BibTeX records: Bin Li 0011

download as .bib file

@article{DBLP:journals/tcsv/LiWLTZ24,
  author       = {Weixiang Li and
                  Shihang Wu and
                  Bin Li and
                  Weixuan Tang and
                  Xinpeng Zhang},
  title        = {Payload-Independent Direct Cost Learning for Image Steganography},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {34},
  number       = {3},
  pages        = {1970--1975},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCSVT.2023.3294291},
  doi          = {10.1109/TCSVT.2023.3294291},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/LiWLTZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/WangWZLMLS24,
  author       = {Hao Wang and
                  Jinwei Wang and
                  Jiawei Zhang and
                  Xiangyang Luo and
                  Bin Ma and
                  Bin Li and
                  Jinsheng Sun},
  title        = {General Forensics for Aligned Double {JPEG} Compression Based on the
                  Quantization Interference},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {34},
  number       = {6},
  pages        = {5191--5206},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCSVT.2023.3341032},
  doi          = {10.1109/TCSVT.2023.3341032},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/WangWZLMLS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TangZLCH24,
  author       = {Weixuan Tang and
                  Zhili Zhou and
                  Bin Li and
                  Kim{-}Kwang Raymond Choo and
                  Jiwu Huang},
  title        = {Joint Cost Learning and Payload Allocation With Image-Wise Attention
                  for Batch Steganography},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2826--2839},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3354411},
  doi          = {10.1109/TIFS.2024.3354411},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/TangZLCH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/QuXLLWL24,
  author       = {Zuomin Qu and
                  Zuping Xi and
                  Wei Lu and
                  Xiangyang Luo and
                  Qian Wang and
                  Bin Li},
  title        = {{DF-RAP:} {A} Robust Adversarial Perturbation for Defending Against
                  Deepfakes in Real-World Social Network Scenarios},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3943--3957},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3372803},
  doi          = {10.1109/TIFS.2024.3372803},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/QuXLLWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/PengTMLH24,
  author       = {Rongxuan Peng and
                  Shunquan Tan and
                  Xianbo Mo and
                  Bin Li and
                  Jiwu Huang},
  title        = {Employing Reinforcement Learning to Construct a Decision-Making Environment
                  for Image Forgery Localization},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {4820--4834},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3381470},
  doi          = {10.1109/TIFS.2024.3381470},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/PengTMLH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LuZDLLL24,
  author       = {Jiucui Lu and
                  Jiaran Zhou and
                  Junyu Dong and
                  Bin Li and
                  Siwei Lyu and
                  Yuezun Li},
  title        = {ForensicsForest Family: {A} Series of Multi-Scale Hierarchical Cascade
                  Forests for Detecting GAN-Generated Faces},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {5106--5119},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3395013},
  doi          = {10.1109/TIFS.2024.3395013},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LuZDLLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiCXLL24,
  author       = {Bin Li and
                  Jincheng Chen and
                  Yuxiong Xu and
                  Weixiang Li and
                  Zhenghui Liu},
  title        = {{DRAW:} Dual-Decoder-Based Robust Audio Watermarking Against Desynchronization
                  and Replay Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {6529--6544},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3416047},
  doi          = {10.1109/TIFS.2024.3416047},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiCXLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SuNHL24,
  author       = {Wenkang Su and
                  Jiangqun Ni and
                  Xianglei Hu and
                  Bin Li},
  title        = {Efficient Audio Steganography Using Generalized Audio Intrinsic Energy
                  With Micro-Amplitude Modification Suppression},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {6559--6572},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3417268},
  doi          = {10.1109/TIFS.2024.3417268},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SuNHL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WuYSLHL24,
  author       = {Junyan Wu and
                  Qilin Yin and
                  Ziqi Sheng and
                  Wei Lu and
                  Jiwu Huang and
                  Bin Li},
  title        = {Audio Multi-View Spoofing Detection Framework Based on Audio-Text-Emotion
                  Correlations},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {7133--7146},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3431888},
  doi          = {10.1109/TIFS.2024.3431888},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WuYSLHL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/YangLLT024,
  author       = {Zhuofan Yang and
                  Qiushi Li and
                  Shenghai Luo and
                  Shunquan Tan and
                  Bin Li},
  title        = {Improving VGG-Style Convnet for {JPEG} Steganalysis},
  booktitle    = {{IEEE} International Conference on Acoustics, Speech and Signal Processing,
                  {ICASSP} 2024, Seoul, Republic of Korea, April 14-19, 2024},
  pages        = {4450--4454},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICASSP48485.2024.10447518},
  doi          = {10.1109/ICASSP48485.2024.10447518},
  timestamp    = {Mon, 05 Aug 2024 15:26:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/YangLLT024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/SongL024,
  author       = {Wentang Song and
                  Yuzhen Lin and
                  Bin Li},
  title        = {Towards Generic Deepfake Detection with Dynamic Curriculum},
  booktitle    = {{IEEE} International Conference on Acoustics, Speech and Signal Processing,
                  {ICASSP} 2024, Seoul, Republic of Korea, April 14-19, 2024},
  pages        = {4500--4504},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICASSP48485.2024.10448345},
  doi          = {10.1109/ICASSP48485.2024.10448345},
  timestamp    = {Mon, 05 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/SongL024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/PengMT0H24,
  author       = {Rongxuan Peng and
                  Xianbo Mo and
                  Shunquan Tan and
                  Bin Li and
                  Jiwu Huang},
  title        = {A Keyless Extraction Framework Targeting at Deep Learning Based Image-Within-Image
                  Models},
  booktitle    = {{IEEE} International Conference on Acoustics, Speech and Signal Processing,
                  {ICASSP} 2024, Seoul, Republic of Korea, April 14-19, 2024},
  pages        = {12846--12850},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICASSP48485.2024.10448420},
  doi          = {10.1109/ICASSP48485.2024.10448420},
  timestamp    = {Wed, 07 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/PengMT0H24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2404-13872,
  author       = {Hanzhe Li and
                  Yuezun Li and
                  Jiaran Zhou and
                  Bin Li and
                  Junyu Dong},
  title        = {FreqBlender: Enhancing DeepFake Detection by Blending Frequency Knowledge},
  journal      = {CoRR},
  volume       = {abs/2404.13872},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2404.13872},
  doi          = {10.48550/ARXIV.2404.13872},
  eprinttype    = {arXiv},
  eprint       = {2404.13872},
  timestamp    = {Sat, 25 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2404-13872.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/TangLLWH23,
  author       = {Weixuan Tang and
                  Bin Li and
                  Weixiang Li and
                  Yuangen Wang and
                  Jiwu Huang},
  title        = {Reinforcement learning of non-additive joint steganographic embedding
                  costs with attention mechanism},
  journal      = {Sci. China Inf. Sci.},
  volume       = {66},
  number       = {3},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11432-021-3453-5},
  doi          = {10.1007/S11432-021-3453-5},
  timestamp    = {Fri, 15 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/TangLLWH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/DuanLYZL23,
  author       = {Xiaolong Duan and
                  Bin Li and
                  Zhaoxia Yin and
                  Xinpeng Zhang and
                  Bin Luo},
  title        = {Robust image steganography against lossy {JPEG} compression based
                  on embedding domain selection and adaptive error correction},
  journal      = {Expert Syst. Appl.},
  volume       = {229},
  number       = {Part {A}},
  pages        = {120416},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.eswa.2023.120416},
  doi          = {10.1016/J.ESWA.2023.120416},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/DuanLYZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pr/ChenLLLW23,
  author       = {Han Chen and
                  Yuezun Li and
                  Dongdong Lin and
                  Bin Li and
                  Junqiang Wu},
  title        = {Watching the BiG artifacts: Exposing DeepFake videos via Bi-granularity
                  artifacts},
  journal      = {Pattern Recognit.},
  volume       = {135},
  pages        = {109179},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.patcog.2022.109179},
  doi          = {10.1016/J.PATCOG.2022.109179},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pr/ChenLLLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spl/ChenLZ23,
  author       = {Tong Chen and
                  Bin Li and
                  Jinhua Zeng},
  title        = {Learning Traces by Yourself: Blind Image Forgery Localization via
                  Anomaly Detection With ViT-VAE},
  journal      = {{IEEE} Signal Process. Lett.},
  volume       = {30},
  pages        = {150--154},
  year         = {2023},
  url          = {https://doi.org/10.1109/LSP.2023.3245947},
  doi          = {10.1109/LSP.2023.3245947},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/spl/ChenLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/ChenLLT23,
  author       = {Han Chen and
                  Yuzhen Lin and
                  Bin Li and
                  Shunquan Tan},
