Edge adaptive image steganography based on LSB matching revisited W Luo, F Huang, J Huang IEEE Transactions on information forensics and security 5 (2), 201-214, 2010 | 782 | 2010 |
A survey on image steganography and steganalysis. B Li, J He, J Huang, YQ Shi J. Inf. Hiding Multim. Signal Process. 2 (2), 142-172, 2011 | 643 | 2011 |
A new cost function for spatial image steganography B Li, M Wang, J Huang, X Li 2014 IEEE International conference on image processing (ICIP), 4206-4210, 2014 | 500 | 2014 |
Embedding image watermarks in DC components J Huang, YQ Shi, Y Shi IEEE transactions on circuits and systems for video technology 10 (6), 974-979, 2000 | 491 | 2000 |
Robust detection of region-duplication forgery in digital image W Luo, J Huang, G Qiu 18th International Conference on Pattern Recognition (ICPR'06) 4, 746-749, 2006 | 487 | 2006 |
A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression X Kang, J Huang, YQ Shi, Y Lin IEEE transactions on circuits and systems for video technology 13 (8), 776-786, 2003 | 487 | 2003 |
信息安全综述(Survey of information security) 沈昌祥, 张焕国, 冯登国, 曹珍富, 黄继武 中国科学 E 辑: 信息科学(Science in China Series F: Information Science) 37 …, 2007 | 471* | 2007 |
DCT 域图像水印: 嵌入对策和算法(Watermarking in DCT Domain: Embedding Strategy and Algorithm) 黄继武, 程卫东 Yun Q. Shi 电子学报 (ACTA Electronica Sinica) 28 (4), 57-60, 2000 | 400* | 2000 |
Efficiently self-synchronized audio watermarking for assured audio data transmission S Wu, J Huang, D Huang, YQ Shi IEEE Transactions on Broadcasting 51 (1), 69-76, 2005 | 366 | 2005 |
Digital image splicing detection based on Markov features in DCT and DWT domain Z He, W Lu, W Sun, J Huang Pattern recognition 45 (12), 4292-4299, 2012 | 324 | 2012 |
JPEG error analysis and its applications to digital image forensics W Luo, J Huang, G Qiu IEEE Transactions on Information Forensics and Security 5 (3), 480-491, 2010 | 301 | 2010 |
小波变换域图像水印嵌入对策和算法(An Embedding Strategy and Algorithm for Image Watermarking in DWT Domain) 黄达人, 刘九芬, 黄继武 软件学报(Journal of Software) 13 (7), 1290-1297, 2002 | 282* | 2002 |
A novel method for detecting cropped and recompressed image block W Luo, Z Qu, J Huang, G Qiu 2007 IEEE International Conference on Acoustics, Speech and Signal …, 2007 | 263 | 2007 |
Automatic steganographic distortion learning using a generative adversarial network W Tang, S Tan, B Li, J Huang IEEE Signal Processing Letters 24 (10), 1547-1551, 2017 | 257 | 2017 |
A strategy of clustering modification directions in spatial image steganography B Li, M Wang, X Li, S Tan, J Huang IEEE Transactions on Information Forensics and Security 10 (9), 1905-1917, 2015 | 238 | 2015 |
Enhancing source camera identification performance with a camera reference phase sensor pattern noise X Kang, Y Li, Z Qu, J Huang IEEE Transactions on Information Forensics and Security 7 (2), 393-402, 2011 | 237 | 2011 |
Robust image watermarking based on multiband wavelets and empirical mode decomposition N Bi, Q Sun, D Huang, Z Yang, J Huang IEEE Transactions on Image Processing 16 (8), 1956-1966, 2007 | 231 | 2007 |
Detecting double JPEG compression with the same quantization matrix F Huang, J Huang, YQ Shi IEEE Transactions on Information Forensics and Security 5 (4), 848-856, 2010 | 229 | 2010 |
Adaptive image watermarking scheme based on visual masking J Huang, YQ Shi Electronics letters 34 (8), 748-750, 1998 | 229 | 1998 |
Detecting doubly compressed JPEG images by using mode based first digit features B Li, YQ Shi, J Huang 2008 IEEE 10th Workshop on Multimedia Signal Processing, 730-735, 2008 | 217 | 2008 |