Jiwu Huang

According to our database1, Jiwu Huang authored at least 259 papers between 1998 and 2020.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2016, "For contributions to multimedia data hiding and forensics".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2020
An Embedding Cost Learning Framework Using GAN.
IEEE Trans. Information Forensics and Security, 2020

A Copy-Proof Scheme Based on the Spectral and Spatial Barcoding Channel Models.
IEEE Trans. Information Forensics and Security, 2020

2019
WISERNet: Wider Separate-Then-Reunion Network for Steganalysis of Color Images.
IEEE Trans. Information Forensics and Security, 2019

Detection of Speech Smoothing on Very Short Clips.
IEEE Trans. Information Forensics and Security, 2019

Robust Copy-Move Detection of Speech Recording Using Similarities of Pitch and Formant.
IEEE Trans. Information Forensics and Security, 2019

CNN-Based Adversarial Embedding for Image Steganography.
IEEE Trans. Information Forensics and Security, 2019

Patchwork-Based Audio Watermarking Robust Against De-Synchronization and Recapturing Attacks.
IEEE Trans. Information Forensics and Security, 2019

A Novel High-Capacity Reversible Data Hiding Scheme for Encrypted JPEG Bitstreams.
IEEE Trans. Circuits Syst. Video Techn., 2019

Universal Stego Post-processing for Enhancing Image Steganography.
CoRR, 2019

CALPA-NET: Channel-pruning-assisted Deep Residual Network for Steganalysis of Digital Images.
CoRR, 2019

Enhancing JPEG Steganography using Iterative Adversarial Examples.
CoRR, 2019

A New Spatial Steganographic Scheme by Modeling Image Residuals with Multivariate Gaussian Model.
Proceedings of the IEEE International Conference on Acoustics, 2019

2018
Improved Audio Steganalytic Feature and Its Applications in Audio Forensics.
TOMM, 2018

JPEG Image Encryption With Improved Format Compatibility and File Size Preservation.
IEEE Trans. Multimedia, 2018

Efficient Encrypted Images Filtering and Transform Coding With Walsh-Hadamard Transform and Parallelization.
IEEE Trans. Image Processing, 2018

Large-Scale JPEG Image Steganalysis Using Hybrid Deep-Learning Framework.
IEEE Trans. Information Forensics and Security, 2018

Band Energy Difference for Source Attribution in Audio Forensics.
IEEE Trans. Information Forensics and Security, 2018

Identification of Various Image Operations Using Residual-Based Features.
IEEE Trans. Circuits Syst. Video Techn., 2018

A novel reversible data hiding method with image contrast enhancement.
Sig. Proc.: Image Comm., 2018

Detecting median filtering via two-dimensional AR models of multiple filtered residuals.
Multimedia Tools Appl., 2018

Data-driven multimedia forensics and security.
J. Visual Communication and Image Representation, 2018

Riemannian competitive learning for symmetric positive definite matrices clustering.
Neurocomputing, 2018

Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control.
Future Generation Comp. Syst., 2018

Detection of Deep Network Generated Images Using Disparities in Color Components.
CoRR, 2018

CNN Based Adversarial Embedding with Minimum Alteration for Image Steganography.
CoRR, 2018

An Inception-Based Data-Driven Ensemble Approach to Camera Model Identification.
Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security, 2018

A Controllable Efficient Content Distribution Framework Based on Blockchain and ISODATA.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Privacy-Preserving Multipurpose Watermarking Scheme for Audio Authentication and Protection.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Encrypted Domain Mel-Frequency Cepstral Coefficient and Fragile Audio Watermarking.
Proceedings of the 17th IEEE International Conference On Trust, 2018

VPCID - A VoIP Phone Call Identification Database.
Proceedings of the Digital Forensics and Watermarking - 17th International Workshop, 2018

Edge Detection and Image Segmentation on Encrypted Image with Homomorphic Encryption and Garbled Circuit.
Proceedings of the 2018 IEEE International Conference on Multimedia and Expo, 2018

Ensemble Clustering with Novel Weighting Strategy.
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018

2017
An Efficient Motion Detection and Tracking Scheme for Encrypted Surveillance Videos.
TOMM, 2017

Pixel-Decimation-Assisted Steganalysis of Synchronize-Embedding-Changes Steganography.
IEEE Trans. Information Forensics and Security, 2017

Detection of Double Compressed AMR Audio Using Stacked Autoencoder.
IEEE Trans. Information Forensics and Security, 2017

Image Forgery Localization via Integrating Tampering Possibility Maps.
IEEE Trans. Information Forensics and Security, 2017

Localization of Diffusion-Based Inpainting in Digital Images.
IEEE Trans. Information Forensics and Security, 2017

Multi-Scale Analysis Strategies in PRNU-Based Tampering Localization.
IEEE Trans. Information Forensics and Security, 2017

Data-Driven Feature Characterization Techniques for Laser Printer Attribution.
IEEE Trans. Information Forensics and Security, 2017

Automatic Steganographic Distortion Learning Using a Generative Adversarial Network.
IEEE Signal Process. Lett., 2017

Tamper recovery algorithm for digital speech signal based on DWT and DCT.
Multimedia Tools Appl., 2017

A security watermark scheme used for digital speech forensics.
Multimedia Tools Appl., 2017

VideoSet: A large-scale compressed video quality dataset based on JND measurement.
J. Visual Communication and Image Representation, 2017

Ciphertext policy attribute-based encryption supporting unbounded attribute space from R-LWE.
TIIS, 2017

Anti-Forensics of Camera Identification and the Triangle Test by Improved Fingerprint-Copy Attack.
CoRR, 2017

Pre-training via fitting deep neural network to rich-model features extraction procedure and its effect on deep learning for steganalysis.
Proceedings of the Media Watermarking, Security, and Forensics 2017, Burlingame, CA, USA, 29 January 2017, 2017

Exposing Video Forgeries by Detecting Misaligned Double Compression.
Proceedings of the International Conference on Video and Image Processing, 2017

2016
Identification of Reconstructed Speech.
TOMM, 2016

Multi-Scale Fusion for Improved Localization of Malicious Tampering in Digital Images.
IEEE Trans. Image Processing, 2016

Adaptive Steganalysis Based on Embedding Probabilities of Pixels.
IEEE Trans. Information Forensics and Security, 2016

New Framework for Reversible Data Hiding in Encrypted Domain.
IEEE Trans. Information Forensics and Security, 2016

Reversible Data Hiding in JPEG Images.
IEEE Trans. Circuits Syst. Video Techn., 2016

Automatic Detection of Object-Based Forgery in Advanced Video.
IEEE Trans. Circuits Syst. Video Techn., 2016

Clustering Steganographic Modification Directions for Color Components.
IEEE Signal Process. Lett., 2016

Audio Postprocessing Detection Based on Amplitude Cooccurrence Vector Feature.
IEEE Signal Process. Lett., 2016

Improved Tampering Localization in Digital Image Forensics Based on Maximal Entropy Random Walk.
IEEE Signal Process. Lett., 2016

Robust image watermarking based on Tucker decomposition and Adaptive-Lattice Quantization Index Modulation.
Sig. Proc.: Image Comm., 2016

Authentication and recovery algorithm for speech signal based on digital watermarking.
Signal Processing, 2016

Twenty years of digital audio watermarking - a comprehensive review.
Signal Processing, 2016

Efficient multiparty quantum key agreement protocol based on commutative encryption.
Quantum Information Processing, 2016

Reversible data hiding in Paillier cryptosystem.
J. Visual Communication and Image Representation, 2016

Large-scale JPEG steganalysis using hybrid deep-learning framework.
CoRR, 2016

IEEE Access Special Section Editorial: Latest Advances and Emerging Applications of Data Hiding.
IEEE Access, 2016

Evaluation of random field models in multi-modal unsupervised tampering localization.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016

A secure watermarking technique without loss of robustness.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

An improved spread transform dither modulation for robust and secure watermarking.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

Clustering Symmetric Positive Definite Matrices on the Riemannian Manifolds.
Proceedings of the Computer Vision - ACCV 2016, 2016

2015
Statistical Model of JPEG Noises and Its Application in Quantization Step Estimation.
IEEE Trans. Image Processing, 2015

A Strategy of Clustering Modification Directions in Spatial Image Steganography.
IEEE Trans. Information Forensics and Security, 2015

Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis.
IEEE Trans. Information Forensics and Security, 2015

Anti-forensics of double JPEG compression with the same quantization matrix.
Multimedia Tools Appl., 2015

A reversible data hiding method with contrast enhancement for medical images.
J. Visual Communication and Image Representation, 2015

Secure watermarking scheme against watermark attacks in the encrypted domain.
J. Visual Communication and Image Representation, 2015

Estimating JPEG compression history of bitmaps based on factor histogram.
Digital Signal Processing, 2015

Verification of hidden speaker behind transformation disguised voices.
Digital Signal Processing, 2015

Identification of AMR decompressed audio.
Digital Signal Processing, 2015

Local pixel patterns.
Computational Visual Media, 2015

Identification of Image Operations Based on Steganalytic Features.
CoRR, 2015

Feature Selection for High Dimensional Steganalysis.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

Copy-move detection of audio recording with pitch similarity.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

Audio recapture detection using deep learning.
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015

2014
Identifying Compression History of Wave Audio and Its Applications.
TOMCCAP, 2014

Fast Near-Duplicate Image Detection Using Uniform Randomized Trees.
TOMCCAP, 2014

Identification of Electronic Disguised Voices.
IEEE Trans. Information Forensics and Security, 2014

Investigation on Cost Assignment in Spatial Image Steganography.
IEEE Trans. Information Forensics and Security, 2014

Exposing Fake Bit Rate Videos and Estimating Original Bit Rates.
IEEE Trans. Circuits Syst. Video Techn., 2014

Geometric invariant features in the Radon transform domain for near-duplicate image detection.
Pattern Recognition, 2014

Detecting video frame-rate up-conversion based on periodic properties of inter-frame similarity.
Multimedia Tools Appl., 2014

An improved sample projection approach for image watermarking.
Digital Signal Processing, 2014

JPEG Noises beyond the First Compression Cycle.
CoRR, 2014

A framework for identifying shifted double JPEG compression artifacts with application to non-intrusive digital image forensics.
SCIENCE CHINA Information Sciences, 2014

Adaptive steganalysis against WOW embedding algorithm.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

A universal image forensic strategy based on steganalytic model.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

Anti-forensics of JPEG Detectors via Adaptive Quantization Table Replacement.
Proceedings of the 22nd International Conference on Pattern Recognition, 2014

Improved steganalysis algorithm against motion vector based video steganography.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

A new cost function for spatial image steganography.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

Fast and accurate Nearest Neighbor search in the manifolds of symmetric positive definite matrices.
Proceedings of the IEEE International Conference on Acoustics, 2014

Detecting double compressed AMR audio using deep learning.
Proceedings of the IEEE International Conference on Acoustics, 2014

Detection of double compression with the same bit rate in MPEG-2 videos.
Proceedings of the IEEE China Summit & International Conference on Signal and Information Processing, 2014

2013
Discrete Wavelet Transform and Data Expansion Reduction in Homomorphic Encrypted Domain.
IEEE Trans. Image Processing, 2013

Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach.
IEEE Trans. Image Processing, 2013

Region duplication detection based on Harris corner points and step sector statistics.
J. Visual Communication and Image Representation, 2013

An efficient image homomorphic encryption scheme with small ciphertext expansion.
Proceedings of the ACM Multimedia Conference, 2013

Improved Algorithm of Edge Adaptive Image Steganography Based on LSB Matching Revisited Algorithm.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Distortion function designing for JPEG steganography with uncompressed side-image.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

Mixed-strategy Nash equilibrium in the camera source identification game.
Proceedings of the IEEE International Conference on Image Processing, 2013

Exposing fake bitrate video and its original bitrate.
Proceedings of the IEEE International Conference on Image Processing, 2013

Blind detection of electronic disguised voice.
Proceedings of the IEEE International Conference on Acoustics, 2013

