Search Results - "Huang, Jiwu"

Refine Results
  1. 1

    Multi-Scale Analysis Strategies in PRNU-Based Tampering Localization by Korus, Pawel, Jiwu Huang

    “…Accurate unsupervised tampering localization is one of the most challenging problems in digital image forensics. In this paper, we consider a photo response…”
    Get full text
    Journal Article
  2. 2

    Automatic Steganographic Distortion Learning Using a Generative Adversarial Network by Tang, Weixuan, Tan, Shunquan, Li, Bin, Huang, Jiwu

    Published in IEEE signal processing letters (01-10-2017)
    “…Generative adversarial network has shown to effectively generate artificial samples indiscernible from their real counterparts with a united framework of two…”
    Get full text
    Journal Article
  3. 3

    CNN-Based Adversarial Embedding for Image Steganography by Weixuan Tang, Bin Li, Shunquan Tan, Barni, Mauro, Jiwu Huang

    “…Steganographic schemes are commonly designed in a way to preserve image statistics or steganalytic features. Since most of the state-of-the-art steganalytic…”
    Get full text
    Journal Article
  4. 4

    Large-Scale JPEG Image Steganalysis Using Hybrid Deep-Learning Framework by Zeng, Jishen, Tan, Shunquan, Li, Bin, Huang, Jiwu

    “…Adoption of deep learning in image steganalysis is still in its initial stage. In this paper, we propose a generic hybrid deep-learning framework for JPEG…”
    Get full text
    Journal Article
  5. 5

    Efficient Encrypted Images Filtering and Transform Coding With Walsh-Hadamard Transform and Parallelization by Zheng, Peijia, Huang, Jiwu

    Published in IEEE transactions on image processing (01-05-2018)
    “…Since homomorphic encryption operations have high computational complexity, image applications based on homomorphic encryption are often time consuming, which…”
    Get full text
    Journal Article
  6. 6

    Reversible image watermarking on prediction errors by efficient histogram modification by Wu, Hao-Tian, Huang, Jiwu

    Published in Signal processing (01-12-2012)
    “…A reversible data hiding algorithm is proposed, in which the efficiency of modifying a pair of histogram bins is considered. Multiple pairs of histogram bins…”
    Get full text
    Journal Article
  7. 7

    Histogram-Based Audio Watermarking Against Time-Scale Modification and Cropping Attacks by Shijun Xiang, Shijun Xiang, Jiwu Huang, Jiwu Huang

    Published in IEEE transactions on multimedia (01-11-2007)
    “…In audio watermarking area, the robustness against desynchronization attacks, such as TSM (Time-Scale Modification) and random cropping operations, is still…”
    Get full text
    Journal Article
  8. 8

    Automatic Detection of Object-Based Forgery in Advanced Video by Chen, Shengda, Tan, Shunquan, Li, Bin, Huang, Jiwu

    “…Passive multimedia forensics has become an active topic in recent years. However, less attention has been paid to video forensics. Research on video forensics,…”
    Get full text
    Journal Article
  9. 9

    Reversible Data Hiding in JPEG Images by Huang, Fangjun, Qu, Xiaochao, Kim, Hyoung Joong, Huang, Jiwu

    “…Among various digital image formats used in daily life, the Joint Photographic Experts Group (JPEG) is the most popular. Therefore, reversible data hiding…”
    Get full text
    Journal Article
  10. 10

    New Framework for Reversible Data Hiding in Encrypted Domain by Huang, Fangjun, Huang, Jiwu, Shi, Yun-Qing

    “…In the past more than one decade, hundreds of reversible data hiding (RDH) algorithms have been reported. Via exploring the correlation between the neighboring…”
    Get full text
    Journal Article
  11. 11

    Localization of Diffusion-Based Inpainting in Digital Images by Li, Haodong, Luo, Weiqi, Huang, Jiwu

    “…Image inpainting, an image processing technique for restoring missing or damaged image regions, can be utilized by forgers for removing objects in digital…”
    Get full text
    Journal Article
  12. 12

    A new cost function for spatial image steganography by Bin Li, Ming Wang, Jiwu Huang, Xiaolong Li

    “…A well defined cost function is crucial to steganography under the scenario of minimizing embedding distortion. In this paper, we present a new cost function…”
    Get full text
    Conference Proceeding
  13. 13

    Edge Adaptive Image Steganography Based on LSB Matching Revisited by Luo, Weiqi, Huang, Fangjun, Huang, Jiwu

    “…The least-significant-bit (LSB)-based approach is a popular type of steganographic algorithms in the spatial domain. However, we find that in most existing…”
    Get full text
    Journal Article
  14. 14

    Discrete Wavelet Transform and Data Expansion Reduction in Homomorphic Encrypted Domain by Zheng, Peijia, Huang, Jiwu

    Published in IEEE transactions on image processing (01-06-2013)
    “…Signal processing in the encrypted domain is a new technology with the goal of protecting valuable signals from insecure signal processing. In this paper, we…”
    Get full text
    Journal Article
  15. 15

    A Strategy of Clustering Modification Directions in Spatial Image Steganography by Li, Bin, Wang, Ming, Li, Xiaolong, Tan, Shunquan, Huang, Jiwu

    “…Most of the recently proposed steganographic schemes are based on minimizing an additive distortion function defined as the sum of embedding costs for…”
    Get full text
    Journal Article
  16. 16

    Band Energy Difference for Source Attribution in Audio Forensics by Da Luo, Korus, Pawel, Jiwu Huang

    “…Digital audio recordings are one of the key types of evidence used in law enforcement proceedings. As a result, the development of reliable techniques for…”
    Get full text
    Journal Article
  17. 17

    Digital image splicing detection based on Markov features in DCT and DWT domain by He, Zhongwei, Lu, Wei, Sun, Wei, Huang, Jiwu

    Published in Pattern recognition (01-12-2012)
    “…Image splicing is very common and fundamental in image tampering. To recover people's trust in digital images, the detection of image splicing is in great…”
    Get full text
    Journal Article
  18. 18

    Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach by Chen, Chenglong, Ni, Jiangqun, Huang, Jiwu

    Published in IEEE transactions on image processing (01-12-2013)
    “…Recently, the median filtering (MF) detector as a forensic tool for the recovery of images' processing history has attracted wide interest. This paper presents…”
    Get full text
    Journal Article
  19. 19

    Patchwork-Based Audio Watermarking Robust Against De-Synchronization and Recapturing Attacks by Liu, Zhenghui, Huang, Yuankun, Huang, Jiwu

    “…Watermarking is a solution for copyright protection and forensics tracking, but recapturing and de-synchronization attacks may be used to effectively remove…”
    Get full text
    Journal Article
  20. 20

    Robust Image Watermarking Based on Multiband Wavelets and Empirical Mode Decomposition by Bi, Ning, Sun, Qiyu, Huang, Daren, Yang, Zhihua, Huang, Jiwu

    Published in IEEE transactions on image processing (01-08-2007)
    “…In this paper, we propose a blind image watermarking algorithm based on the multiband wavelet transformation and the empirical mode decomposition. Unlike the…”
    Get full text
    Journal Article