Haodong Li

Orcid: 0000-0003-0532-9481

Affiliations:
  • Shenzhen University, Guangdong Key Laboratory of Intelligent Information Processing and Shenzhen Key Laboratory of Media Security, Shenzhen, China
  • Shenzhen University, Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen, China


According to our database1, Haodong Li authored at least 27 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
ReLoc: A Restoration-Assisted Framework for Robust Image Tampering Localization.
IEEE Trans. Inf. Forensics Secur., 2023

2022
A distortion model-based pre-screening method for document image tampering localization under recapturing attack.
Signal Process., 2022

DS-UNet: A dual streams UNet for refined image forgery localization.
Inf. Sci., 2022

Deep Video Inpainting Localization Using Spatial and Temporal Traces.
Proceedings of the IEEE International Conference on Acoustics, 2022

2021
Image Tampering Localization Using a Dense Fully Convolutional Network.
IEEE Trans. Inf. Forensics Secur., 2021

Detail-enhanced image inpainting based on discrete wavelet transforms.
Signal Process., 2021

Image Tampering Localization Using Unified Two-Stream Features Enhanced with Channel and Spatial Attention.
Proceedings of the Pattern Recognition and Computer Vision - 4th Chinese Conference, 2021

2020
Identification of deep network generated images using disparities in color components.
Signal Process., 2020

Image processing operations identification via convolutional neural network.
Sci. China Inf. Sci., 2020

2019
Localization of Deep Inpainting Using High-Pass Fully Convolutional Network.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019

2018
Improved Audio Steganalytic Feature and Its Applications in Audio Forensics.
ACM Trans. Multim. Comput. Commun. Appl., 2018

Identification of Various Image Operations Using Residual-Based Features.
IEEE Trans. Circuits Syst. Video Technol., 2018

Detection of Deep Network Generated Images Using Disparities in Color Components.
CoRR, 2018

Can Forensic Detectors Identify GAN Generated Images?
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

2017
Image Forgery Localization via Integrating Tampering Possibility Maps.
IEEE Trans. Inf. Forensics Secur., 2017

Localization of Diffusion-Based Inpainting in Digital Images.
IEEE Trans. Inf. Forensics Secur., 2017

Image Processing Operations Identification via Convolutional Neural Network.
CoRR, 2017

Anti-Forensics of Camera Identification and the Triangle Test by Improved Fingerprint-Copy Attack.
CoRR, 2017

Adaptive Audio Steganography Based on Advanced Audio Coding and Syndrome-Trellis Coding.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

Audio Steganalysis with Convolutional Neural Network.
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017

2016
Adaptive Steganalysis Based on Embedding Probabilities of Pixels.
IEEE Trans. Inf. Forensics Secur., 2016

2015
Anti-forensics of double JPEG compression with the same quantization matrix.
Multim. Tools Appl., 2015

Identification of Image Operations Based on Steganalytic Features.
CoRR, 2015

2014
Adaptive steganalysis against WOW embedding algorithm.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

A universal image forensic strategy based on steganalytic model.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

Anti-forensics of JPEG Detectors via Adaptive Quantization Table Replacement.
Proceedings of the 22nd International Conference on Pattern Recognition, 2014

2012
Countering anti-JPEG compression forensics.
Proceedings of the 19th IEEE International Conference on Image Processing, 2012


  Loading...