Follow
Jiwu Huang
Jiwu Huang
Verified email at szu.edu.cn
Title
Cited by
Cited by
Year
Edge adaptive image steganography based on LSB matching revisited
W Luo, F Huang, J Huang
IEEE Transactions on information forensics and security 5 (2), 201-214, 2010
8742010
A new cost function for spatial image steganography
B Li, M Wang, J Huang, X Li
2014 IEEE International conference on image processing (ICIP), 4206-4210, 2014
6712014
Robust detection of region-duplication forgery in digital image
W Luo, J Huang, G Qiu
18th International Conference on Pattern Recognition (ICPR'06) 4, 746-749, 2006
5442006
A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression
X Kang, J Huang, YQ Shi, Y Lin
IEEE transactions on circuits and systems for video technology 13 (8), 776-786, 2003
5102003
Embedding image watermarks in DC components
J Huang, YQ Shi, Y Shi
IEEE transactions on circuits and systems for video technology 10 (6), 974-979, 2000
4942000
信息安全综述(Survey of information security)
沈昌祥, 张焕国, 冯登国, 曹珍富, 黄继武
中国科学 E 辑: 信息科学(Science in China Series F: Information Science) 37 …, 2007
488*2007
DCT 域图像水印: 嵌入对策和算法(Watermarking in DCT Domain: Embedding Strategy and Algorithm)
黄继武, 程卫东 Yun Q. Shi
电子学报 (ACTA Electronica Sinica) 28 (4), 57-60, 2000
394*2000
Automatic steganographic distortion learning using a generative adversarial network
W Tang, S Tan, B Li, J Huang
IEEE Signal Processing Letters 24 (10), 1547-1551, 2017
3862017
Efficiently self-synchronized audio watermarking for assured audio data transmission
S Wu, J Huang, D Huang, YQ Shi
IEEE Transactions on Broadcasting 51 (1), 69-76, 2005
3822005
Digital image splicing detection based on Markov features in DCT and DWT domain
Z He, W Lu, W Sun, J Huang
Pattern recognition 45 (12), 4292-4299, 2012
3812012
JPEG error analysis and its applications to digital image forensics
W Luo, J Huang, G Qiu
IEEE Transactions on Information Forensics and Security 5 (3), 480-491, 2010
3322010
CNN-based adversarial embedding for image steganography
W Tang, B Li, S Tan, M Barni, J Huang
IEEE Transactions on Information Forensics and Security 14 (8), 2074-2087, 2019
2952019
Identification of deep network generated images using disparities in color components
H Li, B Li, S Tan, J Huang
Signal Processing 174, 107616, 2020
2922020
A novel method for detecting cropped and recompressed image block
W Luo, Z Qu, J Huang, G Qiu
2007 IEEE International Conference on Acoustics, Speech and Signal …, 2007
2822007
小波变换域图像水印嵌入对策和算法(An Embedding Strategy and Algorithm for Image Watermarking in DWT Domain)
黄达人, 刘九芬, 黄继武
软件学报(Journal of Software) 13 (7), 1290-1297, 2002
281*2002
A strategy of clustering modification directions in spatial image steganography
B Li, M Wang, X Li, S Tan, J Huang
IEEE Transactions on Information Forensics and Security 10 (9), 1905-1917, 2015
2772015
Enhancing source camera identification performance with a camera reference phase sensor pattern noise
X Kang, Y Li, Z Qu, J Huang
IEEE Transactions on Information Forensics and Security 7 (2), 393-402, 2011
2612011
Robust image watermarking based on multiband wavelets and empirical mode decomposition
N Bi, Q Sun, D Huang, Z Yang, J Huang
IEEE Transactions on Image Processing 16 (8), 1956-1966, 2007
2612007
Large-scale JPEG image steganalysis using hybrid deep-learning framework
J Zeng, S Tan, B Li, J Huang
IEEE Transactions on Information Forensics and Security 13 (5), 1200-1214, 2017
2572017
New framework for reversible data hiding in encrypted domain
F Huang, J Huang, YQ Shi
IEEE transactions on information forensics and security 11 (12), 2777-2789, 2016
2542016
The system can't perform the operation now. Try again later.
Articles 1–20