Forensic sensor pattern noise extraction from large image data set.
Proceedings of the IEEE International Conference on Acoustics, 2013

2012
Exposing MP3 audio forgeries using frame offsets.
TOMCCAP, 2012

Reference index-based H.264 video watermarking scheme.
TOMCCAP, 2012

Near-Duplicate Image Detection in a Visually Salient Riemannian Space.
IEEE Trans. Information Forensics and Security, 2012

An Informed Watermarking Scheme Using Hidden Markov Model in the Wavelet Domain.
IEEE Trans. Information Forensics and Security, 2012

Enhancing Source Camera Identification Performance With a Camera Reference Phase Sensor Pattern Noise.
IEEE Trans. Information Forensics and Security, 2012

New Channel Selection Rule for JPEG Steganography.
IEEE Trans. Information Forensics and Security, 2012

Controllable Secure Watermarking Technique for Tradeoff Between Robustness and Security.
IEEE Trans. Information Forensics and Security, 2012

Video Sequence Matching Based on the Invariance of Color Correlation.
IEEE Trans. Circuits Syst. Video Techn., 2012

Reversible image watermarking on prediction errors by efficient histogram modification.
Signal Processing, 2012

Digital image splicing detection based on Markov features in DCT and DWT domain.
Pattern Recognition, 2012

Perceptual video hashing robust against geometric distortions.
SCIENCE CHINA Information Sciences, 2012

Blind Detection of Electronic Voice Transformation with Natural Disguise.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

Walsh-Hadamard Transform in the Homomorphic Encrypted Domain and Its Application in Image Watermarking.
Proceedings of the Information Hiding - 14th International Conference, 2012

Blind Median Filtering Detection Using Statistics in Difference Domain.
Proceedings of the Information Hiding - 14th International Conference, 2012

Countering anti-JPEG compression forensics.
Proceedings of the 19th IEEE International Conference on Image Processing, 2012

Efficient coarse-to-fine near-duplicate image detection in riemannian manifold.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

Compression history identification for digital audio signal.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

Identifying Shifted Double JPEG Compression Artifacts for Non-intrusive Digital Image Forensics.
Proceedings of the Computational Visual Media - First International Conference, 2012

2011
Geometric Invariant Audio Watermarking Based on an LCM Feature.
IEEE Trans. Multimedia, 2011

Security Analysis on Spatial ± 1 Steganography for JPEG Decompressed Images.
IEEE Signal Process. Lett., 2011

Robust image hash in Radon transform domain for authentication.
Sig. Proc.: Image Comm., 2011

Random Gray code and its performance analysis for image hashing.
Signal Processing, 2011

A more secure steganography based on adaptive pixel-value differencing scheme.
Multimedia Tools Appl., 2011

Minority codes with improved embedding efficiency for large payloads.
Multimedia Tools Appl., 2011

Steganalysis of JPEG steganography with complementary embedding strategy.
IET Information Security, 2011

Implementation of the discrete wavelet transform and multiresolution analysis in the encrypted domain.
Proceedings of the 19th International Conference on Multimedia 2011, Scottsdale, AZ, USA, November 28, 2011

Double H.264/AVC compression detection using quantized nonzero AC coefficients.
Proceedings of the Media Forensics and Security III, 2011

Enhancing ROC performance of trustworthy camera source identification.
Proceedings of the Media Forensics and Security III, 2011

Three Novel Algorithms for Hiding Data in PDF Files Based on Incremental Updates.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

Salient covariance for near-duplicate image and video detection.
Proceedings of the 18th IEEE International Conference on Image Processing, 2011

Secure JPEG steganography by LSB+ matching and multi-band embedding.
Proceedings of the 18th IEEE International Conference on Image Processing, 2011

2010
Image Steganalysis.
Proceedings of the Intelligent Multimedia Analysis for Security Applications, 2010

Fragility analysis of adaptive quantization-based image hashing.
IEEE Trans. Information Forensics and Security, 2010

Detection of Quantization Artifacts and Its Applications to Transform Encoder Identification.
IEEE Trans. Information Forensics and Security, 2010

