BibTeX records: Jiwu Huang

download as .bib file

@article{DBLP:journals/tetci/WuCGZHHT24,
  author       = {Hao{-}Tian Wu and
                  Xin Cao and
                  Ying Gao and
                  Kaihan Zheng and
                  Jiwu Huang and
                  Jiankun Hu and
                  Zhihong Tian},
  title        = {Fundus Image Enhancement via Semi-Supervised {GAN} and Anatomical
                  Structure Preservation},
  journal      = {{IEEE} Trans. Emerg. Top. Comput. Intell.},
  volume       = {8},
  number       = {1},
  pages        = {313--326},
  year         = {2024},
  url          = {https://doi.org/10.1109/TETCI.2023.3301337},
  doi          = {10.1109/TETCI.2023.3301337},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tetci/WuCGZHHT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangLLTH24,
  author       = {Dongxia Huang and
                  Weiqi Luo and
                  Minglin Liu and
                  Weixuan Tang and
                  Jiwu Huang},
  title        = {Steganography Embedding Cost Learning With Generative Multi-Adversarial
                  Network},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {15--29},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3318939},
  doi          = {10.1109/TIFS.2023.3318939},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/HuangLLTH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LuoKHHKK24,
  author       = {Anwei Luo and
                  Chenqi Kong and
                  Jiwu Huang and
                  Yongjian Hu and
                  Xiangui Kang and
                  Alex C. Kot},
  title        = {Beyond the Prior Forgery Knowledge: Mining Critical Clues for General
                  Face Forgery Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1168--1182},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3332218},
  doi          = {10.1109/TIFS.2023.3332218},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LuoKHHKK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenLCZH24,
  author       = {Changsheng Chen and
                  Bokang Li and
                  Rizhao Cai and
                  Jishen Zeng and
                  Jiwu Huang},
  title        = {Distortion Model-Based Spectral Augmentation for Generalized Recaptured
                  Document Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1283--1298},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3333548},
  doi          = {10.1109/TIFS.2023.3333548},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenLCZH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LinLLH24,
  author       = {Guoyuan Lin and
                  Weiqi Luo and
                  Da Luo and
                  Jiwu Huang},
  title        = {One-Class Neural Network With Directed Statistics Pooling for Spoofing
                  Speech Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2581--2593},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3352429},
  doi          = {10.1109/TIFS.2024.3352429},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LinLLH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TangZLCH24,
  author       = {Weixuan Tang and
                  Zhili Zhou and
                  Bin Li and
                  Kim{-}Kwang Raymond Choo and
                  Jiwu Huang},
  title        = {Joint Cost Learning and Payload Allocation With Image-Wise Attention
                  for Batch Steganography},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2826--2839},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3354411},
  doi          = {10.1109/TIFS.2024.3354411},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/TangZLCH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/Huang0HC24,
  author       = {Wenmin Huang and
                  Weiqi Luo and
                  Jiwu Huang and
                  Xiaochun Cao},
  editor       = {Michael J. Wooldridge and
                  Jennifer G. Dy and
                  Sriraam Natarajan},
  title        = {{SDGAN:} Disentangling Semantic Manipulation for Facial Attribute
                  Editing},
  booktitle    = {Thirty-Eighth {AAAI} Conference on Artificial Intelligence, {AAAI}
                  2024, Thirty-Sixth Conference on Innovative Applications of Artificial
                  Intelligence, {IAAI} 2024, Fourteenth Symposium on Educational Advances
                  in Artificial Intelligence, {EAAI} 2014, February 20-27, 2024, Vancouver,
                  Canada},
  pages        = {2374--2381},
  publisher    = {{AAAI} Press},
  year         = {2024},
  url          = {https://doi.org/10.1609/aaai.v38i3.28012},
  doi          = {10.1609/AAAI.V38I3.28012},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/Huang0HC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/TangLLWH23,
  author       = {Weixuan Tang and
                  Bin Li and
                  Weixiang Li and
                  Yuangen Wang and
                  Jiwu Huang},
  title        = {Reinforcement learning of non-additive joint steganographic embedding
                  costs with attention mechanism},
  journal      = {Sci. China Inf. Sci.},
  volume       = {66},
  number       = {3},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11432-021-3453-5},
  doi          = {10.1007/S11432-021-3453-5},
  timestamp    = {Fri, 15 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/TangLLWH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spl/HuangCHK23,
  author       = {Bingyuan Huang and
                  Sanshuai Cui and
                  Jiwu Huang and
                  Xiangui Kang},
  title        = {Discriminative Frequency Information Learning for End-to-End Speech
                  Anti-Spoofing},
  journal      = {{IEEE} Signal Process. Lett.},
  volume       = {30},
  pages        = {185--189},
  year         = {2023},
  url          = {https://doi.org/10.1109/LSP.2023.3251895},
  doi          = {10.1109/LSP.2023.3251895},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spl/HuangCHK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/ZhengCTLLH23,
  author       = {Peijia Zheng and
                  Ziyan Cheng and
                  Xianhao Tian and
                  Hongmei Liu and
                  Weiqi Luo and
                  Jiwu Huang},
  title        = {Non-Interactive Privacy-Preserving Frequent Itemset Mining Over Encrypted
                  Cloud Data},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {11},
  number       = {4},
  pages        = {3452--3468},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCC.2023.3291378},
  doi          = {10.1109/TCC.2023.3291378},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcc/ZhengCTLLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/YinWWLZH23,
  author       = {Xiaolin Yin and
                  Shaowu Wu and
                  Ke Wang and
                  Wei Lu and
                  Yicong Zhou and
                  Jiwu Huang},
  title        = {Anti-Rounding Image Steganography With Separable Fine-Tuned Network},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {33},
  number       = {11},
  pages        = {7066--7079},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCSVT.2023.3269468},
  doi          = {10.1109/TCSVT.2023.3269468},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcsv/YinWWLZH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiuSLZH23,
  author       = {Minglin Liu and
                  Tingting Song and
                  Weiqi Luo and
                  Peijia Zheng and
                  Jiwu Huang},
  title        = {Adversarial Steganography Embedding via Stego Generation and Selection},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {3},
  pages        = {2375--2389},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3182041},
  doi          = {10.1109/TDSC.2022.3182041},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiuSLZH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TanLLLH23,
  author       = {Shunquan Tan and
                  Qiushi Li and
                  Laiyuan Li and
                  Bin Li and
                  Jiwu Huang},
  title        = {{STD-NET:} Search of Image Steganalytic Deep-Learning Architecture
                  via Hierarchical Tensor Decomposition},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {3},
  pages        = {2657--2673},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2023.3267065},
  doi          = {10.1109/TDSC.2023.3267065},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/TanLLLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangYCHK23,
  author       = {Jie Wang and
                  Xuemei Yin and
                  Yifang Chen and
                  Jiwu Huang and
                  Xiangui Kang},
  title        = {An Adaptive IPM-Based {HEVC} Video Steganography via Minimizing Non-Additive
                  Distortion},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {4},
  pages        = {2896--2912},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3193423},
  doi          = {10.1109/TDSC.2022.3193423},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WangYCHK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangZZZZH23,
  author       = {Shen Wang and
                  Zhaoyang Zhang and
                  Guopu Zhu and
                  Xinpeng Zhang and
                  Yicong Zhou and
                  Jiwu Huang},
  title        = {Query-Efficient Adversarial Attack With Low Perturbation Against End-to-End
                  Speech Recognition Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {351--364},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2022.3222963},
  doi          = {10.1109/TIFS.2022.3222963},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WangZZZZH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MoTTLH23,
  author       = {Xianbo Mo and
                  Shunquan Tan and
                  Weixuan Tang and
                  Bin Li and
                  Jiwu Huang},
  title        = {ReLOAD: Using Reinforcement Learning to Optimize Asymmetric Distortion
                  for Additive Steganography},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {1524--1538},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3244094},
  doi          = {10.1109/TIFS.2023.3244094},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/MoTTLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FangHLLC0HZ23,
  author       = {Wenbo Fang and
                  Junjiang He and
                  Wenshan Li and
                  Xiaolong Lan and
                  Yang Chen and
                  Tao Li and
                  Jiwu Huang and
                  Linlin Zhang},
  title        = {Comprehensive Android Malware Detection Based on Federated Learning
                  Architecture},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {3977--3990},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3287395},
  doi          = {10.1109/TIFS.2023.3287395},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FangHLLC0HZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YinLLH23,
  author       = {Qilin Yin and
                  Wei Lu and
                  Bin Li and
                  Jiwu Huang},
  title        = {Dynamic Difference Learning With Spatio-Temporal Correlation for Deepfake
                  Video Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {4046--4058},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3290752},
  doi          = {10.1109/TIFS.2023.3290752},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YinLLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuangLYH23,
  author       = {Peiyu Zhuang and
                  Haodong Li and
                  Rui Yang and
                  Jiwu Huang},
  title        = {ReLoc: {A} Restoration-Assisted Framework for Robust Image Tampering
                  Localization},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {5243--5257},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3306181},
  doi          = {10.1109/TIFS.2023.3306181},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuangLYH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aisp/ZhangTRLH23,
  author       = {Wei Zhang and
                  Weixuan Tang and
                  Yuan Rao and
                  Bin Li and
                  Jiwu Huang},
  editor       = {Jaideep Vaidya and
                  Moncef Gabbouj and
                  Jin Li},
  title        = {Deep Multi-image Hiding with Random Key},
  booktitle    = {Artificial Intelligence Security and Privacy - First International
                  Conference on Artificial Intelligence Security and Privacy, AIS{\&}P
                  2023, Guangzhou, China, December 3-5, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14509},
  pages        = {33--41},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-9785-5\_3},
  doi          = {10.1007/978-981-99-9785-5\_3},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aisp/ZhangTRLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MoTLH23,
  author       = {Xianbo Mo and
                  Shunquan Tan and
                  Bin Li and
                  Jiwu Huang},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Poster: Query-efficient Black-box Attack for Image Forgery Localization
                  via Reinforcement Learning},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {3552--3554},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3624390},
  doi          = {10.1145/3576915.3624390},
  timestamp    = {Fri, 01 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MoTLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HuangLHXWH23,
  author       = {Jinkun Huang and
                  Weiqi Luo and
                  Wenmin Huang and
                  Ziyi Xi and
                  Kangkang Wei and
                  Jiwu Huang},
  editor       = {Bin Ma and
                  Jian Li and
                  Qi Li},
  title        = {Multi-Scale Enhanced Dual-Stream Network for Facial Attribute Editing
                  Localization},
  booktitle    = {Digital Forensics and Watermarking - 22nd International Workshop,
                  {IWDW} 2023, Jinan, China, November 25-26, 2023, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14511},
  pages        = {151--165},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-2585-4\_11},
  doi          = {10.1007/978-981-97-2585-4\_11},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HuangLHXWH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mm/Huang0ZH23,
  author       = {Dongxia Huang and
                  Weiqi Luo and
                  Peijia Zheng and
                  Jiwu Huang},
  editor       = {Abdulmotaleb El{-}Saddik and
                  Tao Mei and
                  Rita Cucchiara and
                  Marco Bertini and
                  Diana Patricia Tobon Vallejo and
                  Pradeep K. Atrey and
                  M. Shamim Hossain},
  title        = {Automatic Asymmetric Embedding Cost Learning via Generative Adversarial
                  Networks},
  booktitle    = {Proceedings of the 31st {ACM} International Conference on Multimedia,
                  {MM} 2023, Ottawa, ON, Canada, 29 October 2023- 3 November 2023},
  pages        = {8316--8326},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3581783.3612399},
  doi          = {10.1145/3581783.3612399},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mm/Huang0ZH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-12489,
  author       = {Anwei Luo and
                  Chenqi Kong and
                  Jiwu Huang and
                  Yongjian Hu and
                  Xiangui Kang and
                  Alex C. Kot},
  title        = {Beyond the Prior Forgery Knowledge: Mining Critical Clues for General
                  Face Forgery Detection},
  journal      = {CoRR},
  volume       = {abs/2304.12489},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.12489},
  doi          = {10.48550/ARXIV.2304.12489},
  eprinttype    = {arXiv},
  eprint       = {2304.12489},
  timestamp    = {Wed, 03 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-12489.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-11092,
  author       = {Anwei Luo and
                  Rizhao Cai and
                  Chenqi Kong and
                  Xiangui Kang and
                  Jiwu Huang and
                  Alex C. Kot},
  title        = {Forgery-aware Adaptive Vision Transformer for Face Forgery Detection},
  journal      = {CoRR},
  volume       = {abs/2309.11092},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.11092},
  doi          = {10.48550/ARXIV.2309.11092},
  eprinttype    = {arXiv},
  eprint       = {2309.11092},
  timestamp    = {Mon, 25 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-11092.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-10036,
  author       = {Long Zhuo and
                  Shenghai Luo and
                  Shunquan Tan and
                  Han Chen and
                  Bin Li and
                  Jiwu Huang},
  title        = {Evading Detection Actively: Toward Anti-Forensics against Forgery
                  Localization},
  journal      = {CoRR},
  volume       = {abs/2310.10036},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.10036},
  doi          = {10.48550/ARXIV.2310.10036},
  eprinttype    = {arXiv},
  eprint       = {2310.10036},
  timestamp    = {Wed, 25 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-10036.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-08317,
  author       = {Pei Yan and
                  Shunquan Tan and
                  Miaohui Wang and
                  Jiwu Huang},
  title        = {Prompt Engineering-assisted Malware Dynamic Analysis Using {GPT-4}},
  journal      = {CoRR},
  volume       = {abs/2312.08317},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.08317},
  doi          = {10.48550/ARXIV.2312.08317},
  eprinttype    = {arXiv},
  eprint       = {2312.08317},
  timestamp    = {Mon, 08 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-08317.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ZhuoTLH22,
  author       = {Long Zhuo and
                  Shunquan Tan and
                  Bin Li and
                  Jiwu Huang},
  title        = {{ISP-GAN:} inception sub-pixel deconvolution-based lightweight GANs
                  for colorization},
  journal      = {Multim. Tools Appl.},
  volume       = {81},
  number       = {17},
  pages        = {24977--24994},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11042-022-12587-8},
  doi          = {10.1007/S11042-022-12587-8},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ZhuoTLH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/SuNHH22,
  author       = {Wenkang Su and
                  Jiangqun Ni and
                  Xianglei Hu and
                  Jiwu Huang},
  title        = {New design paradigm of distortion cost function for efficient {JPEG}
                  steganography},
  journal      = {Signal Process.},
  volume       = {190},
  pages        = {108319},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.sigpro.2021.108319},
  doi          = {10.1016/J.SIGPRO.2021.108319},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigpro/SuNHH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/LefevreCFGH22,
  author       = {Pascal Lef{\`{e}}vre and
                  Philippe Carr{\'{e}} and
                  Caroline Fontaine and
                  Philippe Gaborit and
                  Jiwu Huang},
  title        = {Efficient image tampering localization using semi-fragile watermarking
                  and error control codes},
  journal      = {Signal Process.},
  volume       = {190},
  pages        = {108342},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.sigpro.2021.108342},
  doi          = {10.1016/J.SIGPRO.2021.108342},
  timestamp    = {Tue, 23 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigpro/LefevreCFGH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/XieNZZH22,
  author       = {Hao Xie and
                  Jiangqun Ni and
                  Jian Zhang and
                  Weizhe Zhang and
                  Jiwu Huang},
  title        = {Evading generated-image detectors: {A} deep dithering approach},
  journal      = {Signal Process.},
  volume       = {197},
  pages        = {108558},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.sigpro.2022.108558},
  doi          = {10.1016/J.SIGPRO.2022.108558},
  timestamp    = {Sat, 06 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigpro/XieNZZH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/XieNZZH22a,
  author       = {Hao Xie and
                  Jiangqun Ni and
                  Jian Zhang and
                  Weizhe Zhang and
                  Jiwu Huang},
  title        = {Corrigendum to 'Evading generated-image detectors: {A} deep dithering
                  approach' [Signal Processing 197(2022) 108558]},
  journal      = {Signal Process.},
  volume       = {200},
  pages        = {108670},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.sigpro.2022.108670},
  doi          = {10.1016/J.SIGPRO.2022.108670},
  timestamp    = {Sat, 06 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigpro/XieNZZH22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spic/TanCZLH22,
  author       = {Shunquan Tan and
                  Baoying Chen and
                  Jishen Zeng and
                  Bin Li and
                  Jiwu Huang},
  title        = {Hybrid deep-learning framework for object-based forgery detection
                  in video},
  journal      = {Signal Process. Image Commun.},
  volume       = {105},
  pages        = {116695},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.image.2022.116695},
  doi          = {10.1016/J.IMAGE.2022.116695},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spic/TanCZLH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spl/CuiHHK22,
  author       = {Sanshuai Cui and
                  Bingyuan Huang and
                  Jiwu Huang and
                  Xiangui Kang},
  title        = {Synthetic Speech Detection Based on Local Autoregression and Variance
                  Statistics},
  journal      = {{IEEE} Signal Process. Lett.},
  volume       = {29},
  pages        = {1462--1466},
  year         = {2022},
  url          = {https://doi.org/10.1109/LSP.2022.3183951},
  doi          = {10.1109/LSP.2022.3183951},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spl/CuiHHK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/LiCTLH22,
  author       = {Qiushi Li and
                  Shengda Chen and
                  Shunquan Tan and
                  Bin Li and
                  Jiwu Huang},
  title        = {One-Class Double Compression Detection of Advanced Videos Based on
                  Simple Gaussian Distribution Model},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {32},
  number       = {4},
  pages        = {2496--2500},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCSVT.2021.3069254},
  doi          = {10.1109/TCSVT.2021.3069254},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/LiCTLH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/TangLBLH22,
  author       = {Weixuan Tang and
                  Bin Li and
                  Mauro Barni and
                  Jin Li and
                  Jiwu Huang},
  title        = {Improving Cost Learning for {JPEG} Steganography by Exploiting {JPEG}
                  Domain Knowledge},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {32},
  number       = {6},
  pages        = {4081--4095},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCSVT.2021.3115600},
  doi          = {10.1109/TCSVT.2021.3115600},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/TangLBLH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/LiuNZH22,
  author       = {Ying Liu and
                  Jiangqun Ni and
                  Weizhe Zhang and
                  Jiwu Huang},
  title        = {A Novel Video Steganographic Scheme Incorporating the Consistency
                  Degree of Motion Vectors},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {32},
  number       = {7},
  pages        = {4905--4910},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCSVT.2021.3135384},
  doi          = {10.1109/TCSVT.2021.3135384},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/LiuNZH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/QinLTTH22,
  author       = {Xinghong Qin and
                  Bin Li and
                  Shunquan Tan and
                  Weixuan Tang and
                  Jiwu Huang},
  title        = {Gradually Enhanced Adversarial Perturbations on Color Pixel Vectors
                  for Image Steganography},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {32},
  number       = {8},
  pages        = {5110--5123},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCSVT.2022.3148406},
  doi          = {10.1109/TCSVT.2022.3148406},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/QinLTTH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/YuanCFZH22,
  author       = {Yuan Yuan and
                  Gene Cheung and
                  Pascal Frossard and
                  H. Vicky Zhao and
                  Jiwu Huang},
  title        = {Landmarking for Navigational Streaming of Stored High-Dimensional
                  Media},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {32},
  number       = {8},
  pages        = {5663--5679},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCSVT.2022.3150780},
  doi          = {10.1109/TCSVT.2022.3150780},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/YuanCFZH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcyb/LuCZHWZ22,
  author       = {Wei Lu and
                  Junjia Chen and
                  Junhong Zhang and
                  Jiwu Huang and
                  Jian Weng and
                  Yicong Zhou},
  title        = {Secure Halftone Image Steganography Based on Feature Space and Layer
                  Embedding},
  journal      = {{IEEE} Trans. Cybern.},
  volume       = {52},
  number       = {6},
  pages        = {5001--5014},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCYB.2020.3026047},
  doi          = {10.1109/TCYB.2020.3026047},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcyb/LuCZHWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcyb/LuZLZHS22,
  author       = {Wei Lu and
                  Qin Zhang and
                  Shangjun Luo and
                  Yicong Zhou and
                  Jiwu Huang and
                  Yun{-}Qing Shi},
  title        = {Robust Estimation of Upscaling Factor on Double {JPEG} Compressed
                  Images},
  journal      = {{IEEE} Trans. Cybern.},
  volume       = {52},
  number       = {10},
  pages        = {10814--10826},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCYB.2021.3069999},
  doi          = {10.1109/TCYB.2021.3069999},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcyb/LuZLZHS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChenLHWZ22,
  author       = {Bing Chen and
                  Wei Lu and
                  Jiwu Huang and
                  Jian Weng and
                  Yicong Zhou},
  title        = {Secret Sharing Based Reversible Data Hiding in Encrypted Images With
                  Multiple Data-Hiders},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {2},
  pages        = {978--991},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2020.3011923},
  doi          = {10.1109/TDSC.2020.3011923},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ChenLHWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuoTLH22,
  author       = {Long Zhuo and
                  Shunquan Tan and
                  Bin Li and
                  Jiwu Huang},
  title        = {Self-Adversarial Training Incorporating Forgery Attention for Image
                  Forgery Localization},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {17},
  pages        = {819--834},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIFS.2022.3152362},
  doi          = {10.1109/TIFS.2022.3152362},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuoTLH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuCMH22,
  author       = {Zhaoxu Hu and
                  Changsheng Chen and
                  Wai Ho Mow and
                  Jiwu Huang},
  title        = {Document Recapture Detection Based on a Unified Distortion Model of
                  Halftone Cells},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {17},
  pages        = {2800--2815},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIFS.2022.3192999},
  doi          = {10.1109/TIFS.2022.3192999},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HuCMH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenZLH22,
  author       = {Changsheng Chen and
                  Shuzheng Zhang and
                  Fengbo Lan and
                  Jiwu Huang},
  title        = {Domain-Agnostic Document Authentication Against Practical Recapturing
                  Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {17},
  pages        = {2890--2905},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIFS.2022.3197054},
  doi          = {10.1109/TIFS.2022.3197054},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenZLH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WeiLTH22,
  author       = {Kangkang Wei and
                  Weiqi Luo and
                  Shunquan Tan and
                  Jiwu Huang},
  title        = {Universal Deep Network for Steganalysis of Color Image Based on Channel
                  Representation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {17},
  pages        = {3022--3036},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIFS.2022.3196265},
  doi          = {10.1109/TIFS.2022.3196265},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WeiLTH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/WeiLH22,
  author       = {Shujin Wei and
                  Haodong Li and
                  Jiwu Huang},
  title        = {Deep Video Inpainting Localization Using Spatial and Temporal Traces},
  booktitle    = {{IEEE} International Conference on Acoustics, Speech and Signal Processing,
                  {ICASSP} 2022, Virtual and Singapore, 23-27 May 2022},
  pages        = {8957--8961},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICASSP43922.2022.9746190},
  doi          = {10.1109/ICASSP43922.2022.9746190},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icassp/WeiLH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mm/ZhengCZH22,
  author       = {Peijia Zheng and
                  Zhiwei Cai and
                  Huicong Zeng and
                  Jiwu Huang},
  editor       = {Jo{\~{a}}o Magalh{\~{a}}es and
                  Alberto Del Bimbo and
                  Shin'ichi Satoh and
                  Nicu Sebe and
                  Xavier Alameda{-}Pineda and
                  Qin Jin and
                  Vincent Oria and
                  Laura Toni},
  title        = {Keyword Spotting in the Homomorphic Encrypted Domain Using Deep Complex-Valued
                  {CNN}},
  booktitle    = {{MM} '22: The 30th {ACM} International Conference on Multimedia, Lisboa,
                  Portugal, October 10 - 14, 2022},
  pages        = {1474--1483},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3503161.3548350},
  doi          = {10.1145/3503161.3548350},
  timestamp    = {Fri, 14 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mm/ZhengCZH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@misc{DBLP:data/10/FerreiraFPSALHR22,
  author       = {Anselmo Ferreira and
                  Siovani Cintra Felipussi and
                  Ramon Pires and
                  Geise Santos and
                  Sandra Avila and
                  Jorge Albuquerque Lambert and
                  Jiwu Huang and
                  Anderson Rocha},
  title        = {Eyes in the Skies: {A} Data-driven Fusion Approach to Identifying
                  Drug Crops from Remote Sensing Images Dataset},
  publisher    = {{IEEE} DataPort},
  year         = {2022},
  month        = may,
  howpublished = {\url{https://doi.org/10.21227/H2WD42}},
  note         = {Accessed on YYYY-MM-DD.},
  url          = {https://doi.org/10.21227/H2WD42},
  doi          = {10.21227/H2WD42},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/data/10/FerreiraFPSALHR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-05651,
  author       = {Shunquan Tan and
                  Qiushi Li and
                  Laiyuan Li and
                  Bin Li and
                  Jiwu Huang},
  title        = {{STD-NET:} Search of Image Steganalytic Deep-learning Architecture
                  via Hierarchical Tensor Decomposition},
  journal      = {CoRR},
  volume       = {abs/2206.05651},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.05651},
  doi          = {10.48550/ARXIV.2206.05651},
  eprinttype    = {arXiv},
  eprint       = {2206.05651},
  timestamp    = {Mon, 22 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-05651.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-01935,
  author       = {Changsheng Chen and
                  Lin Zhao and
                  Rizhao Cai and
                  Zitong Yu and
                  Jiwu Huang and
                  Alex C. Kot},
  title        = {Forensicability Assessment of Questioned Images in Recapturing Detection},
  journal      = {CoRR},
  volume       = {abs/2209.01935},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.01935},
  doi          = {10.48550/ARXIV.2209.01935},
  eprinttype    = {arXiv},
  eprint       = {2209.01935},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-01935.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-03930,
  author       = {Peiyu Zhuang and
                  Haodong Li and
                  Rui Yang and
                  Jiwu Huang},
  title        = {ReLoc: {A} Restoration-Assisted Framework for Robust Image Tampering
                  Localization},
  journal      = {CoRR},
  volume       = {abs/2211.03930},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.03930},
  doi          = {10.48550/ARXIV.2211.03930},
  eprinttype    = {arXiv},
  eprint       = {2211.03930},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-03930.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-02822,
  author       = {Qingliang Liu and
                  Jiangqun Ni and
                  Weizhe Zhang and
                  Xiangyang Luo and
                  Jiwu Huang},
  title        = {A Robust Image Steganographic Scheme against General Scaling Attacks},
  journal      = {CoRR},
  volume       = {abs/2212.02822},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.02822},
  doi          = {10.48550/ARXIV.2212.02822},
  eprinttype    = {arXiv},
  eprint       = {2212.02822},
  timestamp    = {Tue, 09 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-02822.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/XuLLXZLH21,
  author       = {Zhaopeng Xu and
                  Jiarui Liu and
                  Wei Lu and
                  Bozhi Xu and
                  Xianfeng Zhao and
                  Bin Li and
                  Jiwu Huang},
  title        = {Detecting facial manipulated videos based on set convolutional neural
                  networks},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {77},
  pages        = {103119},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jvcir.2021.103119},
  doi          = {10.1016/J.JVCIR.2021.103119},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jvcir/XuLLXZLH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/HussainTLQHH21,
  author       = {Israr Hussain and
                  Shunquan Tan and
                  Bin Li and
                  Xinghong Qin and
                  Dostdar Hussain and
                  Jiwu Huang},
  title        = {A novel deep learning framework for double {JPEG} compression detection
                  of small size blocks},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {80},
  pages        = {103269},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jvcir.2021.103269},
  doi          = {10.1016/J.JVCIR.2021.103269},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jvcir/HussainTLQHH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/WangZLCH21,
  author       = {Yuan{-}Gen Wang and
                  Guopu Zhu and
                  Jin Li and
                  Mauro Conti and
                  Jiwu Huang},
  title        = {Defeating Lattice-Based Data Hiding Code Via Decoding Security Hole},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {31},
  number       = {1},
  pages        = {76--87},
  year         = {2021},
  url          = {https://doi.org/10.1109/TCSVT.2020.2971590},
  doi          = {10.1109/TCSVT.2020.2971590},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/WangZLCH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/YinLLGHS21,
  author       = {Xiaolin Yin and
                  Wei Lu and
                  Wanteng Liu and
                  Jing{-}Ming Guo and
                  Jiwu Huang and
                  Yun{-}Qing Shi},
  title        = {Reversible Data Hiding in Halftone Images Based on Dynamic Embedding
                  States Group},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {31},
  number       = {7},
  pages        = {2631--2645},
  year         = {2021},
  url          = {https://doi.org/10.1109/TCSVT.2020.3032685},
  doi          = {10.1109/TCSVT.2020.3032685},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/YinLLGHS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/LuZZZH21,
  author       = {Wei Lu and
                  Junhong Zhang and
                  Xianfeng Zhao and
                  Weiming Zhang and
                  Jiwu Huang},
  title        = {Secure Robust {JPEG} Steganography Based on AutoEncoder With Adaptive
                  {BCH} Encoding},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {31},
  number       = {7},
  pages        = {2909--2922},
  year         = {2021},
  url          = {https://doi.org/10.1109/TCSVT.2020.3027843},
  doi          = {10.1109/TCSVT.2020.3027843},
  timestamp    = {Thu, 29 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/LuZZZH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LuXYLHS21,
  author       = {Wei Lu and
                  Yingjie Xue and
                  Yuileong Yeung and
                  Hongmei Liu and
                  Jiwu Huang and
                  Yun Q. Shi},
  title        = {Secure Halftone Image Steganography Based on Pixel Density Transition},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {3},
  pages        = {1137--1149},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2019.2933621},
  doi          = {10.1109/TDSC.2019.2933621},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LuXYLHS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TanWSLLH21,
  author       = {Shunquan Tan and
                  Weilong Wu and
                  Zilong Shao and
                  Qiushi Li and
                  Bin Li and
                  Jiwu Huang},
  title        = {{CALPA-NET:} Channel-Pruning-Assisted Deep Residual Network for Steganalysis
                  of Digital Images},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {131--146},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2020.3005304},
  doi          = {10.1109/TIFS.2020.3005304},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TanWSLLH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TangLBLH21,
  author       = {Weixuan Tang and
                  Bin Li and
                  Mauro Barni and
                  Jin Li and
                  Jiwu Huang},
  title        = {An Automatic Cost Learning Framework for Image Steganography Using
                  Deep Reinforcement Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {952--967},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2020.3025438},
  doi          = {10.1109/TIFS.2020.3025438},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/TangLBLH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuangLTLH21,
  author       = {Peiyu Zhuang and
                  Haodong Li and
                  Shunquan Tan and
                  Bin Li and
                  Jiwu Huang},
  title        = {Image Tampering Localization Using a Dense Fully Convolutional Network},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {2986--2999},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2021.3070444},
  doi          = {10.1109/TIFS.2021.3070444},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuangLTLH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MoTLH21,
  author       = {Xianbo Mo and
                  Shunquan Tan and
                  Bin Li and
                  Jiwu Huang},
  title        = {MCTSteg: {A} Monte Carlo Tree Search-Based Reinforcement Learning
                  Framework for Universal Non-Additive Steganography},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {4306--4320},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2021.3104140},
  doi          = {10.1109/TIFS.2021.3104140},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MoTLH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuNZH21,
  author       = {Xianglei Hu and
                  Jiangqun Ni and
                  Weizhe Zhang and
                  Jiwu Huang},
  title        = {Efficient {JPEG} Batch Steganography Using Intrinsic Energy of Image
                  Contents},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {4544--4558},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2021.3109464},
  doi          = {10.1109/TIFS.2021.3109464},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HuNZH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuLZH21,
  author       = {Minglin Liu and
                  Weiqi Luo and
                  Peijia Zheng and
                  Jiwu Huang},
  title        = {A New Adversarial Embedding Method for Enhancing Image Steganography},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {4621--4634},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2021.3111748},
  doi          = {10.1109/TIFS.2021.3111748},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuLZH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TianZH21,
  author       = {Xianhao Tian and
                  Peijia Zheng and
                  Jiwu Huang},
  title        = {Robust Privacy-Preserving Motion Detection and Object Tracking in
                  Encrypted Streaming Video},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {5381--5396},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2021.3128817},
  doi          = {10.1109/TIFS.2021.3128817},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TianZH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tip/ZhaoCH21,
  author       = {Lin Zhao and
                  Changsheng Chen and
                  Jiwu Huang},
  title        = {Deep Learning-Based Forgery Attack on Document Images},
  journal      = {{IEEE} Trans. Image Process.},
  volume       = {30},
  pages        = {7964--7979},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIP.2021.3112048},
  doi          = {10.1109/TIP.2021.3112048},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tip/ZhaoCH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/QinTT0H21,
  author       = {Xinghong Qin and
                  Shunquan Tan and
                  Weixuan Tang and
                  Bin Li and
                  Jiwu Huang},
  title        = {Image Steganography Based on Iterative Adversarial Perturbations Onto
                  a Synchronized-Directions Sub-Image},
  booktitle    = {{IEEE} International Conference on Acoustics, Speech and Signal Processing,
                  {ICASSP} 2021, Toronto, ON, Canada, June 6-11, 2021},
  pages        = {2705--2709},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICASSP39728.2021.9414055},
  doi          = {10.1109/ICASSP39728.2021.9414055},
  timestamp    = {Thu, 08 Jul 2021 17:12:48 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/QinTT0H21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2101-05209,
  author       = {Xinghong Qin and
                  Shunquan Tan and
                  Bin Li and
                  Weixuan Tang and
                  Jiwu Huang},
  title        = {Image Steganography based on Iteratively Adversarial Samples of {A}
                  Synchronized-directions Sub-image},
  journal      = {CoRR},
  volume       = {abs/2101.05209},
  year         = {2021},
  url          = {https://arxiv.org/abs/2101.05209},
  eprinttype    = {arXiv},
  eprint       = {2101.05209},
  timestamp    = {Fri, 22 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2101-05209.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-00653,
  author       = {Lin Zhao and
                  Changsheng Chen and
                  Jiwu Huang},
  title        = {Deep Learning-based Forgery Attack on Document Images},
  journal      = {CoRR},
  volume       = {abs/2102.00653},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.00653},
  eprinttype    = {arXiv},
  eprint       = {2102.00653},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-00653.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-13689,
  author       = {Xianbo Mo and
                  Shunquan Tan and
                  Bin Li and
                  Jiwu Huang},
  title        = {MCTSteg: {A} Monte Carlo Tree Search-based Reinforcement Learning
                  Framework for Universal Non-additive Steganography},
  journal      = {CoRR},
  volume       = {abs/2103.13689},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.13689},
  eprinttype    = {arXiv},
  eprint       = {2103.13689},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-13689.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-06876,
  author       = {Yuan Yuan and
                  Gene Cheung and
                  Pascal Frossard and
                  H. Vicky Zhao and
                  Jiwu Huang},
  title        = {Landmarking for Navigational Streaming of Stored High-Dimensional
                  Media},
  journal      = {CoRR},
  volume       = {abs/2104.06876},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.06876},
  eprinttype    = {arXiv},
  eprint       = {2104.06876},
  timestamp    = {Mon, 19 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-06876.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-03867,
  author       = {Weixuan Tang and
                  Bin Li and
                  Mauro Barni and
                  Jin Li and
                  Jiwu Huang},
  title        = {Improving Cost Learning for {JPEG} Steganography by Exploiting {JPEG}
                  Domain Knowledge},
  journal      = {CoRR},
  volume       = {abs/2105.03867},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.03867},
  eprinttype    = {arXiv},
  eprint       = {2105.03867},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-03867.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-08899,
  author       = {Yushu Zhang and
                  Xiangli Xiao and
                  Leo Yu Zhang and
                  Zhe Liu and
                  Jiwu Huang},
  title        = {{CREAMS:} Copyrighted Cloud Media Sharing},
  journal      = {CoRR},
  volume       = {abs/2105.08899},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.08899},
  eprinttype    = {arXiv},
  eprint       = {2105.08899},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-08899.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-12832,
  author       = {Wei Lu and
                  Lingyi Liu and
                  Junwei Luo and
                  Xianfeng Zhao and
                  Yicong Zhou and
                  Jiwu Huang},
  title        = {Detection of Deepfake Videos Using Long Distance Attention},
  journal      = {CoRR},
  volume       = {abs/2106.12832},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.12832},
  eprinttype    = {arXiv},
  eprint       = {2106.12832},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-12832.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-02434,
  author       = {Long Zhuo and
                  Shunquan Tan and
                  Bin Li and
                  Jiwu Huang},
  title        = {Self-Adversarial Training incorporating Forgery Attention for Image
                  Forgery Localization},
  journal      = {CoRR},
  volume       = {abs/2107.02434},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.02434},
  eprinttype    = {arXiv},
  eprint       = {2107.02434},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-02434.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-13141,
  author       = {Xianhao Tian and
                  Peijia Zheng and
                  Jiwu Huang},
  title        = {Robust Privacy-Preserving Motion Detection and Object Tracking in
                  Encrypted Streaming Video},
  journal      = {CoRR},
  volume       = {abs/2108.13141},
  year         = {2021},
  url          = {https://arxiv.org/abs/2108.13141},
  eprinttype    = {arXiv},
  eprint       = {2108.13141},
  timestamp    = {Fri, 03 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-13141.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-12231,
  author       = {Kangkang Wei and
                  Weiqi Luo and
                  Shunquan Tan and
                  Jiwu Huang},
  title        = {Universal Deep Network for Steganalysis of Color Image based on Channel
                  Representation},
  journal      = {CoRR},
  volume       = {abs/2111.12231},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.12231},
  eprinttype    = {arXiv},
  eprint       = {2111.12231},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-12231.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AmeriniLMH20,
  author       = {Irene Amerini and
                  Chang{-}Tsun Li and
                  Nasir D. Memon and
                  Jiwu Huang},
  title        = {{IEEE} Access Special Section: Digital Forensics Through Multimedia
                  Source Inference},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {209657--209659},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3036772},
  doi          = {10.1109/ACCESS.2020.3036772},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/AmeriniLMH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ChenLLH20,
  author       = {Bolin Chen and
                  Haodong Li and
                  Weiqi Luo and
                  Jiwu Huang},
  title        = {Image processing operations identification via convolutional neural
                  network},
  journal      = {Sci. China Inf. Sci.},
  volume       = {63},
  number       = {3},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11432-018-9492-6},
  doi          = {10.1007/S11432-018-9492-6},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/ChenLLH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChenLZH20,
  author       = {Bolin Chen and
                  Weiqi Luo and
                  Peijia Zheng and
                  Jiwu Huang},
  title        = {Universal stego post-processing for enhancing image steganography},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102664},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102664},
  doi          = {10.1016/J.JISA.2020.102664},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChenLZH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jstsp/DelpHMRTV20,
  author       = {Edward J. Delp and
                  Jiwu Huang and
                  Nasir D. Memon and
                  Anderson Rocha and
                  Matt Turek and
                  Luisa Verdoliva},
  title        = {Editorial: Media Authentication and Forensics - New Solutions and
                  Research Opportunities},
  journal      = {{IEEE} J. Sel. Top. Signal Process.},
  volume       = {14},
  number       = {5},
  pages        = {906--909},
  year         = {2020},
  url          = {https://doi.org/10.1109/JSTSP.2020.3011085},
  doi          = {10.1109/JSTSP.2020.3011085},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jstsp/DelpHMRTV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/LiLTH20,
  author       = {Haodong Li and
                  Bin Li and
                  Shunquan Tan and
                  Jiwu Huang},
  title        = {Identification of deep network generated images using disparities
                  in color components},
  journal      = {Signal Process.},
  volume       = {174},
  pages        = {107616},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.sigpro.2020.107616},
  doi          = {10.1016/J.SIGPRO.2020.107616},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigpro/LiLTH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spic/HeXLTH20,
  author       = {Junhui He and
                  Yuzhang Xu and
                  Weiqi Luo and
                  Shaohua Tang and
                  Jiwu Huang},
  title        = {A novel selective encryption scheme for {H.264/AVC} video with improved
                  visual security},
  journal      = {Signal Process. Image Commun.},
  volume       = {89},
  pages        = {115994},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.image.2020.115994},
  doi          = {10.1016/J.IMAGE.2020.115994},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spic/HeXLTH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/LiuLZHS20,
  author       = {Xianjin Liu and
                  Wei Lu and
                  Qin Zhang and
                  Jiwu Huang and
                  Yun{-}Qing Shi},
  title        = {Downscaling Factor Estimation on Pre-JPEG Compressed Images},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {30},
  number       = {3},
  pages        = {618--631},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCSVT.2019.2893353},
  doi          = {10.1109/TCSVT.2019.2893353},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/LiuLZHS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/YeungLXHS20,
  author       = {Yuileong Yeung and
                  Wei Lu and
                  Yingjie Xue and
                  Jiwu Huang and
                  Yun Qing Shi},
  title        = {Secure Binary Image Steganography With Distortion Measurement Based
                  on Prediction},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {30},
  number       = {5},
  pages        = {1423--1434},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCSVT.2019.2903432},
  doi          = {10.1109/TCSVT.2019.2903432},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/YeungLXHS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/LuLZCHS20,
  author       = {Wei Lu and
                  Ruipeng Li and
                  Lingwen Zeng and
                  Junjia Chen and
                  Jiwu Huang and
                  Yun{-}Qing Shi},
  title        = {Binary Image Steganalysis Based on Histogram of Structuring Elements},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {30},
  number       = {9},
  pages        = {3081--3094},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCSVT.2019.2936028},
  doi          = {10.1109/TCSVT.2019.2936028},
  timestamp    = {Sat, 19 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/LuLZCHS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/GuoZH20,
  author       = {Jianting Guo and
                  Peijia Zheng and
                  Jiwu Huang},
  title        = {Efficient Privacy-Preserving Anomaly Detection and Localization in
                  Bitstream Video},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {30},
  number       = {9},
  pages        = {3268--3281},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCSVT.2019.2929855},
  doi          = {10.1109/TCSVT.2019.2929855},
  timestamp    = {Sat, 19 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/GuoZH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangRHKS20,
  author       = {Jianhua Yang and
                  Danyang Ruan and
                  Jiwu Huang and
                  Xiangui Kang and
                  Yun{-}Qing Shi},
  title        = {An Embedding Cost Learning Framework Using {GAN}},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {839--851},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2922229},
  doi          = {10.1109/TIFS.2019.2922229},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YangRHKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenLFHC20,
  author       = {Changsheng Chen and
                  Mulin Li and
                  Anselmo Ferreira and
                  Jiwu Huang and
                  Rizhao Cai},
  title        = {A Copy-Proof Scheme Based on the Spectral and Spatial Barcoding Channel
                  Models},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1056--1071},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2934861},
  doi          = {10.1109/TIFS.2019.2934861},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenLFHC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangLBH20,
  author       = {Yuankun Huang and
                  Bin Li and
                  Mauro Barni and
                  Jiwu Huang},
  title        = {Identification of VoIP Speech With Multiple Domain Deep Features},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2253--2267},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2960635},
  doi          = {10.1109/TIFS.2019.2960635},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HuangLBH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SunSCHK20,
  author       = {Wenyun Sun and
                  Yu Song and
                  Changsheng Chen and
                  Jiwu Huang and
                  Alex C. Kot},
  title        = {Face Spoofing Detection Based on Local Ternary Label Supervision in
                  Fully Convolutional Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3181--3196},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2985530},
  doi          = {10.1109/TIFS.2020.2985530},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SunSCHK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/staeors/FerreiraFPASLHR19,
  author       = {Anselmo Ferreira and
                  Siovani Cintra Felipussi and
                  Ramon Pires and
                  Sandra Avila and
                  Geise Santos and
                  Jorge Albuquerque Lambert and
                  Jiwu Huang and
                  Anderson Rocha},
  title        = {Eyes in the Skies: {A} Data-Driven Fusion Approach to Identifying
                  Drug Crops From Remote Sensing Images},
  journal      = {{IEEE} J. Sel. Top. Appl. Earth Obs. Remote. Sens.},
  volume       = {12},
  number       = {12},
  pages        = {4773--4786},
  year         = {2019},
  url          = {https://doi.org/10.1109/JSTARS.2019.2917024},
  doi          = {10.1109/JSTARS.2019.2917024},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/staeors/FerreiraFPASLHR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/HeCLTH19,
  author       = {Junhui He and
                  Junxi Chen and
                  Weiqi Luo and
                  Shaohua Tang and
                  Jiwu Huang},
  title        = {A Novel High-Capacity Reversible Data Hiding Scheme for Encrypted
                  {JPEG} Bitstreams},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {29},
  number       = {12},
  pages        = {3501--3515},
  year         = {2019},
  url          = {https://doi.org/10.1109/TCSVT.2018.2882850},
  doi          = {10.1109/TCSVT.2018.2882850},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/HeCLTH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuHH19,
  author       = {Zhenghui Liu and
                  Yuankun Huang and
                  Jiwu Huang},
  title        = {Patchwork-Based Audio Watermarking Robust Against De-Synchronization
                  and Recapturing Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {14},
  number       = {5},
  pages        = {1171--1180},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIFS.2018.2871748},
  doi          = {10.1109/TIFS.2018.2871748},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuHH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TangLTBH19,
  author       = {Weixuan Tang and
                  Bin Li and
                  Shunquan Tan and
                  Mauro Barni and
                  Jiwu Huang},
  title        = {CNN-Based Adversarial Embedding for Image Steganography},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {14},
  number       = {8},
  pages        = {2074--2087},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIFS.2019.2891237},
  doi          = {10.1109/TIFS.2019.2891237},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TangLTBH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YanYH19,
  author       = {Qi Yan and
                  Rui Yang and
                  Jiwu Huang},
  title        = {Robust Copy-Move Detection of Speech Recording Using Similarities
                  of Pitch and Formant},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {14},
  number       = {9},
  pages        = {2331--2341},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIFS.2019.2895965},
  doi          = {10.1109/TIFS.2019.2895965},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/YanYH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YanYH19a,
  author       = {Qi Yan and
                  Rui Yang and
                  Jiwu Huang},
  title        = {Detection of Speech Smoothing on Very Short Clips},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {14},
  number       = {9},
  pages        = {2441--2453},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIFS.2019.2900935},
  doi          = {10.1109/TIFS.2019.2900935},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/YanYH19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZengTLLH19,
  author       = {Jishen Zeng and
                  Shunquan Tan and
                  Guangqing Liu and
                  Bin Li and
                  Jiwu Huang},
  title        = {WISERNet: Wider Separate-Then-Reunion Network for Steganalysis of
                  Color Images},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {14},
  number       = {10},
  pages        = {2735--2748},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIFS.2019.2904413},
  doi          = {10.1109/TIFS.2019.2904413},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZengTLLH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/QinLH19,
  author       = {Xinghong Qin and
                  Bin Li and
                  Jiwu Huang},
  title        = {A New Spatial Steganographic Scheme by Modeling Image Residuals with
                  Multivariate Gaussian Model},
  booktitle    = {{IEEE} International Conference on Acoustics, Speech and Signal Processing,
                  {ICASSP} 2019, Brighton, United Kingdom, May 12-17, 2019},
  pages        = {2617--2621},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICASSP.2019.8682688},
  doi          = {10.1109/ICASSP.2019.8682688},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/QinLH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccv/LiH19,
  author       = {Haodong Li and
                  Jiwu Huang},
  title        = {Localization of Deep Inpainting Using High-Pass Fully Convolutional
                  Network},
  booktitle    = {2019 {IEEE/CVF} International Conference on Computer Vision, {ICCV}
                  2019, Seoul, Korea (South), October 27 - November 2, 2019},
  pages        = {8300--8309},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICCV.2019.00839},
  doi          = {10.1109/ICCV.2019.00839},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccv/LiH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/MoSCLH19,
  author       = {Huaxiao Mo and
                  Tingting Song and
                  Bolin Chen and
                  Weiqi Luo and
                  Jiwu Huang},
  title        = {Enhancing {JPEG} Steganography using Iterative Adversarial Examples},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2019, Delft, The Netherlands, December 9-12, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WIFS47025.2019.9035101},
  doi          = {10.1109/WIFS47025.2019.9035101},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/MoSCLH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@misc{DBLP:data/10/WangKZHPJWWZPZLKK19,
  author       = {Haiqiang Wang and
                  Ioannis Katsavounidis and
                  Xin Zhou and
                  Jiwu Huang and
                  Man{-}On Pun and
                  Xin Jin and
                  Ronggang Wang and
                  Xu Wang and
                  Yun Zhang and
                  Jeong{-}Hoon Park and
                  Jiantong Zhou and
                  Shawmin Lei and
                  Sam Kwong and
                  C.{-}C. Jay Kuo},
  title        = {VideoSet},
  publisher    = {{IEEE} DataPort},
  year         = {2019},
  month        = nov,
  howpublished = {\url{https://doi.org/10.21227/H2H01C}},
  note         = {Accessed on YYYY-MM-DD.},
  url          = {https://doi.org/10.21227/H2H01C},
  doi          = {10.21227/H2H01C},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/data/10/WangKZHPJWWZPZLKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-07556,
  author       = {Huaxiao Mo and
                  Tingting Song and
                  Bolin Chen and
                  Weiqi Luo and
                  Jiwu Huang},
  title        = {Enhancing {JPEG} Steganography using Iterative Adversarial Examples},
  journal      = {CoRR},
  volume       = {abs/1909.07556},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.07556},
  eprinttype    = {arXiv},
  eprint       = {1909.07556},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-07556.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-04657,
  author       = {Shunquan Tan and
                  Weilong Wu and
                  Zilong Shao and
                  Qiushi Li and
                  Bin Li and
                  Jiwu Huang},
  title        = {{CALPA-NET:} Channel-pruning-assisted Deep Residual Network for Steganalysis
                  of Digital Images},
  journal      = {CoRR},
  volume       = {abs/1911.04657},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.04657},
  eprinttype    = {arXiv},
  eprint       = {1911.04657},
  timestamp    = {Tue, 07 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-04657.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-03878,
  author       = {Bolin Chen and
                  Weiqi Luo and
                  Jiwu Huang},
  title        = {Universal Stego Post-processing for Enhancing Image Steganography},
  journal      = {CoRR},
  volume       = {abs/1912.03878},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.03878},
  eprinttype    = {arXiv},
  eprint       = {1912.03878},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-03878.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ChenZZLHZS18,
  author       = {Zehong Chen and
                  Fangguo Zhang and
                  Peng Zhang and
                  Joseph K. Liu and
                  Jiwu Huang and
                  Hanbang Zhao and
                  Jian Shen},
  title        = {Verifiable keyword search for secure big data-based mobile healthcare
                  networks with fine-grained authorization control},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {87},
  pages        = {712--724},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2017.10.022},
  doi          = {10.1016/J.FUTURE.2017.10.022},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/ChenZZLHZS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/ZhengQH18,
  author       = {Ligang Zheng and
                  Guoping Qiu and
                  Jiwu Huang},
  title        = {Riemannian competitive learning for symmetric positive definite matrices
                  clustering},
  journal      = {Neurocomputing},
  volume       = {295},
  pages        = {153--164},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.neucom.2018.03.015},
  doi          = {10.1016/J.NEUCOM.2018.03.015},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijon/ZhengQH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/RochaLKPH18,
  author       = {Anderson Rocha and
                  Shujun Li and
                  C.{-}C. Jay Kuo and
                  Alessandro Piva and
                  Jiwu Huang},
  title        = {Data-driven multimedia forensics and security},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {55},
  pages        = {447--448},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jvcir.2018.06.023},
  doi          = {10.1016/J.JVCIR.2018.06.023},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jvcir/RochaLKPH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/YangRZHS18,
  author       = {Jianquan Yang and
                  Honglei Ren and
                  Guopu Zhu and
                  Jiwu Huang and
                  Yun{-}Qing Shi},
  title        = {Detecting median filtering via two-dimensional {AR} models of multiple
                  filtered residuals},
  journal      = {Multim. Tools Appl.},
  volume       = {77},
  number       = {7},
  pages        = {7931--7953},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11042-017-4691-0},
  doi          = {10.1007/S11042-017-4691-0},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/YangRZHS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spic/WuTHS18,
  author       = {Hao{-}Tian Wu and
                  Shaohua Tang and
                  Jiwu Huang and
                  Yun{-}Qing Shi},
  title        = {A novel reversible data hiding method with image contrast enhancement},
  journal      = {Signal Process. Image Commun.},
  volume       = {62},
  pages        = {64--73},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.image.2017.12.006},
  doi          = {10.1016/J.IMAGE.2017.12.006},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spic/WuTHS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/LiLQH18,
  author       = {Haodong Li and
                  Weiqi Luo and
                  Xiaoqing Qiu and
                  Jiwu Huang},
  title        = {Identification of Various Image Operations Using Residual-Based Features},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {28},
  number       = {1},
  pages        = {31--45},
  year         = {2018},
  url          = {https://doi.org/10.1109/TCSVT.2016.2599849},
  doi          = {10.1109/TCSVT.2016.2599849},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcsv/LiLQH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZengTLH18,
  author       = {Jishen Zeng and
                  Shunquan Tan and
                  Bin Li and
                  Jiwu Huang},
  title        = {Large-Scale {JPEG} Image Steganalysis Using Hybrid Deep-Learning Framework},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {5},
  pages        = {1200--1214},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2779446},
  doi          = {10.1109/TIFS.2017.2779446},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZengTLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LuoKH18,
  author       = {Da Luo and
                  Pawel Korus and
                  Jiwu Huang},
  title        = {Band Energy Difference for Source Attribution in Audio Forensics},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {9},
  pages        = {2179--2189},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2812185},
  doi          = {10.1109/TIFS.2018.2812185},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LuoKH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tip/ZhengH18,
  author       = {Peijia Zheng and
                  Jiwu Huang},
  title        = {Efficient Encrypted Images Filtering and Transform Coding With Walsh-Hadamard
                  Transform and Parallelization},
  journal      = {{IEEE} Trans. Image Process.},
  volume       = {27},
  number       = {5},
  pages        = {2541--2556},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIP.2018.2802199},
  doi          = {10.1109/TIP.2018.2802199},
  timestamp    = {Sat, 30 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tip/ZhengH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmm/HeHTH18,
  author       = {Junhui He and
                  Shuhao Huang and
                  Shaohua Tang and
                  Jiwu Huang},
  title        = {{JPEG} Image Encryption With Improved Format Compatibility and File
                  Size Preservation},
  journal      = {{IEEE} Trans. Multim.},
  volume       = {20},
  number       = {10},
  pages        = {2645--2658},
  year         = {2018},
  url          = {https://doi.org/10.1109/TMM.2018.2817065},
  doi          = {10.1109/TMM.2018.2817065},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmm/HeHTH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tomccap/LuoLYYH18,
  author       = {Weiqi Luo and
                  Haodong Li and
                  Qi Yan and
                  Rui Yang and
                  Jiwu Huang},
  title        = {Improved Audio Steganalytic Feature and Its Applications in Audio
                  Forensics},
  journal      = {{ACM} Trans. Multim. Comput. Commun. Appl.},
  volume       = {14},
  number       = {2},
  pages        = {43:1--43:14},
  year         = {2018},
  url          = {https://doi.org/10.1145/3190575},
  doi          = {10.1145/3190575},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tomccap/LuoLYYH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/SunJH18,
  author       = {Yao Sun and
                  Hong Jia and
                  Jiwu Huang},
  title        = {Ensemble Clustering with Novel Weighting Strategy},
  booktitle    = {14th International Conference on Computational Intelligence and Security,
                  {CIS} 2018, Hangzhou, China, November 16-19, 2018},
  pages        = {155--159},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/CIS2018.2018.00041},
  doi          = {10.1109/CIS2018.2018.00041},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/SunJH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/ChenCCZH18,
  author       = {Delin Chen and
                  Wenhao Chen and
                  Jian Chen and
                  Peijia Zheng and
                  Jiwu Huang},
  title        = {Edge Detection and Image Segmentation on Encrypted Image with Homomorphic
                  Encryption and Garbled Circuit},
  booktitle    = {2018 {IEEE} International Conference on Multimedia and Expo, {ICME}
                  2018, San Diego, CA, USA, July 23-27, 2018},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICME.2018.8486551},
  doi          = {10.1109/ICME.2018.8486551},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icmcs/ChenCCZH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HuangTLH18,
  author       = {Yuankun Huang and
                  Shunquan Tan and
                  Bin Li and
                  Jiwu Huang},
  editor       = {Chang D. Yoo and
                  Yun Qing Shi and
                  Hyoung{-}Joong Kim and
                  Alessandro Piva and
                  Gwangsu Kim},
  title        = {{VPCID} - {A} VoIP Phone Call Identification Database},
  booktitle    = {Digital Forensics and Watermarking - 17th International Workshop,
                  {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11378},
  pages        = {307--321},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11389-6\_23},
  doi          = {10.1007/978-3-030-11389-6\_23},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HuangTLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenCZGZH18,
  author       = {Jian Chen and
                  Ziyang Chen and
                  Peijia Zheng and
                  Jianting Guo and
                  Wei Zhang and
                  Jiwu Huang},
  title        = {Encrypted Domain Mel-Frequency Cepstral Coefficient and Fragile Audio
                  Watermarking},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {68--73},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00021},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00021},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenCZGZH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChenZGZH18,
  author       = {Jian Chen and
                  Peijia Zheng and
                  Jianting Guo and
                  Wei Zhang and
                  Jiwu Huang},
  title        = {A Privacy-Preserving Multipurpose Watermarking Scheme for Audio Authentication
                  and Protection},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {86--91},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00023},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00023},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChenZGZH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WuZGZH18,
  author       = {Yangxin Wu and
                  Peijia Zheng and
                  Jianting Guo and
                  Wei Zhang and
                  Jiwu Huang},
  title        = {A Controllable Efficient Content Distribution Framework Based on Blockchain
                  and {ISODATA}},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1698--1701},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00254},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00254},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/WuZGZH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FerreiraCLH18,
  author       = {Anselmo Ferreira and
                  Han Chen and
                  Bin Li and
                  Jiwu Huang},
  title        = {An Inception-Based Data-Driven Ensemble Approach to Camera Model Identification},
  booktitle    = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WIFS.2018.8630774},
  doi          = {10.1109/WIFS.2018.8630774},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/FerreiraCLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cloudcomp/2016,
  editor       = {Jiafu Wan and
                  Kai Lin and
                  Delu Zeng and
                  Jin Li and
                  Yang Xiang and
                  Xiaofeng Liao and
                  Jiwu Huang and
                  Zheli Liu},
  title        = {Cloud Computing, Security, Privacy in New Computing Environments -
                  7th International Conference, CloudComp 2016, and First International
                  Conference, {SPNCE} 2016, Guangzhou, China, November 25-26, and December
                  15-16, 2016, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {197},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-69605-8},
  doi          = {10.1007/978-3-319-69605-8},
  isbn         = {978-3-319-69604-1},
  timestamp    = {Sat, 29 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudcomp/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1803-04805,
  author       = {Jishen Zeng and
                  Shunquan Tan and
                  Guangqing Liu and
                  Bin Li and
                  Jiwu Huang},
  title        = {WISERNet: Wider Separate-then-reunion Network for Steganalysis of
                  Color Images},
  journal      = {CoRR},
  volume       = {abs/1803.04805},
  year         = {2018},
  url          = {http://arxiv.org/abs/1803.04805},
  eprinttype    = {arXiv},
  eprint       = {1803.04805},
  timestamp    = {Wed, 03 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1803-04805.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1803-09043,
  author       = {Weixuan Tang and
                  Bin Li and
                  Shunquan Tan and
                  Mauro Barni and
                  Jiwu Huang},
  title        = {{CNN} Based Adversarial Embedding with Minimum Alteration for Image
                  Steganography},
  journal      = {CoRR},
  volume       = {abs/1803.09043},
  year         = {2018},
  url          = {http://arxiv.org/abs/1803.09043},
  eprinttype    = {arXiv},
  eprint       = {1803.09043},
  timestamp    = {Thu, 06 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1803-09043.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-07276,
  author       = {Haodong Li and
                  Bin Li and
                  Shunquan Tan and
                  Jiwu Huang},
  title        = {Detection of Deep Network Generated Images Using Disparities in Color
                  Components},
  journal      = {CoRR},
  volume       = {abs/1808.07276},
  year         = {2018},
  url          = {http://arxiv.org/abs/1808.07276},
  eprinttype    = {arXiv},
  eprint       = {1808.07276},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1808-07276.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/Chen0ZH17,
  author       = {Zehong Chen and
                  Peng Zhang and
                  Fangguo Zhang and
                  Jiwu Huang},
  title        = {Ciphertext policy attribute-based encryption supporting unbounded
                  attribute space from {R-LWE}},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {11},
  number       = {4},
  pages        = {2292--2309},
  year         = {2017},
  url          = {https://doi.org/10.3837/tiis.2017.04.025},
  doi          = {10.3837/TIIS.2017.04.025},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/Chen0ZH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/WangKZPLZPJWWZH17,
  author       = {Haiqiang Wang and
                  Ioannis Katsavounidis and
                  Jiantong Zhou and
                  Jeong{-}Hoon Park and
                  Shawmin Lei and
                  Xin Zhou and
                  Man{-}On Pun and
                  Xin Jin and
                  Ronggang Wang and
                  Xu Wang and
                  Yun Zhang and
                  Jiwu Huang and
                  Sam Kwong and
                  C.{-}C. Jay Kuo},
  title        = {VideoSet: {A} large-scale compressed video quality dataset based on
                  {JND} measurement},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {46},
  pages        = {292--302},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jvcir.2017.04.009},
  doi          = {10.1016/J.JVCIR.2017.04.009},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jvcir/WangKZPLZPJWWZH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LiuHSQ17,
  author       = {Zhenghui Liu and
                  Jiwu Huang and
                  Xingming Sun and
                  Chuanda Qi},
  title        = {A security watermark scheme used for digital speech forensics},
  journal      = {Multim. Tools Appl.},
  volume       = {76},
  number       = {7},
  pages        = {9297--9317},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11042-016-3533-9},
  doi          = {10.1007/S11042-016-3533-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/LiuHSQ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LiuLHWQ17,
  author       = {Zhenghui Liu and
                  Da Luo and
                  Jiwu Huang and
                  J. Wang and
                  Chuanda Qi},
  title        = {Tamper recovery algorithm for digital speech signal based on {DWT}
                  and {DCT}},
  journal      = {Multim. Tools Appl.},
  volume       = {76},
  number       = {10},
  pages        = {12481--12504},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11042-016-3664-z},
  doi          = {10.1007/S11042-016-3664-Z},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/LiuLHWQ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spl/TangTLH17,
  author       = {Weixuan Tang and
                  Shunquan Tan and
                  Bin Li and
                  Jiwu Huang},
  title        = {Automatic Steganographic Distortion Learning Using a Generative Adversarial
                  Network},
  journal      = {{IEEE} Signal Process. Lett.},
  volume       = {24},
  number       = {10},
  pages        = {1547--1551},
  year         = {2017},
  url          = {https://doi.org/10.1109/LSP.2017.2745572},
  doi          = {10.1109/LSP.2017.2745572},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/spl/TangTLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LuoYLH17,
  author       = {Da Luo and
                  Rui Yang and
                  Bin Li and
                  Jiwu Huang},
  title        = {Detection of Double Compressed {AMR} Audio Using Stacked Autoencoder},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {2},
  pages        = {432--444},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2622012},
  doi          = {10.1109/TIFS.2016.2622012},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LuoYLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KorusH17,
  author       = {Pawel Korus and
                  Jiwu Huang},
  title        = {Multi-Scale Analysis Strategies in PRNU-Based Tampering Localization},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {4},
  pages        = {809--824},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2636089},
  doi          = {10.1109/TIFS.2016.2636089},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KorusH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiLQH17,
  author       = {Haodong Li and
                  Weiqi Luo and
                  Xiaoqing Qiu and
                  Jiwu Huang},
  title        = {Image Forgery Localization via Integrating Tampering Possibility Maps},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {5},
  pages        = {1240--1252},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2656823},
  doi          = {10.1109/TIFS.2017.2656823},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiLQH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TanZLH17,
  author       = {Shunquan Tan and
                  Haojie Zhang and
                  Bin Li and
                  Jiwu Huang},
  title        = {Pixel-Decimation-Assisted Steganalysis of Synchronize-Embedding-Changes
                  Steganography},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {7},
  pages        = {1658--1670},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2682703},
  doi          = {10.1109/TIFS.2017.2682703},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TanZLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FerreiraBBBHSTR17,
  author       = {Anselmo Ferreira and
                  Luca Bondi and
                  Luca Baroffio and
                  Paolo Bestagini and
                  Jiwu Huang and
                  Jefersson A. dos Santos and
                  Stefano Tubaro and
                  Anderson Rocha},
  title        = {Data-Driven Feature Characterization Techniques for Laser Printer
                  Attribution},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {8},
  pages        = {1860--1873},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2692722},
  doi          = {10.1109/TIFS.2017.2692722},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FerreiraBBBHSTR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiLH17,
  author       = {Haodong Li and
                  Weiqi Luo and
                  Jiwu Huang},
  title        = {Localization of Diffusion-Based Inpainting in Digital Images},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {12},
  pages        = {3050--3064},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2730822},
  doi          = {10.1109/TIFS.2017.2730822},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tomccap/GuoZH17,
  author       = {Jianting Guo and
                  Peijia Zheng and
                  Jiwu Huang},
  title        = {An Efficient Motion Detection and Tracking Scheme for Encrypted Surveillance
                  Videos},
  journal      = {{ACM} Trans. Multim. Comput. Commun. Appl.},
  volume       = {13},
  number       = {4},
  pages        = {61:1--61:23},
  year         = {2017},
  url          = {https://doi.org/10.1145/3131342},
  doi          = {10.1145/3131342},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tomccap/GuoZH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icvip/BianLH17,
  author       = {Shan Bian and
                  Weiqi Luo and
                  Jiwu Huang},
  title        = {Exposing Video Forgeries by Detecting Misaligned Double Compression},
  booktitle    = {Proceedings of the International Conference on Video and Image Processing,
                  {ICVIP} 2017, Singapore, December 27-29, 2017},
  pages        = {44--48},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3177404.3177420},
  doi          = {10.1145/3177404.3177420},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icvip/BianLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mediaforensics/ZengTLH17,
  author       = {Jishen Zeng and
                  Shunquan Tan and
                  Bin Li and
                  Jiwu Huang},
  editor       = {Adnan M. Alattar and
                  Nasir D. Memon},
  title        = {Pre-training via fitting deep neural network to rich-model features
                  extraction procedure and its effect on deep learning for steganalysis},
  booktitle    = {Media Watermarking, Security, and Forensics 2017, Burlingame, CA,
                  USA, 29 January 2017 - 2 February 2017},
  pages        = {44--49},
  publisher    = {Society for Imaging Science and Technology},
  year         = {2017},
  url          = {https://doi.org/10.2352/ISSN.2470-1173.2017.7.MWSF-324},
  doi          = {10.2352/ISSN.2470-1173.2017.7.MWSF-324},
  timestamp    = {Mon, 17 Jul 2023 16:29:17 +0200},
  biburl       = {https://dblp.org/rec/conf/mediaforensics/ZengTLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WangKZPLZPJWWZH17,
  author       = {Haiqiang Wang and
                  Ioannis Katsavounidis and
                  Jiantong Zhou and
                  Jeong{-}Hoon Park and
                  Shawmin Lei and
                  Xin Zhou and
                  Man{-}On Pun and
                  Xin Jin and
                  Ronggang Wang and
                  Xu Wang and
                  Yun Zhang and
                  Jiwu Huang and
                  Sam Kwong and
                  C.{-}C. Jay Kuo},
  title        = {VideoSet: {A} Large-Scale Compressed Video Quality Dataset Based on
                  {JND} Measurement},
  journal      = {CoRR},
  volume       = {abs/1701.01500},
  year         = {2017},
  url          = {http://arxiv.org/abs/1701.01500},
  eprinttype    = {arXiv},
  eprint       = {1701.01500},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/WangKZPLZPJWWZH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LiLRH17,
  author       = {Haodong Li and
                  Weiqi Luo and
                  Quanquan Rao and
                  Jiwu Huang},
  title        = {Anti-Forensics of Camera Identification and the Triangle Test by Improved
                  Fingerprint-Copy Attack},
  journal      = {CoRR},
  volume       = {abs/1707.07795},
  year         = {2017},
  url          = {http://arxiv.org/abs/1707.07795},
  eprinttype    = {arXiv},
  eprint       = {1707.07795},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/LiLRH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/XiangHPHM16,
  author       = {Yong Xiang and
                  Jiwu Huang and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Guang Hua and
                  Hafiz Malik},
  title        = {{IEEE} Access Special Section Editorial: Latest Advances and Emerging
                  Applications of Data Hiding},
  journal      = {{IEEE} Access},
  volume       = {4},
  pages        = {9740--9742},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACCESS.2016.2612138},
  doi          = {10.1109/ACCESS.2016.2612138},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/XiangHPHM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/WuCH16,
  author       = {Hao{-}Tian Wu and
                  Yiu{-}ming Cheung and
                  Jiwu Huang},
  title        = {Reversible data hiding in Paillier cryptosystem},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {40},
  pages        = {765--771},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jvcir.2016.08.021},
  doi          = {10.1016/J.JVCIR.2016.08.021},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jvcir/WuCH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/SunHW16,
  author       = {Zhiwei Sun and
                  Jiwu Huang and
                  Ping Wang},
  title        = {Efficient multiparty quantum key agreement protocol based on commutative
                  encryption},
  journal      = {Quantum Inf. Process.},
  volume       = {15},
  number       = {5},
  pages        = {2101--2111},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11128-016-1253-8},
  doi          = {10.1007/S11128-016-1253-8},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/SunHW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/LiuZWWH16,
  author       = {Zhenghui Liu and
                  Fan Zhang and
                  Jing Wang and
                  Hongxia Wang and
                  Jiwu Huang},
  title        = {Authentication and recovery algorithm for speech signal based on digital
                  watermarking},
  journal      = {Signal Process.},
  volume       = {123},
  pages        = {157--166},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.sigpro.2015.10.023},
  doi          = {10.1016/J.SIGPRO.2015.10.023},
  timestamp    = {Tue, 29 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigpro/LiuZWWH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/HuaHSGT16,
  author       = {Guang Hua and
                  Jiwu Huang and
                  Yun Q. Shi and
                  Jonathan Goh and
                  Vrizlynn L. L. Thing},
  title        = {Twenty years of digital audio watermarking - a comprehensive review},
  journal      = {Signal Process.},
  volume       = {128},
  pages        = {222--242},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.sigpro.2016.04.005},
  doi          = {10.1016/J.SIGPRO.2016.04.005},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigpro/HuaHSGT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spic/FengL0HS16,
  author       = {Bingwen Feng and
                  Wei Lu and
                  Wei Sun and
                  Jiwu Huang and
                  Yun{-}Qing Shi},
  title        = {Robust image watermarking based on Tucker decomposition and Adaptive-Lattice
                  Quantization Index Modulation},
  journal      = {Signal Process. Image Commun.},
  volume       = {41},
  pages        = {1--14},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.image.2015.10.007},
  doi          = {10.1016/J.IMAGE.2015.10.007},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spic/FengL0HS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spl/KorusH16,
  author       = {Pawel Korus and
                  Jiwu Huang},
  title        = {Improved Tampering Localization in Digital Image Forensics Based on
                  Maximal Entropy Random Walk},
  journal      = {{IEEE} Signal Process. Lett.},
  volume       = {23},
  number       = {1},
  pages        = {169--173},
  year         = {2016},
  url          = {https://doi.org/10.1109/LSP.2015.2507598},
  doi          = {10.1109/LSP.2015.2507598},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spl/KorusH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spl/TangLLH16,
  author       = {Weixuan Tang and
                  Bin Li and
                  Weiqi Luo and
                  Jiwu Huang},
  title        = {Clustering Steganographic Modification Directions for Color Components},
  journal      = {{IEEE} Signal Process. Lett.},
  volume       = {23},
  number       = {2},
  pages        = {197--201},
  year         = {2016},
  url          = {https://doi.org/10.1109/LSP.2015.2504583},
  doi          = {10.1109/LSP.2015.2504583},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spl/TangLLH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spl/LuoSH16,
  author       = {Da Luo and
                  Mengmeng Sun and
                  Jiwu Huang},
  title        = {Audio Postprocessing Detection Based on Amplitude Cooccurrence Vector
                  Feature},
  journal      = {{IEEE} Signal Process. Lett.},
  volume       = {23},
  number       = {5},
  pages        = {688--692},
  year         = {2016},
  url          = {https://doi.org/10.1109/LSP.2016.2549600},
  doi          = {10.1109/LSP.2016.2549600},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spl/LuoSH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/HuangQKH16,
  author       = {Fangjun Huang and
                  Xiaochao Qu and
                  Hyoung Joong Kim and
                  Jiwu Huang},
  title        = {Reversible Data Hiding in {JPEG} Images},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {26},
  number       = {9},
  pages        = {1610--1621},
  year         = {2016},
  url          = {https://doi.org/10.1109/TCSVT.2015.2473235},
  doi          = {10.1109/TCSVT.2015.2473235},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/HuangQKH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/ChenTLH16,
  author       = {Shengda Chen and
                  Shunquan Tan and
                  Bin Li and
                  Jiwu Huang},
  title        = {Automatic Detection of Object-Based Forgery in Advanced Video},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {26},
  number       = {11},
  pages        = {2138--2151},
  year         = {2016},
  url          = {https://doi.org/10.1109/TCSVT.2015.2473436},
  doi          = {10.1109/TCSVT.2015.2473436},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/ChenTLH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TangLLH16,
  author       = {Weixuan Tang and
                  Haodong Li and
                  Weiqi Luo and
                  Jiwu Huang},
  title        = {Adaptive Steganalysis Based on Embedding Probabilities of Pixels},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {4},
  pages        = {734--745},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2507159},
  doi          = {10.1109/TIFS.2015.2507159},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/TangLLH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangHS16,
  author       = {Fangjun Huang and
                  Jiwu Huang and
                  Yun{-}Qing Shi},
  title        = {New Framework for Reversible Data Hiding in Encrypted Domain},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {12},
  pages        = {2777--2789},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2598528},
  doi          = {10.1109/TIFS.2016.2598528},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HuangHS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tip/KorusH16,
  author       = {Pawel Korus and
                  Jiwu Huang},
  title        = {Multi-Scale Fusion for Improved Localization of Malicious Tampering
                  in Digital Images},
  journal      = {{IEEE} Trans. Image Process.},
  volume       = {25},
  number       = {3},
  pages        = {1312--1326},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIP.2016.2518870},
  doi          = {10.1109/TIP.2016.2518870},
  timestamp    = {Sun, 10 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tip/KorusH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tomccap/WuWH16,
  author       = {Haojun Wu and
                  Yong Wang and
                  Jiwu Huang},
  title        = {Identification of Reconstructed Speech},
  journal      = {{ACM} Trans. Multim. Comput. Commun. Appl.},
  volume       = {13},
  number       = {1},
  pages        = {10:1--10:20},
  year         = {2016},
  url          = {https://doi.org/10.1145/3004055},
  doi          = {10.1145/3004055},
  timestamp    = {Sun, 10 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tomccap/WuWH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/accv/ZhengQH16,
  author       = {Ligang Zheng and
                  Guoping Qiu and
                  Jiwu Huang},
  editor       = {Shang{-}Hong Lai and
                  Vincent Lepetit and
                  Ko Nishino and
                  Yoichi Sato},
  title        = {Clustering Symmetric Positive Definite Matrices on the Riemannian
                  Manifolds},
  booktitle    = {Computer Vision - {ACCV} 2016 - 13th Asian Conference on Computer
                  Vision, Taipei, Taiwan, November 20-24, 2016, Revised Selected Papers,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10111},
  pages        = {400--415},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54181-5\_26},
  doi          = {10.1007/978-3-319-54181-5\_26},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/accv/ZhengQH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/KorusH16,
  author       = {Pawel Korus and
                  Jiwu Huang},
  title        = {Evaluation of random field models in multi-modal unsupervised tampering
                  localization},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2016, Abu Dhabi, United Arab Emirates, December 4-7, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WIFS.2016.7823898},
  doi          = {10.1109/WIFS.2016.7823898},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/KorusH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ZengTLH16,
  author       = {Jishen Zeng and
                  Shunquan Tan and
                  Bin Li and
                  Jiwu Huang},
  title        = {Large-scale {JPEG} steganalysis using hybrid deep-learning framework},
  journal      = {CoRR},
  volume       = {abs/1611.03233},
  year         = {2016},
  url          = {http://arxiv.org/abs/1611.03233},
  eprinttype    = {arXiv},
  eprint       = {1611.03233},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ZengTLH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cvm/HuangQKH15,
  author       = {Fangjun Huang and
                  Xiaochao Qu and
                  Hyoung Joong Kim and
                  Jiwu Huang},
  title        = {Local pixel patterns},
  journal      = {Comput. Vis. Media},
  volume       = {1},
  number       = {2},
  pages        = {157--170},
  year         = {2015},
  url          = {https://doi.org/10.1007/s41095-015-0014-4},
  doi          = {10.1007/S41095-015-0014-4},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cvm/HuangQKH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsp/LuoYH15,
  author       = {Da Luo and
                  Rui Yang and
                  Jiwu Huang},
  title        = {Identification of {AMR} decompressed audio},
  journal      = {Digit. Signal Process.},
  volume       = {37},
  pages        = {85--91},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.dsp.2014.11.003},
  doi          = {10.1016/J.DSP.2014.11.003},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dsp/LuoYH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsp/YangZHZ15,
  author       = {Jianquan Yang and
                  Guopu Zhu and
                  Jiwu Huang and
                  Xi Zhao},
  title        = {Estimating {JPEG} compression history of bitmaps based on factor histogram},
  journal      = {Digit. Signal Process.},
  volume       = {41},
  pages        = {90--97},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.dsp.2015.03.014},
  doi          = {10.1016/J.DSP.2015.03.014},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dsp/YangZHZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsp/WangWH15,
  author       = {Yong Wang and
                  Haojun Wu and
                  Jiwu Huang},
  title        = {Verification of hidden speaker behind transformation disguised voices},
  journal      = {Digit. Signal Process.},
  volume       = {45},
  pages        = {84--95},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.dsp.2015.06.010},
  doi          = {10.1016/J.DSP.2015.06.010},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dsp/WangWH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/GuoZH15,
  author       = {Jianting Guo and
                  Peijia Zheng and
                  Jiwu Huang},
  title        = {Secure watermarking scheme against watermark attacks in the encrypted
                  domain},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {30},
  pages        = {125--135},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jvcir.2015.03.009},
  doi          = {10.1016/J.JVCIR.2015.03.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jvcir/GuoZH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/WuHS15,
  author       = {Hao{-}Tian Wu and
                  Jiwu Huang and
                  Yun{-}Qing Shi},
  title        = {A reversible data hiding method with contrast enhancement for medical
                  images},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {31},
  pages        = {146--153},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jvcir.2015.06.010},
  doi          = {10.1016/J.JVCIR.2015.06.010},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jvcir/WuHS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LiLH15,
  author       = {Haodong Li and
                  Weiqi Luo and
                  Jiwu Huang},
  title        = {Anti-forensics of double {JPEG} compression with the same quantization
                  matrix},
  journal      = {Multim. Tools Appl.},
  volume       = {74},
  number       = {17},
  pages        = {6729--6744},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11042-014-1927-0},
  doi          = {10.1007/S11042-014-1927-0},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/LiLH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiNLTH15,
  author       = {Bin Li and
                  Tian{-}Tsong Ng and
                  Xiaolong Li and
                  Shunquan Tan and
                  Jiwu Huang},
  title        = {Revealing the Trace of High-Quality {JPEG} Compression Through Quantization
                  Noise Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {3},
  pages        = {558--573},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2389148},
  doi          = {10.1109/TIFS.2015.2389148},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiNLTH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiWLTH15,
  author       = {Bin Li and
                  Ming Wang and
                  Xiaolong Li and
                  Shunquan Tan and
                  Jiwu Huang},
  title        = {A Strategy of Clustering Modification Directions in Spatial Image
                  Steganography},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {9},
  pages        = {1905--1917},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2434600},
  doi          = {10.1109/TIFS.2015.2434600},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiWLTH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tip/LiNLTH15,
  author       = {Bin Li and
                  Tian{-}Tsong Ng and
                  Xiaolong Li and
                  Shunquan Tan and
                  Jiwu Huang},
  title        = {Statistical Model of {JPEG} Noises and Its Application in Quantization
                  Step Estimation},
  journal      = {{IEEE} Trans. Image Process.},
  volume       = {24},
  number       = {5},
  pages        = {1471--1484},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIP.2015.2405477},
  doi          = {10.1109/TIP.2015.2405477},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tip/LiNLTH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chinasip/LuoWH15,
  author       = {Da Luo and
                  Haojun Wu and
                  Jiwu Huang},
  title        = {Audio recapture detection using deep learning},
  booktitle    = {{IEEE} China Summit and International Conference on Signal and Information
                  Processing, ChinaSIP 2015, Chengdu, China, July 12-15, 2015},
  pages        = {478--482},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ChinaSIP.2015.7230448},
  doi          = {10.1109/CHINASIP.2015.7230448},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/chinasip/LuoWH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/YanYH15,
  author       = {Qi Yan and
                  Rui Yang and
                  Jiwu Huang},
  title        = {Copy-move detection of audio recording with pitch similarity},
  booktitle    = {2015 {IEEE} International Conference on Acoustics, Speech and Signal
                  Processing, {ICASSP} 2015, South Brisbane, Queensland, Australia,
                  April 19-24, 2015},
  pages        = {1782--1786},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICASSP.2015.7178277},
  doi          = {10.1109/ICASSP.2015.7178277},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icassp/YanYH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/TanHH15,
  author       = {Yanping Tan and
                  Fangjun Huang and
                  Jiwu Huang},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Isao Echizen},
  title        = {Feature Selection for High Dimensional Steganalysis},
  booktitle    = {Digital-Forensics and Watermarking - 14th International Workshop,
                  {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9569},
  pages        = {134--144},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31960-5\_12},
  doi          = {10.1007/978-3-319-31960-5\_12},
  timestamp    = {Thu, 28 May 2020 12:51:39 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/TanHH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LiLQH15,
  author       = {Haodong Li and
                  Weiqi Luo and
                  Xiaoqing Qiu and
                  Jiwu Huang},
  title        = {Identification of Image Operations Based on Steganalytic Features},
  journal      = {CoRR},
  volume       = {abs/1503.04718},
  year         = {2015},
  url          = {http://arxiv.org/abs/1503.04718},
  eprinttype    = {arXiv},
  eprint       = {1503.04718},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/LiLQH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cgf/LiuMHH14,
  author       = {Bin Liu and
                  Ralph R. Martin and
                  Ji{-}Wu Huang and
                  Shi{-}Min Hu},
  title        = {Structure Aware Visual Cryptography},
  journal      = {Comput. Graph. Forum},
  volume       = {33},
  number       = {7},
  pages        = {141--150},
  year         = {2014},
  url          = {https://doi.org/10.1111/cgf.12482},
  doi          = {10.1111/CGF.12482},
  timestamp    = {Mon, 14 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cgf/LiuMHH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/QuLH14,
  author       = {Zhenhua Qu and
                  Weiqi Luo and
                  Jiwu Huang},
  title        = {A framework for identifying shifted double {JPEG} compression artifacts
                  with application to non-intrusive digital image forensics},
  journal      = {Sci. China Inf. Sci.},
  volume       = {57},
  number       = {2},
  pages        = {1--18},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11432-013-5046-8},
  doi          = {10.1007/S11432-013-5046-8},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/QuLH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsp/WangZH14,
  author       = {Yuan{-}Gen Wang and
                  Guopu Zhu and
                  Jiwu Huang},
  title        = {An improved sample projection approach for image watermarking},
  journal      = {Digit. Signal Process.},
  volume       = {24},
  pages        = {135--143},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.dsp.2013.09.009},
  doi          = {10.1016/J.DSP.2013.09.009},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dsp/WangZH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/BianLH14,
  author       = {Shan Bian and
                  Weiqi Luo and
                  Jiwu Huang},
  title        = {Detecting video frame-rate up-conversion based on periodic properties
                  of inter-frame similarity},
  journal      = {Multim. Tools Appl.},
  volume       = {72},
  number       = {1},
  pages        = {437--451},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11042-013-1364-5},
  doi          = {10.1007/S11042-013-1364-5},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/BianLH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pr/LeiZH14,
  author       = {Yanqiang Lei and
                  Ligang Zheng and
                  Jiwu Huang},
  title        = {Geometric invariant features in the Radon transform domain for near-duplicate
                  image detection},
  journal      = {Pattern Recognit.},
  volume       = {47},
  number       = {11},
  pages        = {3630--3640},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.patcog.2014.05.009},
  doi          = {10.1016/J.PATCOG.2014.05.009},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pr/LeiZH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/BianLH14,
  author       = {Shan Bian and
                  Weiqi Luo and
                  Jiwu Huang},
  title        = {Exposing Fake Bit Rate Videos and Estimating Original Bit Rates},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {24},
  number       = {12},
  pages        = {2144--2154},
  year         = {2014},
  url          = {https://doi.org/10.1109/TCSVT.2014.2334031},
  doi          = {10.1109/TCSVT.2014.2334031},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/BianLH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WuWH14,
  author       = {Haojun Wu and
                  Yong Wang and
                  Jiwu Huang},
  title        = {Identification of Electronic Disguised Voices},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {9},
  number       = {3},
  pages        = {489--500},
  year         = {2014},
  url          = {https://doi.org/10.1109/TIFS.2014.2301912},
  doi          = {10.1109/TIFS.2014.2301912},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WuWH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiTWH14,
  author       = {Bin Li and
                  Shunquan Tan and
                  Ming Wang and
                  Jiwu Huang},
  title        = {Investigation on Cost Assignment in Spatial Image Steganography},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {9},
  number       = {8},
  pages        = {1264--1277},
  year         = {2014},
  url          = {https://doi.org/10.1109/TIFS.2014.2326954},
  doi          = {10.1109/TIFS.2014.2326954},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiTWH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tomccap/LuoLYH14,
  author       = {Da Luo and
                  Weiqi Luo and
                  Rui Yang and
                  Jiwu Huang},
  title        = {Identifying Compression History of Wave Audio and Its Applications},
  journal      = {{ACM} Trans. Multim. Comput. Commun. Appl.},
  volume       = {10},
  number       = {3},
  pages        = {30:1--30:19},
  year         = {2014},
  url          = {https://doi.org/10.1145/2575978},
  doi          = {10.1145/2575978},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tomccap/LuoLYH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tomccap/LeiQZH14,
  author       = {Yanqiang Lei and
                  Guoping Qiu and
                  Ligang Zheng and
                  Jiwu Huang},
  title        = {Fast Near-Duplicate Image Detection Using Uniform Randomized Trees},
  journal      = {{ACM} Trans. Multim. Comput. Commun. Appl.},
  volume       = {10},
  number       = {4},
  pages        = {35:1--35:15},
  year         = {2014},
  url          = {https://doi.org/10.1145/2602186},
  doi          = {10.1145/2602186},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tomccap/LeiQZH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chinasip/HuangHH14,
  author       = {Zhensheng Huang and
                  Fangjun Huang and
                  Jiwu Huang},
  title        = {Detection of double compression with the same bit rate in {MPEG-2}
                  videos},
  booktitle    = {{IEEE} China Summit {\&} International Conference on Signal and
                  Information Processing, ChinaSIP 2014, Xi'an, China, July 9-13, 2014},
  pages        = {306--309},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ChinaSIP.2014.6889253},
  doi          = {10.1109/CHINASIP.2014.6889253},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/chinasip/HuangHH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/LuoYH14,
  author       = {Da Luo and
                  Rui Yang and
                  Jiwu Huang},
  title        = {Detecting double compressed {AMR} audio using deep learning},
  booktitle    = {{IEEE} International Conference on Acoustics, Speech and Signal Processing,
                  {ICASSP} 2014, Florence, Italy, May 4-9, 2014},
  pages        = {2669--2673},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICASSP.2014.6854084},
  doi          = {10.1109/ICASSP.2014.6854084},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/LuoYH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/ZhengQHD14,
  author       = {Ligang Zheng and
                  Guoping Qiu and
                  Jiwu Huang and
                  Jiang Duan},
  title        = {Fast and accurate Nearest Neighbor search in the manifolds of symmetric
                  positive definite matrices},
  booktitle    = {{IEEE} International Conference on Acoustics, Speech and Signal Processing,
                  {ICASSP} 2014, Florence, Italy, May 4-9, 2014},
  pages        = {3804--3808},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICASSP.2014.6854313},
  doi          = {10.1109/ICASSP.2014.6854313},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/ZhengQHD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/LiWHL14,
  author       = {Bin Li and
                  Ming Wang and
                  Jiwu Huang and
                  Xiaolong Li},
  title        = {A new cost function for spatial image steganography},
  booktitle    = {2014 {IEEE} International Conference on Image Processing, {ICIP} 2014,
                  Paris, France, October 27-30, 2014},
  pages        = {4206--4210},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICIP.2014.7025854},
  doi          = {10.1109/ICIP.2014.7025854},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icip/LiWHL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/WuLHY14,
  author       = {Hao{-}Tian Wu and
                  Yuan Liu and
                  Jiwu Huang and
                  Xin{-}Yu Yang},
  title        = {Improved steganalysis algorithm against motion vector based video
                  steganography},
  booktitle    = {2014 {IEEE} International Conference on Image Processing, {ICIP} 2014,
                  Paris, France, October 27-30, 2014},
  pages        = {5512--5516},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICIP.2014.7026115},
  doi          = {10.1109/ICIP.2014.7026115},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icip/WuLHY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpr/ChenLLYH14,
  author       = {Chao Chen and
                  Haodong Li and
                  Weiqi Luo and
                  Rui Yang and
                  Jiwu Huang},
  title        = {Anti-forensics of {JPEG} Detectors via Adaptive Quantization Table
                  Replacement},
  booktitle    = {22nd International Conference on Pattern Recognition, {ICPR} 2014,
                  Stockholm, Sweden, August 24-28, 2014},
  pages        = {672--677},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICPR.2014.126},
  doi          = {10.1109/ICPR.2014.126},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpr/ChenLLYH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/TangLLH14,
  author       = {Weixuan Tang and
                  Haodong Li and
                  Weiqi Luo and
                  Jiwu Huang},
  editor       = {Andreas Unterweger and
                  Andreas Uhl and
                  Stefan Katzenbeisser and
                  Roland Kwitt and
                  Alessandro Piva},
  title        = {Adaptive steganalysis against {WOW} embedding algorithm},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '14, Salzburg, Austria, June 11-13, 2014},
  pages        = {91--96},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600918.2600935},
  doi          = {10.1145/2600918.2600935},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/TangLLH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/QiuLLH14,
  author       = {Xiaoqing Qiu and
                  Haodong Li and
                  Weiqi Luo and
                  Jiwu Huang},
  editor       = {Andreas Unterweger and
                  Andreas Uhl and
                  Stefan Katzenbeisser and
                  Roland Kwitt and
                  Alessandro Piva},
  title        = {A universal image forensic strategy based on steganalytic model},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '14, Salzburg, Austria, June 11-13, 2014},
  pages        = {165--170},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600918.2600941},
  doi          = {10.1145/2600918.2600941},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ih/QiuLLH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LiNLTH14,
  author       = {Bin Li and
                  Tian{-}Tsong Ng and
                  Xiaolong Li and
                  Shunquan Tan and
                  Jiwu Huang},
  title        = {{JPEG} Noises beyond the First Compression Cycle},
  journal      = {CoRR},
  volume       = {abs/1405.7571},
  year         = {2014},
  url          = {http://arxiv.org/abs/1405.7571},
  eprinttype    = {arXiv},
  eprint       = {1405.7571},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/LiNLTH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/ChenLN0H13,
  author       = {Likai Chen and
                  Wei Lu and
                  Jiangqun Ni and
                  Wei Sun and
                  Jiwu Huang},
  title        = {Region duplication detection based on Harris corner points and step
                  sector statistics},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {24},
  number       = {3},
  pages        = {244--254},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jvcir.2013.01.008},
  doi          = {10.1016/J.JVCIR.2013.01.008},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jvcir/ChenLN0H13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tip/ZhengH13,
  author       = {Peijia Zheng and
                  Jiwu Huang},
  title        = {Discrete Wavelet Transform and Data Expansion Reduction in Homomorphic
                  Encrypted Domain},
  journal      = {{IEEE} Trans. Image Process.},
  volume       = {22},
  number       = {6},
  pages        = {2455--2468},
  year         = {2013},
  url          = {https://doi.org/10.1109/TIP.2013.2253474},
  doi          = {10.1109/TIP.2013.2253474},
  timestamp    = {Sun, 10 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tip/ZhengH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tip/ChenNH13,
  author       = {Chenglong Chen and
                  Jiangqun Ni and
                  Jiwu Huang},
  title        = {Blind Detection of Median Filtering in Digital Images: {A} Difference
                  Domain Based Approach},
  journal      = {{IEEE} Trans. Image Process.},
  volume       = {22},
  number       = {12},
  pages        = {4699--4710},
  year         = {2013},
  url          = {https://doi.org/10.1109/TIP.2013.2277814},
  doi          = {10.1109/TIP.2013.2277814},
  timestamp    = {Sun, 10 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tip/ChenNH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/WuWH13,
  author       = {Haojun Wu and
                  Yong Wang and
                  Jiwu Huang},
  title        = {Blind detection of electronic disguised voice},
  booktitle    = {{IEEE} International Conference on Acoustics, Speech and Signal Processing,
                  {ICASSP} 2013, Vancouver, BC, Canada, May 26-31, 2013},
  pages        = {3013--3017},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICASSP.2013.6638211},
  doi          = {10.1109/ICASSP.2013.6638211},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/WuWH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/QuKHL13,
  author       = {Zhenhua Qu and
                  Xiangui Kang and
                  Jiwu Huang and
                  Yinxiang Li},
  title        = {Forensic sensor pattern noise extraction from large image data set},
  booktitle    = {{IEEE} International Conference on Acoustics, Speech and Signal Processing,
                  {ICASSP} 2013, Vancouver, BC, Canada, May 26-31, 2013},
  pages        = {3023--3027},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICASSP.2013.6638213},
  doi          = {10.1109/ICASSP.2013.6638213},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/QuKHL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/ZengKH13,
  author       = {Hui Zeng and
                  Xiangui Kang and
                  Jiwu Huang},
  title        = {Mixed-strategy Nash equilibrium in the camera source identification
                  game},
  booktitle    = {{IEEE} International Conference on Image Processing, {ICIP} 2013,
                  Melbourne, Australia, September 15-18, 2013},
  pages        = {4472--4476},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICIP.2013.6738921},
  doi          = {10.1109/ICIP.2013.6738921},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icip/ZengKH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/BianLH13,
  author       = {Shan Bian and
                  Weiqi Luo and
                  Jiwu Huang},
  title        = {Exposing fake bitrate video and its original bitrate},
  booktitle    = {{IEEE} International Conference on Image Processing, {ICIP} 2013,
                  Melbourne, Australia, September 15-18, 2013},
  pages        = {4492--4496},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICIP.2013.6738925},
  doi          = {10.1109/ICIP.2013.6738925},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icip/BianLH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/HuangLHS13,
  author       = {Fangjun Huang and
                  Weiqi Luo and
                  Jiwu Huang and
                  Yun{-}Qing Shi},
  editor       = {William Puech and
                  Marc Chaumont and
                  Jana Dittmann and
                  Patrizio Campisi},
  title        = {Distortion function designing for {JPEG} steganography with uncompressed
                  side-image},
  booktitle    = {{ACM} Information Hiding and Multimedia Security Workshop, IH{\&}MMSec
                  '13, Montpellier, France, June 17-19, 2013},
  pages        = {69--76},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2482513.2482517},
  doi          = {10.1145/2482513.2482517},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/HuangLHS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HuangZH13,
  author       = {Fangjun Huang and
                  Yane Zhong and
                  Jiwu Huang},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Improved Algorithm of Edge Adaptive Image Steganography Based on {LSB}
                  Matching Revisited Algorithm},
  booktitle    = {Digital-Forensics and Watermarking - 12th International Workshop,
                  {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8389},
  pages        = {19--31},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43886-2\_2},
  doi          = {10.1007/978-3-662-43886-2\_2},
  timestamp    = {Thu, 28 May 2020 12:51:39 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HuangZH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mm/ZhengH13,
  author       = {Peijia Zheng and
                  Jiwu Huang},
  editor       = {Alejandro Jaimes and
                  Nicu Sebe and
                  Nozha Boujemaa and
                  Daniel Gatica{-}Perez and
                  David A. Shamma and
                  Marcel Worring and
                  Roger Zimmermann},
  title        = {An efficient image homomorphic encryption scheme with small ciphertext
                  expansion},
  booktitle    = {{ACM} Multimedia Conference, {MM} '13, Barcelona, Spain, October 21-25,
                  2013},
  pages        = {803--812},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2502081.2502105},
  doi          = {10.1145/2502081.2502105},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mm/ZhengH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/XiangYH12,
  author       = {Shijun Xiang and
                  Jianquan Yang and
                  Jiwu Huang},
  title        = {Perceptual video hashing robust against geometric distortions},
  journal      = {Sci. China Inf. Sci.},
  volume       = {55},
  number       = {7},
  pages        = {1520--1527},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11432-011-4450-1},
  doi          = {10.1007/S11432-011-4450-1},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/XiangYH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pr/HeLSH12,
  author       = {Zhongwei He and
                  Wei Lu and
                  Wei Sun and
                  Jiwu Huang},
  title        = {Digital image splicing detection based on Markov features in {DCT}
                  and {DWT} domain},
  journal      = {Pattern Recognit.},
  volume       = {45},
  number       = {12},
  pages        = {4292--4299},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.patcog.2012.05.014},
  doi          = {10.1016/J.PATCOG.2012.05.014},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pr/HeLSH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/WuH12,
  author       = {Hao{-}Tian Wu and
                  Jiwu Huang},
  title        = {Reversible image watermarking on prediction errors by efficient histogram
                  modification},
  journal      = {Signal Process.},
  volume       = {92},
  number       = {12},
  pages        = {3000--3009},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.sigpro.2012.05.034},
  doi          = {10.1016/J.SIGPRO.2012.05.034},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigpro/WuH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/LeiLWH12,
  author       = {Yanqiang Lei and
                  Weiqi Luo and
                  Yuan{-}Gen Wang and
                  Jiwu Huang},
  title        = {Video Sequence Matching Based on the Invariance of Color Correlation},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {22},
  number       = {9},
  pages        = {1332--1343},
  year         = {2012},
  url          = {https://doi.org/10.1109/TCSVT.2012.2201670},
  doi          = {10.1109/TCSVT.2012.2201670},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/LeiLWH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KangLQH12,
  author       = {Xiangui Kang and
                  Yinxiang Li and
                  Zhenhua Qu and
                  Jiwu Huang},
  title        = {Enhancing Source Camera Identification Performance With a Camera Reference
                  Phase Sensor Pattern Noise},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {7},
  number       = {2},
  pages        = {393--402},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIFS.2011.2168214},
  doi          = {10.1109/TIFS.2011.2168214},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KangLQH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CaoH12,
  author       = {Jian Cao and
                  Jiwu Huang},
  title        = {Controllable Secure Watermarking Technique for Tradeoff Between Robustness
                  and Security},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {7},
  number       = {2},
  pages        = {821--826},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIFS.2012.2184093},
  doi          = {10.1109/TIFS.2012.2184093},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CaoH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangNH12,
  author       = {Chuntao Wang and
                  Jiangqun Ni and
                  Jiwu Huang},
  title        = {An Informed Watermarking Scheme Using Hidden Markov Model in the Wavelet
                  Domain},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {7},
  number       = {3},
  pages        = {853--867},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIFS.2012.2188797},
  doi          = {10.1109/TIFS.2012.2188797},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangNH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangHS12,
  author       = {Fangjun Huang and
                  Jiwu Huang and
                  Yun{-}Qing Shi},
  title        = {New Channel Selection Rule for {JPEG} Steganography},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {7},
  number       = {4},
  pages        = {1181--1191},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIFS.2012.2198213},
  doi          = {10.1109/TIFS.2012.2198213},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HuangHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhengLQH12,
  author       = {Ligang Zheng and
                  Yanqiang Lei and
                  Guoping Qiu and
                  Jiwu Huang},
  title        = {Near-Duplicate Image Detection in a Visually Salient Riemannian Space},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {7},
  number       = {5},
  pages        = {1578--1593},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIFS.2012.2206386},
  doi          = {10.1109/TIFS.2012.2206386},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhengLQH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tomccap/LiLHS12,
  author       = {Jian Li and
                  Hongmei Liu and
                  Jiwu Huang and
                  Yun Q. Shi},
  title        = {Reference index-based {H.264} video watermarking scheme},
  journal      = {{ACM} Trans. Multim. Comput. Commun. Appl.},
  volume       = {8},
  number       = {{S2}},
  pages        = {33:1--33:22},
  year         = {2012},
  url          = {https://doi.org/10.1145/2344436.2344439},
  doi          = {10.1145/2344436.2344439},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tomccap/LiLHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tomccap/YangQH12,
  author       = {Rui Yang and
                  Zhenhua Qu and
                  Jiwu Huang},
  title        = {Exposing {MP3} audio forgeries using frame offsets},
  journal      = {{ACM} Trans. Multim. Comput. Commun. Appl.},
  volume       = {8},
  number       = {{S2}},
  pages        = {35:1--35:20},
  year         = {2012},
  url          = {https://doi.org/10.1145/2344436.2344441},
  doi          = {10.1145/2344436.2344441},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tomccap/YangQH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvm/QuLH12,
  author       = {Zhenhua Qu and
                  Weiqi Luo and
                  Jiwu Huang},
  editor       = {Shi{-}Min Hu and
                  Ralph R. Martin},
  title        = {Identifying Shifted Double {JPEG} Compression Artifacts for Non-intrusive
                  Digital Image Forensics},
  booktitle    = {Computational Visual Media - First International Conference, {CVM}
                  2012, Beijing, China, November 8-10, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7633},
  pages        = {1--8},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34263-9\_1},
  doi          = {10.1007/978-3-642-34263-9\_1},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cvm/QuLH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/ZhengQH12,
  author       = {Ligang Zheng and
                  Guoping Qiu and
                  Jiwu Huang},
  title        = {Efficient coarse-to-fine near-duplicate image detection in riemannian
                  manifold},
  booktitle    = {2012 {IEEE} International Conference on Acoustics, Speech and Signal
                  Processing, {ICASSP} 2012, Kyoto, Japan, March 25-30, 2012},
  pages        = {977--980},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICASSP.2012.6288048},
  doi          = {10.1109/ICASSP.2012.6288048},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/ZhengQH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/LuoLYH12,
  author       = {Da Luo and
                  Weiqi Luo and
                  Rui Yang and
                  Jiwu Huang},
  title        = {Compression history identification for digital audio signal},
  booktitle    = {2012 {IEEE} International Conference on Acoustics, Speech and Signal
                  Processing, {ICASSP} 2012, Kyoto, Japan, March 25-30, 2012},
  pages        = {1733--1736},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICASSP.2012.6288233},
  doi          = {10.1109/ICASSP.2012.6288233},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/LuoLYH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/LiLH12,
  author       = {Haodong Li and
                  Weiqi Luo and
                  Jiwu Huang},
  title        = {Countering anti-JPEG compression forensics},
  booktitle    = {19th {IEEE} International Conference on Image Processing, {ICIP} 2012,
                  Lake Buena Vista, Orlando, FL, USA, September 30 - October 3, 2012},
  pages        = {241--244},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICIP.2012.6466840},
  doi          = {10.1109/ICIP.2012.6466840},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icip/LiLH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ChenNHH12,
  author       = {Chenglong Chen and
                  Jiangqun Ni and
                  Rongbin Huang and
                  Jiwu Huang},
  editor       = {Matthias Kirchner and
                  Dipak Ghosal},
  title        = {Blind Median Filtering Detection Using Statistics in Difference Domain},
  booktitle    = {Information Hiding - 14th International Conference, {IH} 2012, Berkeley,
                  CA, USA, May 15-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7692},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-36373-3\_1},
  doi          = {10.1007/978-3-642-36373-3\_1},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ChenNHH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ZhengH12,
  author       = {Peijia Zheng and
                  Jiwu Huang},
  editor       = {Matthias Kirchner and
                  Dipak Ghosal},
  title        = {Walsh-Hadamard Transform in the Homomorphic Encrypted Domain and Its
                  Application in Image Watermarking},
  booktitle    = {Information Hiding - 14th International Conference, {IH} 2012, Berkeley,
                  CA, USA, May 15-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7692},
  pages        = {240--254},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-36373-3\_16},
  doi          = {10.1007/978-3-642-36373-3\_16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ZhengH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WangDWH12,
  author       = {Yong Wang and
                  Yanhong Deng and
                  Haojun Wu and
                  Jiwu Huang},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Blind Detection of Electronic Voice Transformation with Natural Disguise},
  booktitle    = {Digital Forensics and Watermaking - 11th International Workshop, {IWDW}
                  2012, Shanghai, China, October 31 - November 3, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7809},
  pages        = {336--343},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40099-5\_28},
  doi          = {10.1007/978-3-642-40099-5\_28},
  timestamp    = {Thu, 28 May 2020 12:51:39 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/WangDWH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/HuangLH11,
  author       = {Fangjun Huang and
                  Weiqi Luo and
                  Jiwu Huang},
  title        = {Steganalysis of {JPEG} steganography with complementary embedding
                  strategy},
  journal      = {{IET} Inf. Secur.},
  volume       = {5},
  number       = {1},
  pages        = {10--18},
  year         = {2011},
  url          = {https://doi.org/10.1049/iet-ifs.2009.0080},
  doi          = {10.1049/IET-IFS.2009.0080},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/HuangLH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jihmsp/0011HH011,
  author       = {Bin Li and
                  Junhui He and
                  Jiwu Huang and
                  Yun Qing Shi},
  title        = {A Survey on Image Steganography and Steganalysis},
  journal      = {J. Inf. Hiding Multim. Signal Process.},
  volume       = {2},
  number       = {2},
  pages        = {142--172},
  year         = {2011},
  url          = {http://bit.kuas.edu.tw/\%7Ejihmsp/2011/vol2/JIH-MSP-2011-03-005.pdf},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jihmsp/0011HH011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LuoHH11,
  author       = {Weiqi Luo and
                  Fangjun Huang and
                  Jiwu Huang},
  title        = {A more secure steganography based on adaptive pixel-value differencing
                  scheme},
  journal      = {Multim. Tools Appl.},
  volume       = {52},
  number       = {2-3},
  pages        = {407--430},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11042-009-0440-3},
  doi          = {10.1007/S11042-009-0440-3},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/LuoHH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LiuYH11,
  author       = {Hongmei Liu and
                  Xinzhi Yao and
                  Jiwu Huang},
  title        = {Minority codes with improved embedding efficiency for large payloads},
  journal      = {Multim. Tools Appl.},
  volume       = {52},
  number       = {2-3},
  pages        = {431--443},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11042-009-0431-4},
  doi          = {10.1007/S11042-009-0431-4},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/LiuYH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/ZhuKHY11,
  author       = {Guopu Zhu and
                  Sam Kwong and
                  Jiwu Huang and
                  Jianquan Yang},
  title        = {Random Gray code and its performance analysis for image hashing},
  journal      = {Signal Process.},
  volume       = {91},
  number       = {9},
  pages        = {2178--2193},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.sigpro.2011.03.022},
  doi          = {10.1016/J.SIGPRO.2011.03.022},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigpro/ZhuKHY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spic/LeiWH11,
  author       = {Yanqiang Lei and
                  Yuan{-}Gen Wang and
                  Jiwu Huang},
  title        = {Robust image hash in Radon transform domain for authentication},
  journal      = {Signal Process. Image Commun.},
  volume       = {26},
  number       = {6},
  pages        = {280--288},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.image.2011.04.007},
  doi          = {10.1016/J.IMAGE.2011.04.007},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/spic/LeiWH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spl/LuoWH11,
  author       = {Weiqi Luo and
                  Yuan{-}Gen Wang and
                  Jiwu Huang},
  title        = {Security Analysis on Spatial {\(\pm\)} 1 Steganography for {JPEG}
                  Decompressed Images},
  journal      = {{IEEE} Signal Process. Lett.},
  volume       = {18},
  number       = {1},
  pages        = {39--42},
  year         = {2011},
  url          = {https://doi.org/10.1109/LSP.2010.2091127},
  doi          = {10.1109/LSP.2010.2091127},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spl/LuoWH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmm/KangYH11,
  author       = {Xiangui Kang and
                  Rui Yang and
                  Jiwu Huang},
  title        = {Geometric Invariant Audio Watermarking Based on an {LCM} Feature},
  journal      = {{IEEE} Trans. Multim.},
  volume       = {13},
  number       = {2},
  pages        = {181--190},
  year         = {2011},
  url          = {https://doi.org/10.1109/TMM.2010.2098850},
  doi          = {10.1109/TMM.2010.2098850},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmm/KangYH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/ZhengQHF11,
  author       = {Ligang Zheng and
                  Guoping Qiu and
                  Jiwu Huang and
                  Hao Fu},
  editor       = {Beno{\^{\i}}t Macq and
                  Peter Schelkens},
  title        = {Salient covariance for near-duplicate image and video detection},
  booktitle    = {18th {IEEE} International Conference on Image Processing, {ICIP} 2011,
                  Brussels, Belgium, September 11-14, 2011},
  pages        = {2537--2540},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICIP.2011.6116179},
  doi          = {10.1109/ICIP.2011.6116179},
  timestamp    = {Fri, 01 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icip/ZhengQHF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/WuH11,
  author       = {Hao{-}Tian Wu and
                  Jiwu Huang},
  editor       = {Beno{\^{\i}}t Macq and
                  Peter Schelkens},
  title        = {Secure {JPEG} steganography by LSB\({}^{\mbox{+}}\) matching and multi-band
                  embedding},
  booktitle    = {18th {IEEE} International Conference on Image Processing, {ICIP} 2011,
                  Brussels, Belgium, September 11-14, 2011},
  pages        = {2737--2740},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICIP.2011.6116235},
  doi          = {10.1109/ICIP.2011.6116235},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icip/WuH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiuLLH11,
  author       = {Hongmei Liu and
                  Lei Li and
                  Jian Li and
                  Jiwu Huang},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title        = {Three Novel Algorithms for Hiding Data in {PDF} Files Based on Incremental
                  Updates},
  booktitle    = {Digital Forensics and Watermarking - 10th International Workshop,
                  {IWDW} 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7128},
  pages        = {167--180},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32205-1\_15},
  doi          = {10.1007/978-3-642-32205-1\_15},
  timestamp    = {Thu, 28 May 2020 12:51:39 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiuLLH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mediaforensics/LiaoYLLH11,
  author       = {Dandan Liao and
                  Rui Yang and
                  Hongmei Liu and
                  Jian Li and
                  Jiwu Huang},
  editor       = {Nasir D. Memon and
                  Jana Dittmann and
                  Adnan M. Alattar and
                  Edward J. Delp III},
  title        = {Double {H.264/AVC} compression detection using quantized nonzero {AC}
                  coefficients},
  booktitle    = {Media Forensics and Security III, San Francisco Airport, CA, USA,
                  January 24-26, 2011, Proceedings},
  series       = {{SPIE} Proceedings},
  volume       = {7880},
  pages        = {78800Q},
  publisher    = {{SPIE}},
  year         = {2011},
  url          = {https://doi.org/10.1117/12.876566},
  doi          = {10.1117/12.876566},
  timestamp    = {Fri, 07 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mediaforensics/LiaoYLLH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mediaforensics/KangLQH11,
  author       = {Xiangui Kang and
                  Yinxiang Li and
                  Zhenhua Qu and
                  Jiwu Huang},
  editor       = {Nasir D. Memon and
                  Jana Dittmann and
                  Adnan M. Alattar and
                  Edward J. Delp III},
  title        = {Enhancing {ROC} performance of trustworthy camera source identification},
  booktitle    = {Media Forensics and Security III, San Francisco Airport, CA, USA,
                  January 24-26, 2011, Proceedings},
  series       = {{SPIE} Proceedings},
  volume       = {7880},
  pages        = {788009},
  publisher    = {{SPIE}},
  year         = {2011},
  url          = {https://doi.org/10.1117/12.872595},
  doi          = {10.1117/12.872595},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mediaforensics/KangLQH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mm/ZhengH11,
  author       = {Peijia Zheng and
                  Jiwu Huang},
  editor       = {K. Sel{\c{c}}uk Candan and
                  Sethuraman Panchanathan and
                  Balakrishnan Prabhakaran and
                  Hari Sundaram and
                  Wu{-}chi Feng and
                  Nicu Sebe},
  title        = {Implementation of the discrete wavelet transform and multiresolution
                  analysis in the encrypted domain},
  booktitle    = {Proceedings of the 19th International Conference on Multimedia 2011,
                  Scottsdale, AZ, USA, November 28 - December 1, 2011},
  pages        = {413--422},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2072298.2072352},
  doi          = {10.1145/2072298.2072352},
  timestamp    = {Mon, 22 Apr 2024 21:24:20 +0200},
  biburl       = {https://dblp.org/rec/conf/mm/ZhengH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/WangH10,
  author       = {Yong Wang and
                  Jiwu Huang},
  title        = {Robust {AVS} audio watermarking},
  journal      = {Sci. China Inf. Sci.},
  volume       = {53},
  number       = {3},
  pages        = {607--618},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11432-010-0049-1},
  doi          = {10.1007/S11432-010-0049-1},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/WangH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejasp/LiuYH10,
  author       = {Hongmei Liu and
                  Xinzhi Yao and
                  Jiwu Huang},
  title        = {Semi-Fragile Zernike Moment-Based Image Watermarking for Authentication},
  journal      = {{EURASIP} J. Adv. Signal Process.},
  volume       = {2010},
  year         = {2010},
  url          = {https://doi.org/10.1155/2010/341856},
  doi          = {10.1155/2010/341856},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejasp/LiuYH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejasp/WangWH10,
  author       = {Yong Wang and
                  Shaoquan Wu and
                  Jiwu Huang},
  title        = {Audio Watermarking Scheme Robust against Desynchronization Based on
                  the Dyadic Wavelet Transform},
  journal      = {{EURASIP} J. Adv. Signal Process.},
  volume       = {2010},
  year         = {2010},
  url          = {https://doi.org/10.1155/2010/232616},
  doi          = {10.1155/2010/232616},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejasp/WangWH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KangHZ10,
  author       = {Xiangui Kang and
                  Jiwu Huang and
                  Wenjun Zeng},
  title        = {Efficient general print-scanning resilient data hiding based on uniform
                  log-polar mapping},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {5},
  number       = {1},
  pages        = {1--12},
  year         = {2010},
  url          = {https://doi.org/10.1109/TIFS.2009.2039604},
  doi          = {10.1109/TIFS.2009.2039604},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KangHZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuHKY10,
  author       = {Guopu Zhu and
                  Jiwu Huang and
                  Sam Kwong and
                  Jianquan Yang},
  title        = {Fragility analysis of adaptive quantization-based image hashing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {5},
  number       = {1},
  pages        = {133--147},
  year         = {2010},
  url          = {https://doi.org/10.1109/TIFS.2009.2038742},
  doi          = {10.1109/TIFS.2009.2038742},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuHKY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LuoHH10,
  author       = {Weiqi Luo and
                  Fangjun Huang and
                  Jiwu Huang},
  title        = {Edge adaptive image steganography based on {LSB} matching revisited},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {5},
  number       = {2},
  pages        = {201--214},
  year         = {2010},
  url          = {https://doi.org/10.1109/TIFS.2010.2041812},
  doi          = {10.1109/TIFS.2010.2041812},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LuoHH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangHS10,
  author       = {Fangjun Huang and
                  Jiwu Huang and
                  Yun{-}Qing Shi},
  title        = {An experimental study on the security performance of {YASS}},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {5},
  number       = {3},
  pages        = {374--380},
  year         = {2010},
  url          = {https://doi.org/10.1109/TIFS.2010.2054082},
  doi          = {10.1109/TIFS.2010.2054082},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HuangHS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LuoHQ10,
  author       = {Weiqi Luo and
                  Jiwu Huang and
                  Guoping Qiu},
  title        = {{JPEG} error analysis and its applications to digital image forensics},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {5},
  number       = {3},
  pages        = {480--491},
  year         = {2010},
  url          = {https://doi.org/10.1109/TIFS.2010.2051426},
  doi          = {10.1109/TIFS.2010.2051426},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LuoHQ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LuoWH10,
  author       = {Weiqi Luo and
                  Yuan{-}Gen Wang and
                  Jiwu Huang},
  title        = {Detection of Quantization Artifacts and Its Applications to Transform
                  Encoder Identification},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {5},
  number       = {4},
  pages        = {810--815},
  year         = {2010},
  url          = {https://doi.org/10.1109/TIFS.2010.2074195},
  doi          = {10.1109/TIFS.2010.2074195},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LuoWH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangHS10a,
  author       = {Fangjun Huang and
                  Jiwu Huang and
                  Yun{-}Qing Shi},
  title        = {Detecting Double {JPEG} Compression With the Same Quantization Matrix},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {5},
  number       = {4},
  pages        = {848--856},
  year         = {2010},
  url          = {https://doi.org/10.1109/TIFS.2010.2072921},
  doi          = {10.1109/TIFS.2010.2072921},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HuangHS10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/WangLH10,
  author       = {Yuan{-}Gen Wang and
                  Yanqiang Lei and
                  Jiwu Huang},
  title        = {An image copy detection scheme based on radon transform},
  booktitle    = {Proceedings of the International Conference on Image Processing, {ICIP}
                  2010, September 26-29, Hong Kong, China},
  pages        = {1009--1012},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICIP.2010.5653456},
  doi          = {10.1109/ICIP.2010.5653456},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icip/WangLH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/WangNZH10,
  author       = {Chuntao Wang and
                  Jiangqun Ni and
                  Huashuo Zhuo and
                  Jiwu Huang},
  title        = {A geometrically resilient robust image watermarking scheme using deformable
                  multi-scale transform},
  booktitle    = {Proceedings of the International Conference on Image Processing, {ICIP}
                  2010, September 26-29, Hong Kong, China},
  pages        = {3677--3680},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICIP.2010.5652496},
  doi          = {10.1109/ICIP.2010.5652496},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icip/WangNZH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/ZhangNZLH10,
  author       = {Dong Zhang and
                  Jiangqun Ni and
                  Qiping Zeng and
                  Dah{-}Jye Lee and
                  Jiwu Huang},
  editor       = {Rainer B{\"{o}}hme and
                  Philip W. L. Fong and
                  Reihaneh Safavi{-}Naini},
  title        = {Security Analysis of {ISS} Watermarking Using Natural Scene Statistics},
  booktitle    = {Information Hiding - 12th International Conference, {IH} 2010, Calgary,
                  AB, Canada, June 28-30, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6387},
  pages        = {235--248},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16435-4\_18},
  doi          = {10.1007/978-3-642-16435-4\_18},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/ZhangNZLH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/CaoH10,
  author       = {Jian Cao and
                  Jiwu Huang},
  editor       = {Rainer B{\"{o}}hme and
                  Philip W. L. Fong and
                  Reihaneh Safavi{-}Naini},
  title        = {Provably Secure Spread-Spectrum Watermarking Schemes in the Known
                  Message Attack Framework},
  booktitle    = {Information Hiding - 12th International Conference, {IH} 2010, Calgary,
                  AB, Canada, June 28-30, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6387},
  pages        = {249--261},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16435-4\_19},
  doi          = {10.1007/978-3-642-16435-4\_19},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/CaoH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/CaoHN10,
  author       = {Jian Cao and
                  Jiwu Huang and
                  Jiangqun Ni},
  editor       = {Rainer B{\"{o}}hme and
                  Philip W. L. Fong and
                  Reihaneh Safavi{-}Naini},
  title        = {A New Spread Spectrum Watermarking Scheme to Achieve a Trade-Off between
                  Security and Robustness},
  booktitle    = {Information Hiding - 12th International Conference, {IH} 2010, Calgary,
                  AB, Canada, June 28-30, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6387},
  pages        = {262--276},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16435-4\_20},
  doi          = {10.1007/978-3-642-16435-4\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/CaoHN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/PanH10,
  author       = {Feng Pan and
                  Jiwu Huang},
  editor       = {Hyoung{-}Joong Kim and
                  Yun{-}Qing Shi and
                  Mauro Barni},
  title        = {Discriminating Computer Graphics Images and Natural Images Using Hidden
                  Markov Tree Model},
  booktitle    = {Digital Watermarking - 9th International Workshop, {IWDW} 2010, Seoul,
                  Korea, October 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6526},
  pages        = {23--28},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18405-5\_3},
  doi          = {10.1007/978-3-642-18405-5\_3},
  timestamp    = {Thu, 28 May 2020 12:51:40 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/PanH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HuangSH10,
  author       = {Fangjun Huang and
                  Yun{-}Qing Shi and
                  Jiwu Huang},
  editor       = {Hyoung{-}Joong Kim and
                  Yun{-}Qing Shi and
                  Mauro Barni},
  title        = {New {JPEG} Steganographic Scheme with High Security Performance},
  booktitle    = {Digital Watermarking - 9th International Workshop, {IWDW} 2010, Seoul,
                  Korea, October 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6526},
  pages        = {189--201},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18405-5\_16},
  doi          = {10.1007/978-3-642-18405-5\_16},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HuangSH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mediaforensics/YangSH10,
  author       = {Rui Yang and
                  Yun Q. Shi and
                  Jiwu Huang},
  editor       = {Nasir D. Memon and
                  Jana Dittmann and
                  Adnan M. Alattar and
                  Edward J. Delp},
  title        = {Detecting double compression of audio signal},
  booktitle    = {Media Forensics and Security II, part of the IS{\&}T-SPIE Electronic
                  Imaging Symposium, San Jose, CA, USA, January 18-20, 2010, Proceedings},
  series       = {{SPIE} Proceedings},
  volume       = {7541},
  pages        = {75410K},
  publisher    = {{SPIE}},
  year         = {2010},
  url          = {https://doi.org/10.1117/12.838695},
  doi          = {10.1117/12.838695},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mediaforensics/YangSH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/sci/HuangLSHX10,
  author       = {Fangjun Huang and
                  Bin Li and
                  Yun{-}Qing Shi and
                  Jiwu Huang and
                  Guorong Xuan},
  editor       = {Husrev T. Sencar and
                  Sergio A. Velastin and
                  Nikolaos Nikolaidis and
                  Shiguo Lian},
  title        = {Image Steganalysis},
  booktitle    = {Intelligent Multimedia Analysis for Security Applications},
  series       = {Studies in Computational Intelligence},
  volume       = {282},
  pages        = {275--303},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11756-5\_13},
  doi          = {10.1007/978-3-642-11756-5\_13},
  timestamp    = {Tue, 24 Nov 2020 16:44:23 +0100},
  biburl       = {https://dblp.org/rec/series/sci/HuangLSHX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/HuangH09a,
  author       = {Fangjun Huang and
                  Jiwu Huang},
  title        = {Calibration based universal {JPEG} steganalysis},
  journal      = {Sci. China Ser. {F} Inf. Sci.},
  volume       = {52},
  number       = {2},
  pages        = {260--268},
  year         = {2009},
  url          = {https://doi.org/10.1007/s11432-009-0033-9},
  doi          = {10.1007/S11432-009-0033-9},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/HuangH09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/KangHZS09,
  author       = {Xiangui Kang and
                  Jiwu Huang and
                  Wenjun Zeng and
                  Yun Q. Shi},
  title        = {Non-ambiguity of blind watermarking: a revisit with analytical resolution},
  journal      = {Sci. China Ser. {F} Inf. Sci.},
  volume       = {52},
  number       = {2},
  pages        = {276--285},
  year         = {2009},
  url          = {https://doi.org/10.1007/s11432-009-0043-7},
  doi          = {10.1007/S11432-009-0043-7},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/KangHZS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/PanCH09,
  author       = {Feng Pan and
                  JiongBin Chen and
                  Jiwu Huang},
  title        = {Discriminating between photorealistic computer graphics and natural
                  images using fractal geometry},
  journal      = {Sci. China Ser. {F} Inf. Sci.},
  volume       = {52},
  number       = {2},
  pages        = {329--337},
  year         = {2009},
  url          = {https://doi.org/10.1007/s11432-009-0053-5},
  doi          = {10.1007/S11432-009-0053-5},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/PanCH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiHS09,
  author       = {Bin Li and
                  Jiwu Huang and
                  Yun{-}Qing Shi},
  title        = {Steganalysis of {YASS}},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {3},
  pages        = {369--382},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2025841},
  doi          = {10.1109/TIFS.2009.2025841},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiHS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuHKY09,
  author       = {Guopu Zhu and
                  Jiwu Huang and
                  Sam Kwong and
                  Jianquan Yang},
  title        = {A study on the randomness measure of image hashing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {4},
  pages        = {928--932},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2033737},
  doi          = {10.1109/TIFS.2009.2033737},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuHKY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/YaoLRH09,
  author       = {Xinzhi Yao and
                  Hongmei Liu and
                  Wei Rui and
                  Jiwu Huang},
  title        = {Content-based authentication algorithm for binary images},
  booktitle    = {Proceedings of the International Conference on Image Processing, {ICIP}
                  2009, 7-10 November 2009, Cairo, Egypt},
  pages        = {2893--2896},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICIP.2009.5413441},
  doi          = {10.1109/ICIP.2009.5413441},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icip/YaoLRH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/QuQH09,
  author       = {Zhenhua Qu and
                  Guoping Qiu and
                  Jiwu Huang},
  editor       = {Stefan Katzenbeisser and
                  Ahmad{-}Reza Sadeghi},
  title        = {Detect Digital Image Splicing with Visual Cues},
  booktitle    = {Information Hiding, 11th International Workshop, {IH} 2009, Darmstadt,
                  Germany, June 8-10, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5806},
  pages        = {247--261},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04431-1\_18},
  doi          = {10.1007/978-3-642-04431-1\_18},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/QuQH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/WangH09,
  author       = {Yong Wang and
                  Jiwu Huang},
  editor       = {Anthony T. S. Ho and
                  Yun Q. Shi and
                  H. J. Kim and
                  Mauro Barni},
  title        = {Robust {AVS} Audio Watermarking},
  booktitle    = {Digital Watermarking, 8th International Workshop, {IWDW} 2009, Guildford,
                  UK, August 24-26, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5703},
  pages        = {29--38},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03688-0\_6},
  doi          = {10.1007/978-3-642-03688-0\_6},
  timestamp    = {Thu, 28 May 2020 12:51:39 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/WangH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ChenNH09,
  author       = {Chong Chen and
                  Jiangqun Ni and
                  Jiwu Huang},
  editor       = {Anthony T. S. Ho and
                  Yun Q. Shi and
                  H. J. Kim and
                  Mauro Barni},
  title        = {Temporal Statistic Based Video Watermarking Scheme Robust against
                  Geometric Attacks and Frame Dropping},
  booktitle    = {Digital Watermarking, 8th International Workshop, {IWDW} 2009, Guildford,
                  UK, August 24-26, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5703},
  pages        = {81--95},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03688-0\_10},
  doi          = {10.1007/978-3-642-03688-0\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ChenNH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/YangSH09,
  author       = {Rui Yang and
                  Yun{-}Qing Shi and
                  Jiwu Huang},
  editor       = {Edward W. Felten and
                  Jana Dittmann and
                  Jessica J. Fridrich and
                  Scott Craver},
  title        = {Defeating fake-quality {MP3}},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2009, Princeton, NJ,
                  USA, September 07 - 08, 2009},
  pages        = {117--124},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1597817.1597838},
  doi          = {10.1145/1597817.1597838},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/YangSH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ZhaoZH08,
  author       = {Changan Zhao and
                  Fangguo Zhang and
                  Jiwu Huang},
  title        = {Efficient Tate pairing computation using double-base chains},
  journal      = {Sci. China Ser. {F} Inf. Sci.},
  volume       = {51},
  number       = {8},
  pages        = {1096--1105},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11432-008-0070-9},
  doi          = {10.1007/S11432-008-0070-9},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/ZhaoZH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ZhaoZH08,
  author       = {Changan Zhao and
                  Fangguo Zhang and
                  Jiwu Huang},
  title        = {All Pairings Are in a Group},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {91-A},
  number       = {10},
  pages        = {3084--3087},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietfec/e91-a.10.3084},
  doi          = {10.1093/IETFEC/E91-A.10.3084},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/ZhaoZH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ZhaoZH08,
  author       = {Changan Zhao and
                  Fangguo Zhang and
                  Jiwu Huang},
  title        = {A note on the Ate pairing},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {6},
  pages        = {379--382},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10207-008-0054-1},
  doi          = {10.1007/S10207-008-0054-1},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/ZhaoZH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/KangZH08,
  author       = {Xiangui Kang and
                  Wenjun Zeng and
                  Jiwu Huang},
  title        = {A Multi-band Wavelet Watermarking Scheme},
  journal      = {Int. J. Netw. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {121--126},
  year         = {2008},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v6-n2/ijns-2008-v6-n2-p121-126.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/KangZH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/XiangKH08,
  author       = {Shijun Xiang and
                  Hyoung{-}Joong Kim and
                  Jiwu Huang},
  title        = {Audio watermarking robust against time-scale modification and {MP3}
                  compression},
  journal      = {Signal Process.},
  volume       = {88},
  number       = {10},
  pages        = {2372--2387},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.sigpro.2008.03.019},
  doi          = {10.1016/J.SIGPRO.2008.03.019},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigpro/XiangKH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spl/LiFH08,
  author       = {Bin Li and
                  Yanmei Fang and
                  Jiwu Huang},
  title        = {Steganalysis of Multiple-Base Notational System Steganography},
  journal      = {{IEEE} Signal Process. Lett.},
  volume       = {15},
  pages        = {493--496},
  year         = {2008},
  url          = {https://doi.org/10.1109/LSP.2008.924000},
  doi          = {10.1109/LSP.2008.924000},
  timestamp    = {Fri, 23 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/spl/LiFH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/XiangKH08,
  author       = {Shijun Xiang and
                  Hyoung{-}Joong Kim and
                  Jiwu Huang},
  title        = {Invariant Image Watermarking Based on Statistical Features in the
                  Low-Frequency Domain},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {18},
  number       = {6},
  pages        = {777--790},
  year         = {2008},
  url          = {https://doi.org/10.1109/TCSVT.2008.918843},
  doi          = {10.1109/TCSVT.2008.918843},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/XiangKH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmm/KangHZ08,
  author       = {Xiangui Kang and
                  Jiwu Huang and
                  Wenjun Zeng},
  title        = {Improving Robustness of Quantization-Based Image Watermarking via
                  Adaptive Receiver},
  journal      = {{IEEE} Trans. Multim.},
  volume       = {10},
  number       = {6},
  pages        = {953--959},
  year         = {2008},
  url          = {https://doi.org/10.1109/TMM.2008.2001361},
  doi          = {10.1109/TMM.2008.2001361},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmm/KangHZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/QuLH08,
  author       = {Zhenhua Qu and
                  Weiqi Luo and
                  Jiwu Huang},
  title        = {A convolutive mixing model for shifted double {JPEG} compression with
                  application to passive image authentication},
  booktitle    = {Proceedings of the {IEEE} International Conference on Acoustics, Speech,
                  and Signal Processing, {ICASSP} 2008, March 30 - April 4, 2008, Caesars
                  Palace, Las Vegas, Nevada, {USA}},
  pages        = {1661--1664},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICASSP.2008.4517946},
  doi          = {10.1109/ICASSP.2008.4517946},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/QuLH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/HuangLH08,
  author       = {Fangjun Huang and
                  Bin Li and
                  Jiwu Huang},
  title        = {Universal {JPEG} steganalysis based on microscopic and macroscopic
                  calibration},
  booktitle    = {Proceedings of the International Conference on Image Processing, {ICIP}
                  2008, October 12-15, 2008, San Diego, California, {USA}},
  pages        = {2068--2071},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICIP.2008.4712193},
  doi          = {10.1109/ICIP.2008.4712193},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icip/HuangLH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/KangZHZ08,
  author       = {Xiangui Kang and
                  Xiong Zhong and
                  Jiwu Huang and
                  Wenjun Zeng},
  title        = {An efficient print-scanning resilient data hiding scheme based on
                  a novel {LPM}},
  booktitle    = {Proceedings of the International Conference on Image Processing, {ICIP}
                  2008, October 12-15, 2008, San Diego, California, {USA}},
  pages        = {2080--2083},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICIP.2008.4712196},
  doi          = {10.1109/ICIP.2008.4712196},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icip/KangZHZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/HuangSH08,
  author       = {Fangjun Huang and
                  Yun Q. Shi and
                  Jiwu Huang},
  title        = {A study on security performance of {YASS}},
  booktitle    = {Proceedings of the International Conference on Image Processing, {ICIP}
                  2008, October 12-15, 2008, San Diego, California, {USA}},
  pages        = {2084--2087},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICIP.2008.4712197},
  doi          = {10.1109/ICIP.2008.4712197},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icip/HuangSH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/NiZFHWK08,
  author       = {Jiangqun Ni and
                  Rongyue Zhang and
                  Chen Fang and
                  Jiwu Huang and
                  Chuntao Wang and
                  Hyoung{-}Joong Kim},
  editor       = {Kaushal Solanki and
                  Kenneth Sullivan and
                  Upamanyu Madhow},
  title        = {Watermarking Security Incorporating Natural Scene Statistics},
  booktitle    = {Information Hiding, 10th International Workshop, {IH} 2008, Santa
                  Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5284},
  pages        = {132--146},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88961-8\_10},
  doi          = {10.1007/978-3-540-88961-8\_10},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/NiZFHWK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiLHZ08,
  author       = {Jian Li and
                  Hongmei Liu and
                  Jiwu Huang and
                  Yongping Zhang},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {A Robust Watermarking Scheme for {H.264}},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_1},
  doi          = {10.1007/978-3-642-04438-0\_1},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiLHZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/YangKH08,
  author       = {Rui Yang and
                  Xiangui Kang and
                  Jiwu Huang},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {Robust Audio Watermarking Based on Log-Polar Frequency Index},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {124--138},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_11},
  doi          = {10.1007/978-3-642-04438-0\_11},
  timestamp    = {Fri, 07 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/YangKH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LuoHQ08,
  author       = {Weiqi Luo and
                  Jiwu Huang and
                  Guoping Qiu},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {A Novel Method for Block Size Forensics Based on Morphological Operations},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {229--239},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_20},
  doi          = {10.1007/978-3-642-04438-0\_20},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LuoHQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhangNLH08,
  author       = {Dong Zhang and
                  Jiangqun Ni and
                  Dah{-}Jye Lee and
                  Jiwu Huang},
  editor       = {Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser and
                  Anthony Tung Shuen Ho},
  title        = {{GSM} Based Security Analysis for Add-SS Watermarking},
  booktitle    = {Digital Watermarking, 7th International Workshop, {IWDW} 2008, Busan,
                  Korea, November 10-12, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5450},
  pages        = {313--326},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-04438-0\_27},
  doi          = {10.1007/978-3-642-04438-0\_27},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhangNLH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/YangQH08,
  author       = {Rui Yang and
                  Zhenhua Qu and
                  Jiwu Huang},
  editor       = {Andrew D. Ker and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Detecting digital audio forgeries by checking frame offsets},
  booktitle    = {Proceedings of the 10th workshop on Multimedia {\&} Security,
                  MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008},
  pages        = {21--26},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1411328.1411334},
  doi          = {10.1145/1411328.1411334},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/YangQH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/LiSH08,
  author       = {Bin Li and
                  Yun Q. Shi and
                  Jiwu Huang},
  editor       = {Andrew D. Ker and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Steganalysis of {YASS}},
  booktitle    = {Proceedings of the 10th workshop on Multimedia {\&} Security,
                  MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008},
  pages        = {139--148},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1411328.1411354},
  doi          = {10.1145/1411328.1411354},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/LiSH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsp/LiSH08,
  author       = {Bin Li and
                  Yun Q. Shi and
                  Jiwu Huang},
  title        = {Detecting doubly compressed {JPEG} images by using Mode Based First
                  Digit Features},
  booktitle    = {International Workshop on Multimedia Signal Processing, {MMSP} 2008,
                  October 8-10, 2008, Shangri-la Hotel, Cairns, Queensland, Australia},
  pages        = {730--735},
  publisher    = {{IEEE} Signal Processing Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/MMSP.2008.4665171},
  doi          = {10.1109/MMSP.2008.4665171},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsp/LiSH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sswmc/Luo0H08,
  author       = {Weiqi Luo and
                  Min Wu and
                  Jiwu Huang},
  editor       = {Edward J. Delp III and
                  Ping Wah Wong and
                  Jana Dittmann and
                  Nasir D. Memon},
  title        = {{MPEG} recompression detection based on block artifacts},
  booktitle    = {Security, Forensics, Steganography, and Watermarking of Multimedia
                  Contents X, San Jose, CA, USA, January 27, 2008},
  series       = {{SPIE} Proceedings},
  volume       = {6819},
  pages        = {68190X},
  publisher    = {{SPIE}},
  year         = {2008},
  url          = {https://doi.org/10.1117/12.767112},
  doi          = {10.1117/12.767112},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sswmc/Luo0H08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sswmc/LiHS08,
  author       = {Bin Li and
                  Jiwu Huang and
                  Yun Q. Shi},
  editor       = {Edward J. Delp III and
                  Ping Wah Wong and
                  Jana Dittmann and
                  Nasir D. Memon},
  title        = {Textural features based universal steganalysis},
  booktitle    = {Security, Forensics, Steganography, and Watermarking of Multimedia
                  Contents X, San Jose, CA, USA, January 27, 2008},
  series       = {{SPIE} Proceedings},
  volume       = {6819},
  pages        = {681912},
  publisher    = {{SPIE}},
  year         = {2008},
  url          = {https://doi.org/10.1117/12.765817},
  doi          = {10.1117/12.765817},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sswmc/LiHS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoZH08,
  author       = {Changan Zhao and
                  Fangguo Zhang and
                  Jiwu Huang},
  title        = {All Pairings Are in a Group},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {85},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/085},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoZH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ShenZFCH07,
  author       = {Changxiang Shen and
                  Huanguo Zhang and
                  Dengguo Feng and
                  Zhenfu Cao and
                  Jiwu Huang},
  title        = {Survey of information security},
  journal      = {Sci. China Ser. {F} Inf. Sci.},
  volume       = {50},
  number       = {3},
  pages        = {273--298},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11432-007-0037-2},
  doi          = {10.1007/S11432-007-0037-2},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/ShenZFCH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/LuoQPH07,
  author       = {Weiqi Luo and
                  Zhenhua Qu and
                  Feng Pan and
                  Jiwu Huang},
  title        = {A survey of passive technology for digital image forensics},
  journal      = {Frontiers Comput. Sci. China},
  volume       = {1},
  number       = {2},
  pages        = {166--179},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11704-007-0017-0},
  doi          = {10.1007/S11704-007-0017-0},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/LuoQPH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tip/BiSHYH07,
  author       = {Ning Bi and
                  Qiyu Sun and
                  Daren Huang and
                  Zhihua Yang and
                  Jiwu Huang},
  title        = {Robust Image Watermarking Based on Multiband Wavelets and Empirical
                  Mode Decomposition},
  journal      = {{IEEE} Trans. Image Process.},
  volume       = {16},
  number       = {8},
  pages        = {1956--1966},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIP.2007.901206},
  doi          = {10.1109/TIP.2007.901206},
  timestamp    = {Sun, 10 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tip/BiSHYH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmm/XiangH07,
  author       = {Shijun Xiang and
                  Jiwu Huang},
  title        = {Histogram-Based Audio Watermarking Against Time-Scale Modification
                  and Cropping Attacks},
  journal      = {{IEEE} Trans. Multim.},
  volume       = {9},
  number       = {7},
  pages        = {1357--1372},
  year         = {2007},
  url          = {https://doi.org/10.1109/TMM.2007.906580},
  doi          = {10.1109/TMM.2007.906580},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmm/XiangH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/NiWHZH07,
  author       = {Jiangqun Ni and
                  Chuntao Wang and
                  Jiwu Huang and
                  Rongyue Zhang and
                  Meiying Huang},
  title        = {A GA-Based Joint Coding and Embedding Optimization for Robust and
                  High Capacity Image Watermarking},
  booktitle    = {Proceedings of the {IEEE} International Conference on Acoustics, Speech,
                  and Signal Processing, {ICASSP} 2007, Honolulu, Hawaii, USA, April
                  15-20, 2007},
  pages        = {181--184},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICASSP.2007.366202},
  doi          = {10.1109/ICASSP.2007.366202},
  timestamp    = {Mon, 22 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/NiWHZH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/LuoQHQ07,
  author       = {Weiqi Luo and
                  Zhenhua Qu and
                  Jiwu Huang and
                  Guoping Qiu},
  title        = {A Novel Method for Detecting Cropped and Recompressed Image Block},
  booktitle    = {Proceedings of the {IEEE} International Conference on Acoustics, Speech,
                  and Signal Processing, {ICASSP} 2007, Honolulu, Hawaii, USA, April
                  15-20, 2007},
  pages        = {217--220},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICASSP.2007.366211},
  doi          = {10.1109/ICASSP.2007.366211},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/LuoQHQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/LiuRH07,
  author       = {Hongmei Liu and
                  Wei Rui and
                  Jiwu Huang},
  title        = {Binary Image Authentication using Zernike Moments},
  booktitle    = {Proceedings of the International Conference on Image Processing, {ICIP}
                  2007, September 16-19, 2007, San Antonio, Texas, {USA}},
  pages        = {385--388},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICIP.2007.4378972},
  doi          = {10.1109/ICIP.2007.4378972},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icip/LiuRH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/HuangLH07,
  author       = {Fangjun Huang and
                  Bin Li and
                  Jiwu Huang},
  title        = {Attack {LSB} Matching Steganography by Counting Alteration Rate of
                  the Number of Neighbourhood Gray Levels},
  booktitle    = {Proceedings of the International Conference on Image Processing, {ICIP}
                  2007, September 16-19, 2007, San Antonio, Texas, {USA}},
  pages        = {401--404},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICIP.2007.4378976},
  doi          = {10.1109/ICIP.2007.4378976},
  timestamp    = {Fri, 23 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icip/HuangLH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/LiHH07,
  author       = {Bin Li and
                  Fangjun Huang and
                  Jiwu Huang},
  title        = {Steganalysis of {LSB} Greedy Embedding Algorithm for {JPEG} Images
                  using Coefficient Symmetry},
  booktitle    = {Proceedings of the International Conference on Image Processing, {ICIP}
                  2007, September 16-19, 2007, San Antonio, Texas, {USA}},
  pages        = {413--416},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICIP.2007.4378979},
  doi          = {10.1109/ICIP.2007.4378979},
  timestamp    = {Fri, 23 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icip/LiHH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/WangNHZH07,
  author       = {Chuntao Wang and
                  Jiangqun Ni and
                  Jiwu Huang and
                  Rongyue Zhang and
                  Meiying Huang},
  editor       = {Teddy Furon and
                  Fran{\c{c}}ois Cayre and
                  Gwena{\"{e}}l J. Do{\"{e}}rr and
                  Patrick Bas},
  title        = {Robust and High Capacity Image Watermarking Based on Jointly Coding
                  and Embedding Optimization},
  booktitle    = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo,
                  France, June 11-13, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4567},
  pages        = {65--79},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77370-2\_5},
  doi          = {10.1007/978-3-540-77370-2\_5},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/WangNHZH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/LuZH07,
  author       = {Zhe{-}Ming Lu and
                  Hong{-}Yi Zheng and
                  Ji{-}Wu Huang},
  editor       = {Bin{-}Yih Liao and
                  Jeng{-}Shyang Pan and
                  Lakhmi C. Jain and
                  Mark Liao and
                  Hideki Noda and
                  Anthony T. S. Ho},
  title        = {A Digital Watermarking Scheme Based on {DCT} and {SVD}},
  booktitle    = {3rd International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing {(IIH-MSP} 2007), Kaohsiung, Taiwan,
                  26-28 November 2007, Proceedings},
  pages        = {241--244},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/IIH-MSP.2007.13},
  doi          = {10.1109/IIH-MSP.2007.13},
  timestamp    = {Fri, 24 Mar 2023 08:33:27 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/LuZH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/TanHS07,
  author       = {Shunquan Tan and
                  Jiwu Huang and
                  Yun Q. Shi},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {Steganalysis of Enhanced {BPCS} Steganography Using the Hilbert-Huang
                  Transform Based Sequential Analysis},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {112--126},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_10},
  doi          = {10.1007/978-3-540-92238-4\_10},
  timestamp    = {Thu, 28 May 2020 12:51:39 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/TanHS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiHTHS07,
  author       = {Bin Li and
                  Fangjun Huang and
                  Shunquan Tan and
                  Jiwu Huang and
                  Yun Q. Shi},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {Effect of Different Coding Patterns on Compressed Frequency Domain
                  Based Universal {JPEG} Steganalysis},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {143--157},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_12},
  doi          = {10.1007/978-3-540-92238-4\_12},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiHTHS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/XiangKH07,
  author       = {Shijun Xiang and
                  Hyoung{-}Joong Kim and
                  Jiwu Huang},
  editor       = {Deepa Kundur and
                  Balakrishnan Prabhakaran and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Histogram-based image hashing scheme robust against geometric deformations},
  booktitle    = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec
                  2007, Dallas, Texas, USA, September 20-21, 2007},
  pages        = {121--128},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1288869.1288886},
  doi          = {10.1145/1288869.1288886},
  timestamp    = {Mon, 22 Apr 2024 21:24:22 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/XiangKH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sswmc/KangLZHL07,
  author       = {Xiangui Kang and
                  Chunhui Liu and
                  Wenjun Zeng and
                  Jiwu Huang and
                  Congbai Liu},
  editor       = {Edward J. Delp III and
                  Ping Wah Wong},
  title        = {Fast and automatic watermark resynchronization based on zernike moments},
  booktitle    = {Security, Steganography, and Watermarking of Multimedia Contents IX,
                  San Jose, CA, USA, January 28, 2007},
  series       = {{SPIE} Proceedings},
  volume       = {6505},
  pages        = {65050E},
  publisher    = {{SPIE}},
  year         = {2007},
  url          = {https://doi.org/10.1117/12.703839},
  doi          = {10.1117/12.703839},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sswmc/KangLZHL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sswmc/WangWH07,
  author       = {Yong Wang and
                  Shaoquan Wu and
                  Jiwu Huang},
  editor       = {Edward J. Delp III and
                  Ping Wah Wong},
  title        = {Audio watermarking robust to geometrical distortions based on dyadic
                  wavelet transform},
  booktitle    = {Security, Steganography, and Watermarking of Multimedia Contents IX,
                  San Jose, CA, USA, January 28, 2007},
  series       = {{SPIE} Proceedings},
  volume       = {6505},
  pages        = {65050A},
  publisher    = {{SPIE}},
  year         = {2007},
  url          = {https://doi.org/10.1117/12.698495},
  doi          = {10.1117/12.698495},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sswmc/WangWH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0707-0397,
  author       = {Shijun Xiang and
                  Jiwu Huang},
  title        = {Robust Audio Watermarking Against the {D/A} and {A/D} conversions},
  journal      = {CoRR},
  volume       = {abs/0707.0397},
  year         = {2007},
  url          = {http://arxiv.org/abs/0707.0397},
  eprinttype    = {arXiv},
  eprint       = {0707.0397},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0707-0397.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoZH07,
  author       = {Changan Zhao and
                  Fangguo Zhang and
                  Jiwu Huang},
  title        = {A Note on the Ate Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {247},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/247},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoZH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/HeH06,
  author       = {Junhui He and
                  Jiwu Huang},
  title        = {Steganalysis of stochastic modulation steganography},
  journal      = {Sci. China Ser. {F} Inf. Sci.},
  volume       = {49},
  number       = {3},
  pages        = {273--285},
  year         = {2006},
  url          = {https://doi.org/10.1007/s11432-006-0273-x},
  doi          = {10.1007/S11432-006-0273-X},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/HeH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/XiangH06,
  author       = {Shijun Xiang and
                  Jiwu Huang},
  title        = {Analysis of Quantization-based Audio Watermarking to {D/A} and {A/D}
                  Conversions},
  journal      = {Int. J. Netw. Secur.},
  volume       = {3},
  number       = {3},
  pages        = {230--238},
  year         = {2006},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v3-n3/ijns-2006-v3-n3-p230-238.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/XiangH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/HuKH06,
  author       = {Yongjian Hu and
                  Sam Kwong and
                  Jiwu Huang},
  title        = {An algorithm for removable visible watermarking},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {16},
  number       = {1},
  pages        = {129--133},
  year         = {2006},
  url          = {https://doi.org/10.1109/TCSVT.2005.858742},
  doi          = {10.1109/TCSVT.2005.858742},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/HuKH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/TanHYS06,
  author       = {Shunquan Tan and
                  Jiwu Huang and
                  Zhihua Yang and
                  Yun Q. Shi},
  title        = {Steganalysis of {JPEG2000} Lazy-Mode Steganography using the Hilbert-Huang
                  Transform Based Sequential Analysis},
  booktitle    = {Proceedings of the International Conference on Image Processing, {ICIP}
                  2006, October 8-11, Atlanta, Georgia, {USA}},
  pages        = {101--104},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICIP.2006.312382},
  doi          = {10.1109/ICIP.2006.312382},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icip/TanHYS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/NiWHZ06,
  author       = {Jiangqun Ni and
                  Chuntao Wang and
                  Jiwu Huang and
                  Rongyue Zhang},
  title        = {Performance Enhancement for {DWT-HMM} Image Watermarking with Content-Adaptive
                  Approach},
  booktitle    = {Proceedings of the International Conference on Image Processing, {ICIP}
                  2006, October 8-11, Atlanta, Georgia, {USA}},
  pages        = {1377--1380},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICIP.2006.312591},
  doi          = {10.1109/ICIP.2006.312591},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icip/NiWHZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/LiuZH06a,
  author       = {Hongmei Liu and
                  Ling Zhu and
                  Jiwu Huang},
  title        = {A Hybrid Watermarking Scheme for Video Authentication},
  booktitle    = {Proceedings of the International Conference on Image Processing, {ICIP}
                  2006, October 8-11, Atlanta, Georgia, {USA}},
  pages        = {2569--2572},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICIP.2006.312984},
  doi          = {10.1109/ICIP.2006.312984},
  timestamp    = {Mon, 26 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icip/LiuZH06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpr/LuoHQ06,
  author       = {Weiqi Luo and
                  Jiwu Huang and
                  Guoping Qiu},
  title        = {Robust Detection of Region-Duplication Forgery in Digital Image},
  booktitle    = {18th International Conference on Pattern Recognition {(ICPR} 2006),
                  20-24 August 2006, Hong Kong, China},
  pages        = {746--749},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICPR.2006.1003},
  doi          = {10.1109/ICPR.2006.1003},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icpr/LuoHQ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpr/YangQHE06,
  author       = {Mai Yang and
                  Guoping Qiu and
                  Jiwu Huang and
                  Dave Elliman},
  title        = {Near-Duplicate Image Recognition and Content-based Image Retrieval
                  using Adaptive Hierarchical Geometric Centroids},
  booktitle    = {18th International Conference on Pattern Recognition {(ICPR} 2006),
                  20-24 August 2006, Hong Kong, China},
  pages        = {958--961},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICPR.2006.851},
  doi          = {10.1109/ICPR.2006.851},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icpr/YangQHE06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/XiangHY06,
  author       = {Shijun Xiang and
                  Jiwu Huang and
                  Rui Yang},
  editor       = {Jan Camenisch and
                  Christian S. Collberg and
                  Neil F. Johnson and
                  Phil Sallee},
  title        = {Time-Scale Invariant Audio Watermarking Based on the Statistical Features
                  in Time Domain},
  booktitle    = {Information Hiding, 8th International Workshop, {IH} 2006, Alexandria,
                  VA, USA, July 10-12, 2006. Revised Selcted Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4437},
  pages        = {93--108},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-74124-4\_7},
  doi          = {10.1007/978-3-540-74124-4\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/XiangHY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/XiangHYWL06,
  author       = {Shijun Xiang and
                  Jiwu Huang and
                  Rui Yang and
                  Chuntao Wang and
                  Hongmei Liu},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {Robust Audio Watermarking Based on Low-Order Zernike Moments},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {226--240},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_19},
  doi          = {10.1007/11922841\_19},
  timestamp    = {Thu, 28 May 2020 12:51:40 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/XiangHYWL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/NiZHWL06,
  author       = {Jiangqun Ni and
                  Rongyue Zhang and
                  Jiwu Huang and
                  Chuntao Wang and
                  Quanbo Li},
  editor       = {Yun{-}Qing Shi and
                  Byeungwoo Jeon},
  title        = {A Rotation-Invariant Secure Image Watermarking Algorithm Incorporating
                  Steerable Pyramid Transform},
  booktitle    = {Digital Watermarking, 5th International Workshop, {IWDW} 2006, Jeju
                  Island, Korea, November 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4283},
  pages        = {446--460},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922841\_36},
  doi          = {10.1007/11922841\_36},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/NiZHWL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pcm/LiuFH06,
  author       = {Hongmei Liu and
                  Huiying Fu and
                  Jiwu Huang},
  editor       = {Yueting Zhuang and
                  Shiqiang Yang and
                  Yong Rui and
                  Qinming He},
  title        = {A Watermarking Algorithm for {JPEG} File},
  booktitle    = {Advances in Multimedia Information Processing - {PCM} 2006, 7th Pacific
                  Rim Conference on Multimedia, Hangzhou, China, November 2-4, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4261},
  pages        = {319--328},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11922162\_38},
  doi          = {10.1007/11922162\_38},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/pcm/LiuFH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sswmc/KangSH06,
  author       = {Xiangui Kang and
                  Yun Q. Shi and
                  Jiwu Huang},
  editor       = {Edward J. Delp III and
                  Ping Wah Wong},
  title        = {Achieving non-ambiguity of quantization-based watermarking},
  booktitle    = {Security, Steganography, and Watermarking of Multimedia Contents VIII,
                  San Jose, CA, USA, January 15, 2006},
  series       = {{SPIE} Proceedings},
  volume       = {6072},
  pages        = {60720F},
  publisher    = {{SPIE}},
  year         = {2006},
  url          = {https://doi.org/10.1117/12.650876},
  doi          = {10.1117/12.650876},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sswmc/KangSH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoZH06,
  author       = {Changan Zhao and
                  Fangguo Zhang and
                  Jiwu Huang},
  title        = {Efficient Tate Pairing Computation Using Double-Base Chains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {201},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/201},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoZH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoZH06a,
  author       = {Changan Zhao and
                  Fangguo Zhang and
                  Jiwu Huang},
  title        = {Speeding up the Bilinear Pairings Computation on Curves with Automorphisms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {474},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/474},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoZH06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijig/LiuHS05,
  author       = {Hongmei Liu and
                  Jiwu Huang and
                  Yun Q. Shi},
  title        = {Dwt-Based Video Data Hiding Robust To Mpeg Compression And Frame Loss},
  journal      = {Int. J. Image Graph.},
  volume       = {5},
  number       = {1},
  pages        = {111--134},
  year         = {2005},
  url          = {https://doi.org/10.1142/S0219467805001689},
  doi          = {10.1142/S0219467805001689},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijig/LiuHS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tbc/WuHHS05,
  author       = {Shaoquan Wu and
                  Jiwu Huang and
                  Daren Huang and
                  Yun Q. Shi},
  title        = {Efficiently self-synchronized audio watermarking for assured audio
                  data transmission},
  journal      = {{IEEE} Trans. Broadcast.},
  volume       = {51},
  number       = {1},
  pages        = {69--76},
  year         = {2005},
  url          = {https://doi.org/10.1109/TBC.2004.838265},
  doi          = {10.1109/TBC.2004.838265},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tbc/WuHHS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsw/WuHGH05,
  author       = {Xiaoyun Wu and
                  Junquan Hu and
                  Zhixiong Gu and
                  Jiwu Huang},
  editor       = {Rajkumar Buyya and
                  Paul D. Coddington and
                  Paul Montague and
                  Reihaneh Safavi{-}Naini and
                  Nicholas Paul Sheppard and
                  Andrew L. Wendelborn},
  title        = {A Secure Semi-Fragile Watermarking for Image Authentication Based
                  on Integer Wavelet Transform with Parameters Abstract},
  booktitle    = {{ACSW} Frontiers 2005, 2005 {ACSW} Workshops - the Australasian Workshop
                  on Grid Computing and e-Research (AusGrid 2005) and the Third Australasian
                  Information Security Workshop {(AISW} 2005), Newcastle, NSW, Australia,
                  January/February 2005},
  series       = {{CRPIT}},
  volume       = {44},
  pages        = {75--80},
  publisher    = {Australian Computer Society},
  year         = {2005},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV44Wu.html},
  timestamp    = {Fri, 26 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsw/WuHGH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/GuFH05,
  author       = {Limin Gu and
                  Yanmei Fang and
                  Jiwu Huang},
  editor       = {Yvo Desmedt and
                  Huaxiong Wang and
                  Yi Mu and
                  Yongqing Li},
  title        = {Revaluation of Error Correcting Coding in Watermarking Channel},
  booktitle    = {Cryptology and Network Security, 4th International Conference, {CANS}
                  2005, Xiamen, China, December 14-16, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3810},
  pages        = {274--287},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11599371\_23},
  doi          = {10.1007/11599371\_23},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/GuFH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiangWH05,
  author       = {Xiaoping Liang and
                  Xiaoyun Wu and
                  Jiwu Huang},
  editor       = {Yue Hao and
                  Jiming Liu and
                  Yu{-}Ping Wang and
                  Yiu{-}ming Cheung and
                  Hujun Yin and
                  Licheng Jiao and
                  Jianfeng Ma and
                  Yong{-}Chang Jiao},
  title        = {Reversible Data Hiding for Image Based on Histogram Modification of
                  Wavelet Coefficients},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3802},
  pages        = {573--580},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11596981\_85},
  doi          = {10.1007/11596981\_85},
  timestamp    = {Tue, 23 Feb 2021 17:25:41 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiangWH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drmtics/LiuSH05,
  author       = {Hongmei Liu and
                  Fenglian Shao and
                  Jiwu Huang},
  editor       = {Reihaneh Safavi{-}Naini and
                  Moti Yung},
  title        = {A {MPEG-2} Video Watermarking Algorithm with Compensation in Bit Stream},
  booktitle    = {Digital Rights Management: Technologies, Issues, Challenges and Systems,
                  First International Conference, {DRMTICS} 2005, Sydney, Australia,
                  October 31 - November 2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3919},
  pages        = {123--134},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11787952\_10},
  doi          = {10.1007/11787952\_10},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/drmtics/LiuSH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drmtics/WuLLHQ05,
  author       = {Xiaoyun Wu and
                  Xiaoping Liang and
                  Hongmei Liu and
                  Jiwu Huang and
                  Guoping Qiu},
  editor       = {Reihaneh Safavi{-}Naini and
                  Moti Yung},
  title        = {Reversible Semi-fragile Image Authentication Using Zernike Moments
                  and Integer Wavelet Transform},
  booktitle    = {Digital Rights Management: Technologies, Issues, Challenges and Systems,
                  First International Conference, {DRMTICS} 2005, Sydney, Australia,
                  October 31 - November 2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3919},
  pages        = {135--145},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11787952\_11},
  doi          = {10.1007/11787952\_11},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drmtics/WuLLHQ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/FangBHH05,
  author       = {Yanmei Fang and
                  Ning Bi and
                  Daren Huang and
                  Jiwu Huang},
  title        = {The M-band wavelets in image watermarking},
  booktitle    = {Proceedings of the 2005 International Conference on Image Processing,
                  {ICIP} 2005, Genoa, Italy, September 11-14, 2005},
  pages        = {245--248},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICIP.2005.1529733},
  doi          = {10.1109/ICIP.2005.1529733},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icip/FangBHH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/LiuLH05,
  author       = {Hongmei Liu and
                  Junlong Lin and
                  Jiwu Huang},
  title        = {Image authentication using content based watermark},
  booktitle    = {International Symposium on Circuits and Systems {(ISCAS} 2005), 23-26
                  May 2005, Kobe, Japan},
  pages        = {4014--4017},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ISCAS.2005.1465511},
  doi          = {10.1109/ISCAS.2005.1465511},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/LiuLH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/FangGH05,
  author       = {Yanmei Fang and
                  Limin Gu and
                  Jiwu Huang},
  editor       = {Robert H. Deng and
                  Feng Bao and
                  HweeHwa Pang and
                  Jianying Zhou},
  title        = {Performance Analysis of CDMA-Based Watermarking with Quantization
                  Scheme},
  booktitle    = {Information Security Practice and Experience, First International
                  Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3439},
  pages        = {350--361},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-31979-5\_30},
  doi          = {10.1007/978-3-540-31979-5\_30},
  timestamp    = {Wed, 25 Sep 2019 18:12:57 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/FangGH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HeHQ05,
  author       = {Junhui He and
                  Jiwu Huang and
                  Guoping Qiu},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {A New Approach to Estimating Hidden Message Length in Stochastic Modulation
                  Steganography},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_1},
  doi          = {10.1007/11551492\_1},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HeHQ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/NiZHW05,
  author       = {Jiangqun Ni and
                  Rongyue Zhang and
                  Jiwu Huang and
                  Chuntao Wang},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {A Robust Multi-bit Image Watermarking Algorithm Based on {HMM} in
                  Wavelet Domain},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {110--123},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_9},
  doi          = {10.1007/11551492\_9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/NiZHW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KangSHZ05,
  author       = {Xiangui Kang and
                  Yun Q. Shi and
                  Jiwu Huang and
                  Wenjun Zeng},
  editor       = {Mauro Barni and
                  Ingemar J. Cox and
                  Ton Kalker and
                  Hyoung Joong Kim},
  title        = {Multi-band Wavelet Based Digital Watermarking Using Principal Component
                  Analysis},
  booktitle    = {Digital Watermarking, 4th International Workshop, {IWDW} 2005, Siena,
                  Italy, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3710},
  pages        = {139--146},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11551492\_11},
  doi          = {10.1007/11551492\_11},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KangSHZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kes/XiangHF05,
  author       = {Shijun Xiang and
                  Jiwu Huang and
                  Xiaoyun Feng},
  editor       = {Rajiv Khosla and
                  Robert J. Howlett and
                  Lakhmi C. Jain},
  title        = {Analysis of Quantization-Based Audio Watermarking in {DA/AD} Conversions},
  booktitle    = {Knowledge-Based Intelligent Information and Engineering Systems, 9th
                  International Conference, {KES} 2005, Melbourne, Australia, September
                  14-16, 2005, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3682},
  pages        = {587--592},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11552451\_80},
  doi          = {10.1007/11552451\_80},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/kes/XiangHF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kes/WuLH05,
  author       = {Xiaoyun Wu and
                  Hongmei Liu and
                  Jiwu Huang},
  editor       = {Rajiv Khosla and
                  Robert J. Howlett and
                  Lakhmi C. Jain},
  title        = {Semi-fragile Watermarking Based on Zernike Moments and Integer Wavelet
                  Transform},
  booktitle    = {Knowledge-Based Intelligent Information and Engineering Systems, 9th
                  International Conference, {KES} 2005, Melbourne, Australia, September
                  14-16, 2005, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3682},
  pages        = {1108--1114},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11552451\_153},
  doi          = {10.1007/11552451\_153},
  timestamp    = {Mon, 26 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kes/WuLH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kes/NiWHZ05,
  author       = {Jiangqun Ni and
                  Chuntao Wang and
                  Jiwu Huang and
                  Rongyue Zhang},
  editor       = {Rajiv Khosla and
                  Robert J. Howlett and
                  Lakhmi C. Jain},
  title        = {A RST-Invariant Robust {DWT-HMM} Watermarking Algorithm Incorporating
                  Zernike Moments and Template},
  booktitle    = {Knowledge-Based Intelligent Information and Engineering Systems, 9th
                  International Conference, {KES} 2005, Melbourne, Australia, September
                  14-16, 2005, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3681},
  pages        = {1233--1239},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11552413\_176},
  doi          = {10.1007/11552413\_176},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/kes/NiWHZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsp/XuXQH05,
  author       = {Junyi Xu and
                  Changzhen Xiong and
                  Dongxu Qi and
                  Jiwu Huang},
  title        = {Watermarking Parameters Feasible Region Model},
  booktitle    = {{IEEE} 7th Workshop on Multimedia Signal Processing, {MMSP} 2005,
                  October 30 2005 - November 2 2005, Shanghai, China},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/MMSP.2005.248552},
  doi          = {10.1109/MMSP.2005.248552},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsp/XuXQH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/ChenHHZW04,
  author       = {Zewen Chen and
                  Jiwu Huang and
                  Daren Huang and
                  Jianhong Zhang and
                  Yumin Wang},
  title        = {Provably Secure and ID-Based Group Signature Scheme},
  booktitle    = {18th International Conference on Advanced Information Networking and
                  Applications {(AINA} 2004), 29-31 March 2004, Fukuoka, Japan},
  pages        = {384--388},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/AINA.2004.1283828},
  doi          = {10.1109/AINA.2004.1283828},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/ChenHHZW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/HuangHHS04,
  author       = {Jiwu Huang and
                  Junquan Hu and
                  Daren Huang and
                  Yun Q. Shi},
  title        = {Improve security of fragile watermarking via parameterized wavelet},
  booktitle    = {Proceedings of the 2004 International Conference on Image Processing,
                  {ICIP} 2004, Singapore, October 24-27, 2004},
  pages        = {721--724},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/ICIP.2004.1419399},
  doi          = {10.1109/ICIP.2004.1419399},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icip/HuangHHS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/KangHS04,
  author       = {Xiangui Kang and
                  Jiwu Huang and
                  Yun Q. Shi},
  title        = {Improve robustness of image watermarking via adaptive receiving},
  booktitle    = {Proceedings of the 2004 International Conference on Image Processing,
                  {ICIP} 2004, Singapore, October 24-27, 2004},
  pages        = {2343--2346},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/ICIP.2004.1421570},
  doi          = {10.1109/ICIP.2004.1421570},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icip/KangHS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/FangHW04,
  author       = {Yanmei Fang and
                  Jiwu Huang and
                  Shaoquan Wu},
  title        = {CDMA-based watermarking resisting to cropping},
  booktitle    = {Proceedings of the 2004 International Symposium on Circuits and Systems,
                  {ISCAS} 2004, Vancouver, BC, Canada, May 23-26, 2004},
  pages        = {25--28},
  publisher    = {{IEEE}},
  year         = {2004},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/FangHW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/HuKH04,
  author       = {Yongjian Hu and
                  Sam Kwong and
                  Jiwu Huang},
  title        = {Using invisible watermarks to protect visibly watermarked images},
  booktitle    = {Proceedings of the 2004 International Symposium on Circuits and Systems,
                  {ISCAS} 2004, Vancouver, BC, Canada, May 23-26, 2004},
  pages        = {584--587},
  publisher    = {{IEEE}},
  year         = {2004},
  timestamp    = {Fri, 20 May 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/HuKH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/WuHHS04,
  author       = {Shaoquan Wu and
                  Jiwu Huang and
                  Daren Huang and
                  Yun Q. Shi},
  title        = {Self-synchronized audio watermark in {DWT} domain},
  booktitle    = {Proceedings of the 2004 International Symposium on Circuits and Systems,
                  {ISCAS} 2004, Vancouver, BC, Canada, May 23-26, 2004},
  pages        = {712--715},
  publisher    = {{IEEE}},
  year         = {2004},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/WuHHS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/KangHSL03,
  author       = {Xiangui Kang and
                  Jiwu Huang and
                  Yun Q. Shi and
                  Yan Lin},
  title        = {A {DWT-DFT} composite watermarking scheme robust to both affine transform
                  and {JPEG} compression},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {13},
  number       = {8},
  pages        = {776--786},
  year         = {2003},
  url          = {https://doi.org/10.1109/TCSVT.2003.815957},
  doi          = {10.1109/TCSVT.2003.815957},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/KangHSL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/GuHC03,
  author       = {Limin Gu and
                  Jiwu Huang and
                  Zewen Chen},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {Analysis of the Bounds for Linear Block Codes in Watermark Channel},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {294--304},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_22},
  doi          = {10.1007/978-3-540-24691-6\_22},
  timestamp    = {Thu, 17 Nov 2022 14:05:51 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/GuHC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ChenWWHH03,
  author       = {Zewen Chen and
                  Jilin Wang and
                  Yumin Wang and
                  Jiwu Huang and
                  Daren Huang},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {An Efficient Revocation Algorithm in Group Signatures},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {339--351},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_25},
  doi          = {10.1007/978-3-540-24691-6\_25},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ChenWWHH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/GuHS03,
  author       = {Limin Gu and
                  Jiwu Huang and
                  Yun Q. Shi},
  title        = {Analysis of the role played by error correcting coding in robust watermarking},
  booktitle    = {Proceedings of the 2003 International Symposium on Circuits and Systems,
                  {ISCAS} 2003, Bangkok, Thailand, May 25-28, 2003},
  pages        = {798--801},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/ISCAS.2003.1205140},
  doi          = {10.1109/ISCAS.2003.1205140},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/GuHS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/HongmeiZJXS03,
  author       = {Hongmei Liu and
                  Zhang Zhefeng and
                  Jiwu Huang and
                  Huang Xialing and
                  Yun Q. Shi},
  title        = {A high capacity distortion-free data hiding algorithm for palette
                  image},
  booktitle    = {Proceedings of the 2003 International Symposium on Circuits and Systems,
                  {ISCAS} 2003, Bangkok, Thailand, May 25-28, 2003},
  pages        = {916--919},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/ISCAS.2003.1206124},
  doi          = {10.1109/ISCAS.2003.1206124},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/HongmeiZJXS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/ShiNAH03,
  author       = {Yun Q. Shi and
                  Zhicheng Ni and
                  Nirwan Ansari and
                  Jiwu Huang},
  title        = {2-D and 3-D successive packing interleaving techniques and their applications
                  to image and video data hiding},
  booktitle    = {Proceedings of the 2003 International Symposium on Circuits and Systems,
                  {ISCAS} 2003, Bangkok, Thailand, May 25-28, 2003},
  pages        = {924--927},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/ISCAS.2003.1206126},
  doi          = {10.1109/ISCAS.2003.1206126},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/ShiNAH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/FangHS03,
  author       = {Yanmei Fang and
                  Jiwu Huang and
                  Yun Q. Shi},
  title        = {Image watermarking algorithm applying {CDMA}},
  booktitle    = {Proceedings of the 2003 International Symposium on Circuits and Systems,
                  {ISCAS} 2003, Bangkok, Thailand, May 25-28, 2003},
  pages        = {948--951},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/ISCAS.2003.1206132},
  doi          = {10.1109/ISCAS.2003.1206132},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/FangHS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HuHKC03,
  author       = {Yongjian Hu and
                  Jiwu Huang and
                  Sam Kwong and
                  Yiu{-}Keung Chan},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {Image Fusion Based Visible Watermarking Using Dual-Tree Complex Wavelet
                  Transform},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {86--100},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_7},
  doi          = {10.1007/978-3-540-24624-4\_7},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HuHKC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KangHSZ03,
  author       = {Xiangui Kang and
                  Jiwu Huang and
                  Yun Q. Shi and
                  Jianxiang Zhu},
  editor       = {Ton Kalker and
                  Ingemar J. Cox and
                  Yong Man Ro},
  title        = {Robust Watermarking with Adaptive Receiving},
  booktitle    = {Digital Watermarking, Second International Workshop, {IWDW} 2003,
                  Seoul, Korea, October 20-22, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2939},
  pages        = {396--407},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24624-4\_31},
  doi          = {10.1007/978-3-540-24624-4\_31},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KangHSZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/HuangS02,
  author       = {Jiwu Huang and
                  Yun Q. Shi},
  title        = {Reliable information bit hiding},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {12},
  number       = {10},
  pages        = {916--920},
  year         = {2002},
  url          = {https://doi.org/10.1109/TCSVT.2002.804897},
  doi          = {10.1109/TCSVT.2002.804897},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/HuangS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HuHHS02,
  author       = {Junquan Hu and
                  Jiwu Huang and
                  Daren Huang and
                  Yun Q. Shi},
  editor       = {Fabien A. P. Petitcolas and
                  Hyoung Joong Kim},
  title        = {A DWT-Based Fragile Watermarking Tolerant of {JPEG} Compression},
  booktitle    = {Digital Watermarking, First International Workshop, {IWDW} 2002, Seoul,
                  Korea, November 21-22, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2613},
  pages        = {179--188},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36617-2\_15},
  doi          = {10.1007/3-540-36617-2\_15},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HuHHS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KangHS02,
  author       = {Xiangui Kang and
                  Jiwu Huang and
                  Yun Q. Shi},
  editor       = {Fabien A. P. Petitcolas and
                  Hyoung Joong Kim},
  title        = {An Image Watermarking Algorithm Robust to Geometric Distortion},
  booktitle    = {Digital Watermarking, First International Workshop, {IWDW} 2002, Seoul,
                  Korea, November 21-22, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2613},
  pages        = {212--223},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36617-2\_18},
  doi          = {10.1007/3-540-36617-2\_18},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KangHS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/HuangLHL01,
  author       = {Daren Huang and
                  Jiufen Liu and
                  Jiwu Huang and
                  Hongmei Liu},
  title        = {A Dwt-Based Image Watermarking Algorithm},
  booktitle    = {Proceedings of the 2001 {IEEE} International Conference on Multimedia
                  and Expo, {ICME} 2001, August 22-25, 2001, Tokyo, Japan},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ICME.2001.1237719},
  doi          = {10.1109/ICME.2001.1237719},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icmcs/HuangLHL01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/LiuHX01,
  author       = {Hongmei Liu and
                  Jiwu Huang and
                  Zi{-}mei Xiao},
  title        = {An Adaptive Video Watermarking Algorithm},
  booktitle    = {Proceedings of the 2001 {IEEE} International Conference on Multimedia
                  and Expo, {ICME} 2001, August 22-25, 2001, Tokyo, Japan},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ICME.2001.1237688},
  doi          = {10.1109/ICME.2001.1237688},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icmcs/LiuHX01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/HuangS01,
  author       = {Jiwu Huang and
                  Yun Q. Shi},
  title        = {Embedding gray level images},
  booktitle    = {Proceedings of the 2001 International Symposium on Circuits and Systems,
                  {ISCAS} 2001, Sydney, Australia, May 6-9, 2001},
  pages        = {239--242},
  publisher    = {{IEEE}},
  year         = {2001},
  url          = {https://doi.org/10.1109/ISCAS.2001.922029},
  doi          = {10.1109/ISCAS.2001.922029},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/HuangS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/ShiS00,
  author       = {Jiwu Huang and
                  Yun Q. Shi and
                  Yi Shi},
  title        = {Embedding image watermarks in dc components},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {10},
  number       = {6},
  pages        = {974--979},
  year         = {2000},
  url          = {https://doi.org/10.1109/76.867936},
  doi          = {10.1109/76.867936},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/ShiS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsp/HuangES98,
  author       = {Jiwu Huang and
                  George F. Elmasry and
                  Yun Q. Shi},
  editor       = {Ping Wah Wong and
                  Abeer Alwan and
                  Antonio Ortega and
                  C.{-}C. Jay Kuo and
                  C. L. Max Nikias},
  title        = {Power constrained multiple signaling in digital image watermarking},
  booktitle    = {Second {IEEE} Workshop on Multimedia Signal Processing, {MMSP} 1998,
                  Redondo Beach, California, USA, December 7-9, 1998},
  pages        = {388--393},
  publisher    = {{IEEE}},
  year         = {1998},
  url          = {https://doi.org/10.1109/MMSP.1998.738967},
  doi          = {10.1109/MMSP.1998.738967},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsp/HuangES98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics