


default search action
Jiangqun Ni
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j61]Zhimao Lai, Yun Zhang, Dong Li, Jiangqun Ni:
Leveraging High-Frequency Diversified Augmentation for general deepfake detection. J. Inf. Secur. Appl. 89: 103994 (2025) - [j60]Yuan Rao, Jiangqun Ni, Weizhe Zhang, Jiwu Huang:
Towards JPEG-Resistant Image Forgery Detection and Localization Via Self-Supervised Domain Adaptation. IEEE Trans. Pattern Anal. Mach. Intell. 47(5): 3285-3297 (2025) - [j59]Jian Zhang
, Jiangqun Ni, Fan Nie
:
DSM: Domain Shift Modeling for general deepfake detection. Signal Process. 230: 109822 (2025) - [j58]Yulin Zhang
, Jiangqun Ni
, Wenkang Su
:
HiFiMSFA: Robust and High-Fidelity Image Watermarking Using Attention Augmented Deep Network. IEEE Signal Process. Lett. 32: 781-785 (2025) - [j57]Fan Nie
, Jiangqun Ni, Jian Zhang, Bin Zhang, Weizhe Zhang:
DIP: Diffusion Learning of Inconsistency Pattern for General DeepFake Detection. IEEE Trans. Multim. 27: 2155-2167 (2025) - [j56]Jian Zhang
, Jiangqun Ni
, Fan Nie
, Jiwu Huang
:
Domain-invariant and Patch-discriminative Feature Learning for General Deepfake Detection. ACM Trans. Multim. Comput. Commun. Appl. 21(2): 47:1-47:19 (2025) - [c53]Zeqin Yu, Jiangqun Ni, Jian Zhang, Haoyi Deng, Yuzhen Lin:
Reinforced Multi-teacher Knowledge Distillation for Efficient General Image Forgery Detection and Localization. AAAI 2025: 995-1003 - 2024
- [j55]Junying Yuan
, Huicheng Zheng
, Jiangqun Ni
:
Reversible Data Hiding With Pattern Adaptive Prediction. Comput. J. 67(4): 1564-1571 (2024) - [j54]Junxiang Wang, Ying Zhang, Lin Huang, Chuntao Wang, Jiangqun Ni:
Reversible data hiding in enhanced images with anti-detection capability. Multim. Tools Appl. 83(4): 9853-9872 (2024) - [j53]Qingliang Liu
, Wenkang Su
, Jiangqun Ni
, Xianglei Hu, Jiwu Huang:
An efficient distortion cost function design for image steganography in spatial domain using quaternion representation. Signal Process. 219: 109370 (2024) - [j52]Yuanfeng Pan
, Jiangqun Ni
, Qingliang Liu
, Wenkang Su
, Jiwu Huang:
Efficient JPEG image steganography using pairwise conditional random field model. Signal Process. 221: 109493 (2024) - [j51]Shiyuan Tang, Jiangqun Ni
, Wenkang Su
, Yulin Zhang
:
DWW: Robust Deep Wavelet-Domain Watermarking With Enhanced Frequency Mask. IEEE Signal Process. Lett. 31: 3074-3078 (2024) - [j50]Yuanfeng Pan
, Jiangqun Ni:
Domain Transformation of Distortion Costs for Efficient JPEG Steganography with Symmetric Embedding. Symmetry 16(5): 575 (2024) - [j49]Liuhao Zhu, Yixiang Fang
, Yi Zhao
, Yi Peng, Junxiang Wang
, Jiangqun Ni
:
Lite Localization Network and DUE-Based Watermarking for Color Image Copyright Protection. IEEE Trans. Circuits Syst. Video Technol. 34(10): 9311-9325 (2024) - [j48]Wenkang Su
, Jiangqun Ni
, Xianglei Hu
, Bin Li
:
Efficient Audio Steganography Using Generalized Audio Intrinsic Energy With Micro-Amplitude Modification Suppression. IEEE Trans. Inf. Forensics Secur. 19: 6559-6572 (2024) - [j47]Jing Zhao
, Hongwei Yang
, Hui He
, Jie Peng
, Weizhe Zhang
, Jiangqun Ni
, Arun Kumar Sangaiah