JPEG error analysis and its applications to digital image forensics.
IEEE Trans. Information Forensics and Security, 2010

Edge adaptive image steganography based on LSB matching revisited.
IEEE Trans. Information Forensics and Security, 2010

Efficient general print-scanning resilient data hiding based on uniform log-polar mapping.
IEEE Trans. Information Forensics and Security, 2010

Detecting Double JPEG Compression With the Same Quantization Matrix.
IEEE Trans. Information Forensics and Security, 2010

An experimental study on the security performance of YASS.
IEEE Trans. Information Forensics and Security, 2010

Audio Watermarking Scheme Robust against Desynchronization Based on the Dyadic Wavelet Transform.
EURASIP J. Adv. Sig. Proc., 2010

Semi-Fragile Zernike Moment-Based Image Watermarking for Authentication.
EURASIP J. Adv. Sig. Proc., 2010

Robust AVS audio watermarking.
SCIENCE CHINA Information Sciences, 2010

Detecting double compression of audio signal.
Proceedings of the Media Forensics and Security II, 2010

Discriminating Computer Graphics Images and Natural Images Using Hidden Markov Tree Model.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010

New JPEG Steganographic Scheme with High Security Performance.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010

Security Analysis of ISS Watermarking Using Natural Scene Statistics.
Proceedings of the Information Hiding - 12th International Conference, 2010

A New Spread Spectrum Watermarking Scheme to Achieve a Trade-Off between Security and Robustness.
Proceedings of the Information Hiding - 12th International Conference, 2010

Provably Secure Spread-Spectrum Watermarking Schemes in the Known Message Attack Framework.
Proceedings of the Information Hiding - 12th International Conference, 2010

A geometrically resilient robust image watermarking scheme using deformable multi-scale transform.
Proceedings of the International Conference on Image Processing, 2010

An image copy detection scheme based on radon transform.
Proceedings of the International Conference on Image Processing, 2010

2009
A study on the randomness measure of image hashing.
IEEE Trans. Information Forensics and Security, 2009

Steganalysis of YASS.
IEEE Trans. Information Forensics and Security, 2009

Discriminating between photorealistic computer graphics and natural images using fractal geometry.
Science in China Series F: Information Sciences, 2009

Non-ambiguity of blind watermarking: a revisit with analytical resolution.
Science in China Series F: Information Sciences, 2009

Calibration based universal JPEG steganalysis.
Science in China Series F: Information Sciences, 2009

Defeating fake-quality MP3.
Proceedings of the Multimedia and Security Workshop, 2009

Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009

Detect Digital Image Splicing with Visual Cues.
Proceedings of the Information Hiding, 11th International Workshop, 2009

Content-based authentication algorithm for binary images.
Proceedings of the International Conference on Image Processing, 2009

2008
Improving Robustness of Quantization-Based Image Watermarking via Adaptive Receiver.
IEEE Trans. Multimedia, 2008

Invariant Image Watermarking Based on Statistical Features in the Low-Frequency Domain.
IEEE Trans. Circuits Syst. Video Techn., 2008

Steganalysis of Multiple-Base Notational System Steganography.
IEEE Signal Process. Lett., 2008

Audio watermarking robust against time-scale modification and MP3 compression.
Signal Processing, 2008

A Multi-band Wavelet Watermarking Scheme.
I. J. Network Security, 2008

A note on the Ate pairing.
Int. J. Inf. Sec., 2008

All Pairings Are in a Group.
IEICE Transactions, 2008

Efficient Tate pairing computation using double-base chains.
Science in China Series F: Information Sciences, 2008

MPEG recompression detection based on block artifacts.
Proceedings of the Security, 2008

Textural features based universal steganalysis.
Proceedings of the Security, 2008

Detecting doubly compressed JPEG images by using Mode Based First Digit Features.
Proceedings of the International Workshop on Multimedia Signal Processing, 2008

Detecting digital audio forgeries by checking frame offsets.
Proceedings of the 10th workshop on Multimedia & Security, 2008

GSM Based Security Analysis for Add-SS Watermarking.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

Robust Audio Watermarking Based on Log-Polar Frequency Index.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

