Follow
Jiwu Huang
Jiwu Huang
Verified email at szu.edu.cn
Title
Cited by
Cited by
Year
Edge adaptive image steganography based on LSB matching revisited
W Luo, F Huang, J Huang
IEEE Transactions on information forensics and security 5 (2), 201-214, 2010
8342010
A survey on image steganography and steganalysis.
B Li, J He, J Huang, YQ Shi
J. Inf. Hiding Multim. Signal Process. 2 (2), 142-172, 2011
6852011
A new cost function for spatial image steganography
B Li, M Wang, J Huang, X Li
2014 IEEE International conference on image processing (ICIP), 4206-4210, 2014
6052014
Robust detection of region-duplication forgery in digital image
W Luo, J Huang, G Qiu
18th International Conference on Pattern Recognition (ICPR'06) 4, 746-749, 2006
5342006
A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression
X Kang, J Huang, YQ Shi, Y Lin
IEEE transactions on circuits and systems for video technology 13 (8), 776-786, 2003
5052003
Embedding image watermarks in DC components
J Huang, YQ Shi, Y Shi
IEEE transactions on circuits and systems for video technology 10 (6), 974-979, 2000
5042000
信息安全综述(Survey of information security)
沈昌祥, 张焕国, 冯登国, 曹珍富, 黄继武
中国科学 E 辑: 信息科学(Science in China Series F: Information Science) 37 …, 2007
494*2007
DCT 域图像水印: 嵌入对策和算法(Watermarking in DCT Domain: Embedding Strategy and Algorithm)
黄继武, 程卫东 Yun Q. Shi
电子学报 (ACTA Electronica Sinica) 28 (4), 57-60, 2000
399*2000
Efficiently self-synchronized audio watermarking for assured audio data transmission
S Wu, J Huang, D Huang, YQ Shi
IEEE Transactions on Broadcasting 51 (1), 69-76, 2005
3782005
Digital image splicing detection based on Markov features in DCT and DWT domain
Z He, W Lu, W Sun, J Huang
Pattern recognition 45 (12), 4292-4299, 2012
3652012
Automatic steganographic distortion learning using a generative adversarial network
W Tang, S Tan, B Li, J Huang
IEEE Signal Processing Letters 24 (10), 1547-1551, 2017
3432017
JPEG error analysis and its applications to digital image forensics
W Luo, J Huang, G Qiu
IEEE Transactions on Information Forensics and Security 5 (3), 480-491, 2010
3192010
A novel method for detecting cropped and recompressed image block
W Luo, Z Qu, J Huang, G Qiu
2007 IEEE International Conference on Acoustics, Speech and Signal …, 2007
2842007
小波变换域图像水印嵌入对策和算法(An Embedding Strategy and Algorithm for Image Watermarking in DWT Domain)
黄达人, 刘九芬, 黄继武
软件学报(Journal of Software) 13 (7), 1290-1297, 2002
284*2002
A strategy of clustering modification directions in spatial image steganography
B Li, M Wang, X Li, S Tan, J Huang
IEEE Transactions on Information Forensics and Security 10 (9), 1905-1917, 2015
2682015
Identification of deep network generated images using disparities in color components
H Li, B Li, S Tan, J Huang
Signal Processing 174, 107616, 2020
2572020
CNN-based adversarial embedding for image steganography
W Tang, B Li, S Tan, M Barni, J Huang
IEEE Transactions on Information Forensics and Security 14 (8), 2074-2087, 2019
2562019
Enhancing source camera identification performance with a camera reference phase sensor pattern noise
X Kang, Y Li, Z Qu, J Huang
IEEE Transactions on Information Forensics and Security 7 (2), 393-402, 2011
2532011
Robust image watermarking based on multiband wavelets and empirical mode decomposition
N Bi, Q Sun, D Huang, Z Yang, J Huang
IEEE Transactions on Image Processing 16 (8), 1956-1966, 2007
2462007
Detecting double JPEG compression with the same quantization matrix
F Huang, J Huang, YQ Shi
IEEE Transactions on Information Forensics and Security 5 (4), 848-856, 2010
2422010
The system can't perform the operation now. Try again later.
Articles 1–20