, Aniello Castiglione
:
Backdoor Two-Stream Video Models on Federated Learning. ACM Trans. Multim. Comput. Commun. Appl. 20(11): 338:1-338:20 (2024) - [c52]Wenkang Su
, Jiangqun Ni, Yiyan Sun:
StegaStyleGAN: Towards Generic and Practical Generative Image Steganography. AAAI 2024: 240-248 - [c51]Zeqin Yu, Jiangqun Ni, Yuzhen Lin, Haoyi Deng, Bin Li:
DiffForensics: Leveraging Diffusion Prior to Image Forgery Detection and Localization. CVPR 2024: 12765-12774 - [c50]Yuzhen Lin
, Wentang Song
, Bin Li
, Yuezun Li
, Jiangqun Ni
, Han Chen
, Qiushi Li
:
Fake It till You Make It: Curricular Dynamic Forgery Augmentations Towards General Deepfake Detection. ECCV (86) 2024: 104-122 - [c49]Ping Xu
, Jiangqun Ni, Jian Zhang
, Yulin Zhang, Shiyuan Tang:
Diff-IFL: Towards General Image Forgery Localization using Diffusion Probabilistic Model. ICME 2024: 1-6 - [c48]Yuhan Yao, Jiawei Feng, Ancong Wu, Jiangqun Ni, Wei-Shi Zheng:
Fine-Grained Depth Knowledge Distillation for Cloth-Changing Person Re-identification. IJCNN 2024: 1-8 - [c47]Yuanfeng Pan
, Wenkang Su
, Jiangqun Ni
, Qingliang Liu
, Yulin Zhang
, Donghua Jiang
:
Model-Based Non-Independent Distortion Cost Design for Effective JPEG Steganography. ACM Multimedia 2024: 2419-2427 - [c46]Fan Nie
, Jiangqun Ni
, Jian Zhang
, Bin Zhang
, Weizhe Zhang
:
FRADE: Forgery-aware Audio-distilled Multimodal Learning for Deepfake Detection. ACM Multimedia 2024: 6297-6306 - [i5]Yuzhen Lin, Wentang Song, Bin Li, Yuezun Li, Jiangqun Ni, Han Chen, Qiushi Li:
Fake It till You Make It: Curricular Dynamic Forgery Augmentations towards General Deepfake Detection. CoRR abs/2409.14444 (2024) - [i4]Fan Nie, Jiangqun Ni, Jian Zhang, Bin Zhang, Weizhe Zhang:
DIP: Diffusion Learning of Inconsistency Pattern for General DeepFake Detection. CoRR abs/2410.23663 (2024) - 2023
- [j46]Junying Yuan
, Huicheng Zheng
, Jiangqun Ni
:
Multiple Histograms-Based Reversible Data Hiding Using Fast Performance Optimization and Adaptive Pixel Distribution. Comput. J. 66(11): 2623-2637 (2023) - [j45]Ying Liu
, Jiangqun Ni, Wenkang Su
:
Efficient Video Steganalytic Feature Design by Exploiting Local Optimality and Lagrangian Cost Quotient. Symmetry 15(2): 520 (2023) - [j44]Chuntao Wang
, Juan Hu
, Shan Bian
, Jiangqun Ni
, Xinpeng Zhang
:
A Customized Deep Network Based Encryption-Then-Lossy-Compression Scheme of Color Images Achieving Arbitrary Compression Ratios. IEEE Trans. Circuits Syst. Video Technol. 33(8): 4322-4336 (2023) - [j43]Chuntao Wang
, Tianjian Zhang, Hao Chen, Qiong Huang
, Jiangqun Ni
, Xinpeng Zhang
:
A Novel Encryption-Then-Lossy-Compression Scheme of Color Images Using Customized Residual Dense Spatial Network. IEEE Trans. Multim. 25: 4026-4040 (2023) - [c45]Jian Zhang
, Jiangqun Ni:
Domain-Invariant Feature Learning for General Face Forgery Detection. ICME 2023: 2321-2326 - [c44]Yulin Zhang
, Jiangqun Ni
, Wenkang Su
, Xin Liao
:
A Novel Deep Video Watermarking Framework with Enhanced Robustness to H.264/AVC Compression. ACM Multimedia 2023: 8095-8104 - [c43]Qingliang Liu
, Jiangqun Ni
, Xianglei Hu
:
