关注
Weiqi Luo
Weiqi Luo
School of Software, Sun Yat-Sen Univ. Guangzhou, P.R. China
在 mail.sysu.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Edge adaptive image steganography based on LSB matching revisited
W Luo, F Huang, J Huang
IEEE Transactions on information forensics and security 5 (2), 201-214, 2010
8652010
Robust detection of region-duplication forgery in digital image
W Luo, J Huang, G Qiu
18th International Conference on Pattern Recognition (ICPR'06) 4, 746-749, 2006
5422006
JPEG error analysis and its applications to digital image forensics
W Luo, J Huang, G Qiu
IEEE Transactions on Information Forensics and Security 5 (3), 480-491, 2010
3302010
A novel method for detecting cropped and recompressed image block
W Luo, Z Qu, J Huang, G Qiu
2007 IEEE International Conference on Acoustics, Speech and Signal …, 2007
2802007
Fake faces identification via convolutional neural network
H Mo, B Chen, W Luo
Proceedings of the 6th ACM workshop on information hiding and multimedia …, 2018
1962018
Identification of various image operations using residual-based features
H Li, W Luo, X Qiu, J Huang
IEEE Transactions on Circuits and Systems for Video Technology 28 (1), 31-45, 2016
1722016
A survey of passive technology for digital image forensics
W Luo, Z Qu, F Pan, J Huang
Frontiers of Computer Science in China 1, 166-179, 2007
1582007
Localization of diffusion-based inpainting in digital images
H Li, W Luo, J Huang
IEEE transactions on information forensics and security 12 (12), 3050-3064, 2017
1532017
Adaptive steganalysis against WOW embedding algorithm
W Tang, H Li, W Luo, J Huang
Proceedings of the 2nd ACM workshop on Information hiding and multimedia …, 2014
1342014
Image forgery localization via integrating tampering possibility maps
H Li, W Luo, X Qiu, J Huang
IEEE Transactions on Information Forensics and Security 12 (5), 1240-1252, 2017
1172017
A more secure steganography based on adaptive pixel-value differencing scheme
W Luo, F Huang, J Huang
Multimedia tools and applications 52, 407-430, 2011
1122011
A universal image forensic strategy based on steganalytic model
X Qiu, H Li, W Luo, J Huang
Proceedings of the 2nd ACM workshop on Information hiding and multimedia …, 2014
1092014
Adaptive steganalysis based on embedding probabilities of pixels
W Tang, H Li, W Luo, J Huang
IEEE Transactions on Information Forensics and Security 11 (4), 734-745, 2015
1072015
A convolutive mixing model for shifted double JPEG compression with application to passive image authentication
Z Qu, W Luo, J Huang
2008 IEEE International Conference on Acoustics, Speech and Signal …, 2008
882008
MPEG recompression detection based on block artifacts
W Luo, M Wu, J Huang
Security, forensics, steganography, and watermarking of multimedia contents …, 2008
832008
Fast and effective global covariance pooling network for image steganalysis
X Deng, B Chen, W Luo, D Luo
Proceedings of the ACM workshop on information hiding and multimedia …, 2019
752019
Audio steganography based on iterative adversarial attacks against convolutional neural networks
J Wu, B Chen, W Luo, Y Fang
IEEE transactions on information forensics and security 15, 2282-2294, 2020
662020
鲁棒的区域复制图像篡改检测技术
骆伟祺, 黄继武, 丘国平
计算机学报 30 (011), 1998-2007, 2007
662007
A novel high-capacity reversible data hiding scheme for encrypted JPEG bitstreams
J He, J Chen, W Luo, S Tang, J Huang
IEEE Transactions on Circuits and Systems for Video Technology 29 (12), 3501 …, 2018
572018
Video Sequence Matching Based on the Invariance of Color Correlation
Y Lei, W Luo, Y Wang, J Huang
IEEE Trans. on CSVT, 2012
552012
系统目前无法执行此操作,请稍后再试。
文章 1–20