  title        = {Learning Features of Intra-Consistency and Inter-Diversity: Keys Toward
                  Generalizable Deepfake Detection},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {33},
  number       = {3},
  pages        = {1468--1480},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCSVT.2022.3209336},
  doi          = {10.1109/TCSVT.2022.3209336},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/ChenLLT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/LiLTQ23,
  author       = {Guanglin Li and
                  Bin Li and
                  Shunquan Tan and
                  Guoping Qiu},
  title        = {Learning Deep Co-Occurrence Features},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {33},
  number       = {4},
  pages        = {1610--1623},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCSVT.2022.3216905},
  doi          = {10.1109/TCSVT.2022.3216905},
  timestamp    = {Tue, 02 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/LiLTQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TanLLLH23,
  author       = {Shunquan Tan and
                  Qiushi Li and
                  Laiyuan Li and
                  Bin Li and
                  Jiwu Huang},
  title        = {{STD-NET:} Search of Image Steganalytic Deep-Learning Architecture
                  via Hierarchical Tensor Decomposition},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {3},
  pages        = {2657--2673},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2023.3267065},
  doi          = {10.1109/TDSC.2023.3267065},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/TanLLLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MoTTLH23,
  author       = {Xianbo Mo and
                  Shunquan Tan and
                  Weixuan Tang and
                  Bin Li and
                  Jiwu Huang},
  title        = {ReLOAD: Using Reinforcement Learning to Optimize Asymmetric Distortion
                  for Additive Steganography},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {1524--1538},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3244094},
  doi          = {10.1109/TIFS.2023.3244094},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/MoTTLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YinLLH23,
  author       = {Qilin Yin and
                  Wei Lu and
                  Bin Li and
                  Jiwu Huang},
  title        = {Dynamic Difference Learning With Spatio-Temporal Correlation for Deepfake
                  Video Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {4046--4058},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3290752},
  doi          = {10.1109/TIFS.2023.3290752},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YinLLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiLZZ23,
  author       = {Weixiang Li and
                  Bin Li and
                  Weiming Zhang and
                  Shengli Zhang},
  title        = {Quaternary Quantized Gaussian Modulation With Optimal Polarity Map
                  Selection for {JPEG} Steganography},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {5026--5040},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3303715},
  doi          = {10.1109/TIFS.2023.3303715},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiLZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aisp/ZhangTRLH23,
  author       = {Wei Zhang and
                  Weixuan Tang and
                  Yuan Rao and
                  Bin Li and
                  Jiwu Huang},
  editor       = {Jaideep Vaidya and
                  Moncef Gabbouj and
                  Jin Li},
  title        = {Deep Multi-image Hiding with Random Key},
  booktitle    = {Artificial Intelligence Security and Privacy - First International
                  Conference on Artificial Intelligence Security and Privacy, AIS{\&}P
                  2023, Guangzhou, China, December 3-5, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14509},
  pages        = {33--41},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-9785-5\_3},
  doi          = {10.1007/978-981-99-9785-5\_3},
  timestamp    = {Tue, 20 Aug 2024 07:54:44 +0200},
  biburl       = {https://dblp.org/rec/conf/aisp/ZhangTRLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MoTLH23,
  author       = {Xianbo Mo and
                  Shunquan Tan and
                  Bin Li and
                  Jiwu Huang},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Poster: Query-efficient Black-box Attack for Image Forgery Localization
                  via Reinforcement Learning},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {3552--3554},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3624390},
  doi          = {10.1145/3576915.3624390},
  timestamp    = {Fri, 01 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MoTLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eusipco/LinM0C23,
  author       = {Yuzhen Lin and
                  Emanuele Maiorana and
                  Bin Li and
                  Patrizio Campisi},
  title        = {Detection of Photoplethysmography Manipulation in Video Forgery},
  booktitle    = {31st European Signal Processing Conference, {EUSIPCO} 2023, Helsinki,
                  Finland, September 4-8, 2023},
  pages        = {615--619},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.23919/EUSIPCO58844.2023.10289891},
  doi          = {10.23919/EUSIPCO58844.2023.10289891},
  timestamp    = {Mon, 06 Nov 2023 12:35:15 +0100},
  biburl       = {https://dblp.org/rec/conf/eusipco/LinM0C23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/YuLLZZ23,
  author       = {Zeqin Yu and
                  Bin Li and
                  Yuzhen Lin and
                  Jinhua Zeng and
                  Jishen Zeng},
  title        = {Learning to Locate the Text Forgery in Smartphone Screenshots},
  booktitle    = {{IEEE} International Conference on Acoustics, Speech and Signal Processing
                  {ICASSP} 2023, Rhodes Island, Greece, June 4-10, 2023},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICASSP49357.2023.10095070},
  doi          = {10.1109/ICASSP49357.2023.10095070},
  timestamp    = {Sun, 05 Nov 2023 16:51:21 +0100},
  biburl       = {https://dblp.org/rec/conf/icassp/YuLLZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/LuLZLL23,
  author       = {Jiucui Lu and
                  Yuezun Li and
                  Jiaran Zhou and
                  Bin Li and
                  Siwei Lyu},
  title        = {Forensics Forest: Multi-scale Hierarchical Cascade Forest for Detecting
                  GAN-generated Faces},
  booktitle    = {{IEEE} International Conference on Multimedia and Expo, {ICME} 2023,
                  Brisbane, Australia, July 10-14, 2023},
  pages        = {2309--2314},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICME55011.2023.00394},
  doi          = {10.1109/ICME55011.2023.00394},
  timestamp    = {Mon, 13 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icmcs/LuLZLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-13297,
  author       = {Xiaolong Duan and
                  Bin Li and
                  Zhaoxia Yin and
                  Xinpeng Zhang and
                  Bin Luo},
  title        = {Robust image steganography against lossy {JPEG} compression based
                  on embedding domain selection and adaptive error correction},
  journal      = {CoRR},
  volume       = {abs/2304.13297},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.13297},
  doi          = {10.48550/ARXIV.2304.13297},
  eprinttype    = {arXiv},
  eprint       = {2304.13297},
  timestamp    = {Fri, 15 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-13297.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-00964,
  author       = {Jiucui Lu and
                  Yuezun Li and
                  Jiaran Zhou and
                  Bin Li and
                  Junyu Dong and
                  Siwei Lyu},
  title        = {ForensicsForest Family: {A} Series of Multi-scale Hierarchical Cascade
                  Forests for Detecting GAN-generated Faces},
  journal      = {CoRR},
  volume       = {abs/2308.00964},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.00964},
  doi          = {10.48550/ARXIV.2308.00964},
  eprinttype    = {arXiv},
  eprint       = {2308.00964},
  timestamp    = {Mon, 13 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-00964.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-10036,
  author       = {Long Zhuo and
                  Shenghai Luo and
                  Shunquan Tan and
                  Han Chen and
                  Bin Li and
                  Jiwu Huang},
  title        = {Evading Detection Actively: Toward Anti-Forensics against Forgery
                  Localization},
  journal      = {CoRR},
  volume       = {abs/2310.10036},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.10036},
  doi          = {10.48550/ARXIV.2310.10036},
  eprinttype    = {arXiv},
  eprint       = {2310.10036},
  timestamp    = {Mon, 05 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-10036.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsp/LiWHAL22,
  author       = {Jialong Li and
                  Hongxia Wang and
                  Peisong He and
                  Sani M. Abdullahi and
                  Bin Li},
  title        = {Long-term variable {Q} transform: {A} novel time-frequency transform
                  algorithm for synthetic speech detection},
  journal      = {Digit. Signal Process.},
  volume       = {120},
  pages        = {103256},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.dsp.2021.103256},
  doi          = {10.1016/J.DSP.2021.103256},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dsp/LiWHAL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ipr/Yin0L22,
  author       = {Hui Yin and
                  Fei Zhou and
                  Bin Li},
  title        = {Metric of choosing the optimal parameter setting for edge aware filtering},
  journal      = {{IET} Image Process.},
  volume       = {16},
  number       = {2},
  pages        = {453--469},
  year         = {2022},
  url          = {https://doi.org/10.1049/ipr2.12360},
  doi          = {10.1049/IPR2.12360},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ipr/Yin0L22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/Yuan0HL022,
  author       = {Chao Yuan and
                  Hongxia Wang and
                  Peisong He and
                  Jie Luo and
                  Bin Li},
  title        = {GAN-based image steganography for enhancing security via adversarial
                  attack and pixel-wise deep fusion},
  journal      = {Multim. Tools Appl.},
  volume       = {81},
  number       = {5},
  pages        = {6681--6701},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11042-021-11778-z},
  doi          = {10.1007/S11042-021-11778-Z},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/Yuan0HL022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ZhuoTLH22,
  author       = {Long Zhuo and
                  Shunquan Tan and
                  Bin Li and
                  Jiwu Huang},
