dblp.uni-trier.dewww.uni-trier.de

Jiwu Huang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
70EEFangjun Huang, Bin Li, Jiwu Huang: Universal JPEG steganalysis based on microscopic and macroscopic calibration. ICIP 2008: 2068-2071
69EEXiangui Kang, Xiong Zhong, Jiwu Huang, Wenjun Zeng: An efficient print-scanning resilient data hiding scheme based on a novel LPM. ICIP 2008: 2080-2083
68EEFangjun Huang, Yun Q. Shi, Jiwu Huang: A study on security performance of YASS. ICIP 2008: 2084-2087
67EEJiangqun Ni, Rongyue Zhang, Chen Fang, Jiwu Huang, Chuntao Wang, Hyoung-Joong Kim: Watermarking Security Incorporating Natural Scene Statistics. Information Hiding 2008: 132-146
66EEBin Li, Yun Q. Shi, Jiwu Huang: Steganalysis of YASS. MM&Sec 2008: 139-148
65EERui Yang, Zhenhua Qu, Jiwu Huang: Detecting digital audio forgeries by checking frame offsets. MM&Sec 2008: 21-26
64EEBin Li, Yun Q. Shi, Jiwu Huang: Detecting doubly compressed JPEG images by using Mode Based First Digit Features. MMSP 2008: 730-735
63EEShijun Xiang, Hyoung-Joong Kim, Jiwu Huang: Invariant Image Watermarking Based on Statistical Features in the Low-Frequency Domain. IEEE Trans. Circuits Syst. Video Techn. 18(6): 777-790 (2008)
62EEChangan Zhao, Fangguo Zhang, Jiwu Huang: A note on the Ate pairing. Int. J. Inf. Sec. 7(6): 379-382 (2008)
61EEChangan Zhao, Fangguo Zhang, Jiwu Huang: Efficient Tate pairing computation using double-base chains. Science in China Series F: Information Sciences 51(8): 1096-1105 (2008)
60EEShijun Xiang, Hyoung-Joong Kim, Jiwu Huang: Audio watermarking robust against time-scale modification and MP3 compression. Signal Processing 88(10): 2372-2387 (2008)
2007
59EEHongmei Liu, Wei Rui, Jiwu Huang: Binary Image Authentication using Zernike Moments. ICIP (1) 2007: 385-388
58EEFangjun Huang, Bin Li, Jiwu Huang: Attack LSB Matching Steganography by Counting Alteration Rate of the Number of Neighbourhood Gray Levels. ICIP (1) 2007: 401-404
57EEBin Li, Fangjun Huang, Jiwu Huang: Steganalysis of LSB Greedy Embedding Algorithm for JPEG Images using Coefficient Symmetry. ICIP (1) 2007: 413-416
56EEShunquan Tan, Jiwu Huang, Yun Q. Shi: Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis. IWDW 2007: 112-126
55EEBin Li, Fangjun Huang, Shunquan Tan, Jiwu Huang, Yun Q. Shi: Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis. IWDW 2007: 143-157
54EEChuntao Wang, Jiangqun Ni, Jiwu Huang, Rongyue Zhang, Meiying Huang: Robust and High Capacity Image Watermarking Based on Jointly Coding and Embedding Optimization. Information Hiding 2007: 65-79
53EEShijun Xiang, Hyoung-Joong Kim, Jiwu Huang: Histogram-based image hashing scheme robust against geometric deformations. MM&Sec 2007: 121-128
52EEShijun Xiang, Jiwu Huang: Robust Audio Watermarking Against the D/A and A/D conversions CoRR abs/0707.0397: (2007)
51EEWeiqi Luo, Zhenhua Qu, Feng Pan, Jiwu Huang: A survey of passive technology for digital image forensics. Frontiers of Computer Science in China 1(2): 166-179 (2007)
50EENing Bi, Qiyu Sun, Daren Huang, Zhihua Yang, Jiwu Huang: Robust Image Watermarking Based on Multiband Wavelets and Empirical Mode Decomposition. IEEE Transactions on Image Processing 16(8): 1956-1966 (2007)
49EEShijun Xiang, Jiwu Huang: Histogram-Based Audio Watermarking Against Time-Scale Modification and Cropping Attacks. IEEE Transactions on Multimedia 9(7): 1357-1372 (2007)
2006
48EEShunquan Tan, Jiwu Huang, Zhihua Yang, Yun Q. Shi: Steganalysis of JPEG2000 Lazy-Mode Steganography using the Hilbert-Huang Transform Based Sequential Analysis. ICIP 2006: 101-104
47EEJiangqun Ni, Chuntao Wang, Jiwu Huang, Rongyue Zhang: Performance Enhancement for DWT-HMM Image Watermarking with Content-Adaptive Approach. ICIP 2006: 1377-1380
46EEHongmei Liu, Ling Zhu, Jiwu Huang: A Hybrid Watermarking Scheme for Video Authentication. ICIP 2006: 2569-2572
45EEMai Yang, Guoping Qiu, Jiwu Huang, Dave Elliman: Near-Duplicate Image Recognition and Content-based Image Retrieval using Adaptive Hierarchical Geometric Centroids. ICPR (2) 2006: 958-961
44EEWeiqi Luo, Jiwu Huang, Guoping Qiu: Robust Detection of Region-Duplication Forgery in Digital Image. ICPR (4) 2006: 746-749
43EEShijun Xiang, Jiwu Huang, Rui Yang, Chuntao Wang, Hongmei Liu: Robust Audio Watermarking Based on Low-Order Zernike Moments. IWDW 2006: 226-240
42EEJiangqun Ni, Rongyue Zhang, Jiwu Huang, Chuntao Wang, Quanbo Li: A Rotation-Invariant Secure Image Watermarking Algorithm Incorporating Steerable Pyramid Transform. IWDW 2006: 446-460
41EEShijun Xiang, Jiwu Huang, Rui Yang: Time-Scale Invariant Audio Watermarking Based on the Statistical Features in Time Domain. Information Hiding 2006: 93-108
40EEHongmei Liu, Huiying Fu, Jiwu Huang: A Watermarking Algorithm for JPEG File. PCM 2006: 319-328
39EEYongjian Hu, Sam Kwong, Jiwu Huang: An algorithm for removable visible watermarking. IEEE Trans. Circuits Syst. Video Techn. 16(1): 129-133 (2006)
38EEJunhui He, Jiwu Huang: Steganalysis of stochastic modulation steganography. Science in China Series F: Information Sciences 49(3): 273-285 (2006)
2005
37EEXiaoyun Wu, Junquan Hu, Zhixiong Gu, Jiwu Huang: A Secure Semi-Fragile Watermarking for Image Authentication Based on Integer Wavelet Transform with Parameters Abstract. ACSW Frontiers 2005: 75-80
36EELimin Gu, Yanmei Fang, Jiwu Huang: Revaluation of Error Correcting Coding in Watermarking Channel. CANS 2005: 274-287
35EEXiaoping Liang, Xiaoyun Wu, Jiwu Huang: Reversible Data Hiding for Image Based on Histogram Modification of Wavelet Coefficients. CIS (2) 2005: 573-580
34EEHongmei Liu, Fenglian Shao, Jiwu Huang: A MPEG-2 Video Watermarking Algorithm with Compensation in Bit Stream. DRMTICS 2005: 123-134
33EEXiaoyun Wu, Xiaoping Liang, Hongmei Liu, Jiwu Huang, Guoping Qiu: Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform. DRMTICS 2005: 135-145
32EEYanmei Fang, Ning Bi, Daren Huang, Jiwu Huang: The M-band wavelets in image watermarking. ICIP (1) 2005: 245-248
31EEHongmei Liu, Junlong Lin, Jiwu Huang: Image authentication using content based watermark. ISCAS (4) 2005: 4014-4017
30EEYanmei Fang, Limin Gu, Jiwu Huang: Performance Analysis of CDMA-Based Watermarking with Quantization Scheme. ISPEC 2005: 350-361
29EEJunhui He, Jiwu Huang, Guoping Qiu: A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography. IWDW 2005: 1-14
28EEJiangqun Ni, Rongyue Zhang, Jiwu Huang, Chuntao Wang: A Robust Multi-bit Image Watermarking Algorithm Based on HMM in Wavelet Domain. IWDW 2005: 110-123
27EEXiangui Kang, Yun Q. Shi, Jiwu Huang, Wenjun Zeng: Multi-band Wavelet Based Digital Watermarking Using Principal Component Analysis. IWDW 2005: 139-146
26EEJiangqun Ni, Chuntao Wang, Jiwu Huang, Rongyue Zhang: A RST-Invariant Robust DWT-HMM Watermarking Algorithm Incorporating Zernike Moments and Template. KES (1) 2005: 1233-1239
25EEXiaoyun Wu, Hongmei Liu, Jiwu Huang: Semi-fragile Watermarking Based on Zernike Moments and Integer Wavelet Transform. KES (2) 2005: 1108-1114
24EEShijun Xiang, Jiwu Huang, Xiaoyun Feng: Analysis of Quantization-Based Audio Watermarking in DA/AD Conversions. KES (2) 2005: 587-592
23EEHongmei Liu, Jiwu Huang, Yun Q. Shi: Dwt-Based Video Data Hiding Robust To Mpeg Compression And Frame Loss. Int. J. Image Graphics 5(1): 111-134 (2005)
2004
22EEZewen Chen, Jiwu Huang, Daren Huang, Jianhong Zhang, Yumin Wang: Provably Secure and ID-Based Group Signature Scheme. AINA (2) 2004: 384-388
21EEXiangui Kang, Jiwu Huang, Yun Q. Shi: Improve robustness of image watermarking via adaptive receiving. ICIP 2004: 2343-2346
20EEJiwu Huang, Junquan Hu, Daren Huang, Yun Q. Shi: Improve security of fragile watermarking via parameterized wavelet. ICIP 2004: 721-724
19 Yanmei Fang, Jiwu Huang, Shaoquan Wu: CDMA-based watermarking resisting to cropping. ISCAS (2) 2004: 25-28
18 Yongjian Hu, Sam Kwong, Jiwu Huang: Using invisible watermarks to protect visibly watermarked images. ISCAS (5) 2004: 584-587
17 Shaoquan Wu, Jiwu Huang, Daren Huang, Yun Q. Shi: Self-synchronized audio watermark in DWT domain. ISCAS (5) 2004: 712-715
2003
16EELimin Gu, Jiwu Huang, Zewen Chen: Analysis of the Bounds for Linear Block Codes in Watermark Channel. ICISC 2003: 294-304
15EEZewen Chen, Jilin Wang, Yumin Wang, Jiwu Huang, Daren Huang: An Efficient Revocation Algorithm in Group Signatures. ICISC 2003: 339-351
14EEHongmei Liu, Zhang Zhefeng, Jiwu Huang, Huang Xialing, Yun Q. Shi: A high capacity distortion-free data hiding algorithm for palette image. ISCAS (2) 2003: 916-919
13EEYun Q. Shi, Zhicheng Ni, Nirwan Ansari, Jiwu Huang: 2-D and 3-D successive packing interleaving techniques and their applications to image and video data hiding. ISCAS (2) 2003: 924-927
12EEYanmei Fang, Jiwu Huang, Yun Q. Shi: Image watermarking algorithm applying CDMA. ISCAS (2) 2003: 948-951
11EELimin Gu, Jiwu Huang, Yun Q. Shi: Analysis of the role played by error correcting coding in robust watermarking. ISCAS (3) 2003: 798-801
10EEXiangui Kang, Jiwu Huang, Yun Q. Shi, Jianxiang Zhu: Robust Watermarking with Adaptive Receiving. IWDW 2003: 396-407
9EEYongjian Hu, Jiwu Huang, Sam Kwong, Yiu-Keung Chan: Image Fusion Based Visible Watermarking Using Dual-Tree Complex Wavelet Transform. IWDW 2003: 86-100
8 Xiangui Kang, Jiwu Huang, Yun Q. Shi, Yan Lin: A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Trans. Circuits Syst. Video Techn. 13(8): 776-786 (2003)
2002
7EEJunquan Hu, Jiwu Huang, Daren Huang, Yun Q. Shi: A DWT-Based Fragile Watermarking Tolerant of JPEG Compression. IWDW 2002: 179-188
6EEXiangui Kang, Jiwu Huang, Yun Q. Shi: An Image Watermarking Algorithm Robust to Geometric Distortion. IWDW 2002: 212-223
5 Jiwu Huang, Yun Q. Shi: Reliable information bit hiding. IEEE Trans. Circuits Syst. Video Techn. 12(10): 916- (2002)
2001
4EEDaren Huang, Jiufen Liu, Jiwu Huang, Hongmei Liu: A Dwt-Based Image Watermarking Algorithm. ICME 2001
3EEHongmei Liu, Jiwu Huang, Zi-mei Xiao: An Adaptive Video Watermarking Algorithm. ICME 2001
2EEJiwu Huang, Yun Q. Shi: Embedding gray level images. ISCAS (5) 2001: 239-242
2000
1 Jiwu Huang, Yun Q. Shi, Yi Shi: Embedding image watermarks in dc components. IEEE Trans. Circuits Syst. Video Techn. 10(6): 974-979 (2000)

Coauthor Index

1Nirwan Ansari [13]
2Ning Bi [32] [50]
3Yiu-Keung Chan [9]
4Zewen Chen [15] [16] [22]
5Dave Elliman (David G. Elliman) [45]
6Chen Fang [67]
7Yanmei Fang [12] [19] [30] [32] [36]
8Xiaoyun Feng [24]
9Huiying Fu [40]
10Limin Gu [11] [16] [30] [36]
11Zhixiong Gu [37]
12Junhui He [29] [38]
13Junquan Hu [7] [20] [37]
14Yongjian Hu [9] [18] [39]
15Daren Huang [4] [7] [15] [17] [20] [22] [32] [50]
16Fangjun Huang [55] [57] [58] [68] [70]
17Meiying Huang [54]
18Xiangui Kang [6] [8] [10] [21] [27] [69]
19Hyoung-Joong Kim [53] [60] [63] [67]
20Sam Kwong [9] [18] [39]
21Bin Li [55] [57] [58] [64] [66] [70]
22Quanbo Li [42]
23Xiaoping Liang [33] [35]
24Junlong Lin [31]
25Yan Lin [8]
26Hongmei Liu [3] [4] [14] [23] [25] [31] [33] [34] [40] [43] [46] [59]
27Jiufen Liu [4]
28Weiqi Luo [44] [51]
29Jiangqun Ni [26] [28] [42] [47] [54] [67]
30Zhicheng Ni [13]
31Feng Pan [51]
32Guoping Qiu [29] [33] [44] [45]
33Zhenhua Qu [51] [65]
34Wei Rui [59]
35Fenglian Shao [34]
36Yi Shi [1]
37Yun Q. Shi (Yun-Qing Shi) [1] [2] [5] [6] [7] [8] [10] [11] [12] [13] [14] [17] [20] [21] [23] [27] [48] [55] [56] [64] [66] [68]
38Qiyu Sun [50]
39Shunquan Tan [48] [55] [56]
40Chuntao Wang [26] [28] [42] [43] [47] [54] [67]
41Jilin Wang [15]
42Yumin Wang [15] [22]
43Shaoquan Wu [17] [19]
44Xiaoyun Wu [25] [33] [35] [37]
45Huang Xialing [14]
46Shijun Xiang [24] [41] [43] [49] [52] [53] [60] [63]
47Zi-mei Xiao [3]
48Mai Yang [45]
49Rui Yang [41] [43] [65]
50Zhihua Yang [48] [50]
51Wenjun Zeng [27] [69]
52Fangguo Zhang [61] [62]
53Jianhong Zhang [22]
54Rongyue Zhang [26] [28] [42] [47] [54] [67]
55Changan Zhao [61] [62]
56Zhang Zhefeng [14]
57Xiong Zhong [69]
58Jianxiang Zhu [10]
59Ling Zhu [46]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)