Edge adaptive image steganography based on LSB matching revisited W Luo, F Huang, J Huang IEEE Transactions on information forensics and security 5 (2), 201-214, 2010 | 761 | 2010 |
A survey on image steganography and steganalysis. B Li, J He, J Huang, YQ Shi J. Inf. Hiding Multim. Signal Process. 2 (2), 142-172, 2011 | 593 | 2011 |
A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression X Kang, J Huang, YQ Shi, Y Lin IEEE transactions on circuits and systems for video technology 13 (8), 776-786, 2003 | 477 | 2003 |
信息安全综述(Survey of information security) 沈昌祥, 张焕国, 冯登国, 曹珍富, 黄继武 中国科学 E 辑: 信息科学(Science in China Series F: Information Science) 37 …, 2007 | 472* | 2007 |
Robust detection of region-duplication forgery in digital image W Luo, J Huang, G Qiu 18th International Conference on Pattern Recognition (ICPR'06) 4, 746-749, 2006 | 472 | 2006 |
Embedding image watermarks in DC components J Huang, YQ Shi, Y Shi IEEE transactions on circuits and systems for video technology 10 (6), 974-979, 2000 | 472 | 2000 |
A new cost function for spatial image steganography B Li, M Wang, J Huang, X Li 2014 IEEE International Conference on Image Processing (ICIP), 4206-4210, 2014 | 412 | 2014 |
DCT 域图像水印: 嵌入对策和算法(Watermarking in DCT Domain: Embedding Strategy and Algorithm) 黄继武, 程卫东 Yun Q. Shi 电子学报 (ACTA Electronica Sinica) 28 (4), 57-60, 2000 | 365* | 2000 |
Efficiently self-synchronized audio watermarking for assured audio data transmission S Wu, J Huang, D Huang, YQ Shi IEEE Transactions on Broadcasting 51 (1), 69-76, 2005 | 358 | 2005 |
Digital image splicing detection based on Markov features in DCT and DWT domain Z He, W Lu, W Sun, J Huang Pattern recognition 45 (12), 4292-4299, 2012 | 296 | 2012 |
JPEG error analysis and its applications to digital image forensics W Luo, J Huang, G Qiu IEEE Transactions on Information Forensics and Security 5 (3), 480-491, 2010 | 280 | 2010 |
小波变换域图像水印嵌入对策和算法(An Embedding Strategy and Algorithm for Image Watermarking in DWT Domain) 黄达人, 刘九芬, 黄继武 软件学报(Journal of Software) 13 (7), 1290-1297, 2002 | 280* | 2002 |
A novel method for detecting cropped and recompressed image block W Luo, Z Qu, J Huang, G Qiu 2007 IEEE International Conference on Acoustics, Speech and Signal …, 2007 | 256 | 2007 |
Adaptive image watermarking scheme based on visual masking J Huang, YQ Shi Electronics letters 34 (8), 748-750, 1998 | 230 | 1998 |
Robust image watermarking based on multiband wavelets and empirical mode decomposition N Bi, Q Sun, D Huang, Z Yang, J Huang IEEE Transactions on Image Processing 16 (8), 1956-1966, 2007 | 224 | 2007 |
Enhancing source camera identification performance with a camera reference phase sensor pattern noise X Kang, Y Li, Z Qu, J Huang IEEE Transactions on Information Forensics and Security 7 (2), 393-402, 2011 | 220 | 2011 |
Detecting double JPEG compression with the same quantization matrix F Huang, J Huang, YQ Shi IEEE Transactions on Information Forensics and Security 5 (4), 848-856, 2010 | 211 | 2010 |
A strategy of clustering modification directions in spatial image steganography B Li, M Wang, X Li, S Tan, J Huang IEEE Transactions on Information Forensics and Security 10 (9), 1905-1917, 2015 | 202 | 2015 |
Detecting doubly compressed JPEG images by using mode based first digit features B Li, YQ Shi, J Huang 2008 IEEE 10th Workshop on Multimedia Signal Processing, 730-735, 2008 | 201 | 2008 |
Reversible image watermarking on prediction errors by efficient histogram modification HT Wu, J Huang Signal Processing 92 (12), 3000-3009, 2012 | 194 | 2012 |