Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Jiwu Huang
@article{DBLP:journals/tetci/WuCGZHHT24, author = {Hao{-}Tian Wu and Xin Cao and Ying Gao and Kaihan Zheng and Jiwu Huang and Jiankun Hu and Zhihong Tian}, title = {Fundus Image Enhancement via Semi-Supervised {GAN} and Anatomical Structure Preservation}, journal = {{IEEE} Trans. Emerg. Top. Comput. Intell.}, volume = {8}, number = {1}, pages = {313--326}, year = {2024}, url = {https://doi.org/10.1109/TETCI.2023.3301337}, doi = {10.1109/TETCI.2023.3301337}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tetci/WuCGZHHT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuangLLTH24, author = {Dongxia Huang and Weiqi Luo and Minglin Liu and Weixuan Tang and Jiwu Huang}, title = {Steganography Embedding Cost Learning With Generative Multi-Adversarial Network}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {15--29}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3318939}, doi = {10.1109/TIFS.2023.3318939}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/HuangLLTH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LuoKHHKK24, author = {Anwei Luo and Chenqi Kong and Jiwu Huang and Yongjian Hu and Xiangui Kang and Alex C. Kot}, title = {Beyond the Prior Forgery Knowledge: Mining Critical Clues for General Face Forgery Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1168--1182}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3332218}, doi = {10.1109/TIFS.2023.3332218}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LuoKHHKK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenLCZH24, author = {Changsheng Chen and Bokang Li and Rizhao Cai and Jishen Zeng and Jiwu Huang}, title = {Distortion Model-Based Spectral Augmentation for Generalized Recaptured Document Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1283--1298}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3333548}, doi = {10.1109/TIFS.2023.3333548}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ChenLCZH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LinLLH24, author = {Guoyuan Lin and Weiqi Luo and Da Luo and Jiwu Huang}, title = {One-Class Neural Network With Directed Statistics Pooling for Spoofing Speech Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2581--2593}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3352429}, doi = {10.1109/TIFS.2024.3352429}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LinLLH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TangZLCH24, author = {Weixuan Tang and Zhili Zhou and Bin Li and Kim{-}Kwang Raymond Choo and Jiwu Huang}, title = {Joint Cost Learning and Payload Allocation With Image-Wise Attention for Batch Steganography}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2826--2839}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3354411}, doi = {10.1109/TIFS.2024.3354411}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/TangZLCH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/Huang0HC24, author = {Wenmin Huang and Weiqi Luo and Jiwu Huang and Xiaochun Cao}, editor = {Michael J. Wooldridge and Jennifer G. Dy and Sriraam Natarajan}, title = {{SDGAN:} Disentangling Semantic Manipulation for Facial Attribute Editing}, booktitle = {Thirty-Eighth {AAAI} Conference on Artificial Intelligence, {AAAI} 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2014, February 20-27, 2024, Vancouver, Canada}, pages = {2374--2381}, publisher = {{AAAI} Press}, year = {2024}, url = {https://doi.org/10.1609/aaai.v38i3.28012}, doi = {10.1609/AAAI.V38I3.28012}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/Huang0HC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/TangLLWH23, author = {Weixuan Tang and Bin Li and Weixiang Li and Yuangen Wang and Jiwu Huang}, title = {Reinforcement learning of non-additive joint steganographic embedding costs with attention mechanism}, journal = {Sci. China Inf. Sci.}, volume = {66}, number = {3}, year = {2023}, url = {https://doi.org/10.1007/s11432-021-3453-5}, doi = {10.1007/S11432-021-3453-5}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/TangLLWH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spl/HuangCHK23, author = {Bingyuan Huang and Sanshuai Cui and Jiwu Huang and Xiangui Kang}, title = {Discriminative Frequency Information Learning for End-to-End Speech Anti-Spoofing}, journal = {{IEEE} Signal Process. Lett.}, volume = {30}, pages = {185--189}, year = {2023}, url = {https://doi.org/10.1109/LSP.2023.3251895}, doi = {10.1109/LSP.2023.3251895}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spl/HuangCHK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/ZhengCTLLH23, author = {Peijia Zheng and Ziyan Cheng and Xianhao Tian and Hongmei Liu and Weiqi Luo and Jiwu Huang}, title = {Non-Interactive Privacy-Preserving Frequent Itemset Mining Over Encrypted Cloud Data}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {11}, number = {4}, pages = {3452--3468}, year = {2023}, url = {https://doi.org/10.1109/TCC.2023.3291378}, doi = {10.1109/TCC.2023.3291378}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcc/ZhengCTLLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/YinWWLZH23, author = {Xiaolin Yin and Shaowu Wu and Ke Wang and Wei Lu and Yicong Zhou and Jiwu Huang}, title = {Anti-Rounding Image Steganography With Separable Fine-Tuned Network}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {33}, number = {11}, pages = {7066--7079}, year = {2023}, url = {https://doi.org/10.1109/TCSVT.2023.3269468}, doi = {10.1109/TCSVT.2023.3269468}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcsv/YinWWLZH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiuSLZH23, author = {Minglin Liu and Tingting Song and Weiqi Luo and Peijia Zheng and Jiwu Huang}, title = {Adversarial Steganography Embedding via Stego Generation and Selection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {3}, pages = {2375--2389}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3182041}, doi = {10.1109/TDSC.2022.3182041}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiuSLZH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/TanLLLH23, author = {Shunquan Tan and Qiushi Li and Laiyuan Li and Bin Li and Jiwu Huang}, title = {{STD-NET:} Search of Image Steganalytic Deep-Learning Architecture via Hierarchical Tensor Decomposition}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {3}, pages = {2657--2673}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2023.3267065}, doi = {10.1109/TDSC.2023.3267065}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/TanLLLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangYCHK23, author = {Jie Wang and Xuemei Yin and Yifang Chen and Jiwu Huang and Xiangui Kang}, title = {An Adaptive IPM-Based {HEVC} Video Steganography via Minimizing Non-Additive Distortion}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {4}, pages = {2896--2912}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3193423}, doi = {10.1109/TDSC.2022.3193423}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangYCHK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangZZZZH23, author = {Shen Wang and Zhaoyang Zhang and Guopu Zhu and Xinpeng Zhang and Yicong Zhou and Jiwu Huang}, title = {Query-Efficient Adversarial Attack With Low Perturbation Against End-to-End Speech Recognition Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {351--364}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2022.3222963}, doi = {10.1109/TIFS.2022.3222963}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WangZZZZH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MoTTLH23, author = {Xianbo Mo and Shunquan Tan and Weixuan Tang and Bin Li and Jiwu Huang}, title = {ReLOAD: Using Reinforcement Learning to Optimize Asymmetric Distortion for Additive Steganography}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {1524--1538}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3244094}, doi = {10.1109/TIFS.2023.3244094}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/MoTTLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FangHLLC0HZ23, author = {Wenbo Fang and Junjiang He and Wenshan Li and Xiaolong Lan and Yang Chen and Tao Li and Jiwu Huang and Linlin Zhang}, title = {Comprehensive Android Malware Detection Based on Federated Learning Architecture}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {3977--3990}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3287395}, doi = {10.1109/TIFS.2023.3287395}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FangHLLC0HZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YinLLH23, author = {Qilin Yin and Wei Lu and Bin Li and Jiwu Huang}, title = {Dynamic Difference Learning With Spatio-Temporal Correlation for Deepfake Video Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {4046--4058}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3290752}, doi = {10.1109/TIFS.2023.3290752}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YinLLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhuangLYH23, author = {Peiyu Zhuang and Haodong Li and Rui Yang and Jiwu Huang}, title = {ReLoc: {A} Restoration-Assisted Framework for Robust Image Tampering Localization}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {5243--5257}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3306181}, doi = {10.1109/TIFS.2023.3306181}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhuangLYH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aisp/ZhangTRLH23, author = {Wei Zhang and Weixuan Tang and Yuan Rao and Bin Li and Jiwu Huang}, editor = {Jaideep Vaidya and Moncef Gabbouj and Jin Li}, title = {Deep Multi-image Hiding with Random Key}, booktitle = {Artificial Intelligence Security and Privacy - First International Conference on Artificial Intelligence Security and Privacy, AIS{\&}P 2023, Guangzhou, China, December 3-5, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14509}, pages = {33--41}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-9785-5\_3}, doi = {10.1007/978-981-99-9785-5\_3}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aisp/ZhangTRLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MoTLH23, author = {Xianbo Mo and Shunquan Tan and Bin Li and Jiwu Huang}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Poster: Query-efficient Black-box Attack for Image Forgery Localization via Reinforcement Learning}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {3552--3554}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3624390}, doi = {10.1145/3576915.3624390}, timestamp = {Fri, 01 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MoTLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/HuangLHXWH23, author = {Jinkun Huang and Weiqi Luo and Wenmin Huang and Ziyi Xi and Kangkang Wei and Jiwu Huang}, editor = {Bin Ma and Jian Li and Qi Li}, title = {Multi-Scale Enhanced Dual-Stream Network for Facial Attribute Editing Localization}, booktitle = {Digital Forensics and Watermarking - 22nd International Workshop, {IWDW} 2023, Jinan, China, November 25-26, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14511}, pages = {151--165}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-97-2585-4\_11}, doi = {10.1007/978-981-97-2585-4\_11}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/HuangLHXWH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/Huang0ZH23, author = {Dongxia Huang and Weiqi Luo and Peijia Zheng and Jiwu Huang}, editor = {Abdulmotaleb El{-}Saddik and Tao Mei and Rita Cucchiara and Marco Bertini and Diana Patricia Tobon Vallejo and Pradeep K. Atrey and M. Shamim Hossain}, title = {Automatic Asymmetric Embedding Cost Learning via Generative Adversarial Networks}, booktitle = {Proceedings of the 31st {ACM} International Conference on Multimedia, {MM} 2023, Ottawa, ON, Canada, 29 October 2023- 3 November 2023}, pages = {8316--8326}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3581783.3612399}, doi = {10.1145/3581783.3612399}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mm/Huang0ZH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-12489, author = {Anwei Luo and Chenqi Kong and Jiwu Huang and Yongjian Hu and Xiangui Kang and Alex C. Kot}, title = {Beyond the Prior Forgery Knowledge: Mining Critical Clues for General Face Forgery Detection}, journal = {CoRR}, volume = {abs/2304.12489}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.12489}, doi = {10.48550/ARXIV.2304.12489}, eprinttype = {arXiv}, eprint = {2304.12489}, timestamp = {Wed, 03 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-12489.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-11092, author = {Anwei Luo and Rizhao Cai and Chenqi Kong and Xiangui Kang and Jiwu Huang and Alex C. Kot}, title = {Forgery-aware Adaptive Vision Transformer for Face Forgery Detection}, journal = {CoRR}, volume = {abs/2309.11092}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.11092}, doi = {10.48550/ARXIV.2309.11092}, eprinttype = {arXiv}, eprint = {2309.11092}, timestamp = {Mon, 25 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-11092.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-10036, author = {Long Zhuo and Shenghai Luo and Shunquan Tan and Han Chen and Bin Li and Jiwu Huang}, title = {Evading Detection Actively: Toward Anti-Forensics against Forgery Localization}, journal = {CoRR}, volume = {abs/2310.10036}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.10036}, doi = {10.48550/ARXIV.2310.10036}, eprinttype = {arXiv}, eprint = {2310.10036}, timestamp = {Wed, 25 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-10036.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-08317, author = {Pei Yan and Shunquan Tan and Miaohui Wang and Jiwu Huang}, title = {Prompt Engineering-assisted Malware Dynamic Analysis Using {GPT-4}}, journal = {CoRR}, volume = {abs/2312.08317}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.08317}, doi = {10.48550/ARXIV.2312.08317}, eprinttype = {arXiv}, eprint = {2312.08317}, timestamp = {Mon, 08 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-08317.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ZhuoTLH22, author = {Long Zhuo and Shunquan Tan and Bin Li and Jiwu Huang}, title = {{ISP-GAN:} inception sub-pixel deconvolution-based lightweight GANs for colorization}, journal = {Multim. Tools Appl.}, volume = {81}, number = {17}, pages = {24977--24994}, year = {2022}, url = {https://doi.org/10.1007/s11042-022-12587-8}, doi = {10.1007/S11042-022-12587-8}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ZhuoTLH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/SuNHH22, author = {Wenkang Su and Jiangqun Ni and Xianglei Hu and Jiwu Huang}, title = {New design paradigm of distortion cost function for efficient {JPEG} steganography}, journal = {Signal Process.}, volume = {190}, pages = {108319}, year = {2022}, url = {https://doi.org/10.1016/j.sigpro.2021.108319}, doi = {10.1016/J.SIGPRO.2021.108319}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigpro/SuNHH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/LefevreCFGH22, author = {Pascal Lef{\`{e}}vre and Philippe Carr{\'{e}} and Caroline Fontaine and Philippe Gaborit and Jiwu Huang}, title = {Efficient image tampering localization using semi-fragile watermarking and error control codes}, journal = {Signal Process.}, volume = {190}, pages = {108342}, year = {2022}, url = {https://doi.org/10.1016/j.sigpro.2021.108342}, doi = {10.1016/J.SIGPRO.2021.108342}, timestamp = {Tue, 23 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigpro/LefevreCFGH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/XieNZZH22, author = {Hao Xie and Jiangqun Ni and Jian Zhang and Weizhe Zhang and Jiwu Huang}, title = {Evading generated-image detectors: {A} deep dithering approach}, journal = {Signal Process.}, volume = {197}, pages = {108558}, year = {2022}, url = {https://doi.org/10.1016/j.sigpro.2022.108558}, doi = {10.1016/J.SIGPRO.2022.108558}, timestamp = {Sat, 06 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigpro/XieNZZH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/XieNZZH22a, author = {Hao Xie and Jiangqun Ni and Jian Zhang and Weizhe Zhang and Jiwu Huang}, title = {Corrigendum to 'Evading generated-image detectors: {A} deep dithering approach' [Signal Processing 197(2022) 108558]}, journal = {Signal Process.}, volume = {200}, pages = {108670}, year = {2022}, url = {https://doi.org/10.1016/j.sigpro.2022.108670}, doi = {10.1016/J.SIGPRO.2022.108670}, timestamp = {Sat, 06 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigpro/XieNZZH22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spic/TanCZLH22, author = {Shunquan Tan and Baoying Chen and Jishen Zeng and Bin Li and Jiwu Huang}, title = {Hybrid deep-learning framework for object-based forgery detection in video}, journal = {Signal Process. Image Commun.}, volume = {105}, pages = {116695}, year = {2022}, url = {https://doi.org/10.1016/j.image.2022.116695}, doi = {10.1016/J.IMAGE.2022.116695}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spic/TanCZLH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spl/CuiHHK22, author = {Sanshuai Cui and Bingyuan Huang and Jiwu Huang and Xiangui Kang}, title = {Synthetic Speech Detection Based on Local Autoregression and Variance Statistics}, journal = {{IEEE} Signal Process. Lett.}, volume = {29}, pages = {1462--1466}, year = {2022}, url = {https://doi.org/10.1109/LSP.2022.3183951}, doi = {10.1109/LSP.2022.3183951}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spl/CuiHHK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/LiCTLH22, author = {Qiushi Li and Shengda Chen and Shunquan Tan and Bin Li and Jiwu Huang}, title = {One-Class Double Compression Detection of Advanced Videos Based on Simple Gaussian Distribution Model}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {32}, number = {4}, pages = {2496--2500}, year = {2022}, url = {https://doi.org/10.1109/TCSVT.2021.3069254}, doi = {10.1109/TCSVT.2021.3069254}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/LiCTLH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/TangLBLH22, author = {Weixuan Tang and Bin Li and Mauro Barni and Jin Li and Jiwu Huang}, title = {Improving Cost Learning for {JPEG} Steganography by Exploiting {JPEG} Domain Knowledge}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {32}, number = {6}, pages = {4081--4095}, year = {2022}, url = {https://doi.org/10.1109/TCSVT.2021.3115600}, doi = {10.1109/TCSVT.2021.3115600}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/TangLBLH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/LiuNZH22, author = {Ying Liu and Jiangqun Ni and Weizhe Zhang and Jiwu Huang}, title = {A Novel Video Steganographic Scheme Incorporating the Consistency Degree of Motion Vectors}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {32}, number = {7}, pages = {4905--4910}, year = {2022}, url = {https://doi.org/10.1109/TCSVT.2021.3135384}, doi = {10.1109/TCSVT.2021.3135384}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/LiuNZH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/QinLTTH22, author = {Xinghong Qin and Bin Li and Shunquan Tan and Weixuan Tang and Jiwu Huang}, title = {Gradually Enhanced Adversarial Perturbations on Color Pixel Vectors for Image Steganography}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {32}, number = {8}, pages = {5110--5123}, year = {2022}, url = {https://doi.org/10.1109/TCSVT.2022.3148406}, doi = {10.1109/TCSVT.2022.3148406}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/QinLTTH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/YuanCFZH22, author = {Yuan Yuan and Gene Cheung and Pascal Frossard and H. Vicky Zhao and Jiwu Huang}, title = {Landmarking for Navigational Streaming of Stored High-Dimensional Media}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {32}, number = {8}, pages = {5663--5679}, year = {2022}, url = {https://doi.org/10.1109/TCSVT.2022.3150780}, doi = {10.1109/TCSVT.2022.3150780}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/YuanCFZH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcyb/LuCZHWZ22, author = {Wei Lu and Junjia Chen and Junhong Zhang and Jiwu Huang and Jian Weng and Yicong Zhou}, title = {Secure Halftone Image Steganography Based on Feature Space and Layer Embedding}, journal = {{IEEE} Trans. Cybern.}, volume = {52}, number = {6}, pages = {5001--5014}, year = {2022}, url = {https://doi.org/10.1109/TCYB.2020.3026047}, doi = {10.1109/TCYB.2020.3026047}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcyb/LuCZHWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcyb/LuZLZHS22, author = {Wei Lu and Qin Zhang and Shangjun Luo and Yicong Zhou and Jiwu Huang and Yun{-}Qing Shi}, title = {Robust Estimation of Upscaling Factor on Double {JPEG} Compressed Images}, journal = {{IEEE} Trans. Cybern.}, volume = {52}, number = {10}, pages = {10814--10826}, year = {2022}, url = {https://doi.org/10.1109/TCYB.2021.3069999}, doi = {10.1109/TCYB.2021.3069999}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcyb/LuZLZHS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChenLHWZ22, author = {Bing Chen and Wei Lu and Jiwu Huang and Jian Weng and Yicong Zhou}, title = {Secret Sharing Based Reversible Data Hiding in Encrypted Images With Multiple Data-Hiders}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {2}, pages = {978--991}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.3011923}, doi = {10.1109/TDSC.2020.3011923}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChenLHWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhuoTLH22, author = {Long Zhuo and Shunquan Tan and Bin Li and Jiwu Huang}, title = {Self-Adversarial Training Incorporating Forgery Attention for Image Forgery Localization}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {819--834}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2022.3152362}, doi = {10.1109/TIFS.2022.3152362}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhuoTLH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuCMH22, author = {Zhaoxu Hu and Changsheng Chen and Wai Ho Mow and Jiwu Huang}, title = {Document Recapture Detection Based on a Unified Distortion Model of Halftone Cells}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {2800--2815}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2022.3192999}, doi = {10.1109/TIFS.2022.3192999}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuCMH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenZLH22, author = {Changsheng Chen and Shuzheng Zhang and Fengbo Lan and Jiwu Huang}, title = {Domain-Agnostic Document Authentication Against Practical Recapturing Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {2890--2905}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2022.3197054}, doi = {10.1109/TIFS.2022.3197054}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenZLH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WeiLTH22, author = {Kangkang Wei and Weiqi Luo and Shunquan Tan and Jiwu Huang}, title = {Universal Deep Network for Steganalysis of Color Image Based on Channel Representation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {3022--3036}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2022.3196265}, doi = {10.1109/TIFS.2022.3196265}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WeiLTH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/WeiLH22, author = {Shujin Wei and Haodong Li and Jiwu Huang}, title = {Deep Video Inpainting Localization Using Spatial and Temporal Traces}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2022, Virtual and Singapore, 23-27 May 2022}, pages = {8957--8961}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICASSP43922.2022.9746190}, doi = {10.1109/ICASSP43922.2022.9746190}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icassp/WeiLH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/ZhengCZH22, author = {Peijia Zheng and Zhiwei Cai and Huicong Zeng and Jiwu Huang}, editor = {Jo{\~{a}}o Magalh{\~{a}}es and Alberto Del Bimbo and Shin'ichi Satoh and Nicu Sebe and Xavier Alameda{-}Pineda and Qin Jin and Vincent Oria and Laura Toni}, title = {Keyword Spotting in the Homomorphic Encrypted Domain Using Deep Complex-Valued {CNN}}, booktitle = {{MM} '22: The 30th {ACM} International Conference on Multimedia, Lisboa, Portugal, October 10 - 14, 2022}, pages = {1474--1483}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3503161.3548350}, doi = {10.1145/3503161.3548350}, timestamp = {Fri, 14 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mm/ZhengCZH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@misc{DBLP:data/10/FerreiraFPSALHR22, author = {Anselmo Ferreira and Siovani Cintra Felipussi and Ramon Pires and Geise Santos and Sandra Avila and Jorge Albuquerque Lambert and Jiwu Huang and Anderson Rocha}, title = {Eyes in the Skies: {A} Data-driven Fusion Approach to Identifying Drug Crops from Remote Sensing Images Dataset}, publisher = {{IEEE} DataPort}, year = {2022}, month = may, howpublished = {\url{https://doi.org/10.21227/H2WD42}}, note = {Accessed on YYYY-MM-DD.}, url = {https://doi.org/10.21227/H2WD42}, doi = {10.21227/H2WD42}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/data/10/FerreiraFPSALHR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-05651, author = {Shunquan Tan and Qiushi Li and Laiyuan Li and Bin Li and Jiwu Huang}, title = {{STD-NET:} Search of Image Steganalytic Deep-learning Architecture via Hierarchical Tensor Decomposition}, journal = {CoRR}, volume = {abs/2206.05651}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.05651}, doi = {10.48550/ARXIV.2206.05651}, eprinttype = {arXiv}, eprint = {2206.05651}, timestamp = {Mon, 22 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-05651.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-01935, author = {Changsheng Chen and Lin Zhao and Rizhao Cai and Zitong Yu and Jiwu Huang and Alex C. Kot}, title = {Forensicability Assessment of Questioned Images in Recapturing Detection}, journal = {CoRR}, volume = {abs/2209.01935}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.01935}, doi = {10.48550/ARXIV.2209.01935}, eprinttype = {arXiv}, eprint = {2209.01935}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-01935.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-03930, author = {Peiyu Zhuang and Haodong Li and Rui Yang and Jiwu Huang}, title = {ReLoc: {A} Restoration-Assisted Framework for Robust Image Tampering Localization}, journal = {CoRR}, volume = {abs/2211.03930}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.03930}, doi = {10.48550/ARXIV.2211.03930}, eprinttype = {arXiv}, eprint = {2211.03930}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-03930.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-02822, author = {Qingliang Liu and Jiangqun Ni and Weizhe Zhang and Xiangyang Luo and Jiwu Huang}, title = {A Robust Image Steganographic Scheme against General Scaling Attacks}, journal = {CoRR}, volume = {abs/2212.02822}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.02822}, doi = {10.48550/ARXIV.2212.02822}, eprinttype = {arXiv}, eprint = {2212.02822}, timestamp = {Tue, 09 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-02822.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/XuLLXZLH21, author = {Zhaopeng Xu and Jiarui Liu and Wei Lu and Bozhi Xu and Xianfeng Zhao and Bin Li and Jiwu Huang}, title = {Detecting facial manipulated videos based on set convolutional neural networks}, journal = {J. Vis. Commun. Image Represent.}, volume = {77}, pages = {103119}, year = {2021}, url = {https://doi.org/10.1016/j.jvcir.2021.103119}, doi = {10.1016/J.JVCIR.2021.103119}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jvcir/XuLLXZLH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/HussainTLQHH21, author = {Israr Hussain and Shunquan Tan and Bin Li and Xinghong Qin and Dostdar Hussain and Jiwu Huang}, title = {A novel deep learning framework for double {JPEG} compression detection of small size blocks}, journal = {J. Vis. Commun. Image Represent.}, volume = {80}, pages = {103269}, year = {2021}, url = {https://doi.org/10.1016/j.jvcir.2021.103269}, doi = {10.1016/J.JVCIR.2021.103269}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jvcir/HussainTLQHH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/WangZLCH21, author = {Yuan{-}Gen Wang and Guopu Zhu and Jin Li and Mauro Conti and Jiwu Huang}, title = {Defeating Lattice-Based Data Hiding Code Via Decoding Security Hole}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {31}, number = {1}, pages = {76--87}, year = {2021}, url = {https://doi.org/10.1109/TCSVT.2020.2971590}, doi = {10.1109/TCSVT.2020.2971590}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/WangZLCH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/YinLLGHS21, author = {Xiaolin Yin and Wei Lu and Wanteng Liu and Jing{-}Ming Guo and Jiwu Huang and Yun{-}Qing Shi}, title = {Reversible Data Hiding in Halftone Images Based on Dynamic Embedding States Group}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {31}, number = {7}, pages = {2631--2645}, year = {2021}, url = {https://doi.org/10.1109/TCSVT.2020.3032685}, doi = {10.1109/TCSVT.2020.3032685}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/YinLLGHS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/LuZZZH21, author = {Wei Lu and Junhong Zhang and Xianfeng Zhao and Weiming Zhang and Jiwu Huang}, title = {Secure Robust {JPEG} Steganography Based on AutoEncoder With Adaptive {BCH} Encoding}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {31}, number = {7}, pages = {2909--2922}, year = {2021}, url = {https://doi.org/10.1109/TCSVT.2020.3027843}, doi = {10.1109/TCSVT.2020.3027843}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/LuZZZH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LuXYLHS21, author = {Wei Lu and Yingjie Xue and Yuileong Yeung and Hongmei Liu and Jiwu Huang and Yun Q. Shi}, title = {Secure Halftone Image Steganography Based on Pixel Density Transition}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {3}, pages = {1137--1149}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2933621}, doi = {10.1109/TDSC.2019.2933621}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LuXYLHS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TanWSLLH21, author = {Shunquan Tan and Weilong Wu and Zilong Shao and Qiushi Li and Bin Li and Jiwu Huang}, title = {{CALPA-NET:} Channel-Pruning-Assisted Deep Residual Network for Steganalysis of Digital Images}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {131--146}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2020.3005304}, doi = {10.1109/TIFS.2020.3005304}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TanWSLLH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TangLBLH21, author = {Weixuan Tang and Bin Li and Mauro Barni and Jin Li and Jiwu Huang}, title = {An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {952--967}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2020.3025438}, doi = {10.1109/TIFS.2020.3025438}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/TangLBLH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhuangLTLH21, author = {Peiyu Zhuang and Haodong Li and Shunquan Tan and Bin Li and Jiwu Huang}, title = {Image Tampering Localization Using a Dense Fully Convolutional Network}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {2986--2999}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2021.3070444}, doi = {10.1109/TIFS.2021.3070444}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhuangLTLH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MoTLH21, author = {Xianbo Mo and Shunquan Tan and Bin Li and Jiwu Huang}, title = {MCTSteg: {A} Monte Carlo Tree Search-Based Reinforcement Learning Framework for Universal Non-Additive Steganography}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {4306--4320}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2021.3104140}, doi = {10.1109/TIFS.2021.3104140}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MoTLH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuNZH21, author = {Xianglei Hu and Jiangqun Ni and Weizhe Zhang and Jiwu Huang}, title = {Efficient {JPEG} Batch Steganography Using Intrinsic Energy of Image Contents}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {4544--4558}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2021.3109464}, doi = {10.1109/TIFS.2021.3109464}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuNZH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuLZH21, author = {Minglin Liu and Weiqi Luo and Peijia Zheng and Jiwu Huang}, title = {A New Adversarial Embedding Method for Enhancing Image Steganography}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {4621--4634}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2021.3111748}, doi = {10.1109/TIFS.2021.3111748}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiuLZH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TianZH21, author = {Xianhao Tian and Peijia Zheng and Jiwu Huang}, title = {Robust Privacy-Preserving Motion Detection and Object Tracking in Encrypted Streaming Video}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {5381--5396}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2021.3128817}, doi = {10.1109/TIFS.2021.3128817}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TianZH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tip/ZhaoCH21, author = {Lin Zhao and Changsheng Chen and Jiwu Huang}, title = {Deep Learning-Based Forgery Attack on Document Images}, journal = {{IEEE} Trans. Image Process.}, volume = {30}, pages = {7964--7979}, year = {2021}, url = {https://doi.org/10.1109/TIP.2021.3112048}, doi = {10.1109/TIP.2021.3112048}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tip/ZhaoCH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/QinTT0H21, author = {Xinghong Qin and Shunquan Tan and Weixuan Tang and Bin Li and Jiwu Huang}, title = {Image Steganography Based on Iterative Adversarial Perturbations Onto a Synchronized-Directions Sub-Image}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2021, Toronto, ON, Canada, June 6-11, 2021}, pages = {2705--2709}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICASSP39728.2021.9414055}, doi = {10.1109/ICASSP39728.2021.9414055}, timestamp = {Thu, 08 Jul 2021 17:12:48 +0200}, biburl = {https://dblp.org/rec/conf/icassp/QinTT0H21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2101-05209, author = {Xinghong Qin and Shunquan Tan and Bin Li and Weixuan Tang and Jiwu Huang}, title = {Image Steganography based on Iteratively Adversarial Samples of {A} Synchronized-directions Sub-image}, journal = {CoRR}, volume = {abs/2101.05209}, year = {2021}, url = {https://arxiv.org/abs/2101.05209}, eprinttype = {arXiv}, eprint = {2101.05209}, timestamp = {Fri, 22 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2101-05209.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-00653, author = {Lin Zhao and Changsheng Chen and Jiwu Huang}, title = {Deep Learning-based Forgery Attack on Document Images}, journal = {CoRR}, volume = {abs/2102.00653}, year = {2021}, url = {https://arxiv.org/abs/2102.00653}, eprinttype = {arXiv}, eprint = {2102.00653}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-00653.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-13689, author = {Xianbo Mo and Shunquan Tan and Bin Li and Jiwu Huang}, title = {MCTSteg: {A} Monte Carlo Tree Search-based Reinforcement Learning Framework for Universal Non-additive Steganography}, journal = {CoRR}, volume = {abs/2103.13689}, year = {2021}, url = {https://arxiv.org/abs/2103.13689}, eprinttype = {arXiv}, eprint = {2103.13689}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-13689.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-06876, author = {Yuan Yuan and Gene Cheung and Pascal Frossard and H. Vicky Zhao and Jiwu Huang}, title = {Landmarking for Navigational Streaming of Stored High-Dimensional Media}, journal = {CoRR}, volume = {abs/2104.06876}, year = {2021}, url = {https://arxiv.org/abs/2104.06876}, eprinttype = {arXiv}, eprint = {2104.06876}, timestamp = {Mon, 19 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-06876.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-03867, author = {Weixuan Tang and Bin Li and Mauro Barni and Jin Li and Jiwu Huang}, title = {Improving Cost Learning for {JPEG} Steganography by Exploiting {JPEG} Domain Knowledge}, journal = {CoRR}, volume = {abs/2105.03867}, year = {2021}, url = {https://arxiv.org/abs/2105.03867}, eprinttype = {arXiv}, eprint = {2105.03867}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-03867.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-08899, author = {Yushu Zhang and Xiangli Xiao and Leo Yu Zhang and Zhe Liu and Jiwu Huang}, title = {{CREAMS:} Copyrighted Cloud Media Sharing}, journal = {CoRR}, volume = {abs/2105.08899}, year = {2021}, url = {https://arxiv.org/abs/2105.08899}, eprinttype = {arXiv}, eprint = {2105.08899}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-08899.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-12832, author = {Wei Lu and Lingyi Liu and Junwei Luo and Xianfeng Zhao and Yicong Zhou and Jiwu Huang}, title = {Detection of Deepfake Videos Using Long Distance Attention}, journal = {CoRR}, volume = {abs/2106.12832}, year = {2021}, url = {https://arxiv.org/abs/2106.12832}, eprinttype = {arXiv}, eprint = {2106.12832}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-12832.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-02434, author = {Long Zhuo and Shunquan Tan and Bin Li and Jiwu Huang}, title = {Self-Adversarial Training incorporating Forgery Attention for Image Forgery Localization}, journal = {CoRR}, volume = {abs/2107.02434}, year = {2021}, url = {https://arxiv.org/abs/2107.02434}, eprinttype = {arXiv}, eprint = {2107.02434}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-02434.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-13141, author = {Xianhao Tian and Peijia Zheng and Jiwu Huang}, title = {Robust Privacy-Preserving Motion Detection and Object Tracking in Encrypted Streaming Video}, journal = {CoRR}, volume = {abs/2108.13141}, year = {2021}, url = {https://arxiv.org/abs/2108.13141}, eprinttype = {arXiv}, eprint = {2108.13141}, timestamp = {Fri, 03 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-13141.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-12231, author = {Kangkang Wei and Weiqi Luo and Shunquan Tan and Jiwu Huang}, title = {Universal Deep Network for Steganalysis of Color Image based on Channel Representation}, journal = {CoRR}, volume = {abs/2111.12231}, year = {2021}, url = {https://arxiv.org/abs/2111.12231}, eprinttype = {arXiv}, eprint = {2111.12231}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-12231.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AmeriniLMH20, author = {Irene Amerini and Chang{-}Tsun Li and Nasir D. Memon and Jiwu Huang}, title = {{IEEE} Access Special Section: Digital Forensics Through Multimedia Source Inference}, journal = {{IEEE} Access}, volume = {8}, pages = {209657--209659}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3036772}, doi = {10.1109/ACCESS.2020.3036772}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/AmeriniLMH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ChenLLH20, author = {Bolin Chen and Haodong Li and Weiqi Luo and Jiwu Huang}, title = {Image processing operations identification via convolutional neural network}, journal = {Sci. China Inf. Sci.}, volume = {63}, number = {3}, year = {2020}, url = {https://doi.org/10.1007/s11432-018-9492-6}, doi = {10.1007/S11432-018-9492-6}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/ChenLLH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenLZH20, author = {Bolin Chen and Weiqi Luo and Peijia Zheng and Jiwu Huang}, title = {Universal stego post-processing for enhancing image steganography}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102664}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102664}, doi = {10.1016/J.JISA.2020.102664}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChenLZH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jstsp/DelpHMRTV20, author = {Edward J. Delp and Jiwu Huang and Nasir D. Memon and Anderson Rocha and Matt Turek and Luisa Verdoliva}, title = {Editorial: Media Authentication and Forensics - New Solutions and Research Opportunities}, journal = {{IEEE} J. Sel. Top. Signal Process.}, volume = {14}, number = {5}, pages = {906--909}, year = {2020}, url = {https://doi.org/10.1109/JSTSP.2020.3011085}, doi = {10.1109/JSTSP.2020.3011085}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jstsp/DelpHMRTV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/LiLTH20, author = {Haodong Li and Bin Li and Shunquan Tan and Jiwu Huang}, title = {Identification of deep network generated images using disparities in color components}, journal = {Signal Process.}, volume = {174}, pages = {107616}, year = {2020}, url = {https://doi.org/10.1016/j.sigpro.2020.107616}, doi = {10.1016/J.SIGPRO.2020.107616}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigpro/LiLTH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spic/HeXLTH20, author = {Junhui He and Yuzhang Xu and Weiqi Luo and Shaohua Tang and Jiwu Huang}, title = {A novel selective encryption scheme for {H.264/AVC} video with improved visual security}, journal = {Signal Process. Image Commun.}, volume = {89}, pages = {115994}, year = {2020}, url = {https://doi.org/10.1016/j.image.2020.115994}, doi = {10.1016/J.IMAGE.2020.115994}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spic/HeXLTH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/LiuLZHS20, author = {Xianjin Liu and Wei Lu and Qin Zhang and Jiwu Huang and Yun{-}Qing Shi}, title = {Downscaling Factor Estimation on Pre-JPEG Compressed Images}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {30}, number = {3}, pages = {618--631}, year = {2020}, url = {https://doi.org/10.1109/TCSVT.2019.2893353}, doi = {10.1109/TCSVT.2019.2893353}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/LiuLZHS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/YeungLXHS20, author = {Yuileong Yeung and Wei Lu and Yingjie Xue and Jiwu Huang and Yun Qing Shi}, title = {Secure Binary Image Steganography With Distortion Measurement Based on Prediction}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {30}, number = {5}, pages = {1423--1434}, year = {2020}, url = {https://doi.org/10.1109/TCSVT.2019.2903432}, doi = {10.1109/TCSVT.2019.2903432}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/YeungLXHS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/LuLZCHS20, author = {Wei Lu and Ruipeng Li and Lingwen Zeng and Junjia Chen and Jiwu Huang and Yun{-}Qing Shi}, title = {Binary Image Steganalysis Based on Histogram of Structuring Elements}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {30}, number = {9}, pages = {3081--3094}, year = {2020}, url = {https://doi.org/10.1109/TCSVT.2019.2936028}, doi = {10.1109/TCSVT.2019.2936028}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/LuLZCHS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/GuoZH20, author = {Jianting Guo and Peijia Zheng and Jiwu Huang}, title = {Efficient Privacy-Preserving Anomaly Detection and Localization in Bitstream Video}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {30}, number = {9}, pages = {3268--3281}, year = {2020}, url = {https://doi.org/10.1109/TCSVT.2019.2929855}, doi = {10.1109/TCSVT.2019.2929855}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/GuoZH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangRHKS20, author = {Jianhua Yang and Danyang Ruan and Jiwu Huang and Xiangui Kang and Yun{-}Qing Shi}, title = {An Embedding Cost Learning Framework Using {GAN}}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {839--851}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2922229}, doi = {10.1109/TIFS.2019.2922229}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangRHKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenLFHC20, author = {Changsheng Chen and Mulin Li and Anselmo Ferreira and Jiwu Huang and Rizhao Cai}, title = {A Copy-Proof Scheme Based on the Spectral and Spatial Barcoding Channel Models}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1056--1071}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2934861}, doi = {10.1109/TIFS.2019.2934861}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenLFHC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuangLBH20, author = {Yuankun Huang and Bin Li and Mauro Barni and Jiwu Huang}, title = {Identification of VoIP Speech With Multiple Domain Deep Features}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2253--2267}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2960635}, doi = {10.1109/TIFS.2019.2960635}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuangLBH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SunSCHK20, author = {Wenyun Sun and Yu Song and Changsheng Chen and Jiwu Huang and Alex C. Kot}, title = {Face Spoofing Detection Based on Local Ternary Label Supervision in Fully Convolutional Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3181--3196}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2985530}, doi = {10.1109/TIFS.2020.2985530}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SunSCHK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/staeors/FerreiraFPASLHR19, author = {Anselmo Ferreira and Siovani Cintra Felipussi and Ramon Pires and Sandra Avila and Geise Santos and Jorge Albuquerque Lambert and Jiwu Huang and Anderson Rocha}, title = {Eyes in the Skies: {A} Data-Driven Fusion Approach to Identifying Drug Crops From Remote Sensing Images}, journal = {{IEEE} J. Sel. Top. Appl. Earth Obs. Remote. Sens.