Edge adaptive image steganography based on LSB matching revisited W Luo, F Huang, J Huang IEEE Transactions on information forensics and security 5 (2), 201-214, 2010 | 854 | 2010 |
A new cost function for spatial image steganography B Li, M Wang, J Huang, X Li 2014 IEEE International conference on image processing (ICIP), 4206-4210, 2014 | 635 | 2014 |
Robust detection of region-duplication forgery in digital image W Luo, J Huang, G Qiu 18th International Conference on Pattern Recognition (ICPR'06) 4, 746-749, 2006 | 541 | 2006 |
A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression X Kang, J Huang, YQ Shi, Y Lin IEEE transactions on circuits and systems for video technology 13 (8), 776-786, 2003 | 506 | 2003 |
Embedding image watermarks in DC components J Huang, YQ Shi, Y Shi IEEE transactions on circuits and systems for video technology 10 (6), 974-979, 2000 | 490 | 2000 |
信息安全综述(Survey of information security) 沈昌祥, 张焕国, 冯登国, 曹珍富, 黄继武 中国科学 E 辑: 信息科学(Science in China Series F: Information Science) 37 …, 2007 | 485* | 2007 |
DCT 域图像水印: 嵌入对策和算法(Watermarking in DCT Domain: Embedding Strategy and Algorithm) 黄继武, 程卫东 Yun Q. Shi 电子学报 (ACTA Electronica Sinica) 28 (4), 57-60, 2000 | 394* | 2000 |
Efficiently self-synchronized audio watermarking for assured audio data transmission S Wu, J Huang, D Huang, YQ Shi IEEE Transactions on Broadcasting 51 (1), 69-76, 2005 | 376 | 2005 |
Digital image splicing detection based on Markov features in DCT and DWT domain Z He, W Lu, W Sun, J Huang Pattern recognition 45 (12), 4292-4299, 2012 | 368 | 2012 |
Automatic steganographic distortion learning using a generative adversarial network W Tang, S Tan, B Li, J Huang IEEE Signal Processing Letters 24 (10), 1547-1551, 2017 | 364 | 2017 |
JPEG error analysis and its applications to digital image forensics W Luo, J Huang, G Qiu IEEE Transactions on Information Forensics and Security 5 (3), 480-491, 2010 | 327 | 2010 |
小波变换域图像水印嵌入对策和算法(An Embedding Strategy and Algorithm for Image Watermarking in DWT Domain) 黄达人, 刘九芬, 黄继武 软件学报(Journal of Software) 13 (7), 1290-1297, 2002 | 281* | 2002 |
A novel method for detecting cropped and recompressed image block W Luo, Z Qu, J Huang, G Qiu 2007 IEEE International Conference on Acoustics, Speech and Signal …, 2007 | 280 | 2007 |
Identification of deep network generated images using disparities in color components H Li, B Li, S Tan, J Huang Signal Processing 174, 107616, 2020 | 279 | 2020 |
CNN-based adversarial embedding for image steganography W Tang, B Li, S Tan, M Barni, J Huang IEEE Transactions on Information Forensics and Security 14 (8), 2074-2087, 2019 | 273 | 2019 |
A strategy of clustering modification directions in spatial image steganography B Li, M Wang, X Li, S Tan, J Huang IEEE Transactions on Information Forensics and Security 10 (9), 1905-1917, 2015 | 268 | 2015 |
Enhancing source camera identification performance with a camera reference phase sensor pattern noise X Kang, Y Li, Z Qu, J Huang IEEE Transactions on Information Forensics and Security 7 (2), 393-402, 2011 | 256 | 2011 |
Robust image watermarking based on multiband wavelets and empirical mode decomposition N Bi, Q Sun, D Huang, Z Yang, J Huang IEEE Transactions on Image Processing 16 (8), 1956-1966, 2007 | 253 | 2007 |
Large-scale JPEG image steganalysis using hybrid deep-learning framework J Zeng, S Tan, B Li, J Huang IEEE Transactions on Information Forensics and Security 13 (5), 1200-1214, 2017 | 246 | 2017 |
Detecting double JPEG compression with the same quantization matrix F Huang, J Huang, YQ Shi IEEE Transactions on Information Forensics and Security 5 (4), 848-856, 2010 | 244 | 2010 |