  title        = {{ISP-GAN:} inception sub-pixel deconvolution-based lightweight GANs
                  for colorization},
  journal      = {Multim. Tools Appl.},
  volume       = {81},
  number       = {17},
  pages        = {24977--24994},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11042-022-12587-8},
  doi          = {10.1007/S11042-022-12587-8},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ZhuoTLH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/remotesensing/LiLGQ22,
  author       = {Qinglin Li and
                  Bin Li and
                  Jonathan M. Garibaldi and
                  Guoping Qiu},
  title        = {Clustering-Based Representation Learning through Output Translation
                  and Its Application to Remote-Sensing Images},
  journal      = {Remote. Sens.},
  volume       = {14},
  number       = {14},
  pages        = {3361},
  year         = {2022},
  url          = {https://doi.org/10.3390/rs14143361},
  doi          = {10.3390/RS14143361},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/remotesensing/LiLGQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spic/TanCZLH22,
  author       = {Shunquan Tan and
                  Baoying Chen and
                  Jishen Zeng and
                  Bin Li and
                  Jiwu Huang},
  title        = {Hybrid deep-learning framework for object-based forgery detection
                  in video},
  journal      = {Signal Process. Image Commun.},
  volume       = {105},
  pages        = {116695},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.image.2022.116695},
  doi          = {10.1016/J.IMAGE.2022.116695},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spic/TanCZLH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/LiCTLH22,
  author       = {Qiushi Li and
                  Shengda Chen and
                  Shunquan Tan and
                  Bin Li and
                  Jiwu Huang},
  title        = {One-Class Double Compression Detection of Advanced Videos Based on
                  Simple Gaussian Distribution Model},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {32},
  number       = {4},
  pages        = {2496--2500},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCSVT.2021.3069254},
  doi          = {10.1109/TCSVT.2021.3069254},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/LiCTLH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/TangLBLH22,
  author       = {Weixuan Tang and
                  Bin Li and
                  Mauro Barni and
                  Jin Li and
                  Jiwu Huang},
  title        = {Improving Cost Learning for {JPEG} Steganography by Exploiting {JPEG}
                  Domain Knowledge},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {32},
  number       = {6},
  pages        = {4081--4095},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCSVT.2021.3115600},
  doi          = {10.1109/TCSVT.2021.3115600},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/TangLBLH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/QinLTTH22,
  author       = {Xinghong Qin and
                  Bin Li and
                  Shunquan Tan and
                  Weixuan Tang and
                  Jiwu Huang},
  title        = {Gradually Enhanced Adversarial Perturbations on Color Pixel Vectors
                  for Image Steganography},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {32},
  number       = {8},
  pages        = {5110--5123},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCSVT.2022.3148406},
  doi          = {10.1109/TCSVT.2022.3148406},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/QinLTTH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuoTLH22,
  author       = {Long Zhuo and
                  Shunquan Tan and
                  Bin Li and
                  Jiwu Huang},
  title        = {Self-Adversarial Training Incorporating Forgery Attention for Image
                  Forgery Localization},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {17},
  pages        = {819--834},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIFS.2022.3152362},
  doi          = {10.1109/TIFS.2022.3152362},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuoTLH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/accv/ChenLL22,
  author       = {Han Chen and
                  Yuzhen Lin and
                  Bin Li},
  editor       = {Lei Wang and
                  Juergen Gall and
                  Tat{-}Jun Chin and
                  Imari Sato and
                  Rama Chellappa},
  title        = {Exposing Face Forgery Clues via Retinex-Based Image Enhancement},
  booktitle    = {Computer Vision - {ACCV} 2022 - 16th Asian Conference on Computer
                  Vision, Macao, China, December 4-8, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13844},
  pages        = {20--34},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-26316-3\_2},
  doi          = {10.1007/978-3-031-26316-3\_2},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/accv/ChenLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icb/LinTLB22,
  author       = {Dongdong Lin and
                  Benedetta Tondi and
                  Bin Li and
                  Mauro Barni},
  title        = {Exploiting temporal information to prevent the transferability of
                  adversarial examples against deep fake detectors},
  booktitle    = {{IEEE} International Joint Conference on Biometrics, {IJCB} 2022,
                  Abu Dhabi, United Arab Emirates, October 10-13, 2022},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/IJCB54206.2022.10007959},
  doi          = {10.1109/IJCB54206.2022.10007959},
  timestamp    = {Thu, 20 Apr 2023 16:45:47 +0200},
  biburl       = {https://dblp.org/rec/conf/icb/LinTLB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/LinCLW22,
  author       = {Yuzhen Lin and
                  Han Chen and
                  Bin Li and
                  Junqiang Wu},
  title        = {Towards Generalizable {DEEPFAKE} Face Forgery Detection with Semi-Supervised
                  Learning and Knowledge Distillation},
  booktitle    = {2022 {IEEE} International Conference on Image Processing, {ICIP} 2022,
                  Bordeaux, France, 16-19 October 2022},
  pages        = {576--580},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICIP46576.2022.9897792},
  doi          = {10.1109/ICIP46576.2022.9897792},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icip/LinCLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/LinCMCL22,
  author       = {Yuzhen Lin and
                  Han Chen and
                  Emanuele Maiorana and
                  Patrizio Campisi and
                  Bin Li},
  title        = {Source-ID-Tracker: Source Face Identity Protection in Face Swapping},
  booktitle    = {{IEEE} International Conference on Multimedia and Expo, {ICME} 2022,
                  Taipei, Taiwan, July 18-22, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICME52920.2022.9859600},
  doi          = {10.1109/ICME52920.2022.9859600},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icmcs/LinCMCL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/YangWL22,
  author       = {Haoxin Yang and
                  Yi Wang and
                  Bin Li},
  title        = {Individual Property Inference Over Collaborative Learning in Deep
                  Feature Space},
  booktitle    = {{IEEE} International Conference on Multimedia and Expo, {ICME} 2022,
                  Taipei, Taiwan, July 18-22, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICME52920.2022.9859857},
  doi          = {10.1109/ICME52920.2022.9859857},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icmcs/YangWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iftc/ZhuLLY022,
  author       = {Shaowei Zhu and
                  Wanli Lyu and
                  Bin Li and
                  Zhaoxia Yin and
                  Bin Luo},
  editor       = {Guangtao Zhai and
                  Jun Zhou and
                  Hua Yang and
                  Xiaokang Yang and
                  Ping An and
                  Jia Wang},
  title        = {Adversarial Example Defense via Perturbation Grading Strategy},
  booktitle    = {Digital Multimedia Communications - The 19th International Forum,
                  {IFTC} 2022, Shanghai, China, December 8-9, 2022, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1766},
  pages        = {407--420},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-981-99-0856-1\_30},
  doi          = {10.1007/978-981-99-0856-1\_30},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iftc/ZhuLLY022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/LiLCTQ22,
  author       = {Guanglin Li and
                  Bin Li and
                  Changsheng Chen and
                  Shunquan Tan and
                  Guoping Qiu},
  editor       = {Luc De Raedt},
  title        = {Learning General Gaussian Mixture Model with Integral Cosine Similarity},
  booktitle    = {Proceedings of the Thirty-First International Joint Conference on
                  Artificial Intelligence, {IJCAI} 2022, Vienna, Austria, 23-29 July
                  2022},
  pages        = {3201--3207},
  publisher    = {ijcai.org},
  year         = {2022},
  url          = {https://doi.org/10.24963/ijcai.2022/444},
  doi          = {10.24963/IJCAI.2022/444},
  timestamp    = {Mon, 22 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/LiLCTQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-05651,
  author       = {Shunquan Tan and
                  Qiushi Li and
                  Laiyuan Li and
                  Bin Li and
                  Jiwu Huang},
  title        = {{STD-NET:} Search of Image Steganalytic Deep-learning Architecture
                  via Hierarchical Tensor Decomposition},
  journal      = {CoRR},
  volume       = {abs/2206.05651},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.05651},
  doi          = {10.48550/ARXIV.2206.05651},
  eprinttype    = {arXiv},
  eprint       = {2206.05651},
  timestamp    = {Mon, 22 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-05651.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-08341,
  author       = {Shaowei Zhu and
                  Wanli Lyu and
                  Bin Li and
                  Zhaoxia Yin and
                  Bin Luo},
  title        = {Adversarial Example Defense via Perturbation Grading Strategy},
  journal      = {CoRR},
  volume       = {abs/2212.08341},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.08341},
  doi          = {10.48550/ARXIV.2212.08341},
  eprinttype    = {arXiv},
  eprint       = {2212.08341},
  timestamp    = {Wed, 07 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-08341.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/TondiCHL21,
  author       = {Benedetta Tondi and
                  Andrea Costanzo and
                  Dequ Huang and
                  Bin Li},
  title        = {Boosting CNN-based primary quantization matrix estimation of double
                  {JPEG} images via a classification-like architecture},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2021},
  number       = {1},
