Search Results - "Ni, Jiangqun"
-
1
Deep Learning Hierarchical Representations for Image Steganalysis
Published in IEEE transactions on information forensics and security (01-11-2017)“…Nowadays, the prevailing detectors of steganographic communication in digital images mainly consist of three steps, i.e., residual computation, feature…”
Get full text
Journal Article -
2
Multiple Histograms-Based Reversible Data Hiding: Framework and Realization
Published in IEEE transactions on circuits and systems for video technology (01-08-2020)“…Reversible data hiding (RDH) has unique advantage in copyright and integrity protection for multimedia contents. As a typical RDH scheme, histogram shifting…”
Get full text
Journal Article -
3
Uniform Embedding for Efficient JPEG Steganography
Published in IEEE transactions on information forensics and security (01-05-2014)“…Steganography is the science and art of covert communication, which aims to hide the secret messages into a cover medium while achieving the least possible…”
Get full text
Journal Article -
4
Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited
Published in IEEE transactions on information forensics and security (01-12-2015)“…Uniform embedding was first introduced in 2012 for non-side-informed JPEG steganography, and then extended to the side-informed JPEG steganography in 2014. The…”
Get full text
Journal Article -
5
Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach
Published in IEEE transactions on image processing (01-12-2013)“…Recently, the median filtering (MF) detector as a forensic tool for the recovery of images' processing history has attracted wide interest. This paper presents…”
Get full text
Journal Article -
6
Rate and Distortion Optimization for Reversible Data Hiding Using Multiple Histogram Shifting
Published in IEEE transactions on cybernetics (01-02-2017)“…Histogram shifting (HS) embedding as a typical reversible data hiding scheme is widely investigated due to its high quality of stego-image. For HS-based…”
Get full text
Journal Article -
7
Deep Learning Local Descriptor for Image Splicing Detection and Localization
Published in IEEE access (2020)“…In this paper, a novel image splicing detection and localization scheme is proposed based on the local feature descriptor which is learned by deep…”
Get full text
Journal Article -
8
Blind Forensics of Successive Geometric Transformations in Digital Images Using Spectral Method: Theory and Applications
Published in IEEE transactions on image processing (01-06-2017)“…Geometric transformations, such as resizing and rotation, are almost always needed when two or more images are spliced together to create convincing image…”
Get full text
Journal Article -
9
Domain Transformation of Distortion Costs for Efficient JPEG Steganography with Symmetric Embedding
Published in Symmetry (Basel) (01-05-2024)“…Nowadays, most image steganographic schemes embed secret messages by minimizing a well-designed distortion cost function for the corresponding domain, i.e.,…”
Get full text
Journal Article -
10
Efficient JPEG Steganography Using Domain Transformation of Embedding Entropy
Published in IEEE signal processing letters (01-06-2018)“…Nowadays, JPEG steganographic schemes, e.g., J-UNIWARD, which take into account the effects of embedding in the spatial domain tend to exhibit higher security…”
Get full text
Journal Article -
11
High-Fidelity Reversible Data Hiding Using Directionally Enclosed Prediction
Published in IEEE signal processing letters (01-05-2017)“…Recently, a number of high-fidelity reversible data hiding algorithms have been developed based on prediction-error expansion (PEE) and pixel sorting. In PEE,…”
Get full text
Journal Article -
12
A deep learning approach to detection of splicing and copy-move forgeries in images
Published in 2016 IEEE International Workshop on Information Forensics and Security (WIFS) (01-12-2016)“…In this paper, we present a new image forgery detection method based on deep learning technique, which utilizes a convolutional neural network (CNN) to…”
Get full text
Conference Proceeding -
13
Efficient Compression of Encrypted Binary Images Using the Markov Random Field
Published in IEEE transactions on information forensics and security (01-05-2018)“…Similar to conventional compression with the original, unencrypted image as the input, the recently emerged compression on encrypted images generally exploits…”
Get full text
Journal Article -
14
Efficient Video Steganalytic Feature Design by Exploiting Local Optimality and Lagrangian Cost Quotient
Published in Symmetry (Basel) (01-02-2023)“…As the opponent of motion vector (MV)-based video steganography, the corresponding symmetric steganalysis has also developed a lot in recent years, among which…”
Get full text
Journal Article -
15
Region duplication detection based on Harris corner points and step sector statistics
Published in Journal of visual communication and image representation (01-04-2013)“…► An image region duplication forgery detection scheme based on Harris corner points and step sector statistics is proposed. ► Harris corner points are…”
Get full text
Journal Article -
16
A New MRF-Based Lossy Compression for Encrypted Binary Images
Published in IEEE access (2020)“…Although there exist many researches on the compression of original non-encrypted binary images, few approaches focus on the compression of encrypted binary…”
Get full text
Journal Article -
17
An Informed Watermarking Scheme Using Hidden Markov Model in the Wavelet Domain
Published in IEEE transactions on information forensics and security (01-06-2012)“…Achieving robustness, imperceptibility and high capacity simultaneously is of great importance in digital watermarking. This paper presents a new informed…”
Get full text
Journal Article -
18
An efficient reversible data hiding scheme using prediction and optimal side information selection
Published in Journal of visual communication and image representation (01-08-2014)“…•We improve the HS based multi-layer embedding process for rhombus prediction by introducing a control parameter.•We propose an optimal side information…”
Get full text
Journal Article -
19
An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients
Published in 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (01-03-2012)“…Steganography is the art of covert communication. This paper presents an efficient JPEG steganography scheme based on the block entropy of DCT coefficients and…”
Get full text
Conference Proceeding -
20
Robust digital image stabilization using the Kalman filter
Published in IEEE transactions on consumer electronics (01-02-2009)“…In this paper, we present a new digital image stabilization (DIS) algorithm based on feature point tracking. Feature points well tracked by the…”
Get full text
Journal Article