关注
Jiwu Huang
Jiwu Huang
在 szu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Edge adaptive image steganography based on LSB matching revisited
W Luo, F Huang, J Huang
IEEE Transactions on information forensics and security 5 (2), 201-214, 2010
8542010
A new cost function for spatial image steganography
B Li, M Wang, J Huang, X Li
2014 IEEE International conference on image processing (ICIP), 4206-4210, 2014
6352014
Robust detection of region-duplication forgery in digital image
W Luo, J Huang, G Qiu
18th International Conference on Pattern Recognition (ICPR'06) 4, 746-749, 2006
5412006
A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression
X Kang, J Huang, YQ Shi, Y Lin
IEEE transactions on circuits and systems for video technology 13 (8), 776-786, 2003
5062003
Embedding image watermarks in DC components
J Huang, YQ Shi, Y Shi
IEEE transactions on circuits and systems for video technology 10 (6), 974-979, 2000
4902000
信息安全综述(Survey of information security)
沈昌祥, 张焕国, 冯登国, 曹珍富, 黄继武
中国科学 E 辑: 信息科学(Science in China Series F: Information Science) 37 …, 2007
485*2007
DCT 域图像水印: 嵌入对策和算法(Watermarking in DCT Domain: Embedding Strategy and Algorithm)
黄继武, 程卫东 Yun Q. Shi
电子学报 (ACTA Electronica Sinica) 28 (4), 57-60, 2000
394*2000
Efficiently self-synchronized audio watermarking for assured audio data transmission
S Wu, J Huang, D Huang, YQ Shi
IEEE Transactions on Broadcasting 51 (1), 69-76, 2005
3762005
Digital image splicing detection based on Markov features in DCT and DWT domain
Z He, W Lu, W Sun, J Huang
Pattern recognition 45 (12), 4292-4299, 2012
3682012
Automatic steganographic distortion learning using a generative adversarial network
W Tang, S Tan, B Li, J Huang
IEEE Signal Processing Letters 24 (10), 1547-1551, 2017
3642017
JPEG error analysis and its applications to digital image forensics
W Luo, J Huang, G Qiu
IEEE Transactions on Information Forensics and Security 5 (3), 480-491, 2010
3272010
小波变换域图像水印嵌入对策和算法(An Embedding Strategy and Algorithm for Image Watermarking in DWT Domain)
黄达人, 刘九芬, 黄继武
软件学报(Journal of Software) 13 (7), 1290-1297, 2002
281*2002
A novel method for detecting cropped and recompressed image block
W Luo, Z Qu, J Huang, G Qiu
2007 IEEE International Conference on Acoustics, Speech and Signal …, 2007
2802007
Identification of deep network generated images using disparities in color components
H Li, B Li, S Tan, J Huang
Signal Processing 174, 107616, 2020
2792020
CNN-based adversarial embedding for image steganography
W Tang, B Li, S Tan, M Barni, J Huang
IEEE Transactions on Information Forensics and Security 14 (8), 2074-2087, 2019
2732019
A strategy of clustering modification directions in spatial image steganography
B Li, M Wang, X Li, S Tan, J Huang
IEEE Transactions on Information Forensics and Security 10 (9), 1905-1917, 2015
2682015
Enhancing source camera identification performance with a camera reference phase sensor pattern noise
X Kang, Y Li, Z Qu, J Huang
IEEE Transactions on Information Forensics and Security 7 (2), 393-402, 2011
2562011
Robust image watermarking based on multiband wavelets and empirical mode decomposition
N Bi, Q Sun, D Huang, Z Yang, J Huang
IEEE Transactions on Image Processing 16 (8), 1956-1966, 2007
2532007
Large-scale JPEG image steganalysis using hybrid deep-learning framework
J Zeng, S Tan, B Li, J Huang
IEEE Transactions on Information Forensics and Security 13 (5), 1200-1214, 2017
2462017
Detecting double JPEG compression with the same quantization matrix
F Huang, J Huang, YQ Shi
IEEE Transactions on Information Forensics and Security 5 (4), 848-856, 2010
2442010
系统目前无法执行此操作,请稍后再试。
文章 1–20