The SCEAS System
| |||||||

## Search the dblp DataBase
Jiwu Huang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Xiaoyun Wu, Junquan Hu, Zhixiong Gu, Jiwu Huang
**A Secure Semi-Fragile Watermarking for Image Authentication Based on Integer Wavelet Transform with Parameters Abstract.**[Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2005, pp:75-80 [Conf] - Zewen Chen, Jiwu Huang, Daren Huang, Jianhong Zhang, Yumin Wang
**Provably Secure and ID-Based Group Signature Scheme.**[Citation Graph (0, 0)][DBLP] AINA (2), 2004, pp:384-388 [Conf] - Limin Gu, Yanmei Fang, Jiwu Huang
**Revaluation of