}, volume = {12}, number = {12}, pages = {4773--4786}, year = {2019}, url = {https://doi.org/10.1109/JSTARS.2019.2917024}, doi = {10.1109/JSTARS.2019.2917024}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/staeors/FerreiraFPASLHR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/HeCLTH19, author = {Junhui He and Junxi Chen and Weiqi Luo and Shaohua Tang and Jiwu Huang}, title = {A Novel High-Capacity Reversible Data Hiding Scheme for Encrypted {JPEG} Bitstreams}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {29}, number = {12}, pages = {3501--3515}, year = {2019}, url = {https://doi.org/10.1109/TCSVT.2018.2882850}, doi = {10.1109/TCSVT.2018.2882850}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/HeCLTH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuHH19, author = {Zhenghui Liu and Yuankun Huang and Jiwu Huang}, title = {Patchwork-Based Audio Watermarking Robust Against De-Synchronization and Recapturing Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {14}, number = {5}, pages = {1171--1180}, year = {2019}, url = {https://doi.org/10.1109/TIFS.2018.2871748}, doi = {10.1109/TIFS.2018.2871748}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiuHH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TangLTBH19, author = {Weixuan Tang and Bin Li and Shunquan Tan and Mauro Barni and Jiwu Huang}, title = {CNN-Based Adversarial Embedding for Image Steganography}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {14}, number = {8}, pages = {2074--2087}, year = {2019}, url = {https://doi.org/10.1109/TIFS.2019.2891237}, doi = {10.1109/TIFS.2019.2891237}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TangLTBH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YanYH19, author = {Qi Yan and Rui Yang and Jiwu Huang}, title = {Robust Copy-Move Detection of Speech Recording Using Similarities of Pitch and Formant}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {14}, number = {9}, pages = {2331--2341}, year = {2019}, url = {https://doi.org/10.1109/TIFS.2019.2895965}, doi = {10.1109/TIFS.2019.2895965}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/YanYH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YanYH19a, author = {Qi Yan and Rui Yang and Jiwu Huang}, title = {Detection of Speech Smoothing on Very Short Clips}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {14}, number = {9}, pages = {2441--2453}, year = {2019}, url = {https://doi.org/10.1109/TIFS.2019.2900935}, doi = {10.1109/TIFS.2019.2900935}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/YanYH19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZengTLLH19, author = {Jishen Zeng and Shunquan Tan and Guangqing Liu and Bin Li and Jiwu Huang}, title = {WISERNet: Wider Separate-Then-Reunion Network for Steganalysis of Color Images}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {14}, number = {10}, pages = {2735--2748}, year = {2019}, url = {https://doi.org/10.1109/TIFS.2019.2904413}, doi = {10.1109/TIFS.2019.2904413}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZengTLLH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/QinLH19, author = {Xinghong Qin and Bin Li and Jiwu Huang}, title = {A New Spatial Steganographic Scheme by Modeling Image Residuals with Multivariate Gaussian Model}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2019, Brighton, United Kingdom, May 12-17, 2019}, pages = {2617--2621}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICASSP.2019.8682688}, doi = {10.1109/ICASSP.2019.8682688}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icassp/QinLH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccv/LiH19, author = {Haodong Li and Jiwu Huang}, title = {Localization of Deep Inpainting Using High-Pass Fully Convolutional Network}, booktitle = {2019 {IEEE/CVF} International Conference on Computer Vision, {ICCV} 2019, Seoul, Korea (South), October 27 - November 2, 2019}, pages = {8300--8309}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICCV.2019.00839}, doi = {10.1109/ICCV.2019.00839}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccv/LiH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/MoSCLH19, author = {Huaxiao Mo and Tingting Song and Bolin Chen and Weiqi Luo and Jiwu Huang}, title = {Enhancing {JPEG} Steganography using Iterative Adversarial Examples}, booktitle = {{IEEE} International Workshop on Information Forensics and Security, {WIFS} 2019, Delft, The Netherlands, December 9-12, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/WIFS47025.2019.9035101}, doi = {10.1109/WIFS47025.2019.9035101}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wifs/MoSCLH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@misc{DBLP:data/10/WangKZHPJWWZPZLKK19, author = {Haiqiang Wang and Ioannis Katsavounidis and Xin Zhou and Jiwu Huang and Man{-}On Pun and Xin Jin and Ronggang Wang and Xu Wang and Yun Zhang and Jeong{-}Hoon Park and Jiantong Zhou and Shawmin Lei and Sam Kwong and C.{-}C. Jay Kuo}, title = {VideoSet}, publisher = {{IEEE} DataPort}, year = {2019}, month = nov, howpublished = {\url{https://doi.org/10.21227/H2H01C}}, note = {Accessed on YYYY-MM-DD.}, url = {https://doi.org/10.21227/H2H01C}, doi = {10.21227/H2H01C}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/data/10/WangKZHPJWWZPZLKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-07556, author = {Huaxiao Mo and Tingting Song and Bolin Chen and Weiqi Luo and Jiwu Huang}, title = {Enhancing {JPEG} Steganography using Iterative Adversarial Examples}, journal = {CoRR}, volume = {abs/1909.07556}, year = {2019}, url = {http://arxiv.org/abs/1909.07556}, eprinttype = {arXiv}, eprint = {1909.07556}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-07556.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-04657, author = {Shunquan Tan and Weilong Wu and Zilong Shao and Qiushi Li and Bin Li and Jiwu Huang}, title = {{CALPA-NET:} Channel-pruning-assisted Deep Residual Network for Steganalysis of Digital Images}, journal = {CoRR}, volume = {abs/1911.04657}, year = {2019}, url = {http://arxiv.org/abs/1911.04657}, eprinttype = {arXiv}, eprint = {1911.04657}, timestamp = {Tue, 07 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-04657.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-03878, author = {Bolin Chen and Weiqi Luo and Jiwu Huang}, title = {Universal Stego Post-processing for Enhancing Image Steganography}, journal = {CoRR}, volume = {abs/1912.03878}, year = {2019}, url = {http://arxiv.org/abs/1912.03878}, eprinttype = {arXiv}, eprint = {1912.03878}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-03878.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/ChenZZLHZS18, author = {Zehong Chen and Fangguo Zhang and Peng Zhang and Joseph K. Liu and Jiwu Huang and Hanbang Zhao and Jian Shen}, title = {Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control}, journal = {Future Gener. Comput. Syst.}, volume = {87}, pages = {712--724}, year = {2018}, url = {https://doi.org/10.1016/j.future.2017.10.022}, doi = {10.1016/J.FUTURE.2017.10.022}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/ChenZZLHZS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/ZhengQH18, author = {Ligang Zheng and Guoping Qiu and Jiwu Huang}, title = {Riemannian competitive learning for symmetric positive definite matrices clustering}, journal = {Neurocomputing}, volume = {295}, pages = {153--164}, year = {2018}, url = {https://doi.org/10.1016/j.neucom.2018.03.015}, doi = {10.1016/J.NEUCOM.2018.03.015}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/ZhengQH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/RochaLKPH18, author = {Anderson Rocha and Shujun Li and C.{-}C. Jay Kuo and Alessandro Piva and Jiwu Huang}, title = {Data-driven multimedia forensics and security}, journal = {J. Vis. Commun. Image Represent.}, volume = {55}, pages = {447--448}, year = {2018}, url = {https://doi.org/10.1016/j.jvcir.2018.06.023}, doi = {10.1016/J.JVCIR.2018.06.023}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jvcir/RochaLKPH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/YangRZHS18, author = {Jianquan Yang and Honglei Ren and Guopu Zhu and Jiwu Huang and Yun{-}Qing Shi}, title = {Detecting median filtering via two-dimensional {AR} models of multiple filtered residuals}, journal = {Multim. Tools Appl.}, volume = {77}, number = {7}, pages = {7931--7953}, year = {2018}, url = {https://doi.org/10.1007/s11042-017-4691-0}, doi = {10.1007/S11042-017-4691-0}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/YangRZHS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spic/WuTHS18, author = {Hao{-}Tian Wu and Shaohua Tang and Jiwu Huang and Yun{-}Qing Shi}, title = {A novel reversible data hiding method with image contrast enhancement}, journal = {Signal Process. Image Commun.}, volume = {62}, pages = {64--73}, year = {2018}, url = {https://doi.org/10.1016/j.image.2017.12.006}, doi = {10.1016/J.IMAGE.2017.12.006}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spic/WuTHS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/LiLQH18, author = {Haodong Li and Weiqi Luo and Xiaoqing Qiu and Jiwu Huang}, title = {Identification of Various Image Operations Using Residual-Based Features}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {28}, number = {1}, pages = {31--45}, year = {2018}, url = {https://doi.org/10.1109/TCSVT.2016.2599849}, doi = {10.1109/TCSVT.2016.2599849}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcsv/LiLQH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZengTLH18, author = {Jishen Zeng and Shunquan Tan and Bin Li and Jiwu Huang}, title = {Large-Scale {JPEG} Image Steganalysis Using Hybrid Deep-Learning Framework}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {5}, pages = {1200--1214}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2779446}, doi = {10.1109/TIFS.2017.2779446}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZengTLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LuoKH18, author = {Da Luo and Pawel Korus and Jiwu Huang}, title = {Band Energy Difference for Source Attribution in Audio Forensics}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {9}, pages = {2179--2189}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2812185}, doi = {10.1109/TIFS.2018.2812185}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LuoKH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tip/ZhengH18, author = {Peijia Zheng and Jiwu Huang}, title = {Efficient Encrypted Images Filtering and Transform Coding With Walsh-Hadamard Transform and Parallelization}, journal = {{IEEE} Trans. Image Process.}, volume = {27}, number = {5}, pages = {2541--2556}, year = {2018}, url = {https://doi.org/10.1109/TIP.2018.2802199}, doi = {10.1109/TIP.2018.2802199}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tip/ZhengH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/HeHTH18, author = {Junhui He and Shuhao Huang and Shaohua Tang and Jiwu Huang}, title = {{JPEG} Image Encryption With Improved Format Compatibility and File Size Preservation}, journal = {{IEEE} Trans. Multim.}, volume = {20}, number = {10}, pages = {2645--2658}, year = {2018}, url = {https://doi.org/10.1109/TMM.2018.2817065}, doi = {10.1109/TMM.2018.2817065}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmm/HeHTH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tomccap/LuoLYYH18, author = {Weiqi Luo and Haodong Li and Qi Yan and Rui Yang and Jiwu Huang}, title = {Improved Audio Steganalytic Feature and Its Applications in Audio Forensics}, journal = {{ACM} Trans. Multim. Comput. Commun. Appl.}, volume = {14}, number = {2}, pages = {43:1--43:14}, year = {2018}, url = {https://doi.org/10.1145/3190575}, doi = {10.1145/3190575}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tomccap/LuoLYYH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/SunJH18, author = {Yao Sun and Hong Jia and Jiwu Huang}, title = {Ensemble Clustering with Novel Weighting Strategy}, booktitle = {14th International Conference on Computational Intelligence and Security, {CIS} 2018, Hangzhou, China, November 16-19, 2018}, pages = {155--159}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CIS2018.2018.00041}, doi = {10.1109/CIS2018.2018.00041}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/SunJH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/ChenCCZH18, author = {Delin Chen and Wenhao Chen and Jian Chen and Peijia Zheng and Jiwu Huang}, title = {Edge Detection and Image Segmentation on Encrypted Image with Homomorphic Encryption and Garbled Circuit}, booktitle = {2018 {IEEE} International Conference on Multimedia and Expo, {ICME} 2018, San Diego, CA, USA, July 23-27, 2018}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/ICME.2018.8486551}, doi = {10.1109/ICME.2018.8486551}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/ChenCCZH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/HuangTLH18, author = {Yuankun Huang and Shunquan Tan and Bin Li and Jiwu Huang}, editor = {Chang D. Yoo and Yun Qing Shi and Hyoung{-}Joong Kim and Alessandro Piva and Gwangsu Kim}, title = {{VPCID} - {A} VoIP Phone Call Identification Database}, booktitle = {Digital Forensics and Watermarking - 17th International Workshop, {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11378}, pages = {307--321}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11389-6\_23}, doi = {10.1007/978-3-030-11389-6\_23}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/HuangTLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenCZGZH18, author = {Jian Chen and Ziyang Chen and Peijia Zheng and Jianting Guo and Wei Zhang and Jiwu Huang}, title = {Encrypted Domain Mel-Frequency Cepstral Coefficient and Fragile Audio Watermarking}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {68--73}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00021}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00021}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenCZGZH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ChenZGZH18, author = {Jian Chen and Peijia Zheng and Jianting Guo and Wei Zhang and Jiwu Huang}, title = {A Privacy-Preserving Multipurpose Watermarking Scheme for Audio Authentication and Protection}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {86--91}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00023}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00023}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ChenZGZH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WuZGZH18, author = {Yangxin Wu and Peijia Zheng and Jianting Guo and Wei Zhang and Jiwu Huang}, title = {A Controllable Efficient Content Distribution Framework Based on Blockchain and {ISODATA}}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1698--1701}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00254}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00254}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WuZGZH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/FerreiraCLH18, author = {Anselmo Ferreira and Han Chen and Bin Li and Jiwu Huang}, title = {An Inception-Based Data-Driven Ensemble Approach to Camera Model Identification}, booktitle = {2018 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2018, Hong Kong, China, December 11-13, 2018}, pages = {1--7}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/WIFS.2018.8630774}, doi = {10.1109/WIFS.2018.8630774}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wifs/FerreiraCLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cloudcomp/2016, editor = {Jiafu Wan and Kai Lin and Delu Zeng and Jin Li and Yang Xiang and Xiaofeng Liao and Jiwu Huang and Zheli Liu}, title = {Cloud Computing, Security, Privacy in New Computing Environments - 7th International Conference, CloudComp 2016, and First International Conference, {SPNCE} 2016, Guangzhou, China, November 25-26, and December 15-16, 2016, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {197}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-69605-8}, doi = {10.1007/978-3-319-69605-8}, isbn = {978-3-319-69604-1}, timestamp = {Sat, 29 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cloudcomp/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1803-04805, author = {Jishen Zeng and Shunquan Tan and Guangqing Liu and Bin Li and Jiwu Huang}, title = {WISERNet: Wider Separate-then-reunion Network for Steganalysis of Color Images}, journal = {CoRR}, volume = {abs/1803.04805}, year = {2018}, url = {http://arxiv.org/abs/1803.04805}, eprinttype = {arXiv}, eprint = {1803.04805}, timestamp = {Wed, 03 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1803-04805.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1803-09043, author = {Weixuan Tang and Bin Li and Shunquan Tan and Mauro Barni and Jiwu Huang}, title = {{CNN} Based Adversarial Embedding with Minimum Alteration for Image Steganography}, journal = {CoRR}, volume = {abs/1803.09043}, year = {2018}, url = {http://arxiv.org/abs/1803.09043}, eprinttype = {arXiv}, eprint = {1803.09043}, timestamp = {Thu, 06 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1803-09043.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1808-07276, author = {Haodong Li and Bin Li and Shunquan Tan and Jiwu Huang}, title = {Detection of Deep Network Generated Images Using Disparities in Color Components}, journal = {CoRR}, volume = {abs/1808.07276}, year = {2018}, url = {http://arxiv.org/abs/1808.07276}, eprinttype = {arXiv}, eprint = {1808.07276}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1808-07276.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/Chen0ZH17, author = {Zehong Chen and Peng Zhang and Fangguo Zhang and Jiwu Huang}, title = {Ciphertext policy attribute-based encryption supporting unbounded attribute space from {R-LWE}}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {11}, number = {4}, pages = {2292--2309}, year = {2017}, url = {https://doi.org/10.3837/tiis.2017.04.025}, doi = {10.3837/TIIS.2017.04.025}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/Chen0ZH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/WangKZPLZPJWWZH17, author = {Haiqiang Wang and Ioannis Katsavounidis and Jiantong Zhou and Jeong{-}Hoon Park and Shawmin Lei and Xin Zhou and Man{-}On Pun and Xin Jin and Ronggang Wang and Xu Wang and Yun Zhang and Jiwu Huang and Sam Kwong and C.{-}C. Jay Kuo}, title = {VideoSet: {A} large-scale compressed video quality dataset based on {JND} measurement}, journal = {J. Vis. Commun. Image Represent.}, volume = {46}, pages = {292--302}, year = {2017}, url = {https://doi.org/10.1016/j.jvcir.2017.04.009}, doi = {10.1016/J.JVCIR.2017.04.009}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jvcir/WangKZPLZPJWWZH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LiuHSQ17, author = {Zhenghui Liu and Jiwu Huang and Xingming Sun and Chuanda Qi}, title = {A security watermark scheme used for digital speech forensics}, journal = {Multim. Tools Appl.}, volume = {76}, number = {7}, pages = {9297--9317}, year = {2017}, url = {https://doi.org/10.1007/s11042-016-3533-9}, doi = {10.1007/S11042-016-3533-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LiuHSQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LiuLHWQ17, author = {Zhenghui Liu and Da Luo and Jiwu Huang and J. Wang and Chuanda Qi}, title = {Tamper recovery algorithm for digital speech signal based on {DWT} and {DCT}}, journal = {Multim. Tools Appl.}, volume = {76}, number = {10}, pages = {12481--12504}, year = {2017}, url = {https://doi.org/10.1007/s11042-016-3664-z}, doi = {10.1007/S11042-016-3664-Z}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LiuLHWQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spl/TangTLH17, author = {Weixuan Tang and Shunquan Tan and Bin Li and Jiwu Huang}, title = {Automatic Steganographic Distortion Learning Using a Generative Adversarial Network}, journal = {{IEEE} Signal Process. Lett.}, volume = {24}, number = {10}, pages = {1547--1551}, year = {2017}, url = {https://doi.org/10.1109/LSP.2017.2745572}, doi = {10.1109/LSP.2017.2745572}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/spl/TangTLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LuoYLH17, author = {Da Luo and Rui Yang and Bin Li and Jiwu Huang}, title = {Detection of Double Compressed {AMR} Audio Using Stacked Autoencoder}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {2}, pages = {432--444}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2622012}, doi = {10.1109/TIFS.2016.2622012}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LuoYLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KorusH17, author = {Pawel Korus and Jiwu Huang}, title = {Multi-Scale Analysis Strategies in PRNU-Based Tampering Localization}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {4}, pages = {809--824}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2636089}, doi = {10.1109/TIFS.2016.2636089}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KorusH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiLQH17, author = {Haodong Li and Weiqi Luo and Xiaoqing Qiu and Jiwu Huang}, title = {Image Forgery Localization via Integrating Tampering Possibility Maps}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {5}, pages = {1240--1252}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2656823}, doi = {10.1109/TIFS.2017.2656823}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiLQH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TanZLH17, author = {Shunquan Tan and Haojie Zhang and Bin Li and Jiwu Huang}, title = {Pixel-Decimation-Assisted Steganalysis of Synchronize-Embedding-Changes Steganography}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {7}, pages = {1658--1670}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2682703}, doi = {10.1109/TIFS.2017.2682703}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TanZLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FerreiraBBBHSTR17, author = {Anselmo Ferreira and Luca Bondi and Luca Baroffio and Paolo Bestagini and Jiwu Huang and Jefersson A. dos Santos and Stefano Tubaro and Anderson Rocha}, title = {Data-Driven Feature Characterization Techniques for Laser Printer Attribution}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {8}, pages = {1860--1873}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2692722}, doi = {10.1109/TIFS.2017.2692722}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FerreiraBBBHSTR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiLH17, author = {Haodong Li and Weiqi Luo and Jiwu Huang}, title = {Localization of Diffusion-Based Inpainting in Digital Images}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {12}, pages = {3050--3064}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2730822}, doi = {10.1109/TIFS.2017.2730822}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tomccap/GuoZH17, author = {Jianting Guo and Peijia Zheng and Jiwu Huang}, title = {An Efficient Motion Detection and Tracking Scheme for Encrypted Surveillance Videos}, journal = {{ACM} Trans. Multim. Comput. Commun. Appl.}, volume = {13}, number = {4}, pages = {61:1--61:23}, year = {2017}, url = {https://doi.org/10.1145/3131342}, doi = {10.1145/3131342}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tomccap/GuoZH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icvip/BianLH17, author = {Shan Bian and Weiqi Luo and Jiwu Huang}, title = {Exposing Video Forgeries by Detecting Misaligned Double Compression}, booktitle = {Proceedings of the International Conference on Video and Image Processing, {ICVIP} 2017, Singapore, December 27-29, 2017}, pages = {44--48}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3177404.3177420}, doi = {10.1145/3177404.3177420}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icvip/BianLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mediaforensics/ZengTLH17, author = {Jishen Zeng and Shunquan Tan and Bin Li and Jiwu Huang}, editor = {Adnan M. Alattar and Nasir D. Memon}, title = {Pre-training via fitting deep neural network to rich-model features extraction procedure and its effect on deep learning for steganalysis}, booktitle = {Media Watermarking, Security, and Forensics 2017, Burlingame, CA, USA, 29 January 2017 - 2 February 2017}, pages = {44--49}, publisher = {Society for Imaging Science and Technology}, year = {2017}, url = {https://doi.org/10.2352/ISSN.2470-1173.2017.7.MWSF-324}, doi = {10.2352/ISSN.2470-1173.2017.7.MWSF-324}, timestamp = {Mon, 17 Jul 2023 16:29:17 +0200}, biburl = {https://dblp.org/rec/conf/mediaforensics/ZengTLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WangKZPLZPJWWZH17, author = {Haiqiang Wang and Ioannis Katsavounidis and Jiantong Zhou and Jeong{-}Hoon Park and Shawmin Lei and Xin Zhou and Man{-}On Pun and Xin Jin and Ronggang Wang and Xu Wang and Yun Zhang and Jiwu Huang and Sam Kwong and C.{-}C. Jay Kuo}, title = {VideoSet: {A} Large-Scale Compressed Video Quality Dataset Based on {JND} Measurement}, journal = {CoRR}, volume = {abs/1701.01500}, year = {2017}, url = {http://arxiv.org/abs/1701.01500}, eprinttype = {arXiv}, eprint = {1701.01500}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/WangKZPLZPJWWZH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/LiLRH17, author = {Haodong Li and Weiqi Luo and Quanquan Rao and Jiwu Huang}, title = {Anti-Forensics of Camera Identification and the Triangle Test by Improved Fingerprint-Copy Attack}, journal = {CoRR}, volume = {abs/1707.07795}, year = {2017}, url = {http://arxiv.org/abs/1707.07795}, eprinttype = {arXiv}, eprint = {1707.07795}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/LiLRH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/XiangHPHM16, author = {Yong Xiang and Jiwu Huang and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Guang Hua and Hafiz Malik}, title = {{IEEE} Access Special Section Editorial: Latest Advances and Emerging Applications of Data Hiding}, journal = {{IEEE} Access}, volume = {4}, pages = {9740--9742}, year = {2016}, url = {https://doi.org/10.1109/ACCESS.2016.2612138}, doi = {10.1109/ACCESS.2016.2612138}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/XiangHPHM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/WuCH16, author = {Hao{-}Tian Wu and Yiu{-}ming Cheung and Jiwu Huang}, title = {Reversible data hiding in Paillier cryptosystem}, journal = {J. Vis. Commun. Image Represent.}, volume = {40}, pages = {765--771}, year = {2016}, url = {https://doi.org/10.1016/j.jvcir.2016.08.021}, doi = {10.1016/J.JVCIR.2016.08.021}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jvcir/WuCH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/SunHW16, author = {Zhiwei Sun and Jiwu Huang and Ping Wang}, title = {Efficient multiparty quantum key agreement protocol based on commutative encryption}, journal = {Quantum Inf. Process.}, volume = {15}, number = {5}, pages = {2101--2111}, year = {2016}, url = {https://doi.org/10.1007/s11128-016-1253-8}, doi = {10.1007/S11128-016-1253-8}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/SunHW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/LiuZWWH16, author = {Zhenghui Liu and Fan Zhang and Jing Wang and Hongxia Wang and Jiwu Huang}, title = {Authentication and recovery algorithm for speech signal based on digital watermarking}, journal = {Signal Process.}, volume = {123}, pages = {157--166}, year = {2016}, url = {https://doi.org/10.1016/j.sigpro.2015.10.023}, doi = {10.1016/J.SIGPRO.2015.10.023}, timestamp = {Tue, 29 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigpro/LiuZWWH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/HuaHSGT16, author = {Guang Hua and Jiwu Huang and Yun Q. Shi and Jonathan Goh and Vrizlynn L. L. Thing}, title = {Twenty years of digital audio watermarking - a comprehensive review}, journal = {Signal Process.}, volume = {128}, pages = {222--242}, year = {2016}, url = {https://doi.org/10.1016/j.sigpro.2016.04.005}, doi = {10.1016/J.SIGPRO.2016.04.005}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigpro/HuaHSGT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spic/FengL0HS16, author = {Bingwen Feng and Wei Lu and Wei Sun and Jiwu Huang and Yun{-}Qing Shi}, title = {Robust image watermarking based on Tucker decomposition and Adaptive-Lattice Quantization Index Modulation}, journal = {Signal Process. Image Commun.}, volume = {41}, pages = {1--14}, year = {2016}, url = {https://doi.org/10.1016/j.image.2015.10.007}, doi = {10.1016/J.IMAGE.2015.10.007}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spic/FengL0HS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spl/KorusH16, author = {Pawel Korus and Jiwu Huang}, title = {Improved Tampering Localization in Digital Image Forensics Based on Maximal Entropy Random Walk}, journal = {{IEEE} Signal Process. Lett.}, volume = {23}, number = {1}, pages = {169--173}, year = {2016}, url = {https://doi.org/10.1109/LSP.2015.2507598}, doi = {10.1109/LSP.2015.2507598}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spl/KorusH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spl/TangLLH16, author = {Weixuan Tang and Bin Li and Weiqi Luo and Jiwu Huang}, title = {Clustering Steganographic Modification Directions for Color Components}, journal = {{IEEE} Signal Process. Lett.}, volume = {23}, number = {2}, pages = {197--201}, year = {2016}, url = {https://doi.org/10.1109/LSP.2015.2504583}, doi = {10.1109/LSP.2015.2504583}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spl/TangLLH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spl/LuoSH16, author = {Da Luo and Mengmeng Sun and Jiwu Huang}, title = {Audio Postprocessing Detection Based on Amplitude Cooccurrence Vector Feature}, journal = {{IEEE} Signal Process. Lett.}, volume = {23}, number = {5}, pages = {688--692}, year = {2016}, url = {https://doi.org/10.1109/LSP.2016.2549600}, doi = {10.1109/LSP.2016.2549600}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spl/LuoSH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/HuangQKH16, author = {Fangjun Huang and Xiaochao Qu and Hyoung Joong Kim and Jiwu Huang}, title = {Reversible Data Hiding in {JPEG} Images}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {26}, number = {9}, pages = {1610--1621}, year = {2016}, url = {https://doi.org/10.1109/TCSVT.2015.2473235}, doi = {10.1109/TCSVT.2015.2473235}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/HuangQKH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/ChenTLH16, author = {Shengda Chen and Shunquan Tan and Bin Li and Jiwu Huang}, title = {Automatic Detection of Object-Based Forgery in Advanced Video}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {26}, number = {11}, pages = {2138--2151}, year = {2016}, url = {https://doi.org/10.1109/TCSVT.2015.2473436}, doi = {10.1109/TCSVT.2015.2473436}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/ChenTLH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TangLLH16, author = {Weixuan Tang and Haodong Li and Weiqi Luo and Jiwu Huang}, title = {Adaptive Steganalysis Based on Embedding Probabilities of Pixels}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {4}, pages = {734--745}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2507159}, doi = {10.1109/TIFS.2015.2507159}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/TangLLH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuangHS16, author = {Fangjun Huang and Jiwu Huang and Yun{-}Qing Shi}, title = {New Framework for Reversible Data Hiding in Encrypted Domain}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {12}, pages = {2777--2789}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2598528}, doi = {10.1109/TIFS.2016.2598528}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuangHS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tip/KorusH16, author = {Pawel Korus and Jiwu Huang}, title = {Multi-Scale Fusion for Improved Localization of Malicious Tampering in Digital Images}, journal = {{IEEE} Trans. Image Process.}, volume = {25}, number = {3}, pages = {1312--1326}, year = {2016}, url = {https://doi.org/10.1109/TIP.2016.2518870}, doi = {10.1109/TIP.2016.2518870}, timestamp = {Sun, 10 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tip/KorusH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tomccap/WuWH16, author = {Haojun Wu and Yong Wang and Jiwu Huang}, title = {Identification of Reconstructed Speech}, journal = {{ACM} Trans. Multim. Comput. Commun. Appl.}, volume = {13}, number = {1}, pages = {10:1--10:20}, year = {2016}, url = {https://doi.org/10.1145/3004055}, doi = {10.1145/3004055}, timestamp = {Sun, 10 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tomccap/WuWH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/accv/ZhengQH16, author = {Ligang Zheng and Guoping Qiu and Jiwu Huang}, editor = {Shang{-}Hong Lai and Vincent Lepetit and Ko Nishino and Yoichi Sato}, title = {Clustering Symmetric Positive Definite Matrices on the Riemannian Manifolds}, booktitle = {Computer Vision - {ACCV} 2016 - 13th Asian Conference on Computer Vision, Taipei, Taiwan, November 20-24, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10111}, pages = {400--415}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54181-5\_26}, doi = {10.1007/978-3-319-54181-5\_26}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/accv/ZhengQH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/KorusH16, author = {Pawel Korus and Jiwu Huang}, title = {Evaluation of random field models in multi-modal unsupervised tampering localization}, booktitle = {{IEEE} International Workshop on Information Forensics and Security, {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/WIFS.2016.7823898}, doi = {10.1109/WIFS.2016.7823898}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wifs/KorusH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ZengTLH16, author = {Jishen Zeng and Shunquan Tan and Bin Li and Jiwu Huang}, title = {Large-scale {JPEG} steganalysis using hybrid deep-learning framework}, journal = {CoRR}, volume = {abs/1611.03233}, year = {2016}, url = {http://arxiv.org/abs/1611.03233}, eprinttype = {arXiv}, eprint = {1611.03233}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ZengTLH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cvm/HuangQKH15, author = {Fangjun Huang and Xiaochao Qu and Hyoung Joong Kim and Jiwu Huang}, title = {Local pixel patterns}, journal = {Comput. Vis. Media}, volume = {1}, number = {2}, pages = {157--170}, year = {2015}, url = {https://doi.org/10.1007/s41095-015-0014-4}, doi = {10.1007/S41095-015-0014-4}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cvm/HuangQKH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dsp/LuoYH15, author = {Da Luo and Rui Yang and Jiwu Huang}, title = {Identification of {AMR} decompressed audio}, journal = {Digit. Signal Process.}, volume = {37}, pages = {85--91}, year = {2015}, url = {https://doi.org/10.1016/j.dsp.2014.11.003}, doi = {10.1016/J.DSP.2014.11.003}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dsp/LuoYH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dsp/YangZHZ15, author = {Jianquan Yang and Guopu Zhu and Jiwu Huang and Xi Zhao}, title = {Estimating {JPEG} compression history of bitmaps based on factor histogram}, journal = {Digit. Signal Process.}, volume = {41}, pages = {90--97}, year = {2015}, url = {https://doi.org/10.1016/j.dsp.2015.03.014}, doi = {10.1016/J.DSP.2015.03.014}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dsp/YangZHZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dsp/WangWH15, author = {Yong Wang and Haojun Wu and Jiwu Huang}, title = {Verification of hidden speaker behind transformation disguised voices}, journal = {Digit. Signal Process.}, volume = {45}, pages = {84--95}, year = {2015}, url = {https://doi.org/10.1016/j.dsp.2015.06.010}, doi = {10.1016/J.DSP.2015.06.010}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dsp/WangWH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/GuoZH15, author = {Jianting Guo and Peijia Zheng and Jiwu Huang}, title = {Secure watermarking scheme against watermark attacks in the encrypted domain}, journal = {J. Vis. Commun. Image Represent.}, volume = {30}, pages = {125--135}, year = {2015}, url = {https://doi.org/10.1016/j.jvcir.2015.03.009}, doi = {10.1016/J.JVCIR.2015.03.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jvcir/GuoZH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/WuHS15, author = {Hao{-}Tian Wu and Jiwu Huang and Yun{-}Qing Shi}, title = {A reversible data hiding method with contrast enhancement for medical images}, journal = {J. Vis. Commun. Image Represent.}, volume = {31}, pages = {146--153}, year = {2015}, url = {https://doi.org/10.1016/j.jvcir.2015.06.010}, doi = {10.1016/J.JVCIR.2015.06.010}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jvcir/WuHS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LiLH15, author = {Haodong Li and Weiqi Luo and Jiwu Huang}, title = {Anti-forensics of double {JPEG} compression with the same quantization matrix}, journal = {Multim. Tools Appl.}, volume = {74}, number = {17}, pages = {6729--6744}, year = {2015}, url = {https://doi.org/10.1007/s11042-014-1927-0}, doi = {10.1007/S11042-014-1927-0}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/LiLH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiNLTH15, author = {Bin Li and Tian{-}Tsong Ng and Xiaolong Li and Shunquan Tan and Jiwu Huang}, title = {Revealing the Trace of High-Quality {JPEG} Compression Through Quantization Noise Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {3}, pages = {558--573}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2389148}, doi = {10.1109/TIFS.2015.2389148}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiNLTH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiWLTH15, author = {Bin Li and Ming Wang and Xiaolong Li and Shunquan Tan and Jiwu Huang}, title = {A Strategy of Clustering Modification Directions in Spatial Image Steganography}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {9}, pages = {1905--1917}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2434600}, doi = {10.1109/TIFS.2015.2434600}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiWLTH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tip/LiNLTH15, author = {Bin Li and Tian{-}Tsong Ng and Xiaolong Li and Shunquan Tan and Jiwu Huang}, title = {Statistical Model of {JPEG} Noises and Its Application in Quantization Step Estimation}, journal = {{IEEE} Trans. Image Process.}, volume = {24}, number = {5}, pages = {1471--1484}, year = {2015}, url = {https://doi.org/10.1109/TIP.2015.2405477}, doi = {10.1109/TIP.2015.2405477}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tip/LiNLTH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chinasip/LuoWH15, author = {Da Luo and Haojun Wu and Jiwu Huang}, title = {Audio recapture detection using deep learning}, booktitle = {{IEEE} China Summit and International Conference on Signal and Information Processing, ChinaSIP 2015, Chengdu, China, July 12-15, 2015}, pages = {478--482}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ChinaSIP.2015.7230448}, doi = {10.1109/CHINASIP.2015.7230448}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/chinasip/LuoWH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/YanYH15, author = {Qi Yan and Rui Yang and Jiwu Huang}, title = {Copy-move detection of audio recording with pitch similarity}, booktitle = {2015 {IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2015, South Brisbane, Queensland, Australia, April 19-24, 2015}, pages = {1782--1786}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICASSP.2015.7178277}, doi = {10.1109/ICASSP.2015.7178277}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icassp/YanYH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/TanHH15, author = {Yanping Tan and Fangjun Huang and Jiwu Huang}, editor = {Yun{-}Qing Shi and Hyoung{-}Joong Kim and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Isao Echizen}, title = {Feature Selection for High Dimensional Steganalysis}, booktitle = {Digital-Forensics and Watermarking - 14th International Workshop, {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9569}, pages = {134--144}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31960-5\_12}, doi = {10.1007/978-3-319-31960-5\_12}, timestamp = {Thu, 28 May 2020 12:51:39 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/TanHH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/LiLQH15, author = {Haodong Li and Weiqi Luo and Xiaoqing Qiu and Jiwu Huang}, title = {Identification of Image Operations Based on Steganalytic Features}, journal = {CoRR}, volume = {abs/1503.04718}, year = {2015}, url = {http://arxiv.org/abs/1503.04718}, eprinttype = {arXiv}, eprint = {1503.04718}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/LiLQH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cgf/LiuMHH14, author = {Bin Liu and Ralph R. Martin and Ji{-}Wu Huang and Shi{-}Min Hu}, title = {Structure Aware Visual Cryptography}, journal = {Comput. Graph. Forum}, volume = {33}, number = {7}, pages = {141--150}, year = {2014}, url = {https://doi.org/10.1111/cgf.12482}, doi = {10.1111/CGF.12482}, timestamp = {Mon, 14 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cgf/LiuMHH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/QuLH14, author = {Zhenhua Qu and Weiqi Luo and Jiwu Huang}, title = {A framework for identifying shifted double {JPEG} compression artifacts with application to non-intrusive digital image forensics}, journal = {Sci. China Inf. Sci.}, volume = {57}, number = {2}, pages = {1--18}, year = {2014}, url = {https://doi.org/10.1007/s11432-013-5046-8}, doi = {10.1007/S11432-013-5046-8}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/QuLH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dsp/WangZH14, author = {Yuan{-}Gen Wang and Guopu Zhu and Jiwu Huang}, title = {An improved sample projection approach for image watermarking}, journal = {Digit. Signal Process.}, volume = {24}, pages = {135--143}, year = {2014}, url = {https://doi.org/10.1016/j.dsp.2013.09.009}, doi = {10.1016/J.DSP.2013.09.009}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dsp/WangZH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/BianLH14, author = {Shan Bian and Weiqi Luo and Jiwu Huang}, title = {Detecting video frame-rate up-conversion based on periodic properties of inter-frame similarity}, journal = {Multim. Tools Appl.}, volume = {72}, number = {1}, pages = {437--451}, year = {2014}, url = {https://doi.org/10.1007/s11042-013-1364-5}, doi = {10.1007/S11042-013-1364-5}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/BianLH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pr/LeiZH14, author = {Yanqiang Lei and Ligang Zheng and Jiwu Huang}, title = {Geometric invariant features in the Radon transform domain for near-duplicate image detection}, journal = {Pattern Recognit.}, volume = {47}, number = {11}, pages = {3630--3640}, year = {2014}, url = {https://doi.org/10.1016/j.patcog.2014.05.009}, doi = {10.1016/J.PATCOG.2014.05.009}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pr/LeiZH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/BianLH14, author = {Shan Bian and Weiqi Luo and Jiwu Huang}, title = {Exposing Fake Bit Rate Videos and Estimating Original Bit Rates}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {24}, number = {12}, pages = {2144--2154}, year = {2014}, url = {https://doi.org/10.1109/TCSVT.2014.2334031}, doi = {10.1109/TCSVT.2014.2334031}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/BianLH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WuWH14, author = {Haojun Wu and Yong Wang and Jiwu Huang}, title = {Identification of Electronic Disguised Voices}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {9}, number = {3}, pages = {489--500}, year = {2014}, url = {https://doi.org/10.1109/TIFS.2014.2301912}, doi = {10.1109/TIFS.2014.2301912}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WuWH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiTWH14, author = {Bin Li and Shunquan Tan and Ming Wang and Jiwu Huang}, title = {Investigation on Cost Assignment in Spatial Image Steganography}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {9}, number = {8}, pages = {1264--1277}, year = {2014}, url = {https://doi.org/10.1109/TIFS.2014.2326954}, doi = {10.1109/TIFS.2014.2326954}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiTWH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tomccap/LuoLYH14, author = {Da Luo and Weiqi Luo and Rui Yang and Jiwu Huang}, title = {Identifying Compression History of Wave Audio and Its Applications}, journal = {{ACM} Trans. Multim. Comput. Commun. Appl.}, volume = {10}, number = {3}, pages = {30:1--30:19}, year = {2014}, url = {https://doi.org/10.1145/2575978}, doi = {10.1145/2575978}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tomccap/LuoLYH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tomccap/LeiQZH14, author = {Yanqiang Lei and Guoping Qiu and Ligang Zheng and Jiwu Huang}, title = {Fast Near-Duplicate Image Detection Using Uniform Randomized Trees}, journal = {{ACM} Trans. Multim. Comput. Commun. Appl.}, volume = {10}, number = {4}, pages = {35:1--35:15}, year = {2014}, url = {https://doi.org/10.1145/2602186}, doi = {10.1145/2602186}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tomccap/LeiQZH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chinasip/HuangHH14, author = {Zhensheng Huang and Fangjun Huang and Jiwu Huang}, title = {Detection of double compression with the same bit rate in {MPEG-2} videos}, booktitle = {{IEEE} China Summit {\&} International Conference on Signal and Information Processing, ChinaSIP 2014, Xi'an, China, July 9-13, 2014}, pages = {306--309}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ChinaSIP.2014.6889253}, doi = {10.1109/CHINASIP.2014.6889253}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/chinasip/HuangHH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/LuoYH14, author = {Da Luo and Rui Yang and Jiwu Huang}, title = {Detecting double compressed {AMR} audio using deep learning}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2014, Florence, Italy, May 4-9, 2014}, pages = {2669--2673}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICASSP.2014.6854084}, doi = {10.1109/ICASSP.2014.6854084}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icassp/LuoYH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/ZhengQHD14, author = {Ligang Zheng and Guoping Qiu and Jiwu Huang and Jiang Duan}, title = {Fast and accurate Nearest Neighbor search in the manifolds of symmetric positive definite matrices}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2014, Florence, Italy, May 4-9, 2014}, pages = {3804--3808}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICASSP.2014.6854313}, doi = {10.1109/ICASSP.2014.6854313}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/ZhengQHD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/LiWHL14, author = {Bin Li and Ming Wang and Jiwu Huang and Xiaolong Li}, title = {A new cost function for spatial image steganography}, booktitle = {2014 {IEEE} International Conference on Image Processing, {ICIP} 2014, Paris, France, October 27-30, 2014}, pages = {4206--4210}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICIP.2014.7025854}, doi = {10.1109/ICIP.2014.7025854}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icip/LiWHL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/WuLHY14, author = {Hao{-}Tian Wu and Yuan Liu and Jiwu Huang and Xin{-}Yu Yang}, title = {Improved steganalysis algorithm against motion vector based video steganography}, booktitle = {2014 {IEEE} International Conference on Image Processing, {ICIP} 2014, Paris, France, October 27-30, 2014}, pages = {5512--5516}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICIP.2014.7026115}, doi = {10.1109/ICIP.2014.7026115}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icip/WuLHY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpr/ChenLLYH14, author = {Chao Chen and Haodong Li and Weiqi Luo and Rui Yang and Jiwu Huang}, title = {Anti-forensics of {JPEG} Detectors via Adaptive Quantization Table Replacement}, booktitle = {22nd International Conference on Pattern Recognition, {ICPR} 2014, Stockholm, Sweden, August 24-28, 2014}, pages = {672--677}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICPR.2014.126}, doi = {10.1109/ICPR.2014.126}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpr/ChenLLYH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/TangLLH14, author = {Weixuan Tang and Haodong Li and Weiqi Luo and Jiwu Huang}, editor = {Andreas Unterweger and Andreas Uhl and Stefan Katzenbeisser and Roland Kwitt and Alessandro Piva}, title = {Adaptive steganalysis against {WOW} embedding algorithm}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '14, Salzburg, Austria, June 11-13, 2014}, pages = {91--96}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600918.2600935}, doi = {10.1145/2600918.2600935}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/TangLLH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/QiuLLH14, author = {Xiaoqing Qiu and Haodong Li and Weiqi Luo and Jiwu Huang}, editor = {Andreas Unterweger and Andreas Uhl and Stefan Katzenbeisser and Roland Kwitt and Alessandro Piva}, title = {A universal image forensic strategy based on steganalytic model}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '14, Salzburg, Austria, June 11-13, 2014}, pages = {165--170}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600918.2600941}, doi = {10.1145/2600918.2600941}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ih/QiuLLH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/LiNLTH14, author = {Bin Li and Tian{-}Tsong Ng and Xiaolong Li and Shunquan Tan and Jiwu Huang}, title = {{JPEG} Noises beyond the First Compression Cycle}, journal = {CoRR}, volume = {abs/1405.7571}, year = {2014}, url = {http://arxiv.org/abs/1405.7571}, eprinttype = {arXiv}, eprint = {1405.7571}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/LiNLTH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/ChenLN0H13, author = {Likai Chen and Wei Lu and Jiangqun Ni and Wei Sun and Jiwu Huang}, title = {Region duplication detection based on Harris corner points and step sector statistics}, journal = {J. Vis. Commun. Image Represent.}, volume = {24}, number = {3}, pages = {244--254}, year = {2013}, url = {https://doi.org/10.1016/j.jvcir.2013.01.008}, doi = {10.1016/J.JVCIR.2013.01.008}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jvcir/ChenLN0H13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tip/ZhengH13, author = {Peijia Zheng and Jiwu Huang}, title = {Discrete Wavelet Transform and Data Expansion Reduction in Homomorphic Encrypted Domain}, journal = {{IEEE} Trans. Image Process.}, volume = {22}, number = {6}, pages = {2455--2468}, year = {2013}, url = {https://doi.org/10.1109/TIP.2013.2253474}, doi = {10.1109/TIP.2013.2253474}, timestamp = {Sun, 10 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tip/ZhengH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tip/ChenNH13, author = {Chenglong Chen and Jiangqun Ni and Jiwu Huang}, title = {Blind Detection of Median Filtering in Digital Images: {A} Difference Domain Based Approach}, journal = {{IEEE} Trans. Image Process.}, volume = {22}, number = {12}, pages = {4699--4710}, year = {2013}, url = {https://doi.org/10.1109/TIP.2013.2277814}, doi = {10.1109/TIP.2013.2277814}, timestamp = {Sun, 10 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tip/ChenNH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/WuWH13, author = {Haojun Wu and Yong Wang and Jiwu Huang}, title = {Blind detection of electronic disguised voice}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2013, Vancouver, BC, Canada, May 26-31, 2013}, pages = {3013--3017}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICASSP.2013.6638211}, doi = {10.1109/ICASSP.2013.6638211}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icassp/WuWH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/QuKHL13, author = {Zhenhua Qu and Xiangui Kang and Jiwu Huang and Yinxiang Li}, title = {Forensic sensor pattern noise extraction from large image data set}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2013, Vancouver, BC, Canada, May 26-31, 2013}, pages = {3023--3027}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICASSP.2013.6638213}, doi = {10.1109/ICASSP.2013.6638213}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/QuKHL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/ZengKH13, author = {Hui Zeng and Xiangui Kang and Jiwu Huang}, title = {Mixed-strategy Nash equilibrium in the camera source identification game}, booktitle = {{IEEE} International Conference on Image Processing, {ICIP} 2013, Melbourne, Australia, September 15-18, 2013}, pages = {4472--4476}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICIP.2013.6738921}, doi = {10.1109/ICIP.2013.6738921}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icip/ZengKH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/BianLH13, author = {Shan Bian and Weiqi Luo and Jiwu Huang}, title = {Exposing fake bitrate video and its original bitrate}, booktitle = {{IEEE} International Conference on Image Processing, {ICIP} 2013, Melbourne, Australia, September 15-18, 2013}, pages = {4492--4496}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICIP.2013.6738925}, doi = {10.1109/ICIP.2013.6738925}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icip/BianLH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/HuangLHS13, author = {Fangjun Huang and Weiqi Luo and Jiwu Huang and Yun{-}Qing Shi}, editor = {William Puech and Marc Chaumont and Jana Dittmann and Patrizio Campisi}, title = {Distortion function designing for {JPEG} steganography with uncompressed side-image}, booktitle = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec '13, Montpellier, France, June 17-19, 2013}, pages = {69--76}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2482513.2482517}, doi = {10.1145/2482513.2482517}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/HuangLHS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/HuangZH13, author = {Fangjun Huang and Yane Zhong and Jiwu Huang}, editor = {Yun{-}Qing Shi and Hyoung{-}Joong Kim and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, title = {Improved Algorithm of Edge Adaptive Image Steganography Based on {LSB} Matching Revisited Algorithm}, booktitle = {Digital-Forensics and Watermarking - 12th International Workshop, {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8389}, pages = {19--31}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43886-2\_2}, doi = {10.1007/978-3-662-43886-2\_2}, timestamp = {Thu, 28 May 2020 12:51:39 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/HuangZH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/ZhengH13, author = {Peijia Zheng and Jiwu Huang}, editor = {Alejandro Jaimes and Nicu Sebe and Nozha Boujemaa and Daniel Gatica{-}Perez and David A. Shamma and Marcel Worring and Roger Zimmermann}, title = {An efficient image homomorphic encryption scheme with small ciphertext expansion}, booktitle = {{ACM} Multimedia Conference, {MM} '13, Barcelona, Spain, October 21-25, 2013}, pages = {803--812}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2502081.2502105}, doi = {10.1145/2502081.2502105}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mm/ZhengH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/XiangYH12, author = {Shijun Xiang and Jianquan Yang and Jiwu Huang}, title = {Perceptual video hashing robust against geometric distortions}, journal = {Sci. China Inf. Sci.}, volume = {55}, number = {7}, pages = {1520--1527}, year = {2012}, url = {https://doi.org/10.1007/s11432-011-4450-1}, doi = {10.1007/S11432-011-4450-1}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/XiangYH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pr/HeLSH12, author = {Zhongwei He and Wei Lu and Wei Sun and Jiwu Huang}, title = {Digital image splicing detection based on Markov features in {DCT} and {DWT} domain}, journal = {Pattern Recognit.}, volume = {45}, number = {12}, pages = {4292--4299}, year = {2012}, url = {https://doi.org/10.1016/j.patcog.2012.05.014}, doi = {10.1016/J.PATCOG.2012.05.014}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pr/HeLSH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/WuH12, author = {Hao{-}Tian Wu and Jiwu Huang}, title = {Reversible image watermarking on prediction errors by efficient histogram modification}, journal = {Signal Process.}, volume = {92}, number = {12}, pages = {3000--3009}, year = {2012}, url = {https://doi.org/10.1016/j.sigpro.2012.05.034}, doi = {10.1016/J.SIGPRO.2012.05.034}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigpro/WuH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/LeiLWH12, author = {Yanqiang Lei and Weiqi Luo and Yuan{-}Gen Wang and Jiwu Huang}, title = {Video Sequence Matching Based on the Invariance of Color Correlation}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {22}, number = {9}, pages = {1332--1343}, year = {2012}, url = {https://doi.org/10.1109/TCSVT.2012.2201670}, doi = {10.1109/TCSVT.2012.2201670}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/LeiLWH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KangLQH12, author = {Xiangui Kang and Yinxiang Li and Zhenhua Qu and Jiwu Huang}, title = {Enhancing Source Camera Identification Performance With a Camera Reference Phase Sensor Pattern Noise}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {7}, number = {2}, pages = {393--402}, year = {2012}, url = {https://doi.org/10.1109/TIFS.2011.2168214}, doi = {10.1109/TIFS.2011.2168214}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KangLQH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CaoH12, author = {Jian Cao and Jiwu Huang}, title = {Controllable Secure Watermarking Technique for Tradeoff Between Robustness and Security}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {7}, number = {2}, pages = {821--826}, year = {2012}, url = {https://doi.org/10.1109/TIFS.2012.2184093}, doi = {10.1109/TIFS.2012.2184093}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CaoH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangNH12, author = {Chuntao Wang and Jiangqun Ni and Jiwu Huang}, title = {An Informed Watermarking Scheme Using Hidden Markov Model in the Wavelet Domain}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {7}, number = {3}, pages = {853--867}, year = {2012}, url = {https://doi.org/10.1109/TIFS.2012.2188797}, doi = {10.1109/TIFS.2012.2188797}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangNH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuangHS12, author = {Fangjun Huang and Jiwu Huang and Yun{-}Qing Shi}, title = {New Channel Selection Rule for {JPEG} Steganography}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {7}, number = {4}, pages = {1181--1191}, year = {2012}, url = {https://doi.org/10.1109/TIFS.2012.2198213}, doi = {10.1109/TIFS.2012.2198213}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuangHS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhengLQH12, author = {Ligang Zheng and Yanqiang Lei and Guoping Qiu and Jiwu Huang}, title = {Near-Duplicate Image Detection in a Visually Salient Riemannian Space}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {7}, number = {5}, pages = {1578--1593}, year = {2012}, url = {https://doi.org/10.1109/TIFS.2012.2206386}, doi = {10.1109/TIFS.2012.2206386}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhengLQH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tomccap/LiLHS12, author = {Jian Li and Hongmei Liu and Jiwu Huang and Yun Q. Shi}, title = {Reference index-based {H.264} video watermarking scheme}, journal = {{ACM} Trans. Multim. Comput. Commun. Appl.}, volume = {8}, number = {{S2}}, pages = {33:1--33:22}, year = {2012}, url = {https://doi.org/10.1145/2344436.2344439}, doi = {10.1145/2344436.2344439}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tomccap/LiLHS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tomccap/YangQH12, author = {Rui Yang and Zhenhua Qu and Jiwu Huang}, title = {Exposing {MP3} audio forgeries using frame offsets}, journal = {{ACM} Trans. Multim. Comput. Commun. Appl.}, volume = {8}, number = {{S2}}, pages = {35:1--35:20}, year = {2012}, url = {https://doi.org/10.1145/2344436.2344441}, doi = {10.1145/2344436.2344441}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tomccap/YangQH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvm/QuLH12, author = {Zhenhua Qu and Weiqi Luo and Jiwu Huang}, editor = {Shi{-}Min Hu and Ralph R. Martin}, title = {Identifying Shifted Double {JPEG} Compression Artifacts for Non-intrusive Digital Image Forensics}, booktitle = {Computational Visual Media - First International Conference, {CVM} 2012, Beijing, China, November 8-10, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7633}, pages = {1--8}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34263-9\_1}, doi = {10.1007/978-3-642-34263-9\_1}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cvm/QuLH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/ZhengQH12, author = {Ligang Zheng and Guoping Qiu and Jiwu Huang}, title = {Efficient coarse-to-fine near-duplicate image detection in riemannian manifold}, booktitle = {2012 {IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2012, Kyoto, Japan, March 25-30, 2012}, pages = {977--980}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICASSP.2012.6288048}, doi = {10.1109/ICASSP.2012.6288048}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/ZhengQH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/LuoLYH12, author = {Da Luo and Weiqi Luo and Rui Yang and Jiwu Huang}, title = {Compression history identification for digital audio signal}, booktitle = {2012 {IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2012, Kyoto, Japan, March 25-30, 2012}, pages = {1733--1736}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICASSP.2012.6288233}, doi = {10.1109/ICASSP.2012.6288233}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/LuoLYH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/LiLH12, author = {Haodong Li and Weiqi Luo and Jiwu Huang}, title = {Countering anti-JPEG compression forensics}, booktitle = {19th {IEEE} International Conference on Image Processing, {ICIP} 2012, Lake Buena Vista, Orlando, FL, USA, September 30 - October 3, 2012}, pages = {241--244}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICIP.2012.6466840}, doi = {10.1109/ICIP.2012.6466840}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icip/LiLH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ChenNHH12, author = {Chenglong Chen and Jiangqun Ni and Rongbin Huang and Jiwu Huang}, editor = {Matthias Kirchner and Dipak Ghosal}, title = {Blind Median Filtering Detection Using Statistics in Difference Domain}, booktitle = {Information Hiding - 14th International Conference, {IH} 2012, Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7692}, pages = {1--15}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-36373-3\_1}, doi = {10.1007/978-3-642-36373-3\_1}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/ChenNHH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ZhengH12, author = {Peijia Zheng and Jiwu Huang}, editor = {Matthias Kirchner and Dipak Ghosal}, title = {Walsh-Hadamard Transform in the Homomorphic Encrypted Domain and Its Application in Image Watermarking}, booktitle = {Information Hiding - 14th International Conference, {IH} 2012, Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7692}, pages = {240--254}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-36373-3\_16}, doi = {10.1007/978-3-642-36373-3\_16}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/ZhengH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/WangDWH12, author = {Yong Wang and Yanhong Deng and Haojun Wu and Jiwu Huang}, editor = {Yun Q. Shi and Hyoung{-}Joong Kim and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, title = {Blind Detection of Electronic Voice Transformation with Natural Disguise}, booktitle = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW} 2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7809}, pages = {336--343}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-40099-5\_28}, doi = {10.1007/978-3-642-40099-5\_28}, timestamp = {Thu, 28 May 2020 12:51:39 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/WangDWH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/HuangLH11, author = {Fangjun Huang and Weiqi Luo and Jiwu Huang}, title = {Steganalysis of {JPEG} steganography with complementary embedding strategy}, journal = {{IET} Inf. Secur.}, volume = {5}, number = {1}, pages = {10--18}, year = {2011}, url = {https://doi.org/10.1049/iet-ifs.2009.0080}, doi = {10.1049/IET-IFS.2009.0080}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/HuangLH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jihmsp/0011HH011, author = {Bin Li and Junhui He and Jiwu Huang and Yun Qing Shi}, title = {A Survey on Image Steganography and Steganalysis}, journal = {J. Inf. Hiding Multim. Signal Process.}, volume = {2}, number = {2}, pages = {142--172}, year = {2011}, url = {http://bit.kuas.edu.tw/\%7Ejihmsp/2011/vol2/JIH-MSP-2011-03-005.pdf}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jihmsp/0011HH011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LuoHH11, author = {Weiqi Luo and Fangjun Huang and Jiwu Huang}, title = {A more secure steganography based on adaptive pixel-value differencing scheme}, journal = {Multim. Tools Appl.}, volume = {52}, number = {2-3}, pages = {407--430}, year = {2011}, url = {https://doi.org/10.1007/s11042-009-0440-3}, doi = {10.1007/S11042-009-0440-3}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LuoHH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LiuYH11, author = {Hongmei Liu and Xinzhi Yao and Jiwu Huang}, title = {Minority codes with improved embedding efficiency for large payloads}, journal = {Multim. Tools Appl.}, volume = {52}, number = {2-3}, pages = {431--443}, year = {2011}, url = {https://doi.org/10.1007/s11042-009-0431-4}, doi = {10.1007/S11042-009-0431-4}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LiuYH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/ZhuKHY11, author = {Guopu Zhu and Sam Kwong and Jiwu Huang and Jianquan Yang}, title = {Random Gray code and its performance analysis for image hashing}, journal = {Signal Process.}, volume = {91}, number = {9}, pages = {2178--2193}, year = {2011}, url = {https://doi.org/10.1016/j.sigpro.2011.03.022}, doi = {10.1016/J.SIGPRO.2011.03.022}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigpro/ZhuKHY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spic/LeiWH11, author = {Yanqiang Lei and Yuan{-}Gen Wang and Jiwu Huang}, title = {Robust image hash in Radon transform domain for authentication}, journal = {Signal Process. Image Commun.}, volume = {26}, number = {6}, pages = {280--288}, year = {2011}, url = {https://doi.org/10.1016/j.image.2011.04.007}, doi = {10.1016/J.IMAGE.2011.04.007}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/spic/LeiWH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spl/LuoWH11, author = {Weiqi Luo and Yuan{-}Gen Wang and Jiwu Huang}, title = {Security Analysis on Spatial {\(\pm\)} 1 Steganography for {JPEG} Decompressed Images}, journal = {{IEEE} Signal Process. Lett.}, volume = {18}, number = {1}, pages = {39--42}, year = {2011}, url = {https://doi.org/10.1109/LSP.2010.2091127}, doi = {10.1109/LSP.2010.2091127}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spl/LuoWH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/KangYH11, author = {Xiangui Kang and Rui Yang and Jiwu Huang}, title = {Geometric Invariant Audio Watermarking Based on an {LCM} Feature}, journal = {{IEEE} Trans. Multim.