Robust Image Steganography against General Scaling Attacks. ACM Multimedia 2023: 8233-8241 - 2022
- [j42]Wenkang Su
, Jiangqun Ni
, Xianglei Hu, Fangjun Huang:
Towards improving the security of image steganography via minimizing the spatial embedding impact. Digit. Signal Process. 131: 103758 (2022) - [j41]Liya Zhu, Donghua Jiang, Jiangqun Ni, Xingyuan Wang, Xianwei Rong, Musheer Ahmad
:
A visually secure image encryption scheme using adaptive-thresholding sparsification compression sensing model and newly-designed memristive chaotic map. Inf. Sci. 607: 1001-1022 (2022) - [j40]Wenkang Su
, Jiangqun Ni, Xianglei Hu, Jiwu Huang:
New design paradigm of distortion cost function for efficient JPEG steganography. Signal Process. 190: 108319 (2022) - [j39]Liya Zhu, Donghua Jiang
, Jiangqun Ni, Xingyuan Wang, Xianwei Rong, Musheer Ahmad
, Yingpin Chen:
A stable meaningful image encryption scheme using the newly-designed 2D discrete fractional-order chaotic map and Bayesian compressive sensing. Signal Process. 195: 108489 (2022) - [j38]Hao Xie
, Jiangqun Ni
, Jian Zhang
, Weizhe Zhang, Jiwu Huang:
Evading generated-image detectors: A deep dithering approach. Signal Process. 197: 108558 (2022) - [j37]Hao Xie, Jiangqun Ni, Jian Zhang, Weizhe Zhang, Jiwu Huang:
Corrigendum to 'Evading generated-image detectors: A deep dithering approach' [Signal Processing 197(2022) 108558]. Signal Process. 200: 108670 (2022) - [j36]Hao Xie
, Jiangqun Ni
, Yun Qing Shi:
Dual-Domain Generative Adversarial Network for Digital Image Operation Anti-Forensics. IEEE Trans. Circuits Syst. Video Technol. 32(3): 1701-1706 (2022) - [j35]Ying Liu
, Jiangqun Ni
, Weizhe Zhang
, Jiwu Huang
:
A Novel Video Steganographic Scheme Incorporating the Consistency Degree of Motion Vectors. IEEE Trans. Circuits Syst. Video Technol. 32(7): 4905-4910 (2022) - [c42]Jiangqun Ni
, Yichen Tong
, Xianglei Hu
, Wenkang Su
, Xiangui Kang
:
Spatial Image Steganography Using a Correlational Model. ICAIS (3) 2022: 400-411 - [c41]Yichen Tong
, Jiangqun Ni
, Wenkang Su
, Xianglei Hu
:
Spatial Image Steganography Incorporating Adjacent Dependencies. ICAIS (3) 2022: 412-423 - [c40]Qingliang Liu, Jiangqun Ni, Mengxin Jian:
Effective JPEG Steganalysis Using Non-Linear Pre-Processing and Residual Channel-Spatial Attention. ICME 2022: 1-6 - [c39]Junxiong Lu, Jiangqun Ni, Wenkang Su
, Hao Xie:
Wavelet-Based CNN for Robust and High-Capacity Image Watermarking. ICME 2022: 1-6 - [i3]Qingliang Liu, Jiangqun Ni, Weizhe Zhang, Xiangyang Luo, Jiwu Huang:
A Robust Image Steganographic Scheme against General Scaling Attacks. CoRR abs/2212.02822 (2022) - 2021
- [j34]Xin Chen, Ying Zhang, Lang Lin, Junxiang Wang, Jiangqun Ni:
Efficient Anti-Glare Ceramic Decals Defect Detection by Incorporating Homomorphic Filtering. Comput. Syst. Sci. Eng. 36(3): 551-564 (2021) - [j33]Yuan Rao
, Jiangqun Ni
, Hao Xie
:
Multi-semantic CRF-based attention model for image forgery detection and localization. Signal Process. 183: 108051 (2021) - [j32]Wenkang Su
, Jiangqun Ni
, Xianglei Hu
, Jessica J. Fridrich:
Image Steganography With Symmetric Embedding Using Gaussian Markov Random Field Model. IEEE Trans. Circuits Syst. Video Technol. 31(3): 1001-1015 (2021) - [j31]Xianglei Hu
, Jiangqun Ni
, Weizhe Zhang
, Jiwu Huang
:
Efficient JPEG Batch Steganography Using Intrinsic Energy of Image Contents. IEEE Trans. Inf. Forensics Secur. 16: 4544-4558 (2021) - [c38]Yuan Rao
, Jiangqun Ni:
Self-supervised Domain Adaptation for Forgery Localization of JPEG Compressed Images. ICCV 2021: 15014-15023 - [c37]Jian Zhang
, Jiangqun Ni, Hao Xie:
DeepFake Videos Detection Using Self-Supervised Decoupling Network. ICME 2021: 1-6 - 2020
- [j30]Chuntao Wang
, Tianzheng Li
, Jiangqun Ni
, Qiong Huang
:
A New MRF-Based Lossy Compression for Encrypted Binary Images. IEEE Access 8: 11328-11341 (2020) - [j29]Yuan Rao
, Jiangqun Ni
, Huimin Zhao
:
Deep Learning Local Descriptor for Image Splicing Detection and Localization. IEEE Access 8: 25611-25625 (2020) - [j28]Haishan Chen, Junying Yuan, Wien Hong, Jiangqun Ni, Tung-Shou Chen:
On Performance Improvement Of Reversible Data Hiding With Contrast Enhancement. Comput. J. 63(10): 1584-1596 (2020) - [j27]Junxiang Wang
, Xin Chen, Jiangqun Ni
, Ningxiong Mao, Yun-Qing Shi:
Multiple Histograms-Based Reversible Data Hiding: Framework and Realization. IEEE Trans. Circuits Syst. Video Technol. 30(8): 2313-2328 (2020) - [c36]Rongyu Zhang, Jiangqun Ni:
A Dense U-Net with Cross-Layer Intersection for Detection and Localization of Image Forgery. ICASSP 2020: 2982-2986 - [c35]Qian Shu, Jiangqun Ni, Hao Xie:
Decoupling-Gan for Camera Model Identification of JPEG Compressed Images. ICME 2020: 1-6
2010 – 2019
- 2019
- [j26]Junxiang Wang, Ningxiong Mao, Xin Chen, Jiangqun Ni, Chuntao Wang
, Yunqing Shi:
Multiple histograms based reversible data hiding by using FCM clustering. Signal Process. 159: 193-203 (2019) - [c34]Junwen Huang, Jiangqun Ni, Linhong Wan, Jingwen Yan:
A Customized Convolutional Neural Network with Low Model Complexity for JPEG Steganalysis. IH&MMSec 2019: 198-203 - [c33]Yichen Tong
, Jiangqun Ni
, Wenkang Su
:
Image Steganography Using an Eight-Element Neighborhood Gaussian Markov Random Field Model. IWDW 2019: 247-255 - [i2]Wenkang Su, Jiangqun Ni, Yuanfeng Pan, Xianglei Hu, Yun-Qing Shi:
Image Steganography using Gaussian Markov Random Field Model. CoRR abs/1908.01483 (2019) - [i1]Wenkang Su, Jiangqun Ni, Yuanfeng Pan, Xianglei Hu, Qingliang Liu:
An Efficient JPEG Steganographic Scheme Design Using Domain Transformation of Embedding Cost. CoRR abs/1908.01947 (2019) - 2018
- [j25]Xianglei Hu, Jiangqun Ni, Wenkang Su
, Junwen Huang:
Model-based image steganography using asymmetric embedding scheme. J. Electronic Imaging 27(04): 043023 (2018) - [j24]Xianglei Hu
, Jiangqun Ni
, Yun-Qing Shi:
Efficient JPEG Steganography Using Domain Transformation of Embedding Entropy. IEEE Signal Process. Lett. 25(6): 773-777 (2018) - [j23]Wenkang Su
, Jiangqun Ni
, Xiaohan Li, Yun-Qing Shi:
A New Distortion Function Design for JPEG Steganography Using the Generalized Uniform Embedding Strategy. IEEE Trans. Circuits Syst. Video Technol. 28(12): 3545-3549 (2018) - [j22]Chuntao Wang
