Follow
Jiwu Huang
Jiwu Huang
Verified email at szu.edu.cn
Title
Cited by
Cited by
Year
Edge adaptive image steganography based on LSB matching revisited
W Luo, F Huang, J Huang
IEEE Transactions on information forensics and security 5 (2), 201-214, 2010
7822010
A survey on image steganography and steganalysis.
B Li, J He, J Huang, YQ Shi
J. Inf. Hiding Multim. Signal Process. 2 (2), 142-172, 2011
6432011
A new cost function for spatial image steganography
B Li, M Wang, J Huang, X Li
2014 IEEE International conference on image processing (ICIP), 4206-4210, 2014
5002014
Embedding image watermarks in DC components
J Huang, YQ Shi, Y Shi
IEEE transactions on circuits and systems for video technology 10 (6), 974-979, 2000
4912000
Robust detection of region-duplication forgery in digital image
W Luo, J Huang, G Qiu
18th International Conference on Pattern Recognition (ICPR'06) 4, 746-749, 2006
4872006
A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression
X Kang, J Huang, YQ Shi, Y Lin
IEEE transactions on circuits and systems for video technology 13 (8), 776-786, 2003
4872003
信息安全综述(Survey of information security)
沈昌祥, 张焕国, 冯登国, 曹珍富, 黄继武
中国科学 E 辑: 信息科学(Science in China Series F: Information Science) 37 …, 2007
471*2007
DCT 域图像水印: 嵌入对策和算法(Watermarking in DCT Domain: Embedding Strategy and Algorithm)
黄继武, 程卫东 Yun Q. Shi
电子学报 (ACTA Electronica Sinica) 28 (4), 57-60, 2000
400*2000
Efficiently self-synchronized audio watermarking for assured audio data transmission
S Wu, J Huang, D Huang, YQ Shi
IEEE Transactions on Broadcasting 51 (1), 69-76, 2005
3662005
Digital image splicing detection based on Markov features in DCT and DWT domain
Z He, W Lu, W Sun, J Huang
Pattern recognition 45 (12), 4292-4299, 2012
3242012
JPEG error analysis and its applications to digital image forensics
W Luo, J Huang, G Qiu
IEEE Transactions on Information Forensics and Security 5 (3), 480-491, 2010
3012010
小波变换域图像水印嵌入对策和算法(An Embedding Strategy and Algorithm for Image Watermarking in DWT Domain)
黄达人, 刘九芬, 黄继武
软件学报(Journal of Software) 13 (7), 1290-1297, 2002
282*2002
A novel method for detecting cropped and recompressed image block
W Luo, Z Qu, J Huang, G Qiu
2007 IEEE International Conference on Acoustics, Speech and Signal …, 2007
2632007
Automatic steganographic distortion learning using a generative adversarial network
W Tang, S Tan, B Li, J Huang
IEEE Signal Processing Letters 24 (10), 1547-1551, 2017
2572017
A strategy of clustering modification directions in spatial image steganography
B Li, M Wang, X Li, S Tan, J Huang
IEEE Transactions on Information Forensics and Security 10 (9), 1905-1917, 2015
2382015
Enhancing source camera identification performance with a camera reference phase sensor pattern noise
X Kang, Y Li, Z Qu, J Huang
IEEE Transactions on Information Forensics and Security 7 (2), 393-402, 2011
2372011
Robust image watermarking based on multiband wavelets and empirical mode decomposition
N Bi, Q Sun, D Huang, Z Yang, J Huang
IEEE Transactions on Image Processing 16 (8), 1956-1966, 2007
2312007
Detecting double JPEG compression with the same quantization matrix
F Huang, J Huang, YQ Shi
IEEE Transactions on Information Forensics and Security 5 (4), 848-856, 2010
2292010
Adaptive image watermarking scheme based on visual masking
J Huang, YQ Shi
Electronics letters 34 (8), 748-750, 1998
2291998
Detecting doubly compressed JPEG images by using mode based first digit features
B Li, YQ Shi, J Huang
2008 IEEE 10th Workshop on Multimedia Signal Processing, 730-735, 2008
2172008
The system can't perform the operation now. Try again later.
Articles 1–20