}, volume = {13}, number = {2}, pages = {181--190}, year = {2011}, url = {https://doi.org/10.1109/TMM.2010.2098850}, doi = {10.1109/TMM.2010.2098850}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmm/KangYH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/ZhengQHF11, author = {Ligang Zheng and Guoping Qiu and Jiwu Huang and Hao Fu}, editor = {Beno{\^{\i}}t Macq and Peter Schelkens}, title = {Salient covariance for near-duplicate image and video detection}, booktitle = {18th {IEEE} International Conference on Image Processing, {ICIP} 2011, Brussels, Belgium, September 11-14, 2011}, pages = {2537--2540}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ICIP.2011.6116179}, doi = {10.1109/ICIP.2011.6116179}, timestamp = {Fri, 01 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icip/ZhengQHF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/WuH11, author = {Hao{-}Tian Wu and Jiwu Huang}, editor = {Beno{\^{\i}}t Macq and Peter Schelkens}, title = {Secure {JPEG} steganography by LSB\({}^{\mbox{+}}\) matching and multi-band embedding}, booktitle = {18th {IEEE} International Conference on Image Processing, {ICIP} 2011, Brussels, Belgium, September 11-14, 2011}, pages = {2737--2740}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ICIP.2011.6116235}, doi = {10.1109/ICIP.2011.6116235}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icip/WuH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/LiuLLH11, author = {Hongmei Liu and Lei Li and Jian Li and Jiwu Huang}, editor = {Yun{-}Qing Shi and Hyoung{-}Joong Kim and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, title = {Three Novel Algorithms for Hiding Data in {PDF} Files Based on Incremental Updates}, booktitle = {Digital Forensics and Watermarking - 10th International Workshop, {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7128}, pages = {167--180}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32205-1\_15}, doi = {10.1007/978-3-642-32205-1\_15}, timestamp = {Thu, 28 May 2020 12:51:39 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/LiuLLH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mediaforensics/LiaoYLLH11, author = {Dandan Liao and Rui Yang and Hongmei Liu and Jian Li and Jiwu Huang}, editor = {Nasir D. Memon and Jana Dittmann and Adnan M. Alattar and Edward J. Delp III}, title = {Double {H.264/AVC} compression detection using quantized nonzero {AC} coefficients}, booktitle = {Media Forensics and Security III, San Francisco Airport, CA, USA, January 24-26, 2011, Proceedings}, series = {{SPIE} Proceedings}, volume = {7880}, pages = {78800Q}, publisher = {{SPIE}}, year = {2011}, url = {https://doi.org/10.1117/12.876566}, doi = {10.1117/12.876566}, timestamp = {Fri, 07 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mediaforensics/LiaoYLLH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mediaforensics/KangLQH11, author = {Xiangui Kang and Yinxiang Li and Zhenhua Qu and Jiwu Huang}, editor = {Nasir D. Memon and Jana Dittmann and Adnan M. Alattar and Edward J. Delp III}, title = {Enhancing {ROC} performance of trustworthy camera source identification}, booktitle = {Media Forensics and Security III, San Francisco Airport, CA, USA, January 24-26, 2011, Proceedings}, series = {{SPIE} Proceedings}, volume = {7880}, pages = {788009}, publisher = {{SPIE}}, year = {2011}, url = {https://doi.org/10.1117/12.872595}, doi = {10.1117/12.872595}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mediaforensics/KangLQH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/ZhengH11, author = {Peijia Zheng and Jiwu Huang}, editor = {K. Sel{\c{c}}uk Candan and Sethuraman Panchanathan and Balakrishnan Prabhakaran and Hari Sundaram and Wu{-}chi Feng and Nicu Sebe}, title = {Implementation of the discrete wavelet transform and multiresolution analysis in the encrypted domain}, booktitle = {Proceedings of the 19th International Conference on Multimedia 2011, Scottsdale, AZ, USA, November 28 - December 1, 2011}, pages = {413--422}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2072298.2072352}, doi = {10.1145/2072298.2072352}, timestamp = {Mon, 22 Apr 2024 21:24:20 +0200}, biburl = {https://dblp.org/rec/conf/mm/ZhengH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/WangH10, author = {Yong Wang and Jiwu Huang}, title = {Robust {AVS} audio watermarking}, journal = {Sci. China Inf. Sci.}, volume = {53}, number = {3}, pages = {607--618}, year = {2010}, url = {https://doi.org/10.1007/s11432-010-0049-1}, doi = {10.1007/S11432-010-0049-1}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/WangH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejasp/LiuYH10, author = {Hongmei Liu and Xinzhi Yao and Jiwu Huang}, title = {Semi-Fragile Zernike Moment-Based Image Watermarking for Authentication}, journal = {{EURASIP} J. Adv. Signal Process.}, volume = {2010}, year = {2010}, url = {https://doi.org/10.1155/2010/341856}, doi = {10.1155/2010/341856}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejasp/LiuYH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejasp/WangWH10, author = {Yong Wang and Shaoquan Wu and Jiwu Huang}, title = {Audio Watermarking Scheme Robust against Desynchronization Based on the Dyadic Wavelet Transform}, journal = {{EURASIP} J. Adv. Signal Process.}, volume = {2010}, year = {2010}, url = {https://doi.org/10.1155/2010/232616}, doi = {10.1155/2010/232616}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejasp/WangWH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KangHZ10, author = {Xiangui Kang and Jiwu Huang and Wenjun Zeng}, title = {Efficient general print-scanning resilient data hiding based on uniform log-polar mapping}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {5}, number = {1}, pages = {1--12}, year = {2010}, url = {https://doi.org/10.1109/TIFS.2009.2039604}, doi = {10.1109/TIFS.2009.2039604}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KangHZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhuHKY10, author = {Guopu Zhu and Jiwu Huang and Sam Kwong and Jianquan Yang}, title = {Fragility analysis of adaptive quantization-based image hashing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {5}, number = {1}, pages = {133--147}, year = {2010}, url = {https://doi.org/10.1109/TIFS.2009.2038742}, doi = {10.1109/TIFS.2009.2038742}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhuHKY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LuoHH10, author = {Weiqi Luo and Fangjun Huang and Jiwu Huang}, title = {Edge adaptive image steganography based on {LSB} matching revisited}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {5}, number = {2}, pages = {201--214}, year = {2010}, url = {https://doi.org/10.1109/TIFS.2010.2041812}, doi = {10.1109/TIFS.2010.2041812}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LuoHH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuangHS10, author = {Fangjun Huang and Jiwu Huang and Yun{-}Qing Shi}, title = {An experimental study on the security performance of {YASS}}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {5}, number = {3}, pages = {374--380}, year = {2010}, url = {https://doi.org/10.1109/TIFS.2010.2054082}, doi = {10.1109/TIFS.2010.2054082}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuangHS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LuoHQ10, author = {Weiqi Luo and Jiwu Huang and Guoping Qiu}, title = {{JPEG} error analysis and its applications to digital image forensics}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {5}, number = {3}, pages = {480--491}, year = {2010}, url = {https://doi.org/10.1109/TIFS.2010.2051426}, doi = {10.1109/TIFS.2010.2051426}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LuoHQ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LuoWH10, author = {Weiqi Luo and Yuan{-}Gen Wang and Jiwu Huang}, title = {Detection of Quantization Artifacts and Its Applications to Transform Encoder Identification}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {5}, number = {4}, pages = {810--815}, year = {2010}, url = {https://doi.org/10.1109/TIFS.2010.2074195}, doi = {10.1109/TIFS.2010.2074195}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LuoWH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuangHS10a, author = {Fangjun Huang and Jiwu Huang and Yun{-}Qing Shi}, title = {Detecting Double {JPEG} Compression With the Same Quantization Matrix}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {5}, number = {4}, pages = {848--856}, year = {2010}, url = {https://doi.org/10.1109/TIFS.2010.2072921}, doi = {10.1109/TIFS.2010.2072921}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuangHS10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/WangLH10, author = {Yuan{-}Gen Wang and Yanqiang Lei and Jiwu Huang}, title = {An image copy detection scheme based on radon transform}, booktitle = {Proceedings of the International Conference on Image Processing, {ICIP} 2010, September 26-29, Hong Kong, China}, pages = {1009--1012}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICIP.2010.5653456}, doi = {10.1109/ICIP.2010.5653456}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icip/WangLH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/WangNZH10, author = {Chuntao Wang and Jiangqun Ni and Huashuo Zhuo and Jiwu Huang}, title = {A geometrically resilient robust image watermarking scheme using deformable multi-scale transform}, booktitle = {Proceedings of the International Conference on Image Processing, {ICIP} 2010, September 26-29, Hong Kong, China}, pages = {3677--3680}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICIP.2010.5652496}, doi = {10.1109/ICIP.2010.5652496}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icip/WangNZH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/ZhangNZLH10, author = {Dong Zhang and Jiangqun Ni and Qiping Zeng and Dah{-}Jye Lee and Jiwu Huang}, editor = {Rainer B{\"{o}}hme and Philip W. L. Fong and Reihaneh Safavi{-}Naini}, title = {Security Analysis of {ISS} Watermarking Using Natural Scene Statistics}, booktitle = {Information Hiding - 12th International Conference, {IH} 2010, Calgary, AB, Canada, June 28-30, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6387}, pages = {235--248}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16435-4\_18}, doi = {10.1007/978-3-642-16435-4\_18}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/ZhangNZLH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/CaoH10, author = {Jian Cao and Jiwu Huang}, editor = {Rainer B{\"{o}}hme and Philip W. L. Fong and Reihaneh Safavi{-}Naini}, title = {Provably Secure Spread-Spectrum Watermarking Schemes in the Known Message Attack Framework}, booktitle = {Information Hiding - 12th International Conference, {IH} 2010, Calgary, AB, Canada, June 28-30, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6387}, pages = {249--261}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16435-4\_19}, doi = {10.1007/978-3-642-16435-4\_19}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/CaoH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/CaoHN10, author = {Jian Cao and Jiwu Huang and Jiangqun Ni}, editor = {Rainer B{\"{o}}hme and Philip W. L. Fong and Reihaneh Safavi{-}Naini}, title = {A New Spread Spectrum Watermarking Scheme to Achieve a Trade-Off between Security and Robustness}, booktitle = {Information Hiding - 12th International Conference, {IH} 2010, Calgary, AB, Canada, June 28-30, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6387}, pages = {262--276}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16435-4\_20}, doi = {10.1007/978-3-642-16435-4\_20}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/CaoHN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/PanH10, author = {Feng Pan and Jiwu Huang}, editor = {Hyoung{-}Joong Kim and Yun{-}Qing Shi and Mauro Barni}, title = {Discriminating Computer Graphics Images and Natural Images Using Hidden Markov Tree Model}, booktitle = {Digital Watermarking - 9th International Workshop, {IWDW} 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6526}, pages = {23--28}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-18405-5\_3}, doi = {10.1007/978-3-642-18405-5\_3}, timestamp = {Thu, 28 May 2020 12:51:40 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/PanH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/HuangSH10, author = {Fangjun Huang and Yun{-}Qing Shi and Jiwu Huang}, editor = {Hyoung{-}Joong Kim and Yun{-}Qing Shi and Mauro Barni}, title = {New {JPEG} Steganographic Scheme with High Security Performance}, booktitle = {Digital Watermarking - 9th International Workshop, {IWDW} 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6526}, pages = {189--201}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-18405-5\_16}, doi = {10.1007/978-3-642-18405-5\_16}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/HuangSH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mediaforensics/YangSH10, author = {Rui Yang and Yun Q. Shi and Jiwu Huang}, editor = {Nasir D. Memon and Jana Dittmann and Adnan M. Alattar and Edward J. Delp}, title = {Detecting double compression of audio signal}, booktitle = {Media Forensics and Security II, part of the IS{\&}T-SPIE Electronic Imaging Symposium, San Jose, CA, USA, January 18-20, 2010, Proceedings}, series = {{SPIE} Proceedings}, volume = {7541}, pages = {75410K}, publisher = {{SPIE}}, year = {2010}, url = {https://doi.org/10.1117/12.838695}, doi = {10.1117/12.838695}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mediaforensics/YangSH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/sci/HuangLSHX10, author = {Fangjun Huang and Bin Li and Yun{-}Qing Shi and Jiwu Huang and Guorong Xuan}, editor = {Husrev T. Sencar and Sergio A. Velastin and Nikolaos Nikolaidis and Shiguo Lian}, title = {Image Steganalysis}, booktitle = {Intelligent Multimedia Analysis for Security Applications}, series = {Studies in Computational Intelligence}, volume = {282}, pages = {275--303}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11756-5\_13}, doi = {10.1007/978-3-642-11756-5\_13}, timestamp = {Tue, 24 Nov 2020 16:44:23 +0100}, biburl = {https://dblp.org/rec/series/sci/HuangLSHX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/HuangH09a, author = {Fangjun Huang and Jiwu Huang}, title = {Calibration based universal {JPEG} steganalysis}, journal = {Sci. China Ser. {F} Inf. Sci.}, volume = {52}, number = {2}, pages = {260--268}, year = {2009}, url = {https://doi.org/10.1007/s11432-009-0033-9}, doi = {10.1007/S11432-009-0033-9}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/HuangH09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/KangHZS09, author = {Xiangui Kang and Jiwu Huang and Wenjun Zeng and Yun Q. Shi}, title = {Non-ambiguity of blind watermarking: a revisit with analytical resolution}, journal = {Sci. China Ser. {F} Inf. Sci.}, volume = {52}, number = {2}, pages = {276--285}, year = {2009}, url = {https://doi.org/10.1007/s11432-009-0043-7}, doi = {10.1007/S11432-009-0043-7}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/KangHZS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/PanCH09, author = {Feng Pan and JiongBin Chen and Jiwu Huang}, title = {Discriminating between photorealistic computer graphics and natural images using fractal geometry}, journal = {Sci. China Ser. {F} Inf. Sci.}, volume = {52}, number = {2}, pages = {329--337}, year = {2009}, url = {https://doi.org/10.1007/s11432-009-0053-5}, doi = {10.1007/S11432-009-0053-5}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/PanCH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiHS09, author = {Bin Li and Jiwu Huang and Yun{-}Qing Shi}, title = {Steganalysis of {YASS}}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {3}, pages = {369--382}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2025841}, doi = {10.1109/TIFS.2009.2025841}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiHS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhuHKY09, author = {Guopu Zhu and Jiwu Huang and Sam Kwong and Jianquan Yang}, title = {A study on the randomness measure of image hashing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {4}, pages = {928--932}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2033737}, doi = {10.1109/TIFS.2009.2033737}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhuHKY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/YaoLRH09, author = {Xinzhi Yao and Hongmei Liu and Wei Rui and Jiwu Huang}, title = {Content-based authentication algorithm for binary images}, booktitle = {Proceedings of the International Conference on Image Processing, {ICIP} 2009, 7-10 November 2009, Cairo, Egypt}, pages = {2893--2896}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICIP.2009.5413441}, doi = {10.1109/ICIP.2009.5413441}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icip/YaoLRH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/QuQH09, author = {Zhenhua Qu and Guoping Qiu and Jiwu Huang}, editor = {Stefan Katzenbeisser and Ahmad{-}Reza Sadeghi}, title = {Detect Digital Image Splicing with Visual Cues}, booktitle = {Information Hiding, 11th International Workshop, {IH} 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5806}, pages = {247--261}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04431-1\_18}, doi = {10.1007/978-3-642-04431-1\_18}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/QuQH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/WangH09, author = {Yong Wang and Jiwu Huang}, editor = {Anthony T. S. Ho and Yun Q. Shi and H. J. Kim and Mauro Barni}, title = {Robust {AVS} Audio Watermarking}, booktitle = {Digital Watermarking, 8th International Workshop, {IWDW} 2009, Guildford, UK, August 24-26, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5703}, pages = {29--38}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03688-0\_6}, doi = {10.1007/978-3-642-03688-0\_6}, timestamp = {Thu, 28 May 2020 12:51:39 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/WangH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/ChenNH09, author = {Chong Chen and Jiangqun Ni and Jiwu Huang}, editor = {Anthony T. S. Ho and Yun Q. Shi and H. J. Kim and Mauro Barni}, title = {Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping}, booktitle = {Digital Watermarking, 8th International Workshop, {IWDW} 2009, Guildford, UK, August 24-26, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5703}, pages = {81--95}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03688-0\_10}, doi = {10.1007/978-3-642-03688-0\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/ChenNH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/YangSH09, author = {Rui Yang and Yun{-}Qing Shi and Jiwu Huang}, editor = {Edward W. Felten and Jana Dittmann and Jessica J. Fridrich and Scott Craver}, title = {Defeating fake-quality {MP3}}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ, USA, September 07 - 08, 2009}, pages = {117--124}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1597817.1597838}, doi = {10.1145/1597817.1597838}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/YangSH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ZhaoZH08, author = {Changan Zhao and Fangguo Zhang and Jiwu Huang}, title = {Efficient Tate pairing computation using double-base chains}, journal = {Sci. China Ser. {F} Inf. Sci.}, volume = {51}, number = {8}, pages = {1096--1105}, year = {2008}, url = {https://doi.org/10.1007/s11432-008-0070-9}, doi = {10.1007/S11432-008-0070-9}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/ZhaoZH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ZhaoZH08, author = {Changan Zhao and Fangguo Zhang and Jiwu Huang}, title = {All Pairings Are in a Group}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {91-A}, number = {10}, pages = {3084--3087}, year = {2008}, url = {https://doi.org/10.1093/ietfec/e91-a.10.3084}, doi = {10.1093/IETFEC/E91-A.10.3084}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/ZhaoZH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ZhaoZH08, author = {Changan Zhao and Fangguo Zhang and Jiwu Huang}, title = {A note on the Ate pairing}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {6}, pages = {379--382}, year = {2008}, url = {https://doi.org/10.1007/s10207-008-0054-1}, doi = {10.1007/S10207-008-0054-1}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/ZhaoZH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/KangZH08, author = {Xiangui Kang and Wenjun Zeng and Jiwu Huang}, title = {A Multi-band Wavelet Watermarking Scheme}, journal = {Int. J. Netw. Secur.}, volume = {6}, number = {2}, pages = {121--126}, year = {2008}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v6-n2/ijns-2008-v6-n2-p121-126.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/KangZH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/XiangKH08, author = {Shijun Xiang and Hyoung{-}Joong Kim and Jiwu Huang}, title = {Audio watermarking robust against time-scale modification and {MP3} compression}, journal = {Signal Process.}, volume = {88}, number = {10}, pages = {2372--2387}, year = {2008}, url = {https://doi.org/10.1016/j.sigpro.2008.03.019}, doi = {10.1016/J.SIGPRO.2008.03.019}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigpro/XiangKH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spl/LiFH08, author = {Bin Li and Yanmei Fang and Jiwu Huang}, title = {Steganalysis of Multiple-Base Notational System Steganography}, journal = {{IEEE} Signal Process. Lett.}, volume = {15}, pages = {493--496}, year = {2008}, url = {https://doi.org/10.1109/LSP.2008.924000}, doi = {10.1109/LSP.2008.924000}, timestamp = {Fri, 23 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/spl/LiFH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/XiangKH08, author = {Shijun Xiang and Hyoung{-}Joong Kim and Jiwu Huang}, title = {Invariant Image Watermarking Based on Statistical Features in the Low-Frequency Domain}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {18}, number = {6}, pages = {777--790}, year = {2008}, url = {https://doi.org/10.1109/TCSVT.2008.918843}, doi = {10.1109/TCSVT.2008.918843}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/XiangKH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/KangHZ08, author = {Xiangui Kang and Jiwu Huang and Wenjun Zeng}, title = {Improving Robustness of Quantization-Based Image Watermarking via Adaptive Receiver}, journal = {{IEEE} Trans. Multim.}, volume = {10}, number = {6}, pages = {953--959}, year = {2008}, url = {https://doi.org/10.1109/TMM.2008.2001361}, doi = {10.1109/TMM.2008.2001361}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmm/KangHZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/QuLH08, author = {Zhenhua Qu and Weiqi Luo and Jiwu Huang}, title = {A convolutive mixing model for shifted double {JPEG} compression with application to passive image authentication}, booktitle = {Proceedings of the {IEEE} International Conference on Acoustics, Speech, and Signal Processing, {ICASSP} 2008, March 30 - April 4, 2008, Caesars Palace, Las Vegas, Nevada, {USA}}, pages = {1661--1664}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ICASSP.2008.4517946}, doi = {10.1109/ICASSP.2008.4517946}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/QuLH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/HuangLH08, author = {Fangjun Huang and Bin Li and Jiwu Huang}, title = {Universal {JPEG} steganalysis based on microscopic and macroscopic calibration}, booktitle = {Proceedings of the International Conference on Image Processing, {ICIP} 2008, October 12-15, 2008, San Diego, California, {USA}}, pages = {2068--2071}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ICIP.2008.4712193}, doi = {10.1109/ICIP.2008.4712193}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icip/HuangLH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/KangZHZ08, author = {Xiangui Kang and Xiong Zhong and Jiwu Huang and Wenjun Zeng}, title = {An efficient print-scanning resilient data hiding scheme based on a novel {LPM}}, booktitle = {Proceedings of the International Conference on Image Processing, {ICIP} 2008, October 12-15, 2008, San Diego, California, {USA}}, pages = {2080--2083}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ICIP.2008.4712196}, doi = {10.1109/ICIP.2008.4712196}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icip/KangZHZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/HuangSH08, author = {Fangjun Huang and Yun Q. Shi and Jiwu Huang}, title = {A study on security performance of {YASS}}, booktitle = {Proceedings of the International Conference on Image Processing, {ICIP} 2008, October 12-15, 2008, San Diego, California, {USA}}, pages = {2084--2087}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ICIP.2008.4712197}, doi = {10.1109/ICIP.2008.4712197}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icip/HuangSH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/NiZFHWK08, author = {Jiangqun Ni and Rongyue Zhang and Chen Fang and Jiwu Huang and Chuntao Wang and Hyoung{-}Joong Kim}, editor = {Kaushal Solanki and Kenneth Sullivan and Upamanyu Madhow}, title = {Watermarking Security Incorporating Natural Scene Statistics}, booktitle = {Information Hiding, 10th International Workshop, {IH} 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5284}, pages = {132--146}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88961-8\_10}, doi = {10.1007/978-3-540-88961-8\_10}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/NiZFHWK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/LiLHZ08, author = {Jian Li and Hongmei Liu and Jiwu Huang and Yongping Zhang}, editor = {Hyoung{-}Joong Kim and Stefan Katzenbeisser and Anthony Tung Shuen Ho}, title = {A Robust Watermarking Scheme for {H.264}}, booktitle = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan, Korea, November 10-12, 2008. Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5450}, pages = {1--15}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04438-0\_1}, doi = {10.1007/978-3-642-04438-0\_1}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/LiLHZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/YangKH08, author = {Rui Yang and Xiangui Kang and Jiwu Huang}, editor = {Hyoung{-}Joong Kim and Stefan Katzenbeisser and Anthony Tung Shuen Ho}, title = {Robust Audio Watermarking Based on Log-Polar Frequency Index}, booktitle = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan, Korea, November 10-12, 2008. Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5450}, pages = {124--138}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04438-0\_11}, doi = {10.1007/978-3-642-04438-0\_11}, timestamp = {Fri, 07 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/YangKH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/LuoHQ08, author = {Weiqi Luo and Jiwu Huang and Guoping Qiu}, editor = {Hyoung{-}Joong Kim and Stefan Katzenbeisser and Anthony Tung Shuen Ho}, title = {A Novel Method for Block Size Forensics Based on Morphological Operations}, booktitle = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan, Korea, November 10-12, 2008. Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5450}, pages = {229--239}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04438-0\_20}, doi = {10.1007/978-3-642-04438-0\_20}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/LuoHQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/ZhangNLH08, author = {Dong Zhang and Jiangqun Ni and Dah{-}Jye Lee and Jiwu Huang}, editor = {Hyoung{-}Joong Kim and Stefan Katzenbeisser and Anthony Tung Shuen Ho}, title = {{GSM} Based Security Analysis for Add-SS Watermarking}, booktitle = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan, Korea, November 10-12, 2008. Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5450}, pages = {313--326}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04438-0\_27}, doi = {10.1007/978-3-642-04438-0\_27}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/ZhangNLH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/YangQH08, author = {Rui Yang and Zhenhua Qu and Jiwu Huang}, editor = {Andrew D. Ker and Jana Dittmann and Jessica J. Fridrich}, title = {Detecting digital audio forgeries by checking frame offsets}, booktitle = {Proceedings of the 10th workshop on Multimedia {\&} Security, MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008}, pages = {21--26}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1411328.1411334}, doi = {10.1145/1411328.1411334}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/YangQH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/LiSH08, author = {Bin Li and Yun Q. Shi and Jiwu Huang}, editor = {Andrew D. Ker and Jana Dittmann and Jessica J. Fridrich}, title = {Steganalysis of {YASS}}, booktitle = {Proceedings of the 10th workshop on Multimedia {\&} Security, MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008}, pages = {139--148}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1411328.1411354}, doi = {10.1145/1411328.1411354}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/LiSH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsp/LiSH08, author = {Bin Li and Yun Q. Shi and Jiwu Huang}, title = {Detecting doubly compressed {JPEG} images by using Mode Based First Digit Features}, booktitle = {International Workshop on Multimedia Signal Processing, {MMSP} 2008, October 8-10, 2008, Shangri-la Hotel, Cairns, Queensland, Australia}, pages = {730--735}, publisher = {{IEEE} Signal Processing Society}, year = {2008}, url = {https://doi.org/10.1109/MMSP.2008.4665171}, doi = {10.1109/MMSP.2008.4665171}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsp/LiSH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sswmc/Luo0H08, author = {Weiqi Luo and Min Wu and Jiwu Huang}, editor = {Edward J. Delp III and Ping Wah Wong and Jana Dittmann and Nasir D. Memon}, title = {{MPEG} recompression detection based on block artifacts}, booktitle = {Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008}, series = {{SPIE} Proceedings}, volume = {6819}, pages = {68190X}, publisher = {{SPIE}}, year = {2008}, url = {https://doi.org/10.1117/12.767112}, doi = {10.1117/12.767112}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sswmc/Luo0H08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sswmc/LiHS08, author = {Bin Li and Jiwu Huang and Yun Q. Shi}, editor = {Edward J. Delp III and Ping Wah Wong and Jana Dittmann and Nasir D. Memon}, title = {Textural features based universal steganalysis}, booktitle = {Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008}, series = {{SPIE} Proceedings}, volume = {6819}, pages = {681912}, publisher = {{SPIE}}, year = {2008}, url = {https://doi.org/10.1117/12.765817}, doi = {10.1117/12.765817}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sswmc/LiHS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoZH08, author = {Changan Zhao and Fangguo Zhang and Jiwu Huang}, title = {All Pairings Are in a Group}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {85}, year = {2008}, url = {http://eprint.iacr.org/2008/085}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoZH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ShenZFCH07, author = {Changxiang Shen and Huanguo Zhang and Dengguo Feng and Zhenfu Cao and Jiwu Huang}, title = {Survey of information security}, journal = {Sci. China Ser. {F} Inf. Sci.}, volume = {50}, number = {3}, pages = {273--298}, year = {2007}, url = {https://doi.org/10.1007/s11432-007-0037-2}, doi = {10.1007/S11432-007-0037-2}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/ShenZFCH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/LuoQPH07, author = {Weiqi Luo and Zhenhua Qu and Feng Pan and Jiwu Huang}, title = {A survey of passive technology for digital image forensics}, journal = {Frontiers Comput. Sci. China}, volume = {1}, number = {2}, pages = {166--179}, year = {2007}, url = {https://doi.org/10.1007/s11704-007-0017-0}, doi = {10.1007/S11704-007-0017-0}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/LuoQPH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tip/BiSHYH07, author = {Ning Bi and Qiyu Sun and Daren Huang and Zhihua Yang and Jiwu Huang}, title = {Robust Image Watermarking Based on Multiband Wavelets and Empirical Mode Decomposition}, journal = {{IEEE} Trans. Image Process.}, volume = {16}, number = {8}, pages = {1956--1966}, year = {2007}, url = {https://doi.org/10.1109/TIP.2007.901206}, doi = {10.1109/TIP.2007.901206}, timestamp = {Sun, 10 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tip/BiSHYH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/XiangH07, author = {Shijun Xiang and Jiwu Huang}, title = {Histogram-Based Audio Watermarking Against Time-Scale Modification and Cropping Attacks}, journal = {{IEEE} Trans. Multim.}, volume = {9}, number = {7}, pages = {1357--1372}, year = {2007}, url = {https://doi.org/10.1109/TMM.2007.906580}, doi = {10.1109/TMM.2007.906580}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmm/XiangH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/NiWHZH07, author = {Jiangqun Ni and Chuntao Wang and Jiwu Huang and Rongyue Zhang and Meiying Huang}, title = {A GA-Based Joint Coding and Embedding Optimization for Robust and High Capacity Image Watermarking}, booktitle = {Proceedings of the {IEEE} International Conference on Acoustics, Speech, and Signal Processing, {ICASSP} 2007, Honolulu, Hawaii, USA, April 15-20, 2007}, pages = {181--184}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ICASSP.2007.366202}, doi = {10.1109/ICASSP.2007.366202}, timestamp = {Mon, 22 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/NiWHZH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/LuoQHQ07, author = {Weiqi Luo and Zhenhua Qu and Jiwu Huang and Guoping Qiu}, title = {A Novel Method for Detecting Cropped and Recompressed Image Block}, booktitle = {Proceedings of the {IEEE} International Conference on Acoustics, Speech, and Signal Processing, {ICASSP} 2007, Honolulu, Hawaii, USA, April 15-20, 2007}, pages = {217--220}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ICASSP.2007.366211}, doi = {10.1109/ICASSP.2007.366211}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/LuoQHQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/LiuRH07, author = {Hongmei Liu and Wei Rui and Jiwu Huang}, title = {Binary Image Authentication using Zernike Moments}, booktitle = {Proceedings of the International Conference on Image Processing, {ICIP} 2007, September 16-19, 2007, San Antonio, Texas, {USA}}, pages = {385--388}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ICIP.2007.4378972}, doi = {10.1109/ICIP.2007.4378972}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icip/LiuRH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/HuangLH07, author = {Fangjun Huang and Bin Li and Jiwu Huang}, title = {Attack {LSB} Matching Steganography by Counting Alteration Rate of the Number of Neighbourhood Gray Levels}, booktitle = {Proceedings of the International Conference on Image Processing, {ICIP} 2007, September 16-19, 2007, San Antonio, Texas, {USA}}, pages = {401--404}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ICIP.2007.4378976}, doi = {10.1109/ICIP.2007.4378976}, timestamp = {Fri, 23 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icip/HuangLH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/LiHH07, author = {Bin Li and Fangjun Huang and Jiwu Huang}, title = {Steganalysis of {LSB} Greedy Embedding Algorithm for {JPEG} Images using Coefficient Symmetry}, booktitle = {Proceedings of the International Conference on Image Processing, {ICIP} 2007, September 16-19, 2007, San Antonio, Texas, {USA}}, pages = {413--416}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ICIP.2007.4378979}, doi = {10.1109/ICIP.2007.4378979}, timestamp = {Fri, 23 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icip/LiHH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/WangNHZH07, author = {Chuntao Wang and Jiangqun Ni and Jiwu Huang and Rongyue Zhang and Meiying Huang}, editor = {Teddy Furon and Fran{\c{c}}ois Cayre and Gwena{\"{e}}l J. Do{\"{e}}rr and Patrick Bas}, title = {Robust and High Capacity Image Watermarking Based on Jointly Coding and Embedding Optimization}, booktitle = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4567}, pages = {65--79}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77370-2\_5}, doi = {10.1007/978-3-540-77370-2\_5}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/WangNHZH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/LuZH07, author = {Zhe{-}Ming Lu and Hong{-}Yi Zheng and Ji{-}Wu Huang}, editor = {Bin{-}Yih Liao and Jeng{-}Shyang Pan and Lakhmi C. Jain and Mark Liao and Hideki Noda and Anthony T. S. Ho}, title = {A Digital Watermarking Scheme Based on {DCT} and {SVD}}, booktitle = {3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2007), Kaohsiung, Taiwan, 26-28 November 2007, Proceedings}, pages = {241--244}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/IIH-MSP.2007.13}, doi = {10.1109/IIH-MSP.2007.13}, timestamp = {Fri, 24 Mar 2023 08:33:27 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/LuZH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/TanHS07, author = {Shunquan Tan and Jiwu Huang and Yun Q. Shi}, editor = {Yun Q. Shi and Hyoung{-}Joong Kim and Stefan Katzenbeisser}, title = {Steganalysis of Enhanced {BPCS} Steganography Using the Hilbert-Huang Transform Based Sequential Analysis}, booktitle = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou, China, December 3-5, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5041}, pages = {112--126}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-92238-4\_10}, doi = {10.1007/978-3-540-92238-4\_10}, timestamp = {Thu, 28 May 2020 12:51:39 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/TanHS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/LiHTHS07, author = {Bin Li and Fangjun Huang and Shunquan Tan and Jiwu Huang and Yun Q. Shi}, editor = {Yun Q. Shi and Hyoung{-}Joong Kim and Stefan Katzenbeisser}, title = {Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal {JPEG} Steganalysis}, booktitle = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou, China, December 3-5, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5041}, pages = {143--157}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-92238-4\_12}, doi = {10.1007/978-3-540-92238-4\_12}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/LiHTHS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/XiangKH07, author = {Shijun Xiang and Hyoung{-}Joong Kim and Jiwu Huang}, editor = {Deepa Kundur and Balakrishnan Prabhakaran and Jana Dittmann and Jessica J. Fridrich}, title = {Histogram-based image hashing scheme robust against geometric deformations}, booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007}, pages = {121--128}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1288869.1288886}, doi = {10.1145/1288869.1288886}, timestamp = {Mon, 22 Apr 2024 21:24:22 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/XiangKH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sswmc/KangLZHL07, author = {Xiangui Kang and Chunhui Liu and Wenjun Zeng and Jiwu Huang and Congbai Liu}, editor = {Edward J. Delp III and Ping Wah Wong}, title = {Fast and automatic watermark resynchronization based on zernike moments}, booktitle = {Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, CA, USA, January 28, 2007}, series = {{SPIE} Proceedings}, volume = {6505}, pages = {65050E}, publisher = {{SPIE}}, year = {2007}, url = {https://doi.org/10.1117/12.703839}, doi = {10.1117/12.703839}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sswmc/KangLZHL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sswmc/WangWH07, author = {Yong Wang and Shaoquan Wu and Jiwu Huang}, editor = {Edward J. Delp III and Ping Wah Wong}, title = {Audio watermarking robust to geometrical distortions based on dyadic wavelet transform}, booktitle = {Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, CA, USA, January 28, 2007}, series = {{SPIE} Proceedings}, volume = {6505}, pages = {65050A}, publisher = {{SPIE}}, year = {2007}, url = {https://doi.org/10.1117/12.698495}, doi = {10.1117/12.698495}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sswmc/WangWH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0707-0397, author = {Shijun Xiang and Jiwu Huang}, title = {Robust Audio Watermarking Against the {D/A} and {A/D} conversions}, journal = {CoRR}, volume = {abs/0707.0397}, year = {2007}, url = {http://arxiv.org/abs/0707.0397}, eprinttype = {arXiv}, eprint = {0707.0397}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0707-0397.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoZH07, author = {Changan Zhao and Fangguo Zhang and Jiwu Huang}, title = {A Note on the Ate Pairing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {247}, year = {2007}, url = {http://eprint.iacr.org/2007/247}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoZH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/HeH06, author = {Junhui He and Jiwu Huang}, title = {Steganalysis of stochastic modulation steganography}, journal = {Sci. China Ser. {F} Inf. Sci.}, volume = {49}, number = {3}, pages = {273--285}, year = {2006}, url = {https://doi.org/10.1007/s11432-006-0273-x}, doi = {10.1007/S11432-006-0273-X}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/HeH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/XiangH06, author = {Shijun Xiang and Jiwu Huang}, title = {Analysis of Quantization-based Audio Watermarking to {D/A} and {A/D} Conversions}, journal = {Int. J. Netw. Secur.}, volume = {3}, number = {3}, pages = {230--238}, year = {2006}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v3-n3/ijns-2006-v3-n3-p230-238.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/XiangH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/HuKH06, author = {Yongjian Hu and Sam Kwong and Jiwu Huang}, title = {An algorithm for removable visible watermarking}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {16}, number = {1}, pages = {129--133}, year = {2006}, url = {https://doi.org/10.1109/TCSVT.2005.858742}, doi = {10.1109/TCSVT.2005.858742}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/HuKH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/TanHYS06, author = {Shunquan Tan and Jiwu Huang and Zhihua Yang and Yun Q. Shi}, title = {Steganalysis of {JPEG2000} Lazy-Mode Steganography using the Hilbert-Huang Transform Based Sequential Analysis}, booktitle = {Proceedings of the International Conference on Image Processing, {ICIP} 2006, October 8-11, Atlanta, Georgia, {USA}}, pages = {101--104}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ICIP.2006.312382}, doi = {10.1109/ICIP.2006.312382}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icip/TanHYS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/NiWHZ06, author = {Jiangqun Ni and Chuntao Wang and Jiwu Huang and Rongyue Zhang}, title = {Performance Enhancement for {DWT-HMM} Image Watermarking with Content-Adaptive Approach}, booktitle = {Proceedings of the International Conference on Image Processing, {ICIP} 2006, October 8-11, Atlanta, Georgia, {USA}}, pages = {1377--1380}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ICIP.2006.312591}, doi = {10.1109/ICIP.2006.312591}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icip/NiWHZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/LiuZH06a, author = {Hongmei Liu and Ling Zhu and Jiwu Huang}, title = {A Hybrid Watermarking Scheme for Video Authentication}, booktitle = {Proceedings of the International Conference on Image Processing, {ICIP} 2006, October 8-11, Atlanta, Georgia, {USA}}, pages = {2569--2572}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ICIP.2006.312984}, doi = {10.1109/ICIP.2006.312984}, timestamp = {Mon, 26 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icip/LiuZH06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpr/LuoHQ06, author = {Weiqi Luo and Jiwu Huang and Guoping Qiu}, title = {Robust Detection of Region-Duplication Forgery in Digital Image}, booktitle = {18th International Conference on Pattern Recognition {(ICPR} 2006), 20-24 August 2006, Hong Kong, China}, pages = {746--749}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ICPR.2006.1003}, doi = {10.1109/ICPR.2006.1003}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icpr/LuoHQ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpr/YangQHE06, author = {Mai Yang and Guoping Qiu and Jiwu Huang and Dave Elliman}, title = {Near-Duplicate Image Recognition and Content-based Image Retrieval using Adaptive Hierarchical Geometric Centroids}, booktitle = {18th International Conference on Pattern Recognition {(ICPR} 2006), 20-24 August 2006, Hong Kong, China}, pages = {958--961}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ICPR.2006.851}, doi = {10.1109/ICPR.2006.851}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icpr/YangQHE06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/XiangHY06, author = {Shijun Xiang and Jiwu Huang and Rui Yang}, editor = {Jan Camenisch and Christian S. Collberg and Neil F. Johnson and Phil Sallee}, title = {Time-Scale Invariant Audio Watermarking Based on the Statistical Features in Time Domain}, booktitle = {Information Hiding, 8th International Workshop, {IH} 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers}, series = {Lecture Notes in Computer Science}, volume = {4437}, pages = {93--108}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-74124-4\_7}, doi = {10.1007/978-3-540-74124-4\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/XiangHY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/XiangHYWL06, author = {Shijun Xiang and Jiwu Huang and Rui Yang and Chuntao Wang and Hongmei Liu}, editor = {Yun{-}Qing Shi and Byeungwoo Jeon}, title = {Robust Audio Watermarking Based on Low-Order Zernike Moments}, booktitle = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4283}, pages = {226--240}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11922841\_19}, doi = {10.1007/11922841\_19}, timestamp = {Thu, 28 May 2020 12:51:40 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/XiangHYWL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/NiZHWL06, author = {Jiangqun Ni and Rongyue Zhang and Jiwu Huang and Chuntao Wang and Quanbo Li}, editor = {Yun{-}Qing Shi and Byeungwoo Jeon}, title = {A Rotation-Invariant Secure Image Watermarking Algorithm Incorporating Steerable Pyramid Transform}, booktitle = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4283}, pages = {446--460}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11922841\_36}, doi = {10.1007/11922841\_36}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/NiZHWL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pcm/LiuFH06, author = {Hongmei Liu and Huiying Fu and Jiwu Huang}, editor = {Yueting Zhuang and Shiqiang Yang and Yong Rui and Qinming He}, title = {A Watermarking Algorithm for {JPEG} File}, booktitle = {Advances in Multimedia Information Processing - {PCM} 2006, 7th Pacific Rim Conference on Multimedia, Hangzhou, China, November 2-4, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4261}, pages = {319--328}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11922162\_38}, doi = {10.1007/11922162\_38}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/pcm/LiuFH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sswmc/KangSH06, author = {Xiangui Kang and Yun Q. Shi and Jiwu Huang}, editor = {Edward J. Delp III and Ping Wah Wong}, title = {Achieving non-ambiguity of quantization-based watermarking}, booktitle = {Security, Steganography, and Watermarking of Multimedia Contents VIII, San Jose, CA, USA, January 15, 2006}, series = {{SPIE} Proceedings}, volume = {6072}, pages = {60720F}, publisher = {{SPIE}}, year = {2006}, url = {https://doi.org/10.1117/12.650876}, doi = {10.1117/12.650876}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sswmc/KangSH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoZH06, author = {Changan Zhao and Fangguo Zhang and Jiwu Huang}, title = {Efficient Tate Pairing Computation Using Double-Base Chains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {201}, year = {2006}, url = {http://eprint.iacr.org/2006/201}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoZH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoZH06a, author = {Changan Zhao and Fangguo Zhang and Jiwu Huang}, title = {Speeding up the Bilinear Pairings Computation on Curves with Automorphisms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {474}, year = {2006}, url = {http://eprint.iacr.org/2006/474}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoZH06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijig/LiuHS05, author = {Hongmei Liu and Jiwu Huang and Yun Q. Shi}, title = {Dwt-Based Video Data Hiding Robust To Mpeg Compression And Frame Loss}, journal = {Int. J. Image Graph.