, Jiangqun Ni
, Xinpeng Zhang
, Qiong Huang:
Efficient Compression of Encrypted Binary Images Using the Markov Random Field. IEEE Trans. Inf. Forensics Secur. 13(5): 1271-1285 (2018) - [c32]Xianglei Hu, Haishan Chen, Jiangqun Ni, Wenkang Su
:
A Novel Steganography Scheme Based on Asymmetric Embedding Model. ICCCS (4) 2018: 183-194 - [c31]Haishan Chen, Wien Hong, Jiangqun Ni, Tung-Shou Chen:
Reversible Data Hiding in Partially-Encrypted Images. ICCCS (3) 2018: 670-679 - [c30]Baolin Zhu, Jiangqun Ni:
Uniform Embedding for Efficient Steganography of H.264 Video. ICIP 2018: 1678-1682 - 2017
- [j21]Haishan Chen
, Jiangqun Ni, Wien Hong, Tung-Shou Chen:
High-Fidelity Reversible Data Hiding Using Directionally Enclosed Prediction. IEEE Signal Process. Lett. 24(5): 574-578 (2017) - [j20]Junxiang Wang, Jiangqun Ni, Xing Zhang, Yun-Qing Shi:
Rate and Distortion Optimization for Reversible Data Hiding Using Multiple Histogram Shifting. IEEE Trans. Cybern. 47(2): 315-326 (2017) - [j19]Jian Ye, Jiangqun Ni
, Yang Yi
:
Deep Learning Hierarchical Representations for Image Steganalysis. IEEE Trans. Inf. Forensics Secur. 12(11): 2545-2557 (2017) - [j18]Chenglong Chen, Jiangqun Ni
, Zhaoyi Shen, Yun Qing Shi:
Blind Forensics of Successive Geometric Transformations in Digital Images Using Spectral Method: Theory and Applications. IEEE Trans. Image Process. 26(6): 2811-2824 (2017) - [c29]Jianghong Zhou, Jiangqun Ni, Yuan Rao
:
Block-Based Convolutional Neural Network for Image Forgery Detection. IWDW 2017: 65-76 - 2016
- [j17]Zhaoyi Shen, Jiangqun Ni, Chenglong Chen:
Blind detection of median filtering using linear and nonlinear descriptors. Multim. Tools Appl. 75(4): 2327-2346 (2016) - [j16]Haishan Chen, Jiangqun Ni, Wien Hong, Tung-Shou Chen:
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering. Signal Process. Image Commun. 46: 1-16 (2016) - [c28]Yuanfeng Pan, Jiangqun Ni, Wenkang Su
:
Improved Uniform Embedding for Efficient JPEG Steganography. ICCCS (1) 2016: 125-133 - [c27]Haishan Chen, Wien Hong, Jiangqun Ni, Junying Yuan:
A Tunable Bound of the Embedding Level for Reversible Data Hiding with Contrast Enhancement. ICCCS (1) 2016: 134-144 - [c26]Junxiang Wang, Jiangqun Ni, Xing Zhang:
Efficient HS based Reversible Data Hiding Using Multi-feature Complexity Measure and Optimized Histogram. IH&MMSec 2016: 29-38 - [c25]Yuan Rao
, Jiangqun Ni:
A deep learning approach to detection of splicing and copy-move forgeries in images. WIFS 2016: 1-6 - 2015
- [j15]Chuntao Wang
, Jiangqun Ni, Qiong Huang:
A new encryption-then-compression algorithm using the rate-distortion optimization. Signal Process. Image Commun. 39: 141-150 (2015) - [j14]Linjie Guo, Jiangqun Ni, Wenkang Su
, Chengpei Tang, Yun-Qing Shi:
Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited. IEEE Trans. Inf. Forensics Secur. 10(12): 2669-2680 (2015) - [j13]Chang Wang
, Jiangqun Ni, Chuntao Wang:
New Distortion Metric for Efficient JPEG Steganography Using Linear Prediction. J. Signal Process. Syst. 81(3): 389-400 (2015) - [c24]Chuntao Wang, Jiangqun Ni:
