Search Results - "Jiwu Huang"
-
1
Multi-Scale Analysis Strategies in PRNU-Based Tampering Localization
Published in IEEE transactions on information forensics and security (01-04-2017)“…Accurate unsupervised tampering localization is one of the most challenging problems in digital image forensics. In this paper, we consider a photo response…”
Get full text
Journal Article -
2
Automatic Steganographic Distortion Learning Using a Generative Adversarial Network
Published in IEEE signal processing letters (01-10-2017)“…Generative adversarial network has shown to effectively generate artificial samples indiscernible from their real counterparts with a united framework of two…”
Get full text
Journal Article -
3
CNN-Based Adversarial Embedding for Image Steganography
Published in IEEE transactions on information forensics and security (01-08-2019)“…Steganographic schemes are commonly designed in a way to preserve image statistics or steganalytic features. Since most of the state-of-the-art steganalytic…”
Get full text
Journal Article -
4
Large-Scale JPEG Image Steganalysis Using Hybrid Deep-Learning Framework
Published in IEEE transactions on information forensics and security (01-05-2018)“…Adoption of deep learning in image steganalysis is still in its initial stage. In this paper, we propose a generic hybrid deep-learning framework for JPEG…”
Get full text
Journal Article -
5
Efficient Encrypted Images Filtering and Transform Coding With Walsh-Hadamard Transform and Parallelization
Published in IEEE transactions on image processing (01-05-2018)“…Since homomorphic encryption operations have high computational complexity, image applications based on homomorphic encryption are often time consuming, which…”
Get full text
Journal Article -
6
Reversible image watermarking on prediction errors by efficient histogram modification
Published in Signal processing (01-12-2012)“…A reversible data hiding algorithm is proposed, in which the efficiency of modifying a pair of histogram bins is considered. Multiple pairs of histogram bins…”
Get full text
Journal Article -
7
Histogram-Based Audio Watermarking Against Time-Scale Modification and Cropping Attacks
Published in IEEE transactions on multimedia (01-11-2007)“…In audio watermarking area, the robustness against desynchronization attacks, such as TSM (Time-Scale Modification) and random cropping operations, is still…”
Get full text
Journal Article -
8
Automatic Detection of Object-Based Forgery in Advanced Video
Published in IEEE transactions on circuits and systems for video technology (01-11-2016)“…Passive multimedia forensics has become an active topic in recent years. However, less attention has been paid to video forensics. Research on video forensics,…”
Get full text
Journal Article -
9
Reversible Data Hiding in JPEG Images
Published in IEEE transactions on circuits and systems for video technology (01-09-2016)“…Among various digital image formats used in daily life, the Joint Photographic Experts Group (JPEG) is the most popular. Therefore, reversible data hiding…”
Get full text
Journal Article -
10
New Framework for Reversible Data Hiding in Encrypted Domain
Published in IEEE transactions on information forensics and security (01-12-2016)“…In the past more than one decade, hundreds of reversible data hiding (RDH) algorithms have been reported. Via exploring the correlation between the neighboring…”
Get full text
Journal Article -
11
Localization of Diffusion-Based Inpainting in Digital Images
Published in IEEE transactions on information forensics and security (01-12-2017)“…Image inpainting, an image processing technique for restoring missing or damaged image regions, can be utilized by forgers for removing objects in digital…”
Get full text
Journal Article -
12
A new cost function for spatial image steganography
Published in 2014 IEEE International Conference on Image Processing (ICIP) (01-10-2014)“…A well defined cost function is crucial to steganography under the scenario of minimizing embedding distortion. In this paper, we present a new cost function…”
Get full text
Conference Proceeding -
13
Edge Adaptive Image Steganography Based on LSB Matching Revisited
Published in IEEE transactions on information forensics and security (01-06-2010)“…The least-significant-bit (LSB)-based approach is a popular type of steganographic algorithms in the spatial domain. However, we find that in most existing…”
Get full text
Journal Article -
14
Discrete Wavelet Transform and Data Expansion Reduction in Homomorphic Encrypted Domain
Published in IEEE transactions on image processing (01-06-2013)“…Signal processing in the encrypted domain is a new technology with the goal of protecting valuable signals from insecure signal processing. In this paper, we…”
Get full text
Journal Article -
15
A Strategy of Clustering Modification Directions in Spatial Image Steganography
Published in IEEE transactions on information forensics and security (01-09-2015)“…Most of the recently proposed steganographic schemes are based on minimizing an additive distortion function defined as the sum of embedding costs for…”
Get full text
Journal Article -
16
Band Energy Difference for Source Attribution in Audio Forensics
Published in IEEE transactions on information forensics and security (01-09-2018)“…Digital audio recordings are one of the key types of evidence used in law enforcement proceedings. As a result, the development of reliable techniques for…”
Get full text
Journal Article -
17
Digital image splicing detection based on Markov features in DCT and DWT domain
Published in Pattern recognition (01-12-2012)“…Image splicing is very common and fundamental in image tampering. To recover people's trust in digital images, the detection of image splicing is in great…”
Get full text
Journal Article -
18
Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach
Published in IEEE transactions on image processing (01-12-2013)“…Recently, the median filtering (MF) detector as a forensic tool for the recovery of images' processing history has attracted wide interest. This paper presents…”
Get full text
Journal Article -
19
Patchwork-Based Audio Watermarking Robust Against De-Synchronization and Recapturing Attacks
Published in IEEE transactions on information forensics and security (01-05-2019)“…Watermarking is a solution for copyright protection and forensics tracking, but recapturing and de-synchronization attacks may be used to effectively remove…”
Get full text
Journal Article -
20
Robust Image Watermarking Based on Multiband Wavelets and Empirical Mode Decomposition
Published in IEEE transactions on image processing (01-08-2007)“…In this paper, we propose a blind image watermarking algorithm based on the multiband wavelet transformation and the empirical mode decomposition. Unlike the…”
Get full text
Journal Article