}, volume = {5}, number = {1}, pages = {111--134}, year = {2005}, url = {https://doi.org/10.1142/S0219467805001689}, doi = {10.1142/S0219467805001689}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijig/LiuHS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tbc/WuHHS05, author = {Shaoquan Wu and Jiwu Huang and Daren Huang and Yun Q. Shi}, title = {Efficiently self-synchronized audio watermarking for assured audio data transmission}, journal = {{IEEE} Trans. Broadcast.}, volume = {51}, number = {1}, pages = {69--76}, year = {2005}, url = {https://doi.org/10.1109/TBC.2004.838265}, doi = {10.1109/TBC.2004.838265}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tbc/WuHHS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsw/WuHGH05, author = {Xiaoyun Wu and Junquan Hu and Zhixiong Gu and Jiwu Huang}, editor = {Rajkumar Buyya and Paul D. Coddington and Paul Montague and Reihaneh Safavi{-}Naini and Nicholas Paul Sheppard and Andrew L. Wendelborn}, title = {A Secure Semi-Fragile Watermarking for Image Authentication Based on Integer Wavelet Transform with Parameters Abstract}, booktitle = {{ACSW} Frontiers 2005, 2005 {ACSW} Workshops - the Australasian Workshop on Grid Computing and e-Research (AusGrid 2005) and the Third Australasian Information Security Workshop {(AISW} 2005), Newcastle, NSW, Australia, January/February 2005}, series = {{CRPIT}}, volume = {44}, pages = {75--80}, publisher = {Australian Computer Society}, year = {2005}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV44Wu.html}, timestamp = {Fri, 26 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsw/WuHGH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/GuFH05, author = {Limin Gu and Yanmei Fang and Jiwu Huang}, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {Revaluation of Error Correcting Coding in Watermarking Channel}, booktitle = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, pages = {274--287}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371\_23}, doi = {10.1007/11599371\_23}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/GuFH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiangWH05, author = {Xiaoping Liang and Xiaoyun Wu and Jiwu Huang}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Reversible Data Hiding for Image Based on Histogram Modification of Wavelet Coefficients}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {573--580}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_85}, doi = {10.1007/11596981\_85}, timestamp = {Tue, 23 Feb 2021 17:25:41 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiangWH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drmtics/LiuSH05, author = {Hongmei Liu and Fenglian Shao and Jiwu Huang}, editor = {Reihaneh Safavi{-}Naini and Moti Yung}, title = {A {MPEG-2} Video Watermarking Algorithm with Compensation in Bit Stream}, booktitle = {Digital Rights Management: Technologies, Issues, Challenges and Systems, First International Conference, {DRMTICS} 2005, Sydney, Australia, October 31 - November 2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3919}, pages = {123--134}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11787952\_10}, doi = {10.1007/11787952\_10}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/drmtics/LiuSH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drmtics/WuLLHQ05, author = {Xiaoyun Wu and Xiaoping Liang and Hongmei Liu and Jiwu Huang and Guoping Qiu}, editor = {Reihaneh Safavi{-}Naini and Moti Yung}, title = {Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform}, booktitle = {Digital Rights Management: Technologies, Issues, Challenges and Systems, First International Conference, {DRMTICS} 2005, Sydney, Australia, October 31 - November 2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3919}, pages = {135--145}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11787952\_11}, doi = {10.1007/11787952\_11}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drmtics/WuLLHQ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/FangBHH05, author = {Yanmei Fang and Ning Bi and Daren Huang and Jiwu Huang}, title = {The M-band wavelets in image watermarking}, booktitle = {Proceedings of the 2005 International Conference on Image Processing, {ICIP} 2005, Genoa, Italy, September 11-14, 2005}, pages = {245--248}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ICIP.2005.1529733}, doi = {10.1109/ICIP.2005.1529733}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icip/FangBHH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/LiuLH05, author = {Hongmei Liu and Junlong Lin and Jiwu Huang}, title = {Image authentication using content based watermark}, booktitle = {International Symposium on Circuits and Systems {(ISCAS} 2005), 23-26 May 2005, Kobe, Japan}, pages = {4014--4017}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ISCAS.2005.1465511}, doi = {10.1109/ISCAS.2005.1465511}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/iscas/LiuLH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/FangGH05, author = {Yanmei Fang and Limin Gu and Jiwu Huang}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {Performance Analysis of CDMA-Based Watermarking with Quantization Scheme}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {350--361}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_30}, doi = {10.1007/978-3-540-31979-5\_30}, timestamp = {Wed, 25 Sep 2019 18:12:57 +0200}, biburl = {https://dblp.org/rec/conf/ispec/FangGH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/HeHQ05, author = {Junhui He and Jiwu Huang and Guoping Qiu}, editor = {Mauro Barni and Ingemar J. Cox and Ton Kalker and Hyoung Joong Kim}, title = {A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography}, booktitle = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena, Italy, September 15-17, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3710}, pages = {1--14}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11551492\_1}, doi = {10.1007/11551492\_1}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/HeHQ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/NiZHW05, author = {Jiangqun Ni and Rongyue Zhang and Jiwu Huang and Chuntao Wang}, editor = {Mauro Barni and Ingemar J. Cox and Ton Kalker and Hyoung Joong Kim}, title = {A Robust Multi-bit Image Watermarking Algorithm Based on {HMM} in Wavelet Domain}, booktitle = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena, Italy, September 15-17, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3710}, pages = {110--123}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11551492\_9}, doi = {10.1007/11551492\_9}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/NiZHW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/KangSHZ05, author = {Xiangui Kang and Yun Q. Shi and Jiwu Huang and Wenjun Zeng}, editor = {Mauro Barni and Ingemar J. Cox and Ton Kalker and Hyoung Joong Kim}, title = {Multi-band Wavelet Based Digital Watermarking Using Principal Component Analysis}, booktitle = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena, Italy, September 15-17, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3710}, pages = {139--146}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11551492\_11}, doi = {10.1007/11551492\_11}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/KangSHZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kes/XiangHF05, author = {Shijun Xiang and Jiwu Huang and Xiaoyun Feng}, editor = {Rajiv Khosla and Robert J. Howlett and Lakhmi C. Jain}, title = {Analysis of Quantization-Based Audio Watermarking in {DA/AD} Conversions}, booktitle = {Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, {KES} 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3682}, pages = {587--592}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11552451\_80}, doi = {10.1007/11552451\_80}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/kes/XiangHF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kes/WuLH05, author = {Xiaoyun Wu and Hongmei Liu and Jiwu Huang}, editor = {Rajiv Khosla and Robert J. Howlett and Lakhmi C. Jain}, title = {Semi-fragile Watermarking Based on Zernike Moments and Integer Wavelet Transform}, booktitle = {Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, {KES} 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3682}, pages = {1108--1114}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11552451\_153}, doi = {10.1007/11552451\_153}, timestamp = {Mon, 26 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kes/WuLH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kes/NiWHZ05, author = {Jiangqun Ni and Chuntao Wang and Jiwu Huang and Rongyue Zhang}, editor = {Rajiv Khosla and Robert J. Howlett and Lakhmi C. Jain}, title = {A RST-Invariant Robust {DWT-HMM} Watermarking Algorithm Incorporating Zernike Moments and Template}, booktitle = {Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, {KES} 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {3681}, pages = {1233--1239}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11552413\_176}, doi = {10.1007/11552413\_176}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/kes/NiWHZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsp/XuXQH05, author = {Junyi Xu and Changzhen Xiong and Dongxu Qi and Jiwu Huang}, title = {Watermarking Parameters Feasible Region Model}, booktitle = {{IEEE} 7th Workshop on Multimedia Signal Processing, {MMSP} 2005, October 30 2005 - November 2 2005, Shanghai, China}, pages = {1--4}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/MMSP.2005.248552}, doi = {10.1109/MMSP.2005.248552}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/mmsp/XuXQH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/ChenHHZW04, author = {Zewen Chen and Jiwu Huang and Daren Huang and Jianhong Zhang and Yumin Wang}, title = {Provably Secure and ID-Based Group Signature Scheme}, booktitle = {18th International Conference on Advanced Information Networking and Applications {(AINA} 2004), 29-31 March 2004, Fukuoka, Japan}, pages = {384--388}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/AINA.2004.1283828}, doi = {10.1109/AINA.2004.1283828}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/ChenHHZW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/HuangHHS04, author = {Jiwu Huang and Junquan Hu and Daren Huang and Yun Q. Shi}, title = {Improve security of fragile watermarking via parameterized wavelet}, booktitle = {Proceedings of the 2004 International Conference on Image Processing, {ICIP} 2004, Singapore, October 24-27, 2004}, pages = {721--724}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/ICIP.2004.1419399}, doi = {10.1109/ICIP.2004.1419399}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icip/HuangHHS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/KangHS04, author = {Xiangui Kang and Jiwu Huang and Yun Q. Shi}, title = {Improve robustness of image watermarking via adaptive receiving}, booktitle = {Proceedings of the 2004 International Conference on Image Processing, {ICIP} 2004, Singapore, October 24-27, 2004}, pages = {2343--2346}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/ICIP.2004.1421570}, doi = {10.1109/ICIP.2004.1421570}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icip/KangHS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/FangHW04, author = {Yanmei Fang and Jiwu Huang and Shaoquan Wu}, title = {CDMA-based watermarking resisting to cropping}, booktitle = {Proceedings of the 2004 International Symposium on Circuits and Systems, {ISCAS} 2004, Vancouver, BC, Canada, May 23-26, 2004}, pages = {25--28}, publisher = {{IEEE}}, year = {2004}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/iscas/FangHW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/HuKH04, author = {Yongjian Hu and Sam Kwong and Jiwu Huang}, title = {Using invisible watermarks to protect visibly watermarked images}, booktitle = {Proceedings of the 2004 International Symposium on Circuits and Systems, {ISCAS} 2004, Vancouver, BC, Canada, May 23-26, 2004}, pages = {584--587}, publisher = {{IEEE}}, year = {2004}, timestamp = {Fri, 20 May 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscas/HuKH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/WuHHS04, author = {Shaoquan Wu and Jiwu Huang and Daren Huang and Yun Q. Shi}, title = {Self-synchronized audio watermark in {DWT} domain}, booktitle = {Proceedings of the 2004 International Symposium on Circuits and Systems, {ISCAS} 2004, Vancouver, BC, Canada, May 23-26, 2004}, pages = {712--715}, publisher = {{IEEE}}, year = {2004}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscas/WuHHS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/KangHSL03, author = {Xiangui Kang and Jiwu Huang and Yun Q. Shi and Yan Lin}, title = {A {DWT-DFT} composite watermarking scheme robust to both affine transform and {JPEG} compression}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {13}, number = {8}, pages = {776--786}, year = {2003}, url = {https://doi.org/10.1109/TCSVT.2003.815957}, doi = {10.1109/TCSVT.2003.815957}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/KangHSL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/GuHC03, author = {Limin Gu and Jiwu Huang and Zewen Chen}, editor = {Jong In Lim and Dong Hoon Lee}, title = {Analysis of the Bounds for Linear Block Codes in Watermark Channel}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {294--304}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_22}, doi = {10.1007/978-3-540-24691-6\_22}, timestamp = {Thu, 17 Nov 2022 14:05:51 +0100}, biburl = {https://dblp.org/rec/conf/icisc/GuHC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ChenWWHH03, author = {Zewen Chen and Jilin Wang and Yumin Wang and Jiwu Huang and Daren Huang}, editor = {Jong In Lim and Dong Hoon Lee}, title = {An Efficient Revocation Algorithm in Group Signatures}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {339--351}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_25}, doi = {10.1007/978-3-540-24691-6\_25}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ChenWWHH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/GuHS03, author = {Limin Gu and Jiwu Huang and Yun Q. Shi}, title = {Analysis of the role played by error correcting coding in robust watermarking}, booktitle = {Proceedings of the 2003 International Symposium on Circuits and Systems, {ISCAS} 2003, Bangkok, Thailand, May 25-28, 2003}, pages = {798--801}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/ISCAS.2003.1205140}, doi = {10.1109/ISCAS.2003.1205140}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscas/GuHS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/HongmeiZJXS03, author = {Hongmei Liu and Zhang Zhefeng and Jiwu Huang and Huang Xialing and Yun Q. Shi}, title = {A high capacity distortion-free data hiding algorithm for palette image}, booktitle = {Proceedings of the 2003 International Symposium on Circuits and Systems, {ISCAS} 2003, Bangkok, Thailand, May 25-28, 2003}, pages = {916--919}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/ISCAS.2003.1206124}, doi = {10.1109/ISCAS.2003.1206124}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscas/HongmeiZJXS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/ShiNAH03, author = {Yun Q. Shi and Zhicheng Ni and Nirwan Ansari and Jiwu Huang}, title = {2-D and 3-D successive packing interleaving techniques and their applications to image and video data hiding}, booktitle = {Proceedings of the 2003 International Symposium on Circuits and Systems, {ISCAS} 2003, Bangkok, Thailand, May 25-28, 2003}, pages = {924--927}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/ISCAS.2003.1206126}, doi = {10.1109/ISCAS.2003.1206126}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscas/ShiNAH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/FangHS03, author = {Yanmei Fang and Jiwu Huang and Yun Q. Shi}, title = {Image watermarking algorithm applying {CDMA}}, booktitle = {Proceedings of the 2003 International Symposium on Circuits and Systems, {ISCAS} 2003, Bangkok, Thailand, May 25-28, 2003}, pages = {948--951}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/ISCAS.2003.1206132}, doi = {10.1109/ISCAS.2003.1206132}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscas/FangHS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/HuHKC03, author = {Yongjian Hu and Jiwu Huang and Sam Kwong and Yiu{-}Keung Chan}, editor = {Ton Kalker and Ingemar J. Cox and Yong Man Ro}, title = {Image Fusion Based Visible Watermarking Using Dual-Tree Complex Wavelet Transform}, booktitle = {Digital Watermarking, Second International Workshop, {IWDW} 2003, Seoul, Korea, October 20-22, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2939}, pages = {86--100}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24624-4\_7}, doi = {10.1007/978-3-540-24624-4\_7}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/HuHKC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/KangHSZ03, author = {Xiangui Kang and Jiwu Huang and Yun Q. Shi and Jianxiang Zhu}, editor = {Ton Kalker and Ingemar J. Cox and Yong Man Ro}, title = {Robust Watermarking with Adaptive Receiving}, booktitle = {Digital Watermarking, Second International Workshop, {IWDW} 2003, Seoul, Korea, October 20-22, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2939}, pages = {396--407}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24624-4\_31}, doi = {10.1007/978-3-540-24624-4\_31}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/KangHSZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/HuangS02, author = {Jiwu Huang and Yun Q. Shi}, title = {Reliable information bit hiding}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {12}, number = {10}, pages = {916--920}, year = {2002}, url = {https://doi.org/10.1109/TCSVT.2002.804897}, doi = {10.1109/TCSVT.2002.804897}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/HuangS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/HuHHS02, author = {Junquan Hu and Jiwu Huang and Daren Huang and Yun Q. Shi}, editor = {Fabien A. P. Petitcolas and Hyoung Joong Kim}, title = {A DWT-Based Fragile Watermarking Tolerant of {JPEG} Compression}, booktitle = {Digital Watermarking, First International Workshop, {IWDW} 2002, Seoul, Korea, November 21-22, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2613}, pages = {179--188}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36617-2\_15}, doi = {10.1007/3-540-36617-2\_15}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/HuHHS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/KangHS02, author = {Xiangui Kang and Jiwu Huang and Yun Q. Shi}, editor = {Fabien A. P. Petitcolas and Hyoung Joong Kim}, title = {An Image Watermarking Algorithm Robust to Geometric Distortion}, booktitle = {Digital Watermarking, First International Workshop, {IWDW} 2002, Seoul, Korea, November 21-22, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2613}, pages = {212--223}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36617-2\_18}, doi = {10.1007/3-540-36617-2\_18}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/KangHS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/HuangLHL01, author = {Daren Huang and Jiufen Liu and Jiwu Huang and Hongmei Liu}, title = {A Dwt-Based Image Watermarking Algorithm}, booktitle = {Proceedings of the 2001 {IEEE} International Conference on Multimedia and Expo, {ICME} 2001, August 22-25, 2001, Tokyo, Japan}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ICME.2001.1237719}, doi = {10.1109/ICME.2001.1237719}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/HuangLHL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/LiuHX01, author = {Hongmei Liu and Jiwu Huang and Zi{-}mei Xiao}, title = {An Adaptive Video Watermarking Algorithm}, booktitle = {Proceedings of the 2001 {IEEE} International Conference on Multimedia and Expo, {ICME} 2001, August 22-25, 2001, Tokyo, Japan}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ICME.2001.1237688}, doi = {10.1109/ICME.2001.1237688}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/LiuHX01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/HuangS01, author = {Jiwu Huang and Yun Q. Shi}, title = {Embedding gray level images}, booktitle = {Proceedings of the 2001 International Symposium on Circuits and Systems, {ISCAS} 2001, Sydney, Australia, May 6-9, 2001}, pages = {239--242}, publisher = {{IEEE}}, year = {2001}, url = {https://doi.org/10.1109/ISCAS.2001.922029}, doi = {10.1109/ISCAS.2001.922029}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscas/HuangS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/ShiS00, author = {Jiwu Huang and Yun Q. Shi and Yi Shi}, title = {Embedding image watermarks in dc components}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {10}, number = {6}, pages = {974--979}, year = {2000}, url = {https://doi.org/10.1109/76.867936}, doi = {10.1109/76.867936}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/ShiS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsp/HuangES98, author = {Jiwu Huang and George F. Elmasry and Yun Q. Shi}, editor = {Ping Wah Wong and Abeer Alwan and Antonio Ortega and C.{-}C. Jay Kuo and C. L. Max Nikias}, title = {Power constrained multiple signaling in digital image watermarking}, booktitle = {Second {IEEE} Workshop on Multimedia Signal Processing, {MMSP} 1998, Redondo Beach, California, USA, December 7-9, 1998}, pages = {388--393}, publisher = {{IEEE}}, year = {1998}, url = {https://doi.org/10.1109/MMSP.1998.738967}, doi = {10.1109/MMSP.1998.738967}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsp/HuangES98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.