Compressing Encrypted Images Using the Integer Lifting Wavelet. IIH-MSP 2015: 409-412 - [c23]Xianglei Hu, Jiangqun Ni, Runbiao Pan:
Detecting Video Forgery by Estimating Extrinsic Camera Parameters. IWDW 2015: 28-38 - 2014
- [j12]Junxiang Wang, Jiangqun Ni, Yongjian Hu:
An efficient reversible data hiding scheme using prediction and optimal side information selection. J. Vis. Commun. Image Represent. 25(6): 1425-1431 (2014) - [j11]Chenglong Chen, Jiangqun Ni, Zhaoyi Shen:
Effective Estimation of Image Rotation Angle Using Spectral Method. IEEE Signal Process. Lett. 21(7): 890-894 (2014) - [j10]Linjie Guo, Jiangqun Ni, Yun-Qing Shi:
Uniform Embedding for Efficient JPEG Steganography. IEEE Trans. Inf. Forensics Secur. 9(5): 814-825 (2014) - 2013
- [j9]Chuntao Wang, Jiangqun Ni, Dong Zhang:
Counteracting geometrical attacks on robust image watermarking by constructing a deformable pyramid transform. EURASIP J. Adv. Signal Process. 2013: 119 (2013) - [j8]Likai Chen, Wei Lu, Jiangqun Ni, Wei Sun, Jiwu Huang:
Region duplication detection based on Harris corner points and step sector statistics. J. Vis. Commun. Image Represent. 24(3): 244-254 (2013) - [j7]Chenglong Chen, Jiangqun Ni, Jiwu Huang:
Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach. IEEE Trans. Image Process. 22(12): 4699-4710 (2013) - [c22]Jiehao Chen, Chenglong Chen, Jiangqun Ni:
Effective Video Copy Detection Using Statistics of Quantized Zernike Moments. IWDW 2013: 232-243 - [c21]Junxiang Wang, Jiangqun Ni:
A GA optimization approach to HS based multiple reversible data hiding. WIFS 2013: 203-208 - 2012
- [j6]Junxiang Wang, Jiangqun Ni, Dong Zhang, Hao Luo:
Improved Histogram Shifting Technique for Low Payload Embedding by Using a Rate-Distortion Model and Optimal Side Information Selection. IEICE Trans. Inf. Syst. 95-D(10): 2552-2555 (2012) - [j5]Likai Chen, Wei Lu, Jiangqun Ni:
An Image Region Description Method Based on Step Sector Statistics and its Application in Image Copy-Rotate/Flip-Move Forgery Detection. Int. J. Digit. Crime Forensics 4(1): 49-62 (2012) - [j4]Chang Wang
, Jiangqun Ni, Chuntao Wang, Ruiyu Zhang:
An Adaptive JPEG Steganographic Scheme Based on the Block Entropy of DCT Coefficients. Int. J. Digit. Crime Forensics 4(2): 13-27 (2012) - [j3]Chuntao Wang, Jiangqun Ni, Jiwu Huang:
An Informed Watermarking Scheme Using Hidden Markov Model in the Wavelet Domain. IEEE Trans. Inf. Forensics Secur. 7(3): 853-867 (2012) - [c20]Chang Wang
, Jiangqun Ni:
An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients. ICASSP 2012: 1785-1788 - [c19]Chenglong Chen, Jiangqun Ni, Rongbin Huang, Jiwu Huang:
Blind Median Filtering Detection Using Statistics in Difference Domain. Information Hiding 2012: 1-15 - [c18]Linjie Guo, Jiangqun Ni, Yun-Qing Shi:
An efficient JPEG steganographic scheme using uniform embedding. WIFS 2012: 169-174 - 2011
- [c17]Junxiang Wang, Jiangqun Ni, Jinwei Pan:
A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding. IWDW 2011: 42-56 - [c16]Chenglong Chen, Jiangqun Ni:
Median Filtering Detection Using Edge Based Prediction Matrix. IWDW 2011: 361-375 - 2010
- [c15]Chuntao Wang, Jiangqun Ni, Huashuo Zhuo, Jiwu Huang:
A geometrically resilient robust image watermarking scheme using deformable multi-scale transform. ICIP 2010: 3677-3680 - [c14]Junxiang Wang, Jiangqun Ni:
A fast performance estimation scheme for histogram shifting based multi-layer embedding. ICIP 2010: 3701-3704 - [c13]Dong Zhang, Jiangqun Ni, Qiping Zeng, Dah-Jye Lee, Jiwu Huang:
Security Analysis of ISS Watermarking Using Natural Scene Statistics. Information Hiding 2010: 235-248 - [c12]Jian Cao, Jiwu Huang, Jiangqun Ni:
A New Spread Spectrum Watermarking Scheme to Achieve a Trade-Off between Security and Robustness. Information Hiding 2010: 262-276
2000 – 2009
- 2009
- [j2]Chuntao Wang, Jin-Hyung Kim, Keun-Yung Byun, Jiangqun Ni, Sung-Jea Ko:
Robust digital image stabilization using the Kalman filter. IEEE Trans. Consumer Electron. 55(1): 6-14 (2009) - [c11]Chong Chen, Jiangqun Ni, Jiwu Huang:
Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping. IWDW 2009: 81-95 - 2008
- [j1]Chuntao Wang, Jiangqun Ni, Rongyue Zhang, Goo-Rak Kwon, Sung-Jea Ko:
Content-Adaptive Robust Image Watermarking with Posterior HMM-Based Detector. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(8): 1953-1960 (2008) - [c10]Jiangqun Ni, Rongyue Zhang, Chen Fang, Jiwu Huang, Chuntao Wang, Hyoung-Joong Kim:
Watermarking Security Incorporating Natural Scene Statistics. Information Hiding 2008: 132-146 - [c9]Dong Zhang, Jiangqun Ni, Dah-Jye Lee:
Security Analysis for Spread-Spectrum Watermarking Incorporating Statistics of Natural Images. ISVC (2) 2008: 400-409 - [c8]Dong Zhang, Jiangqun Ni, Dah-Jye Lee, Jiwu Huang:
GSM Based Security Analysis for Add-SS Watermarking. IWDW 2008: 313-326 - 2007
- [c7]Jiangqun Ni, Chuntao Wang, Jiwu Huang, Rongyue Zhang, Meiying Huang:
A GA-Based Joint Coding and Embedding Optimization for Robust and High Capacity Image Watermarking. ICASSP (2) 2007: 181-184 - [c6]Chuntao Wang, Jiangqun Ni, Jiwu Huang, Rongyue Zhang, Meiying Huang:
Robust and High Capacity Image Watermarking Based on Jointly Coding and Embedding Optimization. Information Hiding 2007: 65-79 - [c5]Linna Tang, Jiangqun Ni, Chuntao Wang, Rongyue Zhang:
A Modified Kernels-Alternated Error Diffusion Watermarking Algorithm for Halftone Images. IWDW 2007: 382-394 - 2006
- [c4]Jiangqun Ni, Chuntao Wang, Jiwu Huang, Rongyue Zhang:
Performance Enhancement for DWT-HMM Image Watermarking with Content-Adaptive Approach. ICIP 2006: 1377-1380 - [c3]Jiangqun Ni, Rongyue Zhang, Jiwu Huang, Chuntao Wang, Quanbo Li:
A Rotation-Invariant Secure Image Watermarking Algorithm Incorporating Steerable Pyramid Transform. IWDW 2006: 446-460 - 2005
- [c2]Jiangqun Ni, Rongyue Zhang, Jiwu Huang, Chuntao Wang:
A Robust Multi-bit Image Watermarking Algorithm Based on HMM in Wavelet Domain. IWDW 2005: 110-123 - [c1]Jiangqun Ni, Chuntao Wang, Jiwu Huang, Rongyue Zhang:
A RST-Invariant Robust DWT-HMM Watermarking Algorithm Incorporating Zernike Moments and Template. KES (1) 2005: 1233-1239
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-05 21:52 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint