研究队伍

    黄继武

    首页 > 研究队伍 > 黄继武

    黄继武

    来源:日期:2024-03-07点击:

    简介:

    黄继武,工学博士,1962年10月出生于广东揭阳,毕业于西安电子科技大学。深圳大学信息科学与技术学院教授,广东省信息安全技术重点实验室主任。国家杰出青年科学基金、政府特殊津贴获得者获得者(2003),深圳大学信息工程学院特聘教授、博士生导师;主讲多媒体信号处理、图像信息处理。研究兴趣为多媒体取证与安全、多媒体信号处理。2015年当选国际电气与电子工程师协会2016年度IEEE Fellow(会士)。

    联系方式:

    邮箱: jwhuang@szu.edu.cn

    电话: 0755-86716669

    地址: 深圳大学电子与信息工程学院N801

    研究兴趣:

    多媒体取证、多媒体安全、信息隐藏、图像/音频/视频信号处理、模式识别、机器学习;

    主讲课程:

    图象信息处理、信号与系统。

    获奖与荣誉:

    • 国家杰出青年科学基金,2003。

    • 稳健数字水印方法。教育部提名国家科学技术奖自然科学一等奖(第一),2004。

    • 可视媒体几何计算的理论与方法。国家自然科学二等奖(第二), 2015。

    • Best Student Paper Award, IWDW2008 (Rui Yang, Xiangui Kang, Jiwu Huang. Robust Audio Watermarking Based On Log-polar Frequency Index. IWDW2008), 2008.

    • Best Student Paper Award Nominated. (Ligang Zheng, Guoping Qiu Jiwu Huang, Hao Fu. Salient Covariance For Near-duplicate Image And Video Detection. Prof. of IEEE Int. Conf. on Image Processing, 2585-2588, 2011), 2011

    • IEEE Fellow, 2015

    • 广东省杰出人才,2017。

    主要学术兼职:

    • IEEE Trans.on Information Forensics and Security等国际刊物副编辑(Associate Editor)

    • IEEE 信号处理学会(SPS)信息取证与安全技术委员会(IFS TC)成员

    • IEEE 电路与系统学会(CASS)多媒体系统与应用技术委员会(MSA TC)成员(2002~)

    • 信息安全国家重点实验室学术委员会委员

    • Asia-Pacific Signal and Information Processing Association (APSIPA) BoG(Board of Governors)成员

    科研项目:

    • NSFC-通用技术基础研究联合基金重点项目“基于大数据的信息隐藏与对抗技术” (2017.1-2020.12),U1636202。

    • NSFC-广东联合基金重点项目“网络媒体内容服务安全理论与关键技术”,(2012.1-2015.12)(U1135001).

    • 国家自然科学基金重点项目“数字媒体内容安全关键技术及评测方法的研究” (2007.1-2010.12)(60633030)

    • 国家973计划项目“网络媒体智能处理的理论与方法”(2011CB302200)课题4“网络可视媒体安全”( 2011CB302204)(2010.1-2014.8)

    • 国家973计划项目“可视媒体智能处理的理论与方法”(2006CB303100)课题4“基于内容的可视媒体安全”(2006CB303104)(2006.9-2010.8)。

    学术成果:

    部分期刊论文:

    • Haodong Li, Weiqi Luo,Jiwu Huang, “Localization of Diffusion-based Inpainting in Digital Images,” IEEE Trans. on Information Forensics & Security. Accepted

    • Haodong Li, Weiqi Luo, Xiaoqing Qiu,Jiwu Huang, “Identification of various image operations using residual-based features,” IEEE Trans. on Circuits and Systems for Video Technology. Accepted

    • Anselmo Ferreira, Luca Bondi, Luca Baroffio, Paolo Bestagini,Jiwu Huang, Jefersson A. dos Santos, Stefano Tubaro, Anderson Rocha, “Data-Driven Feature Characterization Techniques for Laser Printer Attribution,” IEEE Trans. on Information Forensics & Security. 12(8), pp. 1860-1873, 2017

    • Shunquan Tan, Haojie Zhang, Bin Li,Jiwu Huang, “Pixel-decimation-assisted Steganalysis of Synchronize-Embedding-Changes Steganography.” IEEE Trans. on Information Forensics & Security. 12(7): 1658-1670, 2017

    • Haojun Wu, Yong Wang,Jiwu Huang, “Identification of Reconstructed Speech,” ACM Transactions on Multimedia Computing Communications and Applications. 13(1): 10:1-10:20, 2017

    • Haodong Li, Weiqi Luo, Xiaoqing Qiu,Jiwu Huang, “Image forgery localization via integrating tampering possibility maps,” IEEE Trans. on Information Forensics & Security. 12(5): 1240-1252, 2017

    • Da Luo, Rui Yang, Bin Li,Jiwu Huang, “Detection of Double Compressed AMR Audio Using Stacked Autoencoder,” IEEE Trans. on Information Forensics & Security. 12(2): 432-444, 2017

    • Paweł Korus andJiwu Huang, “Multi-scale analysis strategies in prnu-based tampering localization,” IEEE Trans. on Information Forensics & Security. 12(4): 809-824, 2017

    • Shengda Chen, Shunquan Tan, Bin Li,Jiwu Huang, “Automatic Detection of Object-based Forgery in Advanced Video,” IEEE Transactions on Circuits and Systems for Video Technology. Accepted

    • Fangjun Huang, Xiaochao Qu, Hyoung Joong Kim,Jiwu Huang, “Reversible Data Hiding in JPEG Image,” IEEE Transactions on Circuits and Systems for Video Technology. Accepted

    • Paweł Korus andJiwu Huang, “Multi-scale fusion for improved localization of malicious tampering in digital images,” IEEE Trans. on Image Processing. vol. 25, no.3, pp. 1314-1316

    • Weixuan Tang, Haodong, Li, Weiqi Luo,Jiwu Huang, “Adaptive steganalysis based on embedding probabilities of pixels,” IEEE Trans. on Information Forensics & Security. vol. 11, no. 4., pp. 734-745, 2016.

    • Weixuan Tang, Bin Li, Weiqi Luo,Jiwu Huang, “Clustering steganographic modification directions for color components,” IEEE Signal Processing Letter. vol.23, no.2, pp.197~201, 2016

    • Paweł Korus andJiwu Huang, “Improved tampering localization in digital image forensics based on maximal entropy random walk,” IEEE Signal Processing Letter. vol.23, no.1, pp.169~173, 2016

    • Zhenghui Liu, Fan Zhang, Jing Wang, Hongxia Wang,Jiwu Huang. Authentication and recovery algorithm for speech signal based on digital watermarking. Signal Processing, 123 (2016), pp. 157-166

    • Bin Li, Ming Wang, Xiaolong Li, Shunquan Tan,Jiwu Huang, “A Strategy of Clustering Modification Directions in Spatial Image Steganography,” IEEE Trans. on Information Forensics & Security. vol.10, no. 9, pp. 1905-1917, 2015.

    • Bin Li, Tian-Tsong Ng, Xiaolong Li, Shunquan Tan, andJiwu Huang, “Statistical Model of JPEG Noises and Its Application in Quantization Step Estimation,” IEEE Trans. on Image Processing. 24(5): 1471-1484, 2015

    • Bin Li, Tian-Tsong Ng, Xiaolong Li, Shunquan Tan, andJiwu Huang, “Revealing the Trace of High-quality JPEG Compression through Quantization Noise Analysis,” IEEE Trans. on Information Forensics & Security. 10(3):558-573, 2015

    • Jianting Guo, Peijia Zheng,Jiwu Huang, “Secure Watermarking Scheme against Watermark Attacks in the Encrypted Domain,” Journal of Visual Communication and Image Representation. 30:125-135, 2015

    • Hao-Tian Wu,Jiwu Huang; Yun-Qing Shi, “A reversible data hiding method with contrast enhancement for medical images,” Journal of Visual Communication and Image Representation. vol. 31, pp. 146-151, 2015

    • Da Luo, Rui Yang,Jiwu Huang. “Identification of AMR decompressed audio,” Digital Signal Processing, vol. 37, no. 2, pp. 85-91, 2015

    • Yong Wang, Haojun Wu,Jiwu Huang, “Verification of hidden speaker behind transformation disguised voices,” Digital Signal Processing. 45: 84-95, 2015

    • Shan Bian, Weiqi Luo,Jiwu Huang, “Exposing Fake Bit-rate Videos and Estimating Original Bit-rates,” IEEE Trans. on Circuits and Systems for Video Technology. 24(12): 2144-2154, 2014

    • Yanqiang Lei, Guoping Qiu, Ligang Zheng,Jiwu Huang, “Geometric Invariant Features in the Radon Transform Domain for Near-Duplicate Image Detection,” Pattern Recognition, 47 (2014) 3630–3640.

    • Haojun Wu, Yong Wang,Jiwu Huang. Identification of Electronic Disguised Voices. IEEE Trans. on Information Forensics & Security. 9(3): 489-500, 2014

    • Bin Li, Shunquan Tan, Ming Wang,Jiwu Huang. Investigation on Cost Assignment in Spatial Image Steganography. IEEE Trans. on Information Forensics & Security. 9(8):1264-1277, 2014

    • Yanqiang Lei, Guoping Qiu, Ligang Zheng,Jiwu Huang. Fast Near-Duplicate Image Detection Using Uniform Randomized Trees. ACM Trans. on Multimedia Computing, Communications, and Applications. Vol. 10, No. 4, 35:1-15, 2014

    • Da Luo, Weiqi Luo, Rui Yang,Jiwu Huang. Identifying Compression History of Wave Audio and Its Applications. ACM Trans. on Multimedia Computing, Communications, and Applications. 10(3), pp. 30:1-19, 2014.

    • Chenglong Chen, Jiangqun Ni,Jiwu Huang. Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach. IEEE Trans. on Image Processing, 22(12):4699-4710, 2013.

    • Peijia Zheng andJiwu Huang. Discrete Wavelet Transform and Data Expansion Reduction in Homomorphic Encrypted Domain. IEEE Trans. on Image Processing. 22(6): 2455-2468, 2013

    • Likai Chen, Wei Lu, Jiangqun Ni, Wei Sun,Jiwu Huang: Region duplication detection based on Harris corner points and step sector statistics. J. Visual Communication and Image Representation, 24(3): 244-254 (2013)

    • Ligang Zheng, Guoping Qiu, Yanqiang Lei andJiwu Huang. Near-duplicate Image Detection in a Visually Salient Riemannian Space. IEEE Trans. on Information Forensics & Security. 7(5): 1578 – 1593, 2012.

    • Yanqiang Lei, Weiqi Luo, Yuangen Wang,Jiwu Huang. Video Sequence Matching Based on the Invariance of Color Correlation. IEEE Trans. on Circuits and Systems for Video Technology. 22(9): 1332-1343, 2012

    • Chuntao Wang, Jiangqun Ni,Jiwu Huang. An Informed Watermarking Scheme Using Hidden Markov Model in the Wavelet Domain. IEEE Trans. on Information Forensics & Security. 7(3):853-867, 2012.

    • Jian Li, Hongmei Liu,Jiwu Huang, Yun Q. Shi. Reference Index-Based H.264 Video Watermarking Scheme. ACM Trans. on Multimedia Computing, Communications, and Applications. Volume 8, Issue 2S, Article No. 33, p1-22, September 2012

    • Rui Yang, Zhenhua Qu,Jiwu Huang. Exposing MP3 Audio Forgeries Using Frame Offsets. ACM Trans. on Multimedia Computing, Communications, and Applications. Volume 8, Issue 2S, Article No. 33, p. 1-20, September 2012

    • Zhongwei He, Wei Lu, Wei Sun,Jiwu Huang. Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recognition, 45(12): 4292-4299, 2012

    • Haotian Wu andJiwu Huang. Reversible Image Watermarking on Prediction Errors by Efficient Histogram Modification. Signal Processing. Volume 92, Issue 12, Pages 3000-3009, 2012.

    • Fangjun Huang,Jiwu Huang, Yun Q. Shi. New Channel Selection Rule for JPEG Steganography. IEEE Trans. on Information Forensics & Security. 7(4):1181-1191, 2012.

    • Jian Cao andJiwu Huang. Controllable Secure Watermarking Technique for Tradeoff Between Robustness and Security. IEEE Trans. on Information Forensics & Security. 7(1): 821 – 826, 2012.

    • Xiangui Kang, Yinxiang Li, Zhenhua Qu andJiwu Huang. Enhancing Source Camera Identification Performance with a Camera Reference Phase Sensor Pattern Noise. IEEE Trans. on Information Forensics & Security. 7(2): 393-402, 2012.

    • Guopu Zhu, Sam Kwong,Jiwu Huang, and Jianquan Yang. Random Gray Code and Its Performance Analysis for Image Hashing. Signal Processing. 91 (2011) 2178–2193.

    • Yanqing Lei, Yunagen Wang,Jiwu Huang. Robust Image Hash in Radon Transform Domain for Authentication. Signal Processing: Image Communication. 26 (2011) 280–288

    • Xiangui Kang, Member, IEEE, Rui Yang, Student Member, IEEE, andJiwu Huang. Geometric Invariant Audio Watermarking Based on an LCM Feature. IEEE Trans. on Multimedia, 13(2): 181-190, April, 2011.

    • Weiqi Luo,Jiwu Huang. Security Analysis on Spatial ±1 Steganography for JPEG Decompressed Images. IEEE Signal Processing Letters, 18(1): 39-42, 2011.

    • Fangjun Huang, Weiqi Luo,Jiwu Huang. Steganalysis of JPEG steganography with complementary embedding strategy. IET Information Security, 5(1):10-18. 2011

    • Weiqi Luo,Jiwu Huang. A More Secure Steganography Based on Adaptive Pixel-Value Differencing Scheme. Multimedia Tools and Applications. Volume 52, Issue 2, Page 407-430, 2011

    • Hongmei Liu, Xinzhi Yao,Jiwu Huang: Minority codes with improved embeddingefficiency for large payloads. Multimedia Tools Applications. 52(2-3): 431-443 (2011)

    • Fangjun Huang,Jiwu Huang, Yun Q. Shi. Detecting Double JPEG Compression with the Same Quantization Matrix. IEEE Trans. on Information Forensics & Security, 5(4): 838-856.

    • Weiqi Luo, Yuangen Wang,Jiwu Huang. Detection of Quantization Artifacts and Its Applications to Transform Encoder Identification. IEEE Trans. on Information Forensics & Security, 5(4): 810-815, 2010

    • Fangjun Huang,Jiwu Huang, Yun Q. Shi. An Experimental Study on the Security Performance of YASS. IEEE Trans. on Information Forensics & Security, 5(3): 374-380

    • Weiqi Luo,Jiwu Huang. JPEG Error Analysis and Its Applications to Digital Image Forensics. IEEE Trans. on Information Forensics & Security, 5(3): 480-491

    • Weiqi Luo, Fangjun Huang,Jiwu Huang. Edge Adaptive Image Steganography Based on LSB Matching Revisited. IEEE Trans. on Information Forensics & Security, 5(2):201-214, 2010.

    • Xiangui Kang,Jiwu Huang, Wenjun Zeng. Efficient General Print-Scanning Resilient Data Hiding Based on Uniform Log-polar Mapping. IEEE Trans. on Information Forensics & Security, 5(1):1-12, 2010.

    • Guopu Zhu,Jiwu Huang, Sam Kwong, Jianquan Yang. Fragility Analysis of Adaptive Quantization Based Image Hashing. IEEE Trans. on Information Forensics & Security, 5(1):133-147, 2010.

    • Yong Wang, Shaoquan Wu, andJiwu Huang. Audio Watermarking Scheme Robust against Desynchronization Based on the Dyadic Wavelet Transform, EURASIP Journal on Advances in Signal Processing, Volume 2010 (2010), Article ID 232616, 17 pages

    • Hongmei Liu, Xinzhi Yao andJiwu Huang. “Semi-Fragile Zernike Moment-Based Image Watermarking for Authentication” EURASIP Journal on Advances in Signal Processing, Volume 2010 (2010), Article ID 341856, 17 pages

    • Guopu Zhu,Jiwu Huang, Sam Kwong, Jianquan Yang. A Study on the Randomness Measure of Image. IEEE Trans. on Information Forensics & Security, 4(4):928-932, 2009

    • Bin Li,Jiwu Huang, Yun Q. Shi. Steganalysis of YASS. IEEE Trans. on Information Forensics & Security, 4(3): 369-382, 2009.

    • Xiangui Kang,Jiwu Huang, Wenjun Zeng. Improving Robustness of Quantization-Based Image watermarking via Adaptive Receiver. IEEE Trans. on Multimedia, vol.10, no.6, pp. 953-959, Oct. 2008.

    • Shijun Xiang, Hyoung-Joong Kim,Jiwu Huang. Invariant Image Watermarking Based on the Statistical Features in the Low-Frequency Domain. IEEE Trans. on Circuits and Systems for Video Technology, 18(6): 777-790, 2008.

    • Shijun Xiang, HJ Kim andJiwu Huang“Audio Watermarking Robust to Time-Scale Modification and MP3 Compression” Signal Processing, vol. 88, pp. 2372-2388. 2008.

    • Bin Li, Yanmei Fang andJiwu Huang. Steganalysis of Multiple-Base Notational System Steganography. IEEE Signal Processing Letter, vol.15, pp.493-496.2008

    • Shijun Xiang,Jiwu Huang. Histogram-Based Audio Watermarking against Time-Scale Modifications and Cropping Attacks. IEEE Trans. on Multimedia. 9(7): 1357-1372, 2007.

    • Ning Bi; Qiyu Sun; Daren Huang; Zhihua Yang;Jiwu Huang. Robust Image Watermarking Based on Multiband Wavelets and Empirical Mode Decomposition. IEEE Trans. on Image Processing. 2007, 16(8):1956-1966.

    • Yongjian Hu, Sam Kwong,Jiwu Huang. A new method of reversible visible watermarking. IEEE Trans. on Circuits and Systems for Video Technology. 16(1): 129-133, 2006.

    • Shaoquan Wu,Jiwu Huang, Daren Huang, Yun Q. Shi, Efficiently Self-Synchronized Audio Watermarking for Assured Audio Data Transmission. IEEE Trans. on Broadcasting. 2005, 51(1): 69-76.

    • Xiangui Kang,Jiwu Huang, Yun Q. Shi, Yan Lin. A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Trans. on Circuits and Systems for Video Technology. 2003, 13(8): 776-786.

    • Jiwu Huang, Yun Q. Shi. Reliable Information Bit Hiding. IEEE Trans. on Circuits and Systems for Video Technology. 2002, 12(10): 916-920.

    • Jiwu Huang, Yun Q. Shi, Yi Shi, Embedding image watermarks in DC components, IEEE Trans. on Circuits and Systems for Video Technology. 2000, 10(6), pp. 974-979.

    部分会议论文:

    • Qi Yan, Rui Yang,Jiwu Huang, “copy-move detection of audio recording with pitch similarity,” Proc. of 2014 IEEE Int. Conf. on Acoustics, Speech and Signal Processing.

    • Ligang Zheng, Guoping Qiu,Jiwu Huang. Fast and Accurate Nearest Neighbor Search in the Manifolds of Symmetric Positive Definite Matrices. Proc. of 2014 IEEE Int. Conf. on Acoustics, Speech and Signal Processing.

    • Da Luo, Rui Yang,Jiwu Huang. Detecting double compressed AMR audio using deep learning. Proc. of 2014 IEEE Int. Conf. on Acoustics, Speech and Signal Processing.

    • Chao Chen, Haodong Li, Weiqi Luo, Rui Yang,Jiwu Huang. Anti-forensics of jpeg detectors via adaptive quantization table replacement. Proc. of 22nd Int. Conf. on Pattern Recognition.

    • Xiaoqing Qiu, Haodong Li, Weiqi Luo andJiwu Huang. A Universal Image Forensic Strategy Based on Steganalytic Model. Proc. ACM Information Hiding and Multimedia Security Workshop (IH&MMsec) 2014.

    • Weixuan Tang, Haodong Li, Weiqi Luo andJiwu Huang. Adaptive Steganalysis against WOW Embedding Algorithm. Proc. ACM Information Hiding and Multimedia Security Workshop (IH&MMsec) 2014.

    • Bin Li, Ming Wang, Xiaolong Li,Jiwu Huang. A new cost function for spatial image steganography. Proc. of IEEE Int. Conf. on Image Processing 2014

    • Hao-tian Wu, Yuan Liu, Xin-Yu Yang,Jiwu Huang. Improved Steganalysis Algorithm Against Motion Vector Based Video Steganography. Proc. of IEEE Int. Conf. on Image Processing 2014.

    • Peijia Zheng andJiwu Huang. An Efficient Image Homomorphic Encryption Scheme with Small Ciphertext Expansion. Proc. of ACM Multimedia 2013, pp.803-812

    • Fangjun Huang, Weiqi Luo,Jiwu Huangand Yun-Qing Shi. Distortion Function Designing for JPEG Steganography with Uncompressed Side-image. Prof. of the 1st ACM Workshop on Information Hiding and Multimedia Security.

    • Shan Bian, Weiqi Luo,Jiwu Huang, “Exposing fake bitrate video and its original bitrate,” Proc. of IEEE Int. Conf. on Image Processing 2013

    • Zhenhua Qu, Xiangui Kang,Jiwu Huang, Yinxiang Li. Forensic sensor pattern noise extraction from large image data set. 2013 IEEE Int. Conf. on Acoustics, Speech and Signal Processing,

    • Haojun Wu, Yong Wang,Jiwu Huang. Blind detection of electronic disguised voice. 2013 IEEE Int. Conf. on Acoustics, Speech and Signal Processing

    • Haodong Li, Weiqi Luo,Jiwu Huang. Countering Anti-JPEG Compression Forensics. 2012 IEEE Int. Conf. on Image Processing, pp. 241-244.

    • Peijia Zheng,Jiwu Huang. Walsh-Hadamard Transform in the Homomorphic Encrypted Domain and Its Application in Image Watermarking. Proc. of 14th Information Hiding Conference. LNCS 7692, pp. 240-254.

    • Ligang Zheng, Guoping Qiu,Jiwu Huang. Efficient Coarse-To-Fine Near-Duplicate Image Detection in Riemannian Manifold. Proc. of IEEE Int. Conf. on Acoustics, Speech and Signal Processing, pp. 977-980, 2012.

    • Da Luo, Weiqi Luo, Rui Yang,Jiwu Huang. Compression History Identification for Digital Audio Signal. Proc. of IEEE Int. Conf. on Acoustics, Speech and Signal Processing, pp. 1733-1736, 2012.

    • Peijia Zheng,Jiwu Huang. Implementation of the Discrete Wavelet Transform and Multiresolution Analysis in the Encrypted Domain. ACM Multimedia 2011, pp. 413-422.

    • Ligang Zheng, Guoping Qiu,Jiwu Huang. Salient Covariance For Near-duplicate Image And Video Detection. Proc. of IEEE Int. Conf. on Image Processing, pp. 2585-2588, 2011.

    • Haotian Wu,Jiwu Huang. Secure JPEG steganography by LSB+ matching and multi-band embedding. Proc. of IEEE Int. Conf. on Image Processing, pp. 2793-2796, 2011.

    • Yuan-Gen Wang, Yanqiang Lei,Jiwu Huang. An image copy detection scheme based on radon transform. Proc. of IEEE Int. Conf. on Image Processing, pp. 2893-2896, 2010

    • Jian Cao ,Jiwu Huang, Jiangqun Ni. Spread Spectrum Watermarking to Achieve a Trade-off Between Security and Robustness. Proc. of Int. Workshop on Information Hiding 2010

    • Jian Cao ,Jiwu Huang. Provably Secure Spread-spectrum Watermarking Schemes in the Known Message Attack. Proc. of Int. Workshop on Information Hiding 2010

    • Rui Yang, Yun Q. Shi,Jiwu Huang. Detecting double compression of audio signal. Proc. IS&T/SPIE Electronic Imaging 2010: Media Forensics and Security XII, 2010.1

    • Zhenhua Qu, Guoping Qiu, andJiwu Huang. Detect Digital Image Splicing with Visual Cues. Proc. of 11th Int. Workshop on Information Hiding. LNCS 5806, pp. 247-261, 2009

    • Xinzhi Yao, Hongmei Liu, Wei Rui,Jiwu Huang. Content-based authentication algorithm for binary images. Proc. of 2007 IEEE Int. Conf. on Image Processing, pp. 2893-2896, 2009

    • Rui Yang, Yun Q. Shi ,Jiwu Huang. Defeating Fake-Quality MP3. Proc. of the 11th ACM Workshop on Multimedia and Security, pp. 117-124, 2009

    • Yong Wang,Jiwu Huang. Robust AVS Audio Watermarking. Proc. of 8th Int Workshop on Digital Processing, LNCS 5703, pp. 29-38, 2009

    • Zhenhua Qu, Weiqi Luo,Jiwu Huang, “A convolutive mixing model for shifted double jpeg compression with application to passive image authentication,” Proc. of IEEE Int. Conf. on Accoust, Speech and Signal Processing, 2008, 1661-1664.

    • Fangjun Huang, Bin Li,Jiwu Huang. Universal JPEG steganalysis based on microscopic and macroscopic calibration. Proc. of 2008 IEEE Int. Conf. on Image Processing, pp. 2068-2071, 2008

    • Fangjun Huang, Yun Q. Shi,Jiwu Huang. A study on security performance of YASS. Proc. of 2008 IEEE Int. Conf. on Image Processing, pp.2084-2087, 2008.

    • Xiangui Kang, Xiong Zhong,Jiwu Huang, Wenjun Zeng. An efficient print-scanning resilient data hiding scheme based on a novel LPM. Proc. of 2008 IEEE Int. Conf. on Image Processing, pp. 2080-2083, 2008

    • Weiqi Luo, Min Wu,Jiwu Huang. MPEG recompression detection based on block artifacts. Proc. of SPIE: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X. Volume 6819, pp. 68190X-68190X-12, 2008.

    • Bin Li,Jiwu Huang, Yun Q. Shi. Textural feature based universal steganalysis. Proc. of SPIE: Forensics, Steganography, and Watermarking of Multimedia Contents X. Volume 6819, pp. 681912-681912-12, 2008

    • Rui Yang, Zhenhua Qu,Jiwu Huang: Detecting digital audio forgeries by checking frame offsets. Proc. of the 10th ACM Workshop on Multimedia and Security,pp: 21-26, 2008



    地址:深圳市南山区南海大道3688号深圳大学电子与信息工程学院N801

    邮编:518060

    电话:0755-86716669

    E-mail: liuwanqi@szu.edu.cn

    Address: Room N801, College of Electronics and Information Engineering, Shenzhen University

    Postcode: 518060

    Tel: 86-755-86716669