Follow
Jiwu Huang
Jiwu Huang
Verified email at szu.edu.cn
Title
Cited by
Cited by
Year
Edge adaptive image steganography based on LSB matching revisited
W Luo, F Huang, J Huang
IEEE Transactions on information forensics and security 5 (2), 201-214, 2010
8402010
A new cost function for spatial image steganography
B Li, M Wang, J Huang, X Li
2014 IEEE International conference on image processing (ICIP), 4206-4210, 2014
6142014
Robust detection of region-duplication forgery in digital image
W Luo, J Huang, G Qiu
18th International Conference on Pattern Recognition (ICPR'06) 4, 746-749, 2006
5302006
A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression
X Kang, J Huang, YQ Shi, Y Lin
IEEE transactions on circuits and systems for video technology 13 (8), 776-786, 2003
5032003
Embedding image watermarks in DC components
J Huang, YQ Shi, Y Shi
IEEE transactions on circuits and systems for video technology 10 (6), 974-979, 2000
4932000
信息安全综述(Survey of information security)
沈昌祥, 张焕国, 冯登国, 曹珍富, 黄继武
中国科学 E 辑: 信息科学(Science in China Series F: Information Science) 37 …, 2007
489*2007
DCT 域图像水印: 嵌入对策和算法(Watermarking in DCT Domain: Embedding Strategy and Algorithm)
黄继武, 程卫东 Yun Q. Shi
电子学报 (ACTA Electronica Sinica) 28 (4), 57-60, 2000
394*2000
Efficiently self-synchronized audio watermarking for assured audio data transmission
S Wu, J Huang, D Huang, YQ Shi
IEEE Transactions on Broadcasting 51 (1), 69-76, 2005
3742005
Digital image splicing detection based on Markov features in DCT and DWT domain
Z He, W Lu, W Sun, J Huang
Pattern recognition 45 (12), 4292-4299, 2012
3712012
Automatic steganographic distortion learning using a generative adversarial network
W Tang, S Tan, B Li, J Huang
IEEE Signal Processing Letters 24 (10), 1547-1551, 2017
3492017
JPEG error analysis and its applications to digital image forensics
W Luo, J Huang, G Qiu
IEEE Transactions on Information Forensics and Security 5 (3), 480-491, 2010
3242010
A novel method for detecting cropped and recompressed image block
W Luo, Z Qu, J Huang, G Qiu
2007 IEEE International Conference on Acoustics, Speech and Signal …, 2007
2812007
小波变换域图像水印嵌入对策和算法(An Embedding Strategy and Algorithm for Image Watermarking in DWT Domain)
黄达人, 刘九芬, 黄继武
软件学报(Journal of Software) 13 (7), 1290-1297, 2002
281*2002
CNN-based adversarial embedding for image steganography
W Tang, B Li, S Tan, M Barni, J Huang
IEEE Transactions on Information Forensics and Security 14 (8), 2074-2087, 2019
2722019
Identification of deep network generated images using disparities in color components
H Li, B Li, S Tan, J Huang
Signal Processing 174, 107616, 2020
2672020
A strategy of clustering modification directions in spatial image steganography
B Li, M Wang, X Li, S Tan, J Huang
IEEE Transactions on Information Forensics and Security 10 (9), 1905-1917, 2015
2662015
Enhancing source camera identification performance with a camera reference phase sensor pattern noise
X Kang, Y Li, Z Qu, J Huang
IEEE Transactions on Information Forensics and Security 7 (2), 393-402, 2011
2542011
Robust image watermarking based on multiband wavelets and empirical mode decomposition
N Bi, Q Sun, D Huang, Z Yang, J Huang
IEEE Transactions on Image Processing 16 (8), 1956-1966, 2007
2492007
Detecting double JPEG compression with the same quantization matrix
F Huang, J Huang, YQ Shi
IEEE Transactions on Information Forensics and Security 5 (4), 848-856, 2010
2412010
Large-scale JPEG image steganalysis using hybrid deep-learning framework
J Zeng, S Tan, B Li, J Huang
IEEE Transactions on Information Forensics and Security 13 (5), 1200-1214, 2017
2402017
The system can't perform the operation now. Try again later.
Articles 1–20