  pages        = {5},
  year         = {2021},
  url          = {https://doi.org/10.1186/s13635-021-00119-0},
  doi          = {10.1186/S13635-021-00119-0},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejisec/TondiCHL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/XuLLXZLH21,
  author       = {Zhaopeng Xu and
                  Jiarui Liu and
                  Wei Lu and
                  Bozhi Xu and
                  Xianfeng Zhao and
                  Bin Li and
                  Jiwu Huang},
  title        = {Detecting facial manipulated videos based on set convolutional neural
                  networks},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {77},
  pages        = {103119},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jvcir.2021.103119},
  doi          = {10.1016/J.JVCIR.2021.103119},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jvcir/XuLLXZLH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/HussainTLQHH21,
  author       = {Israr Hussain and
                  Shunquan Tan and
                  Bin Li and
                  Xinghong Qin and
                  Dostdar Hussain and
                  Jiwu Huang},
  title        = {A novel deep learning framework for double {JPEG} compression detection
                  of small size blocks},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {80},
  pages        = {103269},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jvcir.2021.103269},
  doi          = {10.1016/J.JVCIR.2021.103269},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jvcir/HussainTLQHH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/LiZLL21,
  author       = {Bin Li and
                  Bowei Zheng and
                  Haodong Li and
                  Yanran Li},
  title        = {Detail-enhanced image inpainting based on discrete wavelet transforms},
  journal      = {Signal Process.},
  volume       = {189},
  pages        = {108278},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.sigpro.2021.108278},
  doi          = {10.1016/J.SIGPRO.2021.108278},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigpro/LiZLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TanWSLLH21,
  author       = {Shunquan Tan and
                  Weilong Wu and
                  Zilong Shao and
                  Qiushi Li and
                  Bin Li and
                  Jiwu Huang},
  title        = {{CALPA-NET:} Channel-Pruning-Assisted Deep Residual Network for Steganalysis
                  of Digital Images},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {131--146},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2020.3005304},
  doi          = {10.1109/TIFS.2020.3005304},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TanWSLLH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TangLBLH21,
  author       = {Weixuan Tang and
                  Bin Li and
                  Mauro Barni and
                  Jin Li and
                  Jiwu Huang},
  title        = {An Automatic Cost Learning Framework for Image Steganography Using
                  Deep Reinforcement Learning},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {952--967},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2020.3025438},
  doi          = {10.1109/TIFS.2020.3025438},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/TangLBLH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuangLTLH21,
  author       = {Peiyu Zhuang and
                  Haodong Li and
                  Shunquan Tan and
                  Bin Li and
                  Jiwu Huang},
  title        = {Image Tampering Localization Using a Dense Fully Convolutional Network},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {2986--2999},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2021.3070444},
  doi          = {10.1109/TIFS.2021.3070444},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuangLTLH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MoTLH21,
  author       = {Xianbo Mo and
                  Shunquan Tan and
                  Bin Li and
                  Jiwu Huang},
  title        = {MCTSteg: {A} Monte Carlo Tree Search-Based Reinforcement Learning
                  Framework for Universal Non-Additive Steganography},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {4306--4320},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2021.3104140},
  doi          = {10.1109/TIFS.2021.3104140},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MoTLH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/QinTT0H21,
  author       = {Xinghong Qin and
                  Shunquan Tan and
                  Weixuan Tang and
                  Bin Li and
                  Jiwu Huang},
  title        = {Image Steganography Based on Iterative Adversarial Perturbations Onto
                  a Synchronized-Directions Sub-Image},
  booktitle    = {{IEEE} International Conference on Acoustics, Speech and Signal Processing,
                  {ICASSP} 2021, Toronto, ON, Canada, June 6-11, 2021},
  pages        = {2705--2709},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICASSP39728.2021.9414055},
  doi          = {10.1109/ICASSP39728.2021.9414055},
  timestamp    = {Thu, 08 Jul 2021 17:12:48 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/QinTT0H21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icig/HuangTL21,
  author       = {Dequ Huang and
                  Weixuan Tang and
                  Bin Li},
  editor       = {Yuxin Peng and
                  Shi{-}Min Hu and
                  Moncef Gabbouj and
                  Kun Zhou and
                  Michael Elad and
                  Kun Xu},
  title        = {Anti-forensics for Double {JPEG} Compression Based on Generative Adversarial
                  Network},
  booktitle    = {Image and Graphics - 11th International Conference, {ICIG} 2021, Haikou,
                  China, August 6-8, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12888},
  pages        = {759--771},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-87355-4\_63},
  doi          = {10.1007/978-3-030-87355-4\_63},
  timestamp    = {Wed, 16 Mar 2022 23:55:43 +0100},
  biburl       = {https://dblp.org/rec/conf/icig/HuangTL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prcv/ZhuQGL21,
  author       = {Ye Zhu and
                  Na Qi and
                  Yingchun Guo and
                  Bin Li},
  editor       = {Huimin Ma and
                  Liang Wang and
                  Changshui Zhang and
                  Fei Wu and
                  Tieniu Tan and
                  Yaonan Wang and
                  Jianhuang Lai and
                  Yao Zhao},
  title        = {SEINet: Semantic-Edge Interaction Network for Image Manipulation Localization},
  booktitle    = {Pattern Recognition and Computer Vision - 4th Chinese Conference,
                  {PRCV} 2021, Beijing, China, October 29 - November 1, 2021, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13020},
  pages        = {29--41},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88007-1\_3},
  doi          = {10.1007/978-3-030-88007-1\_3},
  timestamp    = {Tue, 20 Aug 2024 07:54:43 +0200},
  biburl       = {https://dblp.org/rec/conf/prcv/ZhuQGL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prcv/LiCZL21,
  author       = {Haodong Li and
                  Xiaoming Chen and
                  Peiyu Zhuang and
                  Bin Li},
  editor       = {Huimin Ma and
                  Liang Wang and
                  Changshui Zhang and
                  Fei Wu and
                  Tieniu Tan and
                  Yaonan Wang and
                  Jianhuang Lai and
                  Yao Zhao},
  title        = {Image Tampering Localization Using Unified Two-Stream Features Enhanced
                  with Channel and Spatial Attention},
  booktitle    = {Pattern Recognition and Computer Vision - 4th Chinese Conference,
                  {PRCV} 2021, Beijing, China, October 29 - November 1, 2021, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13020},
  pages        = {610--622},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88007-1\_50},
  doi          = {10.1007/978-3-030-88007-1\_50},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/prcv/LiCZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ih/2021,
  editor       = {Dirk Borghys and
                  Patrick Bas and
                  Luisa Verdoliva and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  Bin Li and
                  Jennifer Newman},
  title        = {IH{\&}MMSec '21: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Virtual Event, Belgium, June, 22-25, 2021},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3437880},
  doi          = {10.1145/3437880},
  isbn         = {978-1-4503-8295-3},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2101-05209,
  author       = {Xinghong Qin and
                  Shunquan Tan and
                  Bin Li and
                  Weixuan Tang and
                  Jiwu Huang},
  title        = {Image Steganography based on Iteratively Adversarial Samples of {A}
                  Synchronized-directions Sub-image},
  journal      = {CoRR},
  volume       = {abs/2101.05209},
  year         = {2021},
  url          = {https://arxiv.org/abs/2101.05209},
  eprinttype    = {arXiv},
  eprint       = {2101.05209},
  timestamp    = {Fri, 22 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2101-05209.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-13689,
  author       = {Xianbo Mo and
                  Shunquan Tan and
                  Bin Li and
                  Jiwu Huang},
  title        = {MCTSteg: {A} Monte Carlo Tree Search-based Reinforcement Learning
                  Framework for Universal Non-additive Steganography},
  journal      = {CoRR},
  volume       = {abs/2103.13689},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.13689},
  eprinttype    = {arXiv},
  eprint       = {2103.13689},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-13689.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-03867,
  author       = {Weixuan Tang and
                  Bin Li and
                  Mauro Barni and
                  Jin Li and
                  Jiwu Huang},
  title        = {Improving Cost Learning for {JPEG} Steganography by Exploiting {JPEG}
                  Domain Knowledge},
  journal      = {CoRR},
  volume       = {abs/2105.03867},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.03867},
  eprinttype    = {arXiv},
  eprint       = {2105.03867},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-03867.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-02434,
  author       = {Long Zhuo and
                  Shunquan Tan and
                  Bin Li and
                  Jiwu Huang},
  title        = {Self-Adversarial Training incorporating Forgery Attention for Image
                  Forgery Localization},
  journal      = {CoRR},
  volume       = {abs/2107.02434},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.02434},
  eprinttype    = {arXiv},
  eprint       = {2107.02434},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-02434.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-05948,
  author       = {Qinglin Li and
                  Bin Li and
                  Jonathan M. Garibaldi and
                  Guoping Qiu},
  title        = {On Designing Good Representation Learning Models},
  journal      = {CoRR},
  volume       = {abs/2107.05948},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.05948},
  eprinttype    = {arXiv},
  eprint       = {2107.05948},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-05948.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/LiLTH20,
  author       = {Haodong Li and
                  Bin Li and
                  Shunquan Tan and
                  Jiwu Huang},
  title        = {Identification of deep network generated images using disparities
                  in color components},
  journal      = {Signal Process.},
  volume       = {174},
  pages        = {107616},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.sigpro.2020.107616},
  doi          = {10.1016/J.SIGPRO.2020.107616},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigpro/LiLTH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spic/ShiTLB20,
  author       = {Xiaoyu Shi and
                  Benedetta Tondi and
                  Bin Li and
                  Mauro Barni},
  title        = {CNN-based steganalysis and parametric adversarial embedding: {A} game-theoretic
                  framework},
  journal      = {Signal Process. Image Commun.},
  volume       = {89},
  pages        = {115992},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.image.2020.115992},
  doi          = {10.1016/J.IMAGE.2020.115992},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/spic/ShiTLB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/LiaoYLLQ20,
  author       = {Xin Liao and
                  Yingbo Yu and
                  Bin Li and
                  Zhongpeng Li and
                  Zheng Qin},
  title        = {A New Payload Partition Strategy in Color Image Steganography},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {30},
  number       = {3},
  pages        = {685--696},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCSVT.2019.2896270},
  doi          = {10.1109/TCSVT.2019.2896270},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/LiaoYLLQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/HeLLWL20,
  author       = {Peisong He and
                  Haoliang Li and
                  Bin Li and
                  Hongxia Wang and
                  Liang Liu},
  title        = {Exposing Fake Bitrate Videos Using Hybrid Deep-Learning Network From
                  Recompression Error},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {30},
  number       = {11},
  pages        = {4034--4049},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCSVT.2019.2951630},
  doi          = {10.1109/TCSVT.2019.2951630},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcsv/HeLLWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JiangXS0H20,
  author       = {Xinghao Jiang and
                  Qiang Xu and
                  Tanfeng Sun and
                  Bin Li and
                  Peisong He},
  title        = {Detection of {HEVC} Double Compression With the Same Coding Parameters
                  Based on Analysis of Intra Coding Quality Degradation Process},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {250--263},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2918085},
  doi          = {10.1109/TIFS.2019.2918085},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/JiangXS0H20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuangLBH20,
  author       = {Yuankun Huang and
                  Bin Li and
                  Mauro Barni and
                  Jiwu Huang},
  title        = {Identification of VoIP Speech With Multiple Domain Deep Features},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2253--2267},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2960635},
  doi          = {10.1109/TIFS.2019.2960635},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HuangLBH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-00468,
  author       = {Benedetta Tondi and
                  Andrea Costanzo and
                  Dequ Huang and
                  Bin Li},
  title        = {Boosting CNN-based primary quantization matrix estimation of double
                  {JPEG} images via a classification-like architecture},
  journal      = {CoRR},
  volume       = {abs/2012.00468},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.00468},
  eprinttype    = {arXiv},
  eprint       = {2012.00468},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-00468.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/QinLTZ19,
  author       = {Xinghong Qin and
                  Bin Li and
                  Shunquan Tan and
                  Jishen Zeng},
  title        = {A Novel Steganography for Spatial Color Images Based on Pixel Vector
                  Cost},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {8834--8846},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2891316},
  doi          = {10.1109/ACCESS.2019.2891316},
  timestamp    = {Wed, 13 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/QinLTZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LiZLT19,
  author       = {Bin Li and
                  Haoxin Zhang and
                  Hu Luo and
                  Shunquan Tan},
  title        = {Detecting double {JPEG} compression and its related anti-forensic
                  operations with {CNN}},
  journal      = {Multim. Tools Appl.},
  volume       = {78},
  number       = {7},
  pages        = {8577--8601},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11042-018-7073-3},
  doi          = {10.1007/S11042-018-7073-3},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/LiZLT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TangLTBH19,
  author       = {Weixuan Tang and
                  Bin Li and
                  Shunquan Tan and
                  Mauro Barni and
                  Jiwu Huang},
  title        = {CNN-Based Adversarial Embedding for Image Steganography},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {14},
  number       = {8},
  pages        = {2074--2087},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIFS.2019.2891237},
  doi          = {10.1109/TIFS.2019.2891237},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TangLTBH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZengTLLH19,
  author       = {Jishen Zeng and
                  Shunquan Tan and
                  Guangqing Liu and
                  Bin Li and
                  Jiwu Huang},
  title        = {WISERNet: Wider Separate-Then-Reunion Network for Steganalysis of
                  Color Images},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {14},
  number       = {10},
  pages        = {2735--2748},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIFS.2019.2904413},
  doi          = {10.1109/TIFS.2019.2904413},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZengTLLH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsipa/LiSTZL19,
  author       = {Qiushi Li and
                  Zilong Shao and
                  Shunquan Tan and
                  Jishen Zeng and
                  Bin Li},
  title        = {Non-structured Pruning for Deep-learning based Steganalytic Frameworks},
  booktitle    = {2019 Asia-Pacific Signal and Information Processing Association Annual
                  Summit and Conference, {APSIPA} {ASC} 2019, Lanzhou, China, November
                  18-21, 2019},
  pages        = {1735--1739},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/APSIPAASC47483.2019.9023018},
  doi          = {10.1109/APSIPAASC47483.2019.9023018},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/apsipa/LiSTZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/QinLH19,
  author       = {Xinghong Qin and
                  Bin Li and
                  Jiwu Huang},
  title        = {A New Spatial Steganographic Scheme by Modeling Image Residuals with
                  Multivariate Gaussian Model},
  booktitle    = {{IEEE} International Conference on Acoustics, Speech and Signal Processing,
                  {ICASSP} 2019, Brighton, United Kingdom, May 12-17, 2019},
  pages        = {2617--2621},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICASSP.2019.8682688},
  doi          = {10.1109/ICASSP.2019.8682688},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/QinLH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/BarniHLT19,
  author       = {Mauro Barni and
                  Dequ Huang and
                  Bin Li and
                  Benedetta Tondi},
  title        = {Adversarial {CNN} Training Under {JPEG} Laundering Attacks: a Game-Theoretic
                  Approach},
  booktitle    = {{IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2019, Delft, The Netherlands, December 9-12, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WIFS47025.2019.9035110},
  doi          = {10.1109/WIFS47025.2019.9035110},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/BarniHLT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-00697,
  author       = {Xiaoyu Shi and
                  Benedetta Tondi and
                  Bin Li and
                  Mauro Barni},
  title        = {CNN-based Steganalysis and Parametric Adversarial Embedding: a Game-Theoretic
                  Framework},
  journal      = {CoRR},
  volume       = {abs/1906.00697},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.00697},
  eprinttype    = {arXiv},
  eprint       = {1906.00697},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-00697.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-04657,
  author       = {Shunquan Tan and
                  Weilong Wu and
                  Zilong Shao and
                  Qiushi Li and
                  Bin Li and
                  Jiwu Huang},
  title        = {{CALPA-NET:} Channel-pruning-assisted Deep Residual Network for Steganalysis
                  of Digital Images},
  journal      = {CoRR},
  volume       = {abs/1911.04657},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.04657},
  eprinttype    = {arXiv},
  eprint       = {1911.04657},
  timestamp    = {Tue, 07 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-04657.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HuWJZL18,
  author       = {Donghui Hu and
                  Liang Wang and
                  Wenjie Jiang and
                  Shuli Zheng and
                  Bin Li},
  title        = {A Novel Image Steganography Method via Deep Convolutional Generative
                  Adversarial Networks},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {38303--38314},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2852771},
  doi          = {10.1109/ACCESS.2018.2852771},
  timestamp    = {Fri, 29 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HuWJZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spl/0011WFT18,
  author       = {Bin Li and
                  Weihang Wei and
                  Anselmo Ferreira and
                  Shunquan Tan},
  title        = {ReST-Net: Diverse Activation Modules and Parallel Subnets-Based {CNN}
                  for Spatial Image Steganalysis},
  journal      = {{IEEE} Signal Process. Lett.},
  volume       = {25},
  number       = {5},
  pages        = {650--654},
  year         = {2018},
  url          = {https://doi.org/10.1109/LSP.2018.2816569},
  doi          = {10.1109/LSP.2018.2816569},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spl/0011WFT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spl/HuXMZL18,
  author       = {Donghui Hu and
                  Haiyan Xu and
                  Zhongjin Ma and
                  Shuli Zheng and
                  Bin Li},
  title        = {A Spatial Image Steganography Method Based on Nonnegative Matrix Factorization},
  journal      = {{IEEE} Signal Process. Lett.},
  volume       = {25},
  number       = {9},
  pages        = {1364--1368},
  year         = {2018},
  url          = {https://doi.org/10.1109/LSP.2018.2856630},
  doi          = {10.1109/LSP.2018.2856630},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/spl/HuXMZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZengTLH18,
  author       = {Jishen Zeng and
                  Shunquan Tan and
                  Bin Li and
                  Jiwu Huang},
  title        = {Large-Scale {JPEG} Image Steganalysis Using Hybrid Deep-Learning Framework},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {5},
  pages        = {1200--1214},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2779446},
  doi          = {10.1109/TIFS.2017.2779446},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZengTLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiLZTZ18,
  author       = {Bin Li and
                  Zhongpeng Li and
                  Shijun Zhou and
                  Shunquan Tan and
                  Xiaoling Zhang},
  title        = {New Steganalytic Features for Spatial Image Steganography Based on
                  Derivative Filters and Threshold {LBP} Operator},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {5},
  pages        = {1242--1257},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2780805},
  doi          = {10.1109/TIFS.2017.2780805},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiLZTZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsipa/XuJSHWL18,
  author       = {Qiang Xu and
                  Xinghao Jiang and
                  Tanfeng Sun and
                  Peisong He and
                  Shilin Wang and
                  Bin Li},
  title        = {Relocated I-Frames Detection in {H.264} Double Compressed Videos Based
                  on Genetic-CNN},
  booktitle    = {Asia-Pacific Signal and Information Processing Association Annual
                  Summit and Conference, {APSIPA} {ASC} 2018, Honolulu, HI, USA, November
                  12-15, 2018},
  pages        = {710--716},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.23919/APSIPA.2018.8659519},
  doi          = {10.23919/APSIPA.2018.8659519},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/apsipa/XuJSHWL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsipa/PengSJXLS18,
  author       = {Peng Peng and
                  Tanfeng Sun and
                  Xinghao Jiang and
                  Ke Xu and
                  Bin Li and
                  Yunqing Shi},
  title        = {Detection of Double {JPEG} Compression with the Same Quantization
                  Matrix Based on Convolutional Neural Networks},
  booktitle    = {Asia-Pacific Signal and Information Processing Association Annual
                  Summit and Conference, {APSIPA} {ASC} 2018, Honolulu, HI, USA, November
                  12-15, 2018},
  pages        = {717--721},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.23919/APSIPA.2018.8659763},
  doi          = {10.23919/APSIPA.2018.8659763},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/apsipa/PengSJXLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsipa/LiCLT18,
  author       = {Haodong Li and
                  Han Chen and
                  Bin Li and
                  Shunquan Tan},
  title        = {Can Forensic Detectors Identify {GAN} Generated Images?},
  booktitle    = {Asia-Pacific Signal and Information Processing Association Annual
                  Summit and Conference, {APSIPA} {ASC} 2018, Honolulu, HI, USA, November
                  12-15, 2018},
  pages        = {722--727},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.23919/APSIPA.2018.8659461},
  doi          = {10.23919/APSIPA.2018.8659461},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apsipa/LiCLT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsipa/ZhuoTZL18,
  author       = {Long Zhuo and
                  Shunquan Tan and
                  Jishen Zeng and
                  Bin Li},
  title        = {Fake Colorized Image Detection with Channel-wise Convolution based
                  Deep-learning Framework},
  booktitle    = {Asia-Pacific Signal and Information Processing Association Annual
                  Summit and Conference, {APSIPA} {ASC} 2018, Honolulu, HI, USA, November
                  12-15, 2018},
  pages        = {733--736},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.23919/APSIPA.2018.8659761},
  doi          = {10.23919/APSIPA.2018.8659761},
  timestamp    = {Wed, 03 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/apsipa/ZhuoTZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ZhangLT18,
  author       = {Hongrun Zhang and
                  Bin Li and
                  Shunquan Tan},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {A New Steganographic Distortion Function with Explicit Considerations
                  of Modification Interactions},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11064},
  pages        = {460--471},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00009-7\_42},
  doi          = {10.1007/978-3-030-00009-7\_42},
  timestamp    = {Wed, 03 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/ZhangLT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/ZhouTTL18,
  author       = {Shijun Zhou and
                  Weixuan Tang and
                  Shunquan Tan and
                  Bin Li},
  editor       = {Chang D. Yoo and
                  Yun Qing Shi and
                  Hyoung{-}Joong Kim and
                  Alessandro Piva and
                  Gwangsu Kim},
  title        = {Content-Adaptive Steganalysis via Augmented Utilization of Selection-Channel
                  Information},
  booktitle    = {Digital Forensics and Watermarking - 17th International Workshop,
                  {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11378},
  pages        = {261--274},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11389-6\_20},
  doi          = {10.1007/978-3-030-11389-6\_20},
  timestamp    = {Thu, 28 May 2020 12:51:40 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/ZhouTTL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/HuangTLH18,
  author       = {Yuankun Huang and
                  Shunquan Tan and
                  Bin Li and
                  Jiwu Huang},
  editor       = {Chang D. Yoo and
                  Yun Qing Shi and
                  Hyoung{-}Joong Kim and
                  Alessandro Piva and
                  Gwangsu Kim},
  title        = {{VPCID} - {A} VoIP Phone Call Identification Database},
  booktitle    = {Digital Forensics and Watermarking - 17th International Workshop,
                  {IWDW} 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11378},
  pages        = {307--321},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11389-6\_23},
  doi          = {10.1007/978-3-030-11389-6\_23},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/HuangTLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FerreiraCLH18,
  author       = {Anselmo Ferreira and
                  Han Chen and
                  Bin Li and
                  Jiwu Huang},
  title        = {An Inception-Based Data-Driven Ensemble Approach to Camera Model Identification},
  booktitle    = {2018 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2018, Hong Kong, China, December 11-13, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WIFS.2018.8630774},
  doi          = {10.1109/WIFS.2018.8630774},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/FerreiraCLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1803-04805,
  author       = {Jishen Zeng and
                  Shunquan Tan and
                  Guangqing Liu and
                  Bin Li and
                  Jiwu Huang},
  title        = {WISERNet: Wider Separate-then-reunion Network for Steganalysis of
                  Color Images},
  journal      = {CoRR},
  volume       = {abs/1803.04805},
  year         = {2018},
  url          = {http://arxiv.org/abs/1803.04805},
  eprinttype    = {arXiv},
  eprint       = {1803.04805},
  timestamp    = {Wed, 03 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1803-04805.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1803-09043,
  author       = {Weixuan Tang and
                  Bin Li and
                  Shunquan Tan and
                  Mauro Barni and
                  Jiwu Huang},
  title        = {{CNN} Based Adversarial Embedding with Minimum Alteration for Image
                  Steganography},
  journal      = {CoRR},
  volume       = {abs/1803.09043},
  year         = {2018},
  url          = {http://arxiv.org/abs/1803.09043},
  eprinttype    = {arXiv},
  eprint       = {1803.09043},
  timestamp    = {Thu, 06 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1803-09043.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-07276,
  author       = {Haodong Li and
                  Bin Li and
                  Shunquan Tan and
                  Jiwu Huang},
  title        = {Detection of Deep Network Generated Images Using Disparities in Color
                  Components},
  journal      = {CoRR},
  volume       = {abs/1808.07276},
  year         = {2018},
  url          = {http://arxiv.org/abs/1808.07276},
  eprinttype    = {arXiv},
  eprint       = {1808.07276},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1808-07276.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/HeJSWLD17,
  author       = {Peisong He and
                  Xinghao Jiang and
                  Tanfeng Sun and
                  Shilin Wang and
                  Bin Li and
                  Yi Dong},
  title        = {Frame-wise detection of relocated I-frames in double compressed {H.264}
                  videos based on convolutional neural network},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {48},
  pages        = {149--158},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jvcir.2017.06.010},
  doi          = {10.1016/J.JVCIR.2017.06.010},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jvcir/HeJSWLD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spic/XueYLLL17,
  author       = {Fei Xue and
                  Ziyi Ye and
                  Wei Lu and
                  Hongmei Liu and
                  Bin Li},
  title        = {{MSE} period based estimation of first quantization step in double
                  compressed {JPEG} images},
  journal      = {Signal Process. Image Commun.},
  volume       = {57},
  pages        = {76--83},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.image.2017.05.008},
  doi          = {10.1016/J.IMAGE.2017.05.008},
  timestamp    = {Wed, 30 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spic/XueYLLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spl/TangTLH17,
  author       = {Weixuan Tang and
                  Shunquan Tan and
                  Bin Li and
                  Jiwu Huang},
  title        = {Automatic Steganographic Distortion Learning Using a Generative Adversarial
                  Network},
  journal      = {{IEEE} Signal Process. Lett.},
  volume       = {24},
  number       = {10},
  pages        = {1547--1551},
  year         = {2017},
  url          = {https://doi.org/10.1109/LSP.2017.2745572},
  doi          = {10.1109/LSP.2017.2745572},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/spl/TangTLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LuoYLH17,
  author       = {Da Luo and
                  Rui Yang and
                  Bin Li and
                  Jiwu Huang},
  title        = {Detection of Double Compressed {AMR} Audio Using Stacked Autoencoder},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {2},
  pages        = {432--444},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2622012},
  doi          = {10.1109/TIFS.2016.2622012},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LuoYLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/TanZLH17,
  author       = {Shunquan Tan and
                  Haojie Zhang and
                  Bin Li and
                  Jiwu Huang},
  title        = {Pixel-Decimation-Assisted Steganalysis of Synchronize-Embedding-Changes
                  Steganography},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {7},
  pages        = {1658--1670},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2682703},
  doi          = {10.1109/TIFS.2017.2682703},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/TanZLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mediaforensics/ZengTLH17,
  author       = {Jishen Zeng and
                  Shunquan Tan and
                  Bin Li and
                  Jiwu Huang},
  editor       = {Adnan M. Alattar and
                  Nasir D. Memon},
  title        = {Pre-training via fitting deep neural network to rich-model features
                  extraction procedure and its effect on deep learning for steganalysis},
  booktitle    = {Media Watermarking, Security, and Forensics 2017, Burlingame, CA,
                  USA, 29 January 2017 - 2 February 2017},
  pages        = {44--49},
  publisher    = {Society for Imaging Science and Technology},
  year         = {2017},
  url          = {https://doi.org/10.2352/ISSN.2470-1173.2017.7.MWSF-324},
  doi          = {10.2352/ISSN.2470-1173.2017.7.MWSF-324},
  timestamp    = {Mon, 17 Jul 2023 16:29:17 +0200},
  biburl       = {https://dblp.org/rec/conf/mediaforensics/ZengTLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1710-05477,
  author       = {Bin Li and
                  Hu Luo and
                  Haoxin Zhang and
                  Shunquan Tan and
                  Zhongzhou Ji},
  title        = {A multi-branch convolutional neural network for detecting double {JPEG}
                  compression},
  journal      = {CoRR},
  volume       = {abs/1710.05477},
  year         = {2017},
  url          = {http://arxiv.org/abs/1710.05477},
  eprinttype    = {arXiv},
  eprint       = {1710.05477},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1710-05477.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spl/TangLLH16,
  author       = {Weixuan Tang and
                  Bin Li and
                  Weiqi Luo and
                  Jiwu Huang},
  title        = {Clustering Steganographic Modification Directions for Color Components},
  journal      = {{IEEE} Signal Process. Lett.},
  volume       = {23},
  number       = {2},
  pages        = {197--201},
  year         = {2016},
  url          = {https://doi.org/10.1109/LSP.2015.2504583},
  doi          = {10.1109/LSP.2015.2504583},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spl/TangLLH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/ChenTLH16,
  author       = {Shengda Chen and
                  Shunquan Tan and
                  Bin Li and
                  Jiwu Huang},
  title        = {Automatic Detection of Object-Based Forgery in Advanced Video},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {26},
  number       = {11},
  pages        = {2138--2151},
  year         = {2016},
  url          = {https://doi.org/10.1109/TCSVT.2015.2473436},
  doi          = {10.1109/TCSVT.2015.2473436},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/ChenTLH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ZengTLH16,
  author       = {Jishen Zeng and
                  Shunquan Tan and
                  Bin Li and
                  Jiwu Huang},
  title        = {Large-scale {JPEG} steganalysis using hybrid deep-learning framework},
  journal      = {CoRR},
  volume       = {abs/1611.03233},
  year         = {2016},
  url          = {http://arxiv.org/abs/1611.03233},
  eprinttype    = {arXiv},
  eprint       = {1611.03233},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ZengTLH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiNLTH15,
  author       = {Bin Li and
                  Tian{-}Tsong Ng and
                  Xiaolong Li and
                  Shunquan Tan and
                  Jiwu Huang},
  title        = {Revealing the Trace of High-Quality {JPEG} Compression Through Quantization
                  Noise Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {3},
  pages        = {558--573},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2389148},
  doi          = {10.1109/TIFS.2015.2389148},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiNLTH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiWLTH15,
  author       = {Bin Li and
                  Ming Wang and
                  Xiaolong Li and
                  Shunquan Tan and
                  Jiwu Huang},
  title        = {A Strategy of Clustering Modification Directions in Spatial Image
                  Steganography},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {9},
  pages        = {1905--1917},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2434600},
  doi          = {10.1109/TIFS.2015.2434600},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiWLTH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tip/LiNLTH15,
  author       = {Bin Li and
                  Tian{-}Tsong Ng and
                  Xiaolong Li and
                  Shunquan Tan and
                  Jiwu Huang},
  title        = {Statistical Model of {JPEG} Noises and Its Application in Quantization
                  Step Estimation},
  journal      = {{IEEE} Trans. Image Process.},
  volume       = {24},
  number       = {5},
  pages        = {1471--1484},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIP.2015.2405477},
  doi          = {10.1109/TIP.2015.2405477},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tip/LiNLTH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsipa/TanCL15,
  author       = {Shunquan Tan and
                  Shengda Chen and
                  Bin Li},
  title        = {{GOP} based automatic detection of object-based forgery in advanced
                  video},
  booktitle    = {Asia-Pacific Signal and Information Processing Association Annual
                  Summit and Conference, {APSIPA} 2015, Hong Kong, December 16-19, 2015},
  pages        = {719--722},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/APSIPA.2015.7415366},
  doi          = {10.1109/APSIPA.2015.7415366},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/apsipa/TanCL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsipa/YangLLG15,
  author       = {Guangyuan Yang and
                  Xiaolong Li and
                  Bin Li and
                  Zongming Guo},
  title        = {A new detector of {LSB} matching steganography based on likelihood
                  ratio test for multivariate Gaussian covers},
  booktitle    = {Asia-Pacific Signal and Information Processing Association Annual
                  Summit and Conference, {APSIPA} 2015, Hong Kong, December 16-19, 2015},
  pages        = {757--760},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/APSIPA.2015.7415374},
  doi          = {10.1109/APSIPA.2015.7415374},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apsipa/YangLLG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chinasip/XueLLG15,
  author       = {Bowen Xue and
                  Xiaolong Li and
                  Bin Li and
                  Zongming Guo},
  title        = {Steganalysis of {LSB} replacement for multivariate Gaussian covers},
  booktitle    = {{IEEE} China Summit and International Conference on Signal and Information
                  Processing, ChinaSIP 2015, Chengdu, China, July 12-15, 2015},
  pages        = {836--840},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ChinaSIP.2015.7230522},
  doi          = {10.1109/CHINASIP.2015.7230522},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/chinasip/XueLLG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiTWH14,
  author       = {Bin Li and
                  Shunquan Tan and
                  Ming Wang and
                  Jiwu Huang},
  title        = {Investigation on Cost Assignment in Spatial Image Steganography},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {9},
  number       = {8},
  pages        = {1264--1277},
  year         = {2014},
  url          = {https://doi.org/10.1109/TIFS.2014.2326954},
  doi          = {10.1109/TIFS.2014.2326954},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiTWH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsipa/TanL14,
  author       = {Shunquan Tan and
                  Bin Li},
  title        = {Stacked convolutional auto-encoders for steganalysis of digital images},
  booktitle    = {Asia-Pacific Signal and Information Processing Association Annual
                  Summit and Conference, {APSIPA} 2014, Chiang Mai, Thailand, December
                  9-12, 2014},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/APSIPA.2014.7041565},
  doi          = {10.1109/APSIPA.2014.7041565},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/apsipa/TanL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/LiWHL14,
  author       = {Bin Li and
                  Ming Wang and
                  Jiwu Huang and
                  Xiaolong Li},
  title        = {A new cost function for spatial image steganography},
  booktitle    = {2014 {IEEE} International Conference on Image Processing, {ICIP} 2014,
                  Paris, France, October 27-30, 2014},
  pages        = {4206--4210},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICIP.2014.7025854},
  doi          = {10.1109/ICIP.2014.7025854},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icip/LiWHL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LiNLTH14,
  author       = {Bin Li and
                  Tian{-}Tsong Ng and
                  Xiaolong Li and
                  Shunquan Tan and
                  Jiwu Huang},
  title        = {{JPEG} Noises beyond the First Compression Cycle},
  journal      = {CoRR},
  volume       = {abs/1405.7571},
  year         = {2014},
  url          = {http://arxiv.org/abs/1405.7571},
  eprinttype    = {arXiv},
  eprint       = {1405.7571},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/LiNLTH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/LiLLY13,
  author       = {Xiaolong Li and
                  Jian Li and
                  Bin Li and
                  Bin Yang},
  title        = {High-fidelity reversible data hiding scheme based on pixel-value-ordering
                  and prediction-error expansion},
  journal      = {Signal Process.},
  volume       = {93},
  number       = {1},
  pages        = {198--205},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.sigpro.2012.07.025},
  doi          = {10.1016/J.SIGPRO.2012.07.025},
  timestamp    = {Sat, 27 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigpro/LiLLY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/LiLLYZ13,
  author       = {Xiaolong Li and
                  Bin Li and
                  Xiangyang Luo and
                  Bin Yang and
                  Ruihui Zhu},
  title        = {Steganalysis of a PVD-based content adaptive image steganography},
  journal      = {Signal Process.},
  volume       = {93},
  number       = {9},
  pages        = {2529--2538},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.sigpro.2013.03.029},
  doi          = {10.1016/J.SIGPRO.2013.03.029},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigpro/LiLLYZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tip/LiLYZ13,
  author       = {Xiaolong Li and
                  Bin Li and
                  Bin Yang and
                  Tieyong Zeng},
  title        = {General Framework to Histogram-Shifting-Based Reversible Data Hiding},
  journal      = {{IEEE} Trans. Image Process.},
  volume       = {22},
  number       = {6},
  pages        = {2181--2191},
  year         = {2013},
  url          = {https://doi.org/10.1109/TIP.2013.2246179},
  doi          = {10.1109/TIP.2013.2246179},
  timestamp    = {Sun, 10 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tip/LiLYZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spl/TanL12,
  author       = {Shunquan Tan and
                  Bin Li},
  title        = {Targeted Steganalysis of Edge Adaptive Image Steganography Based on
                  {LSB} Matching Revisited Using B-Spline Fitting},
  journal      = {{IEEE} Signal Process. Lett.},
  volume       = {19},
  number       = {6},
  pages        = {336--339},
  year         = {2012},
  url          = {https://doi.org/10.1109/LSP.2012.2194702},
  doi          = {10.1109/LSP.2012.2194702},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/spl/TanL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/TanL12,
  author       = {Shunquan Tan and
                  Bin Li},
  title        = {Targeted steganalysis of adaptive pixel-value differencing steganography},
  booktitle    = {19th {IEEE} International Conference on Image Processing, {ICIP} 2012,
                  Lake Buena Vista, Orlando, FL, USA, September 30 - October 3, 2012},
  pages        = {1129--1132},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICIP.2012.6467063},
  doi          = {10.1109/ICIP.2012.6467063},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icip/TanL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jihmsp/0011HH011,
  author       = {Bin Li and
                  Junhui He and
                  Jiwu Huang and
                  Yun Qing Shi},
  title        = {A Survey on Image Steganography and Steganalysis},
  journal      = {J. Inf. Hiding Multim. Signal Process.},
  volume       = {2},
  number       = {2},
  pages        = {142--172},
  year         = {2011},
  url          = {http://bit.kuas.edu.tw/\%7Ejihmsp/2011/vol2/JIH-MSP-2011-03-005.pdf},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jihmsp/0011HH011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/sci/HuangLSHX10,
  author       = {Fangjun Huang and
                  Bin Li and
                  Yun{-}Qing Shi and
                  Jiwu Huang and
                  Guorong Xuan},
  editor       = {Husrev T. Sencar and
                  Sergio A. Velastin and
                  Nikolaos Nikolaidis and
                  Shiguo Lian},
  title        = {Image Steganalysis},
  booktitle    = {Intelligent Multimedia Analysis for Security Applications},
  series       = {Studies in Computational Intelligence},
  volume       = {282},
  pages        = {275--303},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11756-5\_13},
  doi          = {10.1007/978-3-642-11756-5\_13},
  timestamp    = {Tue, 24 Nov 2020 16:44:23 +0100},
  biburl       = {https://dblp.org/rec/series/sci/HuangLSHX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiHS09,
  author       = {Bin Li and
                  Jiwu Huang and
                  Yun{-}Qing Shi},
  title        = {Steganalysis of {YASS}},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {4},
  number       = {3},
  pages        = {369--382},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIFS.2009.2025841},
  doi          = {10.1109/TIFS.2009.2025841},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiHS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spl/LiFH08,
  author       = {Bin Li and
                  Yanmei Fang and
                  Jiwu Huang},
  title        = {Steganalysis of Multiple-Base Notational System Steganography},
  journal      = {{IEEE} Signal Process. Lett.},
  volume       = {15},
  pages        = {493--496},
  year         = {2008},
  url          = {https://doi.org/10.1109/LSP.2008.924000},
  doi          = {10.1109/LSP.2008.924000},
  timestamp    = {Fri, 23 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/spl/LiFH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/HuangLH08,
  author       = {Fangjun Huang and
                  Bin Li and
                  Jiwu Huang},
  title        = {Universal {JPEG} steganalysis based on microscopic and macroscopic
                  calibration},
  booktitle    = {Proceedings of the International Conference on Image Processing, {ICIP}
                  2008, October 12-15, 2008, San Diego, California, {USA}},
  pages        = {2068--2071},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICIP.2008.4712193},
  doi          = {10.1109/ICIP.2008.4712193},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icip/HuangLH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/LiSH08,
  author       = {Bin Li and
                  Yun Q. Shi and
                  Jiwu Huang},
  editor       = {Andrew D. Ker and
                  Jana Dittmann and
                  Jessica J. Fridrich},
  title        = {Steganalysis of {YASS}},
  booktitle    = {Proceedings of the 10th workshop on Multimedia {\&} Security,
                  MM{\&}Sec 2008, Oxford, UK, September 22-23, 2008},
  pages        = {139--148},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1411328.1411354},
  doi          = {10.1145/1411328.1411354},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsec/LiSH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsp/LiSH08,
  author       = {Bin Li and
                  Yun Q. Shi and
                  Jiwu Huang},
  title        = {Detecting doubly compressed {JPEG} images by using Mode Based First
                  Digit Features},
  booktitle    = {International Workshop on Multimedia Signal Processing, {MMSP} 2008,
                  October 8-10, 2008, Shangri-la Hotel, Cairns, Queensland, Australia},
  pages        = {730--735},
  publisher    = {{IEEE} Signal Processing Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/MMSP.2008.4665171},
  doi          = {10.1109/MMSP.2008.4665171},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsp/LiSH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sswmc/LiHS08,
  author       = {Bin Li and
                  Jiwu Huang and
                  Yun Q. Shi},
  editor       = {Edward J. Delp III and
                  Ping Wah Wong and
                  Jana Dittmann and
                  Nasir D. Memon},
  title        = {Textural features based universal steganalysis},
  booktitle    = {Security, Forensics, Steganography, and Watermarking of Multimedia
                  Contents X, San Jose, CA, USA, January 27, 2008},
  series       = {{SPIE} Proceedings},
  volume       = {6819},
  pages        = {681912},
  publisher    = {{SPIE}},
  year         = {2008},
  url          = {https://doi.org/10.1117/12.765817},
  doi          = {10.1117/12.765817},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sswmc/LiHS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/HuangLH07,
  author       = {Fangjun Huang and
                  Bin Li and
                  Jiwu Huang},
  title        = {Attack {LSB} Matching Steganography by Counting Alteration Rate of
                  the Number of Neighbourhood Gray Levels},
  booktitle    = {Proceedings of the International Conference on Image Processing, {ICIP}
                  2007, September 16-19, 2007, San Antonio, Texas, {USA}},
  pages        = {401--404},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICIP.2007.4378976},
  doi          = {10.1109/ICIP.2007.4378976},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icip/HuangLH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/LiHH07,
  author       = {Bin Li and
                  Fangjun Huang and
                  Jiwu Huang},
  title        = {Steganalysis of {LSB} Greedy Embedding Algorithm for {JPEG} Images
                  using Coefficient Symmetry},
  booktitle    = {Proceedings of the International Conference on Image Processing, {ICIP}
                  2007, September 16-19, 2007, San Antonio, Texas, {USA}},
  pages        = {413--416},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICIP.2007.4378979},
  doi          = {10.1109/ICIP.2007.4378979},
  timestamp    = {Fri, 23 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icip/LiHH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/LiHTHS07,
  author       = {Bin Li and
                  Fangjun Huang and
                  Shunquan Tan and
                  Jiwu Huang and
                  Yun Q. Shi},
  editor       = {Yun Q. Shi and
                  Hyoung{-}Joong Kim and
                  Stefan Katzenbeisser},
  title        = {Effect of Different Coding Patterns on Compressed Frequency Domain
                  Based Universal {JPEG} Steganalysis},
  booktitle    = {Digital Watermarking, 6th International Workshop, {IWDW} 2007, Guangzhou,
                  China, December 3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5041},
  pages        = {143--157},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-92238-4\_12},
  doi          = {10.1007/978-3-540-92238-4\_12},
  timestamp    = {Thu, 28 May 2020 12:51:39 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/LiHTHS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}