A Novel Method for Block Size Forensics Based on Morphological Operations.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

A Robust Watermarking Scheme for H.264.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

Watermarking Security Incorporating Natural Scene Statistics.
Proceedings of the Information Hiding, 10th International Workshop, 2008

An efficient print-scanning resilient data hiding scheme based on a novel LPM.
Proceedings of the International Conference on Image Processing, 2008

A study on security performance of YASS.
Proceedings of the International Conference on Image Processing, 2008

Universal JPEG steganalysis based on microscopic and macroscopic calibration.
Proceedings of the International Conference on Image Processing, 2008

A convolutive mixing model for shifted double JPEG compression with application to passive image authentication.
Proceedings of the IEEE International Conference on Acoustics, 2008

2007
Histogram-Based Audio Watermarking Against Time-Scale Modification and Cropping Attacks.
IEEE Trans. Multimedia, 2007

Robust Image Watermarking Based on Multiband Wavelets and Empirical Mode Decomposition.
IEEE Trans. Image Processing, 2007

A survey of passive technology for digital image forensics.
Frontiers Comput. Sci. China, 2007

Robust Audio Watermarking Against the D/A and A/D conversions
CoRR, 2007

Survey of information security.
Science in China Series F: Information Sciences, 2007

Audio watermarking robust to geometrical distortions based on dyadic wavelet transform.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Fast and automatic watermark resynchronization based on zernike moments.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Histogram-based image hashing scheme robust against geometric deformations.
Proceedings of the 9th workshop on Multimedia & Security, 2007

Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

Robust and High Capacity Image Watermarking Based on Jointly Coding and Embedding Optimization.
Proceedings of the Information Hiding, 9th International Workshop, 2007

Binary Image Authentication using Zernike Moments.
Proceedings of the International Conference on Image Processing, 2007

Steganalysis of LSB Greedy Embedding Algorithm for JPEG Images using Coefficient Symmetry.
Proceedings of the International Conference on Image Processing, 2007

Attack LSB Matching Steganography by Counting Alteration Rate of the Number of Neighbourhood Gray Levels.
Proceedings of the International Conference on Image Processing, 2007

A GA-Based Joint Coding and Embedding Optimization for Robust and High Capacity Image Watermarking.
Proceedings of the IEEE International Conference on Acoustics, 2007

A Novel Method for Detecting Cropped and Recompressed Image Block.
Proceedings of the IEEE International Conference on Acoustics, 2007

2006
An algorithm for removable visible watermarking.
IEEE Trans. Circuits Syst. Video Techn., 2006

Analysis of Quantization-based Audio Watermarking to D/A and A/D Conversions.
I. J. Network Security, 2006

Speeding up the Bilinear Pairings Computation on Curves with Automorphisms.
IACR Cryptology ePrint Archive, 2006

Steganalysis of stochastic modulation steganography.
Science in China Series F: Information Sciences, 2006

Achieving non-ambiguity of quantization-based watermarking.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

A Watermarking Algorithm for JPEG File.
Proceedings of the Advances in Multimedia Information Processing, 2006

Robust Audio Watermarking Based on Low-Order Zernike Moments.
Proceedings of the Digital Watermarking, 5th International Workshop, 2006

A Rotation-Invariant Secure Image Watermarking Algorithm Incorporating Steerable Pyramid Transform.
Proceedings of the Digital Watermarking, 5th International Workshop, 2006

Time-Scale Invariant Audio Watermarking Based on the Statistical Features in Time Domain.
Proceedings of the Information Hiding, 8th International Workshop, 2006

Near-Duplicate Image Recognition and Content-based Image Retrieval using Adaptive Hierarchical Geometric Centroids.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

Robust Detection of Region-Duplication Forgery in Digital Image.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

Steganalysis of JPEG2000 Lazy-Mode Steganography using the Hilbert-Huang Transform Based Sequential Analysis.
Proceedings of the International Conference on Image Processing, 2006

Performance Enhancement for DWT-HMM Image Watermarking with Content-Adaptive Approach.
Proceedings of the International Conference on Image Processing, 2006

