.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression.
IEEE Trans. Circuits Syst. Video Technol., 2003

Robust Watermarking with Adaptive Receiving.
Proceedings of the Digital Watermarking, Second International Workshop, 2003

Image Fusion Based Visible Watermarking Using Dual-Tree Complex Wavelet Transform.
Proceedings of the Digital Watermarking, Second International Workshop, 2003

2-D and 3-D successive packing interleaving techniques and their applications to image and video data hiding.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

A high capacity distortion-free data hiding algorithm for palette image.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

Analysis of the role played by error correcting coding in robust watermarking.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

Image watermarking algorithm applying CDMA.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

Analysis of the Bounds for Linear Block Codes in Watermark Channel.
Proceedings of the Information Security and Cryptology, 2003

An Efficient Revocation Algorithm in Group Signatures.
Proceedings of the Information Security and Cryptology, 2003

2002
Reliable information bit hiding.
IEEE Trans. Circuits Syst. Video Technol., 2002

An Image Watermarking Algorithm Robust to Geometric Distortion.
Proceedings of the Digital Watermarking, First International Workshop, 2002

A DWT-Based Fragile Watermarking Tolerant of JPEG Compression.
Proceedings of the Digital Watermarking, First International Workshop, 2002

2001
Embedding gray level images.
Proceedings of the 2001 International Symposium on Circuits and Systems, 2001

An Adaptive Video Watermarking Algorithm.
Proceedings of the 2001 IEEE International Conference on Multimedia and Expo, 2001

A Dwt-Based Image Watermarking Algorithm.
Proceedings of the 2001 IEEE International Conference on Multimedia and Expo, 2001

2000
Embedding image watermarks in dc components.
IEEE Trans. Circuits Syst. Video Technol., 2000

1998
Power constrained multiple signaling in digital image watermarking.
Proceedings of the Second IEEE Workshop on Multimedia Signal Processing, 1998


  Loading...