Casia image tampering detection evaluation database J Dong, W Wang, T Tan 2013 IEEE China summit and international conference on signal and …, 2013 | 632 | 2013 |
Deep learning for steganalysis via convolutional neural networks Y Qian, J Dong, W Wang, T Tan Media Watermarking, Security, and Forensics 2015 9409, 171-180, 2015 | 596 | 2015 |
SSGAN: Secure steganography based on generative adversarial networks H Shi, J Dong, W Wang, Y Qian, X Zhang Advances in Multimedia Information Processing–PCM 2017: 18th Pacific-Rim …, 2018 | 266 | 2018 |
Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy C Qin, P Ji, X Zhang, J Dong, J Wang Signal processing 138, 280-293, 2017 | 202 | 2017 |
Effective image splicing detection based on image chroma W Wang, J Dong, T Tan 2009 16th IEEE international conference on image processing (ICIP), 1257-1260, 2009 | 188 | 2009 |
On the generalization of GAN image forensics X Xuan, B Peng, W Wang, J Dong Chinese conference on biometric recognition, 134-141, 2019 | 186 | 2019 |
Learning and transferring representations for image steganalysis using convolutional neural network Y Qian, J Dong, W Wang, T Tan 2016 IEEE international conference on image processing (ICIP), 2752-2756, 2016 | 181 | 2016 |
Run-length and edge statistics based approach for image splicing detection J Dong, W Wang, T Tan, YQ Shi Digital Watermarking: 7th International Workshop, IWDW 2008, Busan, Korea …, 2009 | 135 | 2009 |
Exploring DCT coefficient quantization effects for local tampering detection W Wang, J Dong, T Tan IEEE Transactions on Information Forensics and Security 9 (10), 1653-1666, 2014 | 104 | 2014 |
Image tampering detection based on stationary distribution of Markov chain W Wang, J Dong, T Tan 2010 IEEE International Conference on Image Processing, 2101-2104, 2010 | 97 | 2010 |
A survey of passive image tampering detection W Wang, J Dong, T Tan Digital Watermarking: 8th International Workshop, IWDW 2009, Guildford, UK …, 2009 | 96 | 2009 |
Non-uniform watermark sharing based on optimal iterative BTC for image tampering recovery C Qin, P Ji, CC Chang, J Dong, X Sun IEEE MultiMedia 25 (3), 36-48, 2018 | 93 | 2018 |
Optimized 3D lighting environment estimation for image forgery detection B Peng, W Wang, J Dong, T Tan IEEE Transactions on Information Forensics and Security 12 (2), 479-494, 2016 | 85 | 2016 |
Effects of watermarking on iris recognition performance J Dong, T Tan 2008 10th International Conference on Control, Automation, Robotics and …, 2008 | 71 | 2008 |
Perceptual image hashing with selective sampling for salient structure features C Qin, X Chen, J Dong, X Zhang Displays 45, 26-37, 2016 | 54 | 2016 |
Feature learning for steganalysis using convolutional neural networks Y Qian, J Dong, W Wang, T Tan Multimedia Tools and Applications 77, 19633-19657, 2018 | 50 | 2018 |
Tampered region localization of digital color images based on jpeg compression noise W Wang, J Dong, T Tan Digital Watermarking: 9th International Workshop, IWDW 2010, Seoul, Korea …, 2011 | 48 | 2011 |
A unified framework for high fidelity face swap and expression reenactment B Peng, H Fan, W Wang, J Dong, S Lyu IEEE Transactions on Circuits and Systems for Video Technology 32 (6), 3673-3684, 2021 | 46 | 2021 |
Exploring adversarial fake images on face manifold D Li, W Wang, H Fan, J Dong Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2021 | 46 | 2021 |
Blind image steganalysis based on run-length histogram analysis J Dong, T Tan 2008 15th IEEE International Conference on Image Processing, 2064-2067, 2008 | 40 | 2008 |