A Hybrid Watermarking Scheme for Video Authentication.
Proceedings of the International Conference on Image Processing, 2006

2005
Efficiently self-synchronized audio watermarking for assured audio data transmission.
TBC, 2005

Dwt-Based Video Data Hiding Robust To Mpeg Compression And Frame Loss.
Int. J. Image Graphics, 2005

Watermarking Parameters Feasible Region Model.
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005

Analysis of Quantization-Based Audio Watermarking in DA/AD Conversions.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Semi-fragile Watermarking Based on Zernike Moments and Integer Wavelet Transform.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

A RST-Invariant Robust DWT-HMM Watermarking Algorithm Incorporating Zernike Moments and Template.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

A Robust Multi-bit Image Watermarking Algorithm Based on HMM in Wavelet Domain.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

Multi-band Wavelet Based Digital Watermarking Using Principal Component Analysis.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

Performance Analysis of CDMA-Based Watermarking with Quantization Scheme.
Proceedings of the Information Security Practice and Experience, 2005

Image authentication using content based watermark.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

The M-band wavelets in image watermarking.
Proceedings of the 2005 International Conference on Image Processing, 2005

Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform.
Proceedings of the Digital Rights Management: Technologies, 2005

A MPEG-2 Video Watermarking Algorithm with Compensation in Bit Stream.
Proceedings of the Digital Rights Management: Technologies, 2005

Reversible Data Hiding for Image Based on Histogram Modification of Wavelet Coefficients.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

Revaluation of Error Correcting Coding in Watermarking Channel.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

A Secure Semi-Fragile Watermarking for Image Authentication Based on Integer Wavelet Transform with Parameters Abstract.
Proceedings of the ACSW Frontiers 2005, 2005 ACSW Workshops, 2005

2004
Self-synchronized audio watermark in DWT domain.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004

Using invisible watermarks to protect visibly watermarked images.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004

CDMA-based watermarking resisting to cropping.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004

Improve robustness of image watermarking via adaptive receiving.
Proceedings of the 2004 International Conference on Image Processing, 2004

Improve security of fragile watermarking via parameterized wavelet.
Proceedings of the 2004 International Conference on Image Processing, 2004

Provably Secure and ID-Based Group Signature Scheme.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression.
IEEE Trans. Circuits Syst. Video Techn., 2003

Robust Watermarking with Adaptive Receiving.
Proceedings of the Digital Watermarking, Second International Workshop, 2003

Image Fusion Based Visible Watermarking Using Dual-Tree Complex Wavelet Transform.
Proceedings of the Digital Watermarking, Second International Workshop, 2003

2-D and 3-D successive packing interleaving techniques and their applications to image and video data hiding.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

A high capacity distortion-free data hiding algorithm for palette image.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

Analysis of the role played by error correcting coding in robust watermarking.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

Image watermarking algorithm applying CDMA.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

Analysis of the Bounds for Linear Block Codes in Watermark Channel.
Proceedings of the Information Security and Cryptology, 2003

An Efficient Revocation Algorithm in Group Signatures.
Proceedings of the Information Security and Cryptology, 2003

2002
Reliable information bit hiding.
IEEE Trans. Circuits Syst. Video Techn., 2002

An Image Watermarking Algorithm Robust to Geometric Distortion.
Proceedings of the Digital Watermarking, First International Workshop, 2002

A DWT-Based Fragile Watermarking Tolerant of JPEG Compression.
Proceedings of the Digital Watermarking, First International Workshop, 2002

2001
Embedding gray level images.
Proceedings of the 2001 International Symposium on Circuits and Systems, 2001

An Adaptive Video Watermarking Algorithm.
Proceedings of the 2001 IEEE International Conference on Multimedia and Expo, 2001

A Dwt-Based Image Watermarking Algorithm.
Proceedings of the 2001 IEEE International Conference on Multimedia and Expo, 2001

2000
Embedding image watermarks in dc components.
IEEE Trans. Circuits Syst. Video Techn., 2000

1998
Power constrained multiple signaling in digital image watermarking.
Proceedings of the Second IEEE Workshop on Multimedia Signal Processing, 1998


  Loading...