default search action
BibTeX records: Bin Li 0011
@article{DBLP:journals/tcsv/LiWLTZ24, author = {Weixiang Li and Shihang Wu and Bin Li and Weixuan Tang and Xinpeng Zhang}, title = {Payload-Independent Direct Cost Learning for Image Steganography}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {34}, number = {3}, pages = {1970--1975}, year = {2024}, url = {https://doi.org/10.1109/TCSVT.2023.3294291}, doi = {10.1109/TCSVT.2023.3294291}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/LiWLTZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/WangWZLMLS24, author = {Hao Wang and Jinwei Wang and Jiawei Zhang and Xiangyang Luo and Bin Ma and Bin Li and Jinsheng Sun}, title = {General Forensics for Aligned Double {JPEG} Compression Based on the Quantization Interference}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {34}, number = {6}, pages = {5191--5206}, year = {2024}, url = {https://doi.org/10.1109/TCSVT.2023.3341032}, doi = {10.1109/TCSVT.2023.3341032}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/WangWZLMLS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TangZLCH24, author = {Weixuan Tang and Zhili Zhou and Bin Li and Kim{-}Kwang Raymond Choo and Jiwu Huang}, title = {Joint Cost Learning and Payload Allocation With Image-Wise Attention for Batch Steganography}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2826--2839}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3354411}, doi = {10.1109/TIFS.2024.3354411}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/TangZLCH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/QuXLLWL24, author = {Zuomin Qu and Zuping Xi and Wei Lu and Xiangyang Luo and Qian Wang and Bin Li}, title = {{DF-RAP:} {A} Robust Adversarial Perturbation for Defending Against Deepfakes in Real-World Social Network Scenarios}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3943--3957}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3372803}, doi = {10.1109/TIFS.2024.3372803}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/QuXLLWL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PengTMLH24, author = {Rongxuan Peng and Shunquan Tan and Xianbo Mo and Bin Li and Jiwu Huang}, title = {Employing Reinforcement Learning to Construct a Decision-Making Environment for Image Forgery Localization}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {4820--4834}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3381470}, doi = {10.1109/TIFS.2024.3381470}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PengTMLH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LuZDLLL24, author = {Jiucui Lu and Jiaran Zhou and Junyu Dong and Bin Li and Siwei Lyu and Yuezun Li}, title = {ForensicsForest Family: {A} Series of Multi-Scale Hierarchical Cascade Forests for Detecting GAN-Generated Faces}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {5106--5119}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3395013}, doi = {10.1109/TIFS.2024.3395013}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LuZDLLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiCXLL24, author = {Bin Li and Jincheng Chen and Yuxiong Xu and Weixiang Li and Zhenghui Liu}, title = {{DRAW:} Dual-Decoder-Based Robust Audio Watermarking Against Desynchronization and Replay Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {6529--6544}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3416047}, doi = {10.1109/TIFS.2024.3416047}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiCXLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SuNHL24, author = {Wenkang Su and Jiangqun Ni and Xianglei Hu and Bin Li}, title = {Efficient Audio Steganography Using Generalized Audio Intrinsic Energy With Micro-Amplitude Modification Suppression}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {6559--6572}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3417268}, doi = {10.1109/TIFS.2024.3417268}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SuNHL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WuYSLHL24, author = {Junyan Wu and Qilin Yin and Ziqi Sheng and Wei Lu and Jiwu Huang and Bin Li}, title = {Audio Multi-View Spoofing Detection Framework Based on Audio-Text-Emotion Correlations}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {7133--7146}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3431888}, doi = {10.1109/TIFS.2024.3431888}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WuYSLHL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/YangLLT024, author = {Zhuofan Yang and Qiushi Li and Shenghai Luo and Shunquan Tan and Bin Li}, title = {Improving VGG-Style Convnet for {JPEG} Steganalysis}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2024, Seoul, Republic of Korea, April 14-19, 2024}, pages = {4450--4454}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICASSP48485.2024.10447518}, doi = {10.1109/ICASSP48485.2024.10447518}, timestamp = {Mon, 05 Aug 2024 15:26:37 +0200}, biburl = {https://dblp.org/rec/conf/icassp/YangLLT024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/SongL024, author = {Wentang Song and Yuzhen Lin and Bin Li}, title = {Towards Generic Deepfake Detection with Dynamic Curriculum}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2024, Seoul, Republic of Korea, April 14-19, 2024}, pages = {4500--4504}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICASSP48485.2024.10448345}, doi = {10.1109/ICASSP48485.2024.10448345}, timestamp = {Mon, 05 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/SongL024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/PengMT0H24, author = {Rongxuan Peng and Xianbo Mo and Shunquan Tan and Bin Li and Jiwu Huang}, title = {A Keyless Extraction Framework Targeting at Deep Learning Based Image-Within-Image Models}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2024, Seoul, Republic of Korea, April 14-19, 2024}, pages = {12846--12850}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICASSP48485.2024.10448420}, doi = {10.1109/ICASSP48485.2024.10448420}, timestamp = {Wed, 07 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/PengMT0H24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2404-13872, author = {Hanzhe Li and Yuezun Li and Jiaran Zhou and Bin Li and Junyu Dong}, title = {FreqBlender: Enhancing DeepFake Detection by Blending Frequency Knowledge}, journal = {CoRR}, volume = {abs/2404.13872}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2404.13872}, doi = {10.48550/ARXIV.2404.13872}, eprinttype = {arXiv}, eprint = {2404.13872}, timestamp = {Sat, 25 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2404-13872.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/TangLLWH23, author = {Weixuan Tang and Bin Li and Weixiang Li and Yuangen Wang and Jiwu Huang}, title = {Reinforcement learning of non-additive joint steganographic embedding costs with attention mechanism}, journal = {Sci. China Inf. Sci.}, volume = {66}, number = {3}, year = {2023}, url = {https://doi.org/10.1007/s11432-021-3453-5}, doi = {10.1007/S11432-021-3453-5}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/TangLLWH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/DuanLYZL23, author = {Xiaolong Duan and Bin Li and Zhaoxia Yin and Xinpeng Zhang and Bin Luo}, title = {Robust image steganography against lossy {JPEG} compression based on embedding domain selection and adaptive error correction}, journal = {Expert Syst. Appl.}, volume = {229}, number = {Part {A}}, pages = {120416}, year = {2023}, url = {https://doi.org/10.1016/j.eswa.2023.120416}, doi = {10.1016/J.ESWA.2023.120416}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/DuanLYZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pr/ChenLLLW23, author = {Han Chen and Yuezun Li and Dongdong Lin and Bin Li and Junqiang Wu}, title = {Watching the BiG artifacts: Exposing DeepFake videos via Bi-granularity artifacts}, journal = {Pattern Recognit.}, volume = {135}, pages = {109179}, year = {2023}, url = {https://doi.org/10.1016/j.patcog.2022.109179}, doi = {10.1016/J.PATCOG.2022.109179}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pr/ChenLLLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spl/ChenLZ23, author = {Tong Chen and Bin Li and Jinhua Zeng}, title = {Learning Traces by Yourself: Blind Image Forgery Localization via Anomaly Detection With ViT-VAE}, journal = {{IEEE} Signal Process. Lett.}, volume = {30}, pages = {150--154}, year = {2023}, url = {https://doi.org/10.1109/LSP.2023.3245947}, doi = {10.1109/LSP.2023.3245947}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/spl/ChenLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/ChenLLT23, author = {Han Chen and Yuzhen Lin and Bin Li and Shunquan Tan}, title = {Learning Features of Intra-Consistency and Inter-Diversity: Keys Toward Generalizable Deepfake Detection}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {33}, number = {3}, pages = {1468--1480}, year = {2023}, url = {https://doi.org/10.1109/TCSVT.2022.3209336}, doi = {10.1109/TCSVT.2022.3209336}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/ChenLLT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/LiLTQ23, author = {Guanglin Li and Bin Li and Shunquan Tan and Guoping Qiu}, title = {Learning Deep Co-Occurrence Features}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {33}, number = {4}, pages = {1610--1623}, year = {2023}, url = {https://doi.org/10.1109/TCSVT.2022.3216905}, doi = {10.1109/TCSVT.2022.3216905}, timestamp = {Tue, 02 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/LiLTQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/TanLLLH23, author = {Shunquan Tan and Qiushi Li and Laiyuan Li and Bin Li and Jiwu Huang}, title = {{STD-NET:} Search of Image Steganalytic Deep-Learning Architecture via Hierarchical Tensor Decomposition}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {3}, pages = {2657--2673}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2023.3267065}, doi = {10.1109/TDSC.2023.3267065}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/TanLLLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MoTTLH23, author = {Xianbo Mo and Shunquan Tan and Weixuan Tang and Bin Li and Jiwu Huang}, title = {ReLOAD: Using Reinforcement Learning to Optimize Asymmetric Distortion for Additive Steganography}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {1524--1538}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3244094}, doi = {10.1109/TIFS.2023.3244094}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/MoTTLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YinLLH23, author = {Qilin Yin and Wei Lu and Bin Li and Jiwu Huang}, title = {Dynamic Difference Learning With Spatio-Temporal Correlation for Deepfake Video Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {4046--4058}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3290752}, doi = {10.1109/TIFS.2023.3290752}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YinLLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiLZZ23, author = {Weixiang Li and Bin Li and Weiming Zhang and Shengli Zhang}, title = {Quaternary Quantized Gaussian Modulation With Optimal Polarity Map Selection for {JPEG} Steganography}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {5026--5040}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3303715}, doi = {10.1109/TIFS.2023.3303715}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiLZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aisp/ZhangTRLH23, author = {Wei Zhang and Weixuan Tang and Yuan Rao and Bin Li and Jiwu Huang}, editor = {Jaideep Vaidya and Moncef Gabbouj and Jin Li}, title = {Deep Multi-image Hiding with Random Key}, booktitle = {Artificial Intelligence Security and Privacy - First International Conference on Artificial Intelligence Security and Privacy, AIS{\&}P 2023, Guangzhou, China, December 3-5, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14509}, pages = {33--41}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-9785-5\_3}, doi = {10.1007/978-981-99-9785-5\_3}, timestamp = {Tue, 20 Aug 2024 07:54:44 +0200}, biburl = {https://dblp.org/rec/conf/aisp/ZhangTRLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MoTLH23, author = {Xianbo Mo and Shunquan Tan and Bin Li and Jiwu Huang}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Poster: Query-efficient Black-box Attack for Image Forgery Localization via Reinforcement Learning}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {3552--3554}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3624390}, doi = {10.1145/3576915.3624390}, timestamp = {Fri, 01 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MoTLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eusipco/LinM0C23, author = {Yuzhen Lin and Emanuele Maiorana and Bin Li and Patrizio Campisi}, title = {Detection of Photoplethysmography Manipulation in Video Forgery}, booktitle = {31st European Signal Processing Conference, {EUSIPCO} 2023, Helsinki, Finland, September 4-8, 2023}, pages = {615--619}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/EUSIPCO58844.2023.10289891}, doi = {10.23919/EUSIPCO58844.2023.10289891}, timestamp = {Mon, 06 Nov 2023 12:35:15 +0100}, biburl = {https://dblp.org/rec/conf/eusipco/LinM0C23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/YuLLZZ23, author = {Zeqin Yu and Bin Li and Yuzhen Lin and Jinhua Zeng and Jishen Zeng}, title = {Learning to Locate the Text Forgery in Smartphone Screenshots}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing {ICASSP} 2023, Rhodes Island, Greece, June 4-10, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICASSP49357.2023.10095070}, doi = {10.1109/ICASSP49357.2023.10095070}, timestamp = {Sun, 05 Nov 2023 16:51:21 +0100}, biburl = {https://dblp.org/rec/conf/icassp/YuLLZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/LuLZLL23, author = {Jiucui Lu and Yuezun Li and Jiaran Zhou and Bin Li and Siwei Lyu}, title = {Forensics Forest: Multi-scale Hierarchical Cascade Forest for Detecting GAN-generated Faces}, booktitle = {{IEEE} International Conference on Multimedia and Expo, {ICME} 2023, Brisbane, Australia, July 10-14, 2023}, pages = {2309--2314}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICME55011.2023.00394}, doi = {10.1109/ICME55011.2023.00394}, timestamp = {Mon, 13 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icmcs/LuLZLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-13297, author = {Xiaolong Duan and Bin Li and Zhaoxia Yin and Xinpeng Zhang and Bin Luo}, title = {Robust image steganography against lossy {JPEG} compression based on embedding domain selection and adaptive error correction}, journal = {CoRR}, volume = {abs/2304.13297}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.13297}, doi = {10.48550/ARXIV.2304.13297}, eprinttype = {arXiv}, eprint = {2304.13297}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-13297.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-00964, author = {Jiucui Lu and Yuezun Li and Jiaran Zhou and Bin Li and Junyu Dong and Siwei Lyu}, title = {ForensicsForest Family: {A} Series of Multi-scale Hierarchical Cascade Forests for Detecting GAN-generated Faces}, journal = {CoRR}, volume = {abs/2308.00964}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.00964}, doi = {10.48550/ARXIV.2308.00964}, eprinttype = {arXiv}, eprint = {2308.00964}, timestamp = {Mon, 13 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-00964.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-10036, author = {Long Zhuo and Shenghai Luo and Shunquan Tan and Han Chen and Bin Li and Jiwu Huang}, title = {Evading Detection Actively: Toward Anti-Forensics against Forgery Localization}, journal = {CoRR}, volume = {abs/2310.10036}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.10036}, doi = {10.48550/ARXIV.2310.10036}, eprinttype = {arXiv}, eprint = {2310.10036}, timestamp = {Mon, 05 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-10036.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dsp/LiWHAL22, author = {Jialong Li and Hongxia Wang and Peisong He and Sani M. Abdullahi and Bin Li}, title = {Long-term variable {Q} transform: {A} novel time-frequency transform algorithm for synthetic speech detection}, journal = {Digit. Signal Process.}, volume = {120}, pages = {103256}, year = {2022}, url = {https://doi.org/10.1016/j.dsp.2021.103256}, doi = {10.1016/J.DSP.2021.103256}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dsp/LiWHAL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ipr/Yin0L22, author = {Hui Yin and Fei Zhou and Bin Li}, title = {Metric of choosing the optimal parameter setting for edge aware filtering}, journal = {{IET} Image Process.}, volume = {16}, number = {2}, pages = {453--469}, year = {2022}, url = {https://doi.org/10.1049/ipr2.12360}, doi = {10.1049/IPR2.12360}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ipr/Yin0L22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/Yuan0HL022, author = {Chao Yuan and Hongxia Wang and Peisong He and Jie Luo and Bin Li}, title = {GAN-based image steganography for enhancing security via adversarial attack and pixel-wise deep fusion}, journal = {Multim. Tools Appl.}, volume = {81}, number = {5}, pages = {6681--6701}, year = {2022}, url = {https://doi.org/10.1007/s11042-021-11778-z}, doi = {10.1007/S11042-021-11778-Z}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/Yuan0HL022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ZhuoTLH22, author = {Long Zhuo and Shunquan Tan and Bin Li and Jiwu Huang}, title = {{ISP-GAN:} inception sub-pixel deconvolution-based lightweight GANs for colorization}, journal = {Multim. Tools Appl.}, volume = {81}, number = {17}, pages = {24977--24994}, year = {2022}, url = {https://doi.org/10.1007/s11042-022-12587-8}, doi = {10.1007/S11042-022-12587-8}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ZhuoTLH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/remotesensing/LiLGQ22, author = {Qinglin Li and Bin Li and Jonathan M. Garibaldi and Guoping Qiu}, title = {Clustering-Based Representation Learning through Output Translation and Its Application to Remote-Sensing Images}, journal = {Remote. Sens.}, volume = {14}, number = {14}, pages = {3361}, year = {2022}, url = {https://doi.org/10.3390/rs14143361}, doi = {10.3390/RS14143361}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/remotesensing/LiLGQ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spic/TanCZLH22, author = {Shunquan Tan and Baoying Chen and Jishen Zeng and Bin Li and Jiwu Huang}, title = {Hybrid deep-learning framework for object-based forgery detection in video}, journal = {Signal Process. Image Commun.}, volume = {105}, pages = {116695}, year = {2022}, url = {https://doi.org/10.1016/j.image.2022.116695}, doi = {10.1016/J.IMAGE.2022.116695}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spic/TanCZLH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/LiCTLH22, author = {Qiushi Li and Shengda Chen and Shunquan Tan and Bin Li and Jiwu Huang}, title = {One-Class Double Compression Detection of Advanced Videos Based on Simple Gaussian Distribution Model}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {32}, number = {4}, pages = {2496--2500}, year = {2022}, url = {https://doi.org/10.1109/TCSVT.2021.3069254}, doi = {10.1109/TCSVT.2021.3069254}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/LiCTLH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/TangLBLH22, author = {Weixuan Tang and Bin Li and Mauro Barni and Jin Li and Jiwu Huang}, title = {Improving Cost Learning for {JPEG} Steganography by Exploiting {JPEG} Domain Knowledge}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {32}, number = {6}, pages = {4081--4095}, year = {2022}, url = {https://doi.org/10.1109/TCSVT.2021.3115600}, doi = {10.1109/TCSVT.2021.3115600}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/TangLBLH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/QinLTTH22, author = {Xinghong Qin and Bin Li and Shunquan Tan and Weixuan Tang and Jiwu Huang}, title = {Gradually Enhanced Adversarial Perturbations on Color Pixel Vectors for Image Steganography}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {32}, number = {8}, pages = {5110--5123}, year = {2022}, url = {https://doi.org/10.1109/TCSVT.2022.3148406}, doi = {10.1109/TCSVT.2022.3148406}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/QinLTTH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhuoTLH22, author = {Long Zhuo and Shunquan Tan and Bin Li and Jiwu Huang}, title = {Self-Adversarial Training Incorporating Forgery Attention for Image Forgery Localization}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {819--834}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2022.3152362}, doi = {10.1109/TIFS.2022.3152362}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhuoTLH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/accv/ChenLL22, author = {Han Chen and Yuzhen Lin and Bin Li}, editor = {Lei Wang and Juergen Gall and Tat{-}Jun Chin and Imari Sato and Rama Chellappa}, title = {Exposing Face Forgery Clues via Retinex-Based Image Enhancement}, booktitle = {Computer Vision - {ACCV} 2022 - 16th Asian Conference on Computer Vision, Macao, China, December 4-8, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13844}, pages = {20--34}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-26316-3\_2}, doi = {10.1007/978-3-031-26316-3\_2}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/accv/ChenLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icb/LinTLB22, author = {Dongdong Lin and Benedetta Tondi and Bin Li and Mauro Barni}, title = {Exploiting temporal information to prevent the transferability of adversarial examples against deep fake detectors}, booktitle = {{IEEE} International Joint Conference on Biometrics, {IJCB} 2022, Abu Dhabi, United Arab Emirates, October 10-13, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/IJCB54206.2022.10007959}, doi = {10.1109/IJCB54206.2022.10007959}, timestamp = {Thu, 20 Apr 2023 16:45:47 +0200}, biburl = {https://dblp.org/rec/conf/icb/LinTLB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/LinCLW22, author = {Yuzhen Lin and Han Chen and Bin Li and Junqiang Wu}, title = {Towards Generalizable {DEEPFAKE} Face Forgery Detection with Semi-Supervised Learning and Knowledge Distillation}, booktitle = {2022 {IEEE} International Conference on Image Processing, {ICIP} 2022, Bordeaux, France, 16-19 October 2022}, pages = {576--580}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICIP46576.2022.9897792}, doi = {10.1109/ICIP46576.2022.9897792}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icip/LinCLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/LinCMCL22, author = {Yuzhen Lin and Han Chen and Emanuele Maiorana and Patrizio Campisi and Bin Li}, title = {Source-ID-Tracker: Source Face Identity Protection in Face Swapping}, booktitle = {{IEEE} International Conference on Multimedia and Expo, {ICME} 2022, Taipei, Taiwan, July 18-22, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICME52920.2022.9859600}, doi = {10.1109/ICME52920.2022.9859600}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icmcs/LinCMCL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/YangWL22, author = {Haoxin Yang and Yi Wang and Bin Li}, title = {Individual Property Inference Over Collaborative Learning in Deep Feature Space}, booktitle = {{IEEE} International Conference on Multimedia and Expo, {ICME} 2022, Taipei, Taiwan, July 18-22, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICME52920.2022.9859857}, doi = {10.1109/ICME52920.2022.9859857}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icmcs/YangWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iftc/ZhuLLY022, author = {Shaowei Zhu and Wanli Lyu and Bin Li and Zhaoxia Yin and Bin Luo}, editor = {Guangtao Zhai and Jun Zhou and Hua Yang and Xiaokang Yang and Ping An and Jia Wang}, title = {Adversarial Example Defense via Perturbation Grading Strategy}, booktitle = {Digital Multimedia Communications - The 19th International Forum, {IFTC} 2022, Shanghai, China, December 8-9, 2022, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1766}, pages = {407--420}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-0856-1\_30}, doi = {10.1007/978-981-99-0856-1\_30}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iftc/ZhuLLY022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/LiLCTQ22, author = {Guanglin Li and Bin Li and Changsheng Chen and Shunquan Tan and Guoping Qiu}, editor = {Luc De Raedt}, title = {Learning General Gaussian Mixture Model with Integral Cosine Similarity}, booktitle = {Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, {IJCAI} 2022, Vienna, Austria, 23-29 July 2022}, pages = {3201--3207}, publisher = {ijcai.org}, year = {2022}, url = {https://doi.org/10.24963/ijcai.2022/444}, doi = {10.24963/IJCAI.2022/444}, timestamp = {Mon, 22 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/LiLCTQ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-05651, author = {Shunquan Tan and Qiushi Li and Laiyuan Li and Bin Li and Jiwu Huang}, title = {{STD-NET:} Search of Image Steganalytic Deep-learning Architecture via Hierarchical Tensor Decomposition}, journal = {CoRR}, volume = {abs/2206.05651}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.05651}, doi = {10.48550/ARXIV.2206.05651}, eprinttype = {arXiv}, eprint = {2206.05651}, timestamp = {Mon, 22 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-05651.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-08341, author = {Shaowei Zhu and Wanli Lyu and Bin Li and Zhaoxia Yin and Bin Luo}, title = {Adversarial Example Defense via Perturbation Grading Strategy}, journal = {CoRR}, volume = {abs/2212.08341}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.08341}, doi = {10.48550/ARXIV.2212.08341}, eprinttype = {arXiv}, eprint = {2212.08341}, timestamp = {Wed, 07 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-08341.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/TondiCHL21, author = {Benedetta Tondi and Andrea Costanzo and Dequ Huang and Bin Li}, title = {Boosting CNN-based primary quantization matrix estimation of double {JPEG} images via a classification-like architecture}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2021}, number = {1}, pages = {5}, year = {2021}, url = {https://doi.org/10.1186/s13635-021-00119-0}, doi = {10.1186/S13635-021-00119-0}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejisec/TondiCHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/XuLLXZLH21, author = {Zhaopeng Xu and Jiarui Liu and Wei Lu and Bozhi Xu and Xianfeng Zhao and Bin Li and Jiwu Huang}, title = {Detecting facial manipulated videos based on set convolutional neural networks}, journal = {J. Vis. Commun. Image Represent.}, volume = {77}, pages = {103119}, year = {2021}, url = {https://doi.org/10.1016/j.jvcir.2021.103119}, doi = {10.1016/J.JVCIR.2021.103119}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jvcir/XuLLXZLH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/HussainTLQHH21, author = {Israr Hussain and Shunquan Tan and Bin Li and Xinghong Qin and Dostdar Hussain and Jiwu Huang}, title = {A novel deep learning framework for double {JPEG} compression detection of small size blocks}, journal = {J. Vis. Commun. Image Represent.}, volume = {80}, pages = {103269}, year = {2021}, url = {https://doi.org/10.1016/j.jvcir.2021.103269}, doi = {10.1016/J.JVCIR.2021.103269}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jvcir/HussainTLQHH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/LiZLL21, author = {Bin Li and Bowei Zheng and Haodong Li and Yanran Li}, title = {Detail-enhanced image inpainting based on discrete wavelet transforms}, journal = {Signal Process.}, volume = {189}, pages = {108278}, year = {2021}, url = {https://doi.org/10.1016/j.sigpro.2021.108278}, doi = {10.1016/J.SIGPRO.2021.108278}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigpro/LiZLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TanWSLLH21, author = {Shunquan Tan and Weilong Wu and Zilong Shao and Qiushi Li and Bin Li and Jiwu Huang}, title = {{CALPA-NET:} Channel-Pruning-Assisted Deep Residual Network for Steganalysis of Digital Images}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {131--146}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2020.3005304}, doi = {10.1109/TIFS.2020.3005304}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TanWSLLH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TangLBLH21, author = {Weixuan Tang and Bin Li and Mauro Barni and Jin Li and Jiwu Huang}, title = {An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {952--967}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2020.3025438}, doi = {10.1109/TIFS.2020.3025438}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/TangLBLH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhuangLTLH21, author = {Peiyu Zhuang and Haodong Li and Shunquan Tan and Bin Li and Jiwu Huang}, title = {Image Tampering Localization Using a Dense Fully Convolutional Network}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {2986--2999}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2021.3070444}, doi = {10.1109/TIFS.2021.3070444}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhuangLTLH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MoTLH21, author = {Xianbo Mo and Shunquan Tan and Bin Li and Jiwu Huang}, title = {MCTSteg: {A} Monte Carlo Tree Search-Based Reinforcement Learning Framework for Universal Non-Additive Steganography}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {4306--4320}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2021.3104140}, doi = {10.1109/TIFS.2021.3104140}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MoTLH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/QinTT0H21, author = {Xinghong Qin and Shunquan Tan and Weixuan Tang and Bin Li and Jiwu Huang}, title = {Image Steganography Based on Iterative Adversarial Perturbations Onto a Synchronized-Directions Sub-Image}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2021, Toronto, ON, Canada, June 6-11, 2021}, pages = {2705--2709}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICASSP39728.2021.9414055}, doi = {10.1109/ICASSP39728.2021.9414055}, timestamp = {Thu, 08 Jul 2021 17:12:48 +0200}, biburl = {https://dblp.org/rec/conf/icassp/QinTT0H21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icig/HuangTL21, author = {Dequ Huang and Weixuan Tang and Bin Li}, editor = {Yuxin Peng and Shi{-}Min Hu and Moncef Gabbouj and Kun Zhou and Michael Elad and Kun Xu}, title = {Anti-forensics for Double {JPEG} Compression Based on Generative Adversarial Network}, booktitle = {Image and Graphics - 11th International Conference, {ICIG} 2021, Haikou, China, August 6-8, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12888}, pages = {759--771}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-87355-4\_63}, doi = {10.1007/978-3-030-87355-4\_63}, timestamp = {Wed, 16 Mar 2022 23:55:43 +0100}, biburl = {https://dblp.org/rec/conf/icig/HuangTL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prcv/ZhuQGL21, author = {Ye Zhu and Na Qi and Yingchun Guo and Bin Li}, editor = {Huimin Ma and Liang Wang and Changshui Zhang and Fei Wu and Tieniu Tan and Yaonan Wang and Jianhuang Lai and Yao Zhao}, title = {SEINet: Semantic-Edge Interaction Network for Image Manipulation Localization}, booktitle = {Pattern Recognition and Computer Vision - 4th Chinese Conference, {PRCV} 2021, Beijing, China, October 29 - November 1, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13020}, pages = {29--41}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88007-1\_3}, doi = {10.1007/978-3-030-88007-1\_3}, timestamp = {Tue, 20 Aug 2024 07:54:43 +0200}, biburl = {https://dblp.org/rec/conf/prcv/ZhuQGL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prcv/LiCZL21, author = {Haodong Li and Xiaoming Chen and Peiyu Zhuang and Bin Li}, editor = {Huimin Ma and Liang Wang and Changshui Zhang and Fei Wu and Tieniu Tan and Yaonan Wang and Jianhuang Lai and Yao Zhao}, title = {Image Tampering Localization Using Unified Two-Stream Features Enhanced with Channel and Spatial Attention}, booktitle = {Pattern Recognition and Computer Vision - 4th Chinese Conference, {PRCV} 2021, Beijing, China, October 29 - November 1, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13020}, pages = {610--622}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88007-1\_50}, doi = {10.1007/978-3-030-88007-1\_50}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/prcv/LiCZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ih/2021, editor = {Dirk Borghys and Patrick Bas and Luisa Verdoliva and Tom{\'{a}}s Pevn{\'{y}} and Bin Li and Jennifer Newman}, title = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia Security, Virtual Event, Belgium, June, 22-25, 2021}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3437880}, doi = {10.1145/3437880}, isbn = {978-1-4503-8295-3}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2101-05209, author = {Xinghong Qin and Shunquan Tan and Bin Li and Weixuan Tang and Jiwu Huang}, title = {Image Steganography based on Iteratively Adversarial Samples of {A} Synchronized-directions Sub-image}, journal = {CoRR}, volume = {abs/2101.05209}, year = {2021}, url = {https://arxiv.org/abs/2101.05209}, eprinttype = {arXiv}, eprint = {2101.05209}, timestamp = {Fri, 22 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2101-05209.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-13689, author = {Xianbo Mo and Shunquan Tan and Bin Li and Jiwu Huang}, title = {MCTSteg: {A} Monte Carlo Tree Search-based Reinforcement Learning Framework for Universal Non-additive Steganography}, journal = {CoRR}, volume = {abs/2103.13689}, year = {2021}, url = {https://arxiv.org/abs/2103.13689}, eprinttype = {arXiv}, eprint = {2103.13689}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-13689.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-03867, author = {Weixuan Tang and Bin Li and Mauro Barni and Jin Li and Jiwu Huang}, title = {Improving Cost Learning for {JPEG} Steganography by Exploiting {JPEG} Domain Knowledge}, journal = {CoRR}, volume = {abs/2105.03867}, year = {2021}, url = {https://arxiv.org/abs/2105.03867}, eprinttype = {arXiv}, eprint = {2105.03867}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-03867.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-02434, author = {Long Zhuo and Shunquan Tan and Bin Li and Jiwu Huang}, title = {Self-Adversarial Training incorporating Forgery Attention for Image Forgery Localization}, journal = {CoRR}, volume = {abs/2107.02434}, year = {2021}, url = {https://arxiv.org/abs/2107.02434}, eprinttype = {arXiv}, eprint = {2107.02434}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-02434.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-05948, author = {Qinglin Li and Bin Li and Jonathan M. Garibaldi and Guoping Qiu}, title = {On Designing Good Representation Learning Models}, journal = {CoRR}, volume = {abs/2107.05948}, year = {2021}, url = {https://arxiv.org/abs/2107.05948}, eprinttype = {arXiv}, eprint = {2107.05948}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-05948.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/LiLTH20, author = {Haodong Li and Bin Li and Shunquan Tan and Jiwu Huang}, title = {Identification of deep network generated images using disparities in color components}, journal = {Signal Process.}, volume = {174}, pages = {107616}, year = {2020}, url = {https://doi.org/10.1016/j.sigpro.2020.107616}, doi = {10.1016/J.SIGPRO.2020.107616}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigpro/LiLTH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spic/ShiTLB20, author = {Xiaoyu Shi and Benedetta Tondi and Bin Li and Mauro Barni}, title = {CNN-based steganalysis and parametric adversarial embedding: {A} game-theoretic framework}, journal = {Signal Process. Image Commun.}, volume = {89}, pages = {115992}, year = {2020}, url = {https://doi.org/10.1016/j.image.2020.115992}, doi = {10.1016/J.IMAGE.2020.115992}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/spic/ShiTLB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/LiaoYLLQ20, author = {Xin Liao and Yingbo Yu and Bin Li and Zhongpeng Li and Zheng Qin}, title = {A New Payload Partition Strategy in Color Image Steganography}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {30}, number = {3}, pages = {685--696}, year = {2020}, url = {https://doi.org/10.1109/TCSVT.2019.2896270}, doi = {10.1109/TCSVT.2019.2896270}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/LiaoYLLQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/HeLLWL20, author = {Peisong He and Haoliang Li and Bin Li and Hongxia Wang and Liang Liu}, title = {Exposing Fake Bitrate Videos Using Hybrid Deep-Learning Network From Recompression Error}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {30}, number = {11}, pages = {4034--4049}, year = {2020}, url = {https://doi.org/10.1109/TCSVT.2019.2951630}, doi = {10.1109/TCSVT.2019.2951630}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcsv/HeLLWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JiangXS0H20, author = {Xinghao Jiang and Qiang Xu and Tanfeng Sun and Bin Li and Peisong He}, title = {Detection of {HEVC} Double Compression With the Same Coding Parameters Based on Analysis of Intra Coding Quality Degradation Process}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {250--263}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2918085}, doi = {10.1109/TIFS.2019.2918085}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/JiangXS0H20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuangLBH20, author = {Yuankun Huang and Bin Li and Mauro Barni and Jiwu Huang}, title = {Identification of VoIP Speech With Multiple Domain Deep Features}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2253--2267}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2960635}, doi = {10.1109/TIFS.2019.2960635}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuangLBH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-00468, author = {Benedetta Tondi and Andrea Costanzo and Dequ Huang and Bin Li}, title = {Boosting CNN-based primary quantization matrix estimation of double {JPEG} images via a classification-like architecture}, journal = {CoRR}, volume = {abs/2012.00468}, year = {2020}, url = {https://arxiv.org/abs/2012.00468}, eprinttype = {arXiv}, eprint = {2012.00468}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-00468.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/QinLTZ19, author = {Xinghong Qin and Bin Li and Shunquan Tan and Jishen Zeng}, title = {A Novel Steganography for Spatial Color Images Based on Pixel Vector Cost}, journal = {{IEEE} Access}, volume = {7}, pages = {8834--8846}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2891316}, doi = {10.1109/ACCESS.2019.2891316}, timestamp = {Wed, 13 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/QinLTZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LiZLT19, author = {Bin Li and Haoxin Zhang and Hu Luo and Shunquan Tan}, title = {Detecting double {JPEG} compression and its related anti-forensic operations with {CNN}}, journal = {Multim. Tools Appl.}, volume = {78}, number = {7}, pages = {8577--8601}, year = {2019}, url = {https://doi.org/10.1007/s11042-018-7073-3}, doi = {10.1007/S11042-018-7073-3}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LiZLT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TangLTBH19, author = {Weixuan Tang and Bin Li and Shunquan Tan and Mauro Barni and Jiwu Huang}, title = {CNN-Based Adversarial Embedding for Image Steganography}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {14}, number = {8}, pages = {2074--2087}, year = {2019}, url = {https://doi.org/10.1109/TIFS.2019.2891237}, doi = {10.1109/TIFS.2019.2891237}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TangLTBH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZengTLLH19, author = {Jishen Zeng and Shunquan Tan and Guangqing Liu and Bin Li and Jiwu Huang}, title = {WISERNet: Wider Separate-Then-Reunion Network for Steganalysis of Color Images}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {14}, number = {10}, pages = {2735--2748}, year = {2019}, url = {https://doi.org/10.1109/TIFS.2019.2904413}, doi = {10.1109/TIFS.2019.2904413}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZengTLLH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apsipa/LiSTZL19, author = {Qiushi Li and Zilong Shao and Shunquan Tan and Jishen Zeng and Bin Li}, title = {Non-structured Pruning for Deep-learning based Steganalytic Frameworks}, booktitle = {2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, {APSIPA} {ASC} 2019, Lanzhou, China, November 18-21, 2019}, pages = {1735--1739}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/APSIPAASC47483.2019.9023018}, doi = {10.1109/APSIPAASC47483.2019.9023018}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/apsipa/LiSTZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/QinLH19, author = {Xinghong Qin and Bin Li and Jiwu Huang}, title = {A New Spatial Steganographic Scheme by Modeling Image Residuals with Multivariate Gaussian Model}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2019, Brighton, United Kingdom, May 12-17, 2019}, pages = {2617--2621}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICASSP.2019.8682688}, doi = {10.1109/ICASSP.2019.8682688}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icassp/QinLH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/BarniHLT19, author = {Mauro Barni and Dequ Huang and Bin Li and Benedetta Tondi}, title = {Adversarial {CNN} Training Under {JPEG} Laundering Attacks: a Game-Theoretic Approach}, booktitle = {{IEEE} International Workshop on Information Forensics and Security, {WIFS} 2019, Delft, The Netherlands, December 9-12, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/WIFS47025.2019.9035110}, doi = {10.1109/WIFS47025.2019.9035110}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wifs/BarniHLT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-00697, author = {Xiaoyu Shi and Benedetta Tondi and Bin Li and Mauro Barni}, title = {CNN-based Steganalysis and Parametric Adversarial Embedding: a Game-Theoretic Framework}, journal = {CoRR}, volume = {abs/1906.00697}, year = {2019}, url = {http://arxiv.org/abs/1906.00697}, eprinttype = {arXiv}, eprint = {1906.00697}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-00697.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-04657, author = {Shunquan Tan and Weilong Wu and Zilong Shao and Qiushi Li and Bin Li and Jiwu Huang}, title = {{CALPA-NET:} Channel-pruning-assisted Deep Residual Network for Steganalysis of Digital Images}, journal = {CoRR}, volume = {abs/1911.04657}, year = {2019}, url = {http://arxiv.org/abs/1911.04657}, eprinttype = {arXiv}, eprint = {1911.04657}, timestamp = {Tue, 07 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-04657.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HuWJZL18, author = {Donghui Hu and Liang Wang and Wenjie Jiang and Shuli Zheng and Bin Li}, title = {A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks}, journal = {{IEEE} Access}, volume = {6}, pages = {38303--38314}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2852771}, doi = {10.1109/ACCESS.2018.2852771}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/HuWJZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spl/0011WFT18, author = {Bin Li and Weihang Wei and Anselmo Ferreira and Shunquan Tan}, title = {ReST-Net: Diverse Activation Modules and Parallel Subnets-Based {CNN} for Spatial Image Steganalysis}, journal = {{IEEE} Signal Process. Lett.}, volume = {25}, number = {5}, pages = {650--654}, year = {2018}, url = {https://doi.org/10.1109/LSP.2018.2816569}, doi = {10.1109/LSP.2018.2816569}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spl/0011WFT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spl/HuXMZL18, author = {Donghui Hu and Haiyan Xu and Zhongjin Ma and Shuli Zheng and Bin Li}, title = {A Spatial Image Steganography Method Based on Nonnegative Matrix Factorization}, journal = {{IEEE} Signal Process. Lett.}, volume = {25}, number = {9}, pages = {1364--1368}, year = {2018}, url = {https://doi.org/10.1109/LSP.2018.2856630}, doi = {10.1109/LSP.2018.2856630}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/spl/HuXMZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZengTLH18, author = {Jishen Zeng and Shunquan Tan and Bin Li and Jiwu Huang}, title = {Large-Scale {JPEG} Image Steganalysis Using Hybrid Deep-Learning Framework}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {5}, pages = {1200--1214}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2779446}, doi = {10.1109/TIFS.2017.2779446}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZengTLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiLZTZ18, author = {Bin Li and Zhongpeng Li and Shijun Zhou and Shunquan Tan and Xiaoling Zhang}, title = {New Steganalytic Features for Spatial Image Steganography Based on Derivative Filters and Threshold {LBP} Operator}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {5}, pages = {1242--1257}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2780805}, doi = {10.1109/TIFS.2017.2780805}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiLZTZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apsipa/XuJSHWL18, author = {Qiang Xu and Xinghao Jiang and Tanfeng Sun and Peisong He and Shilin Wang and Bin Li}, title = {Relocated I-Frames Detection in {H.264} Double Compressed Videos Based on Genetic-CNN}, booktitle = {Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, {APSIPA} {ASC} 2018, Honolulu, HI, USA, November 12-15, 2018}, pages = {710--716}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/APSIPA.2018.8659519}, doi = {10.23919/APSIPA.2018.8659519}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/apsipa/XuJSHWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apsipa/PengSJXLS18, author = {Peng Peng and Tanfeng Sun and Xinghao Jiang and Ke Xu and Bin Li and Yunqing Shi}, title = {Detection of Double {JPEG} Compression with the Same Quantization Matrix Based on Convolutional Neural Networks}, booktitle = {Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, {APSIPA} {ASC} 2018, Honolulu, HI, USA, November 12-15, 2018}, pages = {717--721}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/APSIPA.2018.8659763}, doi = {10.23919/APSIPA.2018.8659763}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/apsipa/PengSJXLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apsipa/LiCLT18, author = {Haodong Li and Han Chen and Bin Li and Shunquan Tan}, title = {Can Forensic Detectors Identify {GAN} Generated Images?}, booktitle = {Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, {APSIPA} {ASC} 2018, Honolulu, HI, USA, November 12-15, 2018}, pages = {722--727}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/APSIPA.2018.8659461}, doi = {10.23919/APSIPA.2018.8659461}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apsipa/LiCLT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apsipa/ZhuoTZL18, author = {Long Zhuo and Shunquan Tan and Jishen Zeng and Bin Li}, title = {Fake Colorized Image Detection with Channel-wise Convolution based Deep-learning Framework}, booktitle = {Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, {APSIPA} {ASC} 2018, Honolulu, HI, USA, November 12-15, 2018}, pages = {733--736}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/APSIPA.2018.8659761}, doi = {10.23919/APSIPA.2018.8659761}, timestamp = {Wed, 03 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/apsipa/ZhuoTZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhangLT18, author = {Hongrun Zhang and Bin Li and Shunquan Tan}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A New Steganographic Distortion Function with Explicit Considerations of Modification Interactions}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {460--471}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_42}, doi = {10.1007/978-3-030-00009-7\_42}, timestamp = {Wed, 03 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ZhangLT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/ZhouTTL18, author = {Shijun Zhou and Weixuan Tang and Shunquan Tan and Bin Li}, editor = {Chang D. Yoo and Yun Qing Shi and Hyoung{-}Joong Kim and Alessandro Piva and Gwangsu Kim}, title = {Content-Adaptive Steganalysis via Augmented Utilization of Selection-Channel Information}, booktitle = {Digital Forensics and Watermarking - 17th International Workshop, {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11378}, pages = {261--274}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11389-6\_20}, doi = {10.1007/978-3-030-11389-6\_20}, timestamp = {Thu, 28 May 2020 12:51:40 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/ZhouTTL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/HuangTLH18, author = {Yuankun Huang and Shunquan Tan and Bin Li and Jiwu Huang}, editor = {Chang D. Yoo and Yun Qing Shi and Hyoung{-}Joong Kim and Alessandro Piva and Gwangsu Kim}, title = {{VPCID} - {A} VoIP Phone Call Identification Database}, booktitle = {Digital Forensics and Watermarking - 17th International Workshop, {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11378}, pages = {307--321}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11389-6\_23}, doi = {10.1007/978-3-030-11389-6\_23}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/HuangTLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/FerreiraCLH18, author = {Anselmo Ferreira and Han Chen and Bin Li and Jiwu Huang}, title = {An Inception-Based Data-Driven Ensemble Approach to Camera Model Identification}, booktitle = {2018 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2018, Hong Kong, China, December 11-13, 2018}, pages = {1--7}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/WIFS.2018.8630774}, doi = {10.1109/WIFS.2018.8630774}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wifs/FerreiraCLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1803-04805, author = {Jishen Zeng and Shunquan Tan and Guangqing Liu and Bin Li and Jiwu Huang}, title = {WISERNet: Wider Separate-then-reunion Network for Steganalysis of Color Images}, journal = {CoRR}, volume = {abs/1803.04805}, year = {2018}, url = {http://arxiv.org/abs/1803.04805}, eprinttype = {arXiv}, eprint = {1803.04805}, timestamp = {Wed, 03 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1803-04805.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1803-09043, author = {Weixuan Tang and Bin Li and Shunquan Tan and Mauro Barni and Jiwu Huang}, title = {{CNN} Based Adversarial Embedding with Minimum Alteration for Image Steganography}, journal = {CoRR}, volume = {abs/1803.09043}, year = {2018}, url = {http://arxiv.org/abs/1803.09043}, eprinttype = {arXiv}, eprint = {1803.09043}, timestamp = {Thu, 06 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1803-09043.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1808-07276, author = {Haodong Li and Bin Li and Shunquan Tan and Jiwu Huang}, title = {Detection of Deep Network Generated Images Using Disparities in Color Components}, journal = {CoRR}, volume = {abs/1808.07276}, year = {2018}, url = {http://arxiv.org/abs/1808.07276}, eprinttype = {arXiv}, eprint = {1808.07276}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1808-07276.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/HeJSWLD17, author = {Peisong He and Xinghao Jiang and Tanfeng Sun and Shilin Wang and Bin Li and Yi Dong}, title = {Frame-wise detection of relocated I-frames in double compressed {H.264} videos based on convolutional neural network}, journal = {J. Vis. Commun. Image Represent.}, volume = {48}, pages = {149--158}, year = {2017}, url = {https://doi.org/10.1016/j.jvcir.2017.06.010}, doi = {10.1016/J.JVCIR.2017.06.010}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jvcir/HeJSWLD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spic/XueYLLL17, author = {Fei Xue and Ziyi Ye and Wei Lu and Hongmei Liu and Bin Li}, title = {{MSE} period based estimation of first quantization step in double compressed {JPEG} images}, journal = {Signal Process. Image Commun.}, volume = {57}, pages = {76--83}, year = {2017}, url = {https://doi.org/10.1016/j.image.2017.05.008}, doi = {10.1016/J.IMAGE.2017.05.008}, timestamp = {Wed, 30 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spic/XueYLLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spl/TangTLH17, author = {Weixuan Tang and Shunquan Tan and Bin Li and Jiwu Huang}, title = {Automatic Steganographic Distortion Learning Using a Generative Adversarial Network}, journal = {{IEEE} Signal Process. Lett.}, volume = {24}, number = {10}, pages = {1547--1551}, year = {2017}, url = {https://doi.org/10.1109/LSP.2017.2745572}, doi = {10.1109/LSP.2017.2745572}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/spl/TangTLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LuoYLH17, author = {Da Luo and Rui Yang and Bin Li and Jiwu Huang}, title = {Detection of Double Compressed {AMR} Audio Using Stacked Autoencoder}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {2}, pages = {432--444}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2622012}, doi = {10.1109/TIFS.2016.2622012}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LuoYLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/TanZLH17, author = {Shunquan Tan and Haojie Zhang and Bin Li and Jiwu Huang}, title = {Pixel-Decimation-Assisted Steganalysis of Synchronize-Embedding-Changes Steganography}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {7}, pages = {1658--1670}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2682703}, doi = {10.1109/TIFS.2017.2682703}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/TanZLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mediaforensics/ZengTLH17, author = {Jishen Zeng and Shunquan Tan and Bin Li and Jiwu Huang}, editor = {Adnan M. Alattar and Nasir D. Memon}, title = {Pre-training via fitting deep neural network to rich-model features extraction procedure and its effect on deep learning for steganalysis}, booktitle = {Media Watermarking, Security, and Forensics 2017, Burlingame, CA, USA, 29 January 2017 - 2 February 2017}, pages = {44--49}, publisher = {Society for Imaging Science and Technology}, year = {2017}, url = {https://doi.org/10.2352/ISSN.2470-1173.2017.7.MWSF-324}, doi = {10.2352/ISSN.2470-1173.2017.7.MWSF-324}, timestamp = {Mon, 17 Jul 2023 16:29:17 +0200}, biburl = {https://dblp.org/rec/conf/mediaforensics/ZengTLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1710-05477, author = {Bin Li and Hu Luo and Haoxin Zhang and Shunquan Tan and Zhongzhou Ji}, title = {A multi-branch convolutional neural network for detecting double {JPEG} compression}, journal = {CoRR}, volume = {abs/1710.05477}, year = {2017}, url = {http://arxiv.org/abs/1710.05477}, eprinttype = {arXiv}, eprint = {1710.05477}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1710-05477.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spl/TangLLH16, author = {Weixuan Tang and Bin Li and Weiqi Luo and Jiwu Huang}, title = {Clustering Steganographic Modification Directions for Color Components}, journal = {{IEEE} Signal Process. Lett.}, volume = {23}, number = {2}, pages = {197--201}, year = {2016}, url = {https://doi.org/10.1109/LSP.2015.2504583}, doi = {10.1109/LSP.2015.2504583}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spl/TangLLH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/ChenTLH16, author = {Shengda Chen and Shunquan Tan and Bin Li and Jiwu Huang}, title = {Automatic Detection of Object-Based Forgery in Advanced Video}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {26}, number = {11}, pages = {2138--2151}, year = {2016}, url = {https://doi.org/10.1109/TCSVT.2015.2473436}, doi = {10.1109/TCSVT.2015.2473436}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/ChenTLH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ZengTLH16, author = {Jishen Zeng and Shunquan Tan and Bin Li and Jiwu Huang}, title = {Large-scale {JPEG} steganalysis using hybrid deep-learning framework}, journal = {CoRR}, volume = {abs/1611.03233}, year = {2016}, url = {http://arxiv.org/abs/1611.03233}, eprinttype = {arXiv}, eprint = {1611.03233}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ZengTLH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiNLTH15, author = {Bin Li and Tian{-}Tsong Ng and Xiaolong Li and Shunquan Tan and Jiwu Huang}, title = {Revealing the Trace of High-Quality {JPEG} Compression Through Quantization Noise Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {3}, pages = {558--573}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2389148}, doi = {10.1109/TIFS.2015.2389148}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiNLTH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiWLTH15, author = {Bin Li and Ming Wang and Xiaolong Li and Shunquan Tan and Jiwu Huang}, title = {A Strategy of Clustering Modification Directions in Spatial Image Steganography}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {9}, pages = {1905--1917}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2434600}, doi = {10.1109/TIFS.2015.2434600}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiWLTH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tip/LiNLTH15, author = {Bin Li and Tian{-}Tsong Ng and Xiaolong Li and Shunquan Tan and Jiwu Huang}, title = {Statistical Model of {JPEG} Noises and Its Application in Quantization Step Estimation}, journal = {{IEEE} Trans. Image Process.}, volume = {24}, number = {5}, pages = {1471--1484}, year = {2015}, url = {https://doi.org/10.1109/TIP.2015.2405477}, doi = {10.1109/TIP.2015.2405477}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tip/LiNLTH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apsipa/TanCL15, author = {Shunquan Tan and Shengda Chen and Bin Li}, title = {{GOP} based automatic detection of object-based forgery in advanced video}, booktitle = {Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, {APSIPA} 2015, Hong Kong, December 16-19, 2015}, pages = {719--722}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/APSIPA.2015.7415366}, doi = {10.1109/APSIPA.2015.7415366}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/apsipa/TanCL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apsipa/YangLLG15, author = {Guangyuan Yang and Xiaolong Li and Bin Li and Zongming Guo}, title = {A new detector of {LSB} matching steganography based on likelihood ratio test for multivariate Gaussian covers}, booktitle = {Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, {APSIPA} 2015, Hong Kong, December 16-19, 2015}, pages = {757--760}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/APSIPA.2015.7415374}, doi = {10.1109/APSIPA.2015.7415374}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apsipa/YangLLG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chinasip/XueLLG15, author = {Bowen Xue and Xiaolong Li and Bin Li and Zongming Guo}, title = {Steganalysis of {LSB} replacement for multivariate Gaussian covers}, booktitle = {{IEEE} China Summit and International Conference on Signal and Information Processing, ChinaSIP 2015, Chengdu, China, July 12-15, 2015}, pages = {836--840}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ChinaSIP.2015.7230522}, doi = {10.1109/CHINASIP.2015.7230522}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chinasip/XueLLG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiTWH14, author = {Bin Li and Shunquan Tan and Ming Wang and Jiwu Huang}, title = {Investigation on Cost Assignment in Spatial Image Steganography}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {9}, number = {8}, pages = {1264--1277}, year = {2014}, url = {https://doi.org/10.1109/TIFS.2014.2326954}, doi = {10.1109/TIFS.2014.2326954}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiTWH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apsipa/TanL14, author = {Shunquan Tan and Bin Li}, title = {Stacked convolutional auto-encoders for steganalysis of digital images}, booktitle = {Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, {APSIPA} 2014, Chiang Mai, Thailand, December 9-12, 2014}, pages = {1--4}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/APSIPA.2014.7041565}, doi = {10.1109/APSIPA.2014.7041565}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/apsipa/TanL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/LiWHL14, author = {Bin Li and Ming Wang and Jiwu Huang and Xiaolong Li}, title = {A new cost function for spatial image steganography}, booktitle = {2014 {IEEE} International Conference on Image Processing, {ICIP} 2014, Paris, France, October 27-30, 2014}, pages = {4206--4210}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICIP.2014.7025854}, doi = {10.1109/ICIP.2014.7025854}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icip/LiWHL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/LiNLTH14, author = {Bin Li and Tian{-}Tsong Ng and Xiaolong Li and Shunquan Tan and Jiwu Huang}, title = {{JPEG} Noises beyond the First Compression Cycle}, journal = {CoRR}, volume = {abs/1405.7571}, year = {2014}, url = {http://arxiv.org/abs/1405.7571}, eprinttype = {arXiv}, eprint = {1405.7571}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/LiNLTH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/LiLLY13, author = {Xiaolong Li and Jian Li and Bin Li and Bin Yang}, title = {High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion}, journal = {Signal Process.}, volume = {93}, number = {1}, pages = {198--205}, year = {2013}, url = {https://doi.org/10.1016/j.sigpro.2012.07.025}, doi = {10.1016/J.SIGPRO.2012.07.025}, timestamp = {Sat, 27 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigpro/LiLLY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/LiLLYZ13, author = {Xiaolong Li and Bin Li and Xiangyang Luo and Bin Yang and Ruihui Zhu}, title = {Steganalysis of a PVD-based content adaptive image steganography}, journal = {Signal Process.}, volume = {93}, number = {9}, pages = {2529--2538}, year = {2013}, url = {https://doi.org/10.1016/j.sigpro.2013.03.029}, doi = {10.1016/J.SIGPRO.2013.03.029}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigpro/LiLLYZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tip/LiLYZ13, author = {Xiaolong Li and Bin Li and Bin Yang and Tieyong Zeng}, title = {General Framework to Histogram-Shifting-Based Reversible Data Hiding}, journal = {{IEEE} Trans. Image Process.}, volume = {22}, number = {6}, pages = {2181--2191}, year = {2013}, url = {https://doi.org/10.1109/TIP.2013.2246179}, doi = {10.1109/TIP.2013.2246179}, timestamp = {Sun, 10 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tip/LiLYZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spl/TanL12, author = {Shunquan Tan and Bin Li}, title = {Targeted Steganalysis of Edge Adaptive Image Steganography Based on {LSB} Matching Revisited Using B-Spline Fitting}, journal = {{IEEE} Signal Process. Lett.}, volume = {19}, number = {6}, pages = {336--339}, year = {2012}, url = {https://doi.org/10.1109/LSP.2012.2194702}, doi = {10.1109/LSP.2012.2194702}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/spl/TanL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/TanL12, author = {Shunquan Tan and Bin Li}, title = {Targeted steganalysis of adaptive pixel-value differencing steganography}, booktitle = {19th {IEEE} International Conference on Image Processing, {ICIP} 2012, Lake Buena Vista, Orlando, FL, USA, September 30 - October 3, 2012}, pages = {1129--1132}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICIP.2012.6467063}, doi = {10.1109/ICIP.2012.6467063}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icip/TanL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jihmsp/0011HH011, author = {Bin Li and Junhui He and Jiwu Huang and Yun Qing Shi}, title = {A Survey on Image Steganography and Steganalysis}, journal = {J. Inf. Hiding Multim. Signal Process.}, volume = {2}, number = {2}, pages = {142--172}, year = {2011}, url = {http://bit.kuas.edu.tw/\%7Ejihmsp/2011/vol2/JIH-MSP-2011-03-005.pdf}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jihmsp/0011HH011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/sci/HuangLSHX10, author = {Fangjun Huang and Bin Li and Yun{-}Qing Shi and Jiwu Huang and Guorong Xuan}, editor = {Husrev T. Sencar and Sergio A. Velastin and Nikolaos Nikolaidis and Shiguo Lian}, title = {Image Steganalysis}, booktitle = {Intelligent Multimedia Analysis for Security Applications}, series = {Studies in Computational Intelligence}, volume = {282}, pages = {275--303}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11756-5\_13}, doi = {10.1007/978-3-642-11756-5\_13}, timestamp = {Tue, 24 Nov 2020 16:44:23 +0100}, biburl = {https://dblp.org/rec/series/sci/HuangLSHX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiHS09, author = {Bin Li and Jiwu Huang and Yun{-}Qing Shi}, title = {Steganalysis of {YASS}}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {4}, number = {3}, pages = {369--382}, year = {2009}, url = {https://doi.org/10.1109/TIFS.2009.2025841}, doi = {10.1109/TIFS.2009.2025841}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiHS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spl/LiFH08, author = {Bin Li and Yanmei Fang and Jiwu Huang}, title = {Steganalysis of Multiple-Base Notational System Steganography}, journal = {{IEEE} Signal Process. Lett.}, volume = {15}, pages = {493--496}, year = {2008}, url = {https://doi.org/10.1109/LSP.2008.924000}, doi = {10.1109/LSP.2008.924000}, timestamp = {Fri, 23 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/spl/LiFH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/HuangLH08, author = {Fangjun Huang and Bin Li and Jiwu Huang}, title = {Universal {JPEG} steganalysis based on microscopic and macroscopic calibration}, booktitle = {Proceedings of the International Conference on Image Processing, {ICIP} 2008, October 12-15, 2008, San Diego, California, {USA}}, pages = {2068--2071}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ICIP.2008.4712193}, doi = {10.1109/ICIP.2008.4712193}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icip/HuangLH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/LiSH08, author = {Bin Li and Yun Q. Shi and Jiwu Huang}, editor = {Andrew D. Ker and Jana Dittmann and Jessica J. Fridrich}, title = {Steganalysis of {YASS}}, booktitle = {Proceedings of the 10th workshop on Multimedia {\&} Security, MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008}, pages = {139--148}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1411328.1411354}, doi = {10.1145/1411328.1411354}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsec/LiSH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsp/LiSH08, author = {Bin Li and Yun Q. Shi and Jiwu Huang}, title = {Detecting doubly compressed {JPEG} images by using Mode Based First Digit Features}, booktitle = {International Workshop on Multimedia Signal Processing, {MMSP} 2008, October 8-10, 2008, Shangri-la Hotel, Cairns, Queensland, Australia}, pages = {730--735}, publisher = {{IEEE} Signal Processing Society}, year = {2008}, url = {https://doi.org/10.1109/MMSP.2008.4665171}, doi = {10.1109/MMSP.2008.4665171}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmsp/LiSH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sswmc/LiHS08, author = {Bin Li and Jiwu Huang and Yun Q. Shi}, editor = {Edward J. Delp III and Ping Wah Wong and Jana Dittmann and Nasir D. Memon}, title = {Textural features based universal steganalysis}, booktitle = {Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008}, series = {{SPIE} Proceedings}, volume = {6819}, pages = {681912}, publisher = {{SPIE}}, year = {2008}, url = {https://doi.org/10.1117/12.765817}, doi = {10.1117/12.765817}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sswmc/LiHS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/HuangLH07, author = {Fangjun Huang and Bin Li and Jiwu Huang}, title = {Attack {LSB} Matching Steganography by Counting Alteration Rate of the Number of Neighbourhood Gray Levels}, booktitle = {Proceedings of the International Conference on Image Processing, {ICIP} 2007, September 16-19, 2007, San Antonio, Texas, {USA}}, pages = {401--404}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ICIP.2007.4378976}, doi = {10.1109/ICIP.2007.4378976}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icip/HuangLH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/LiHH07, author = {Bin Li and Fangjun Huang and Jiwu Huang}, title = {Steganalysis of {LSB} Greedy Embedding Algorithm for {JPEG} Images using Coefficient Symmetry}, booktitle = {Proceedings of the International Conference on Image Processing, {ICIP} 2007, September 16-19, 2007, San Antonio, Texas, {USA}}, pages = {413--416}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ICIP.2007.4378979}, doi = {10.1109/ICIP.2007.4378979}, timestamp = {Fri, 23 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icip/LiHH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/LiHTHS07, author = {Bin Li and Fangjun Huang and Shunquan Tan and Jiwu Huang and Yun Q. Shi}, editor = {Yun Q. Shi and Hyoung{-}Joong Kim and Stefan Katzenbeisser}, title = {Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal {JPEG} Steganalysis}, booktitle = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou, China, December 3-5, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5041}, pages = {143--157}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-92238-4\_12}, doi = {10.1007/978-3-540-92238-4\_12}, timestamp = {Thu, 28 May 2020 12:51:39 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/LiHTHS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.