Search Results - "Ni, Jiangqun"

Refine Results
  1. 1

    Deep Learning Hierarchical Representations for Image Steganalysis by Ye, Jian, Ni, Jiangqun, Yi, Yang

    “…Nowadays, the prevailing detectors of steganographic communication in digital images mainly consist of three steps, i.e., residual computation, feature…”
    Get full text
    Journal Article
  2. 2

    Multiple Histograms-Based Reversible Data Hiding: Framework and Realization by Wang, Junxiang, Chen, Xin, Ni, Jiangqun, Mao, Ningxiong, Shi, Yunqing

    “…Reversible data hiding (RDH) has unique advantage in copyright and integrity protection for multimedia contents. As a typical RDH scheme, histogram shifting…”
    Get full text
    Journal Article
  3. 3

    Uniform Embedding for Efficient JPEG Steganography by Guo, Linjie, Ni, Jiangqun, Shi, Yun Qing

    “…Steganography is the science and art of covert communication, which aims to hide the secret messages into a cover medium while achieving the least possible…”
    Get full text
    Journal Article
  4. 4

    Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited by Guo, Linjie, Ni, Jiangqun, Su, Wenkang, Tang, Chengpei, Shi, Yun-Qing

    “…Uniform embedding was first introduced in 2012 for non-side-informed JPEG steganography, and then extended to the side-informed JPEG steganography in 2014. The…”
    Get full text
    Journal Article
  5. 5

    Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach by Chen, Chenglong, Ni, Jiangqun, Huang, Jiwu

    Published in IEEE transactions on image processing (01-12-2013)
    “…Recently, the median filtering (MF) detector as a forensic tool for the recovery of images' processing history has attracted wide interest. This paper presents…”
    Get full text
    Journal Article
  6. 6

    Rate and Distortion Optimization for Reversible Data Hiding Using Multiple Histogram Shifting by Wang, Junxiang, Ni, Jiangqun, Zhang, Xing, Shi, Yun-Qing

    Published in IEEE transactions on cybernetics (01-02-2017)
    “…Histogram shifting (HS) embedding as a typical reversible data hiding scheme is widely investigated due to its high quality of stego-image. For HS-based…”
    Get full text
    Journal Article
  7. 7

    Deep Learning Local Descriptor for Image Splicing Detection and Localization by Rao, Yuan, Ni, Jiangqun, Zhao, Huimin

    Published in IEEE access (2020)
    “…In this paper, a novel image splicing detection and localization scheme is proposed based on the local feature descriptor which is learned by deep…”
    Get full text
    Journal Article
  8. 8

    Blind Forensics of Successive Geometric Transformations in Digital Images Using Spectral Method: Theory and Applications by Chen, Chenglong, Ni, Jiangqun, Shen, Zhaoyi, Shi, Yun Qing

    Published in IEEE transactions on image processing (01-06-2017)
    “…Geometric transformations, such as resizing and rotation, are almost always needed when two or more images are spliced together to create convincing image…”
    Get full text
    Journal Article
  9. 9

    Domain Transformation of Distortion Costs for Efficient JPEG Steganography with Symmetric Embedding by Pan, Yuanfeng, Ni, Jiangqun

    Published in Symmetry (Basel) (01-05-2024)
    “…Nowadays, most image steganographic schemes embed secret messages by minimizing a well-designed distortion cost function for the corresponding domain, i.e.,…”
    Get full text
    Journal Article
  10. 10

    Efficient JPEG Steganography Using Domain Transformation of Embedding Entropy by Hu, Xianglei, Ni, Jiangqun, Shi, Yun-Qing

    Published in IEEE signal processing letters (01-06-2018)
    “…Nowadays, JPEG steganographic schemes, e.g., J-UNIWARD, which take into account the effects of embedding in the spatial domain tend to exhibit higher security…”
    Get full text
    Journal Article
  11. 11

    High-Fidelity Reversible Data Hiding Using Directionally Enclosed Prediction by Chen, Haishan, Ni, Jiangqun, Hong, Wien, Chen, Tung-Shou

    Published in IEEE signal processing letters (01-05-2017)
    “…Recently, a number of high-fidelity reversible data hiding algorithms have been developed based on prediction-error expansion (PEE) and pixel sorting. In PEE,…”
    Get full text
    Journal Article
  12. 12

    A deep learning approach to detection of splicing and copy-move forgeries in images by Yuan Rao, Jiangqun Ni

    “…In this paper, we present a new image forgery detection method based on deep learning technique, which utilizes a convolutional neural network (CNN) to…”
    Get full text
    Conference Proceeding
  13. 13

    Efficient Compression of Encrypted Binary Images Using the Markov Random Field by Wang, Chuntao, Ni, Jiangqun, Zhang, Xinpeng, Huang, Qiong

    “…Similar to conventional compression with the original, unencrypted image as the input, the recently emerged compression on encrypted images generally exploits…”
    Get full text
    Journal Article
  14. 14

    Efficient Video Steganalytic Feature Design by Exploiting Local Optimality and Lagrangian Cost Quotient by Liu, Ying, Ni, Jiangqun, Su, Wenkang

    Published in Symmetry (Basel) (01-02-2023)
    “…As the opponent of motion vector (MV)-based video steganography, the corresponding symmetric steganalysis has also developed a lot in recent years, among which…”
    Get full text
    Journal Article
  15. 15

    Region duplication detection based on Harris corner points and step sector statistics by Chen, Likai, Lu, Wei, Ni, Jiangqun, Sun, Wei, Huang, Jiwu

    “…► An image region duplication forgery detection scheme based on Harris corner points and step sector statistics is proposed. ► Harris corner points are…”
    Get full text
    Journal Article
  16. 16

    A New MRF-Based Lossy Compression for Encrypted Binary Images by Wang, Chuntao, Li, Tianzheng, Ni, Jiangqun, Huang, Qiong

    Published in IEEE access (2020)
    “…Although there exist many researches on the compression of original non-encrypted binary images, few approaches focus on the compression of encrypted binary…”
    Get full text
    Journal Article
  17. 17

    An Informed Watermarking Scheme Using Hidden Markov Model in the Wavelet Domain by Wang, Chuntao, Ni, Jiangqun, Huang, Jiwu

    “…Achieving robustness, imperceptibility and high capacity simultaneously is of great importance in digital watermarking. This paper presents a new informed…”
    Get full text
    Journal Article
  18. 18

    An efficient reversible data hiding scheme using prediction and optimal side information selection by Wang, Junxiang, Ni, Jiangqun, Hu, Yongjian

    “…•We improve the HS based multi-layer embedding process for rhombus prediction by introducing a control parameter.•We propose an optimal side information…”
    Get full text
    Journal Article
  19. 19

    An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients by Chang Wang, Jiangqun Ni

    “…Steganography is the art of covert communication. This paper presents an efficient JPEG steganography scheme based on the block entropy of DCT coefficients and…”
    Get full text
    Conference Proceeding
  20. 20

    Robust digital image stabilization using the Kalman filter by Wang, Chuntao, Kim, Jin-hyung, Byun, Keun-yung, Ni, Jiangqun, Ko, Sung-jea

    Published in IEEE transactions on consumer electronics (01-02-2009)
    “…In this paper, we present a new digital image stabilization (DIS) algorithm based on feature point tracking. Feature points well tracked by the…”
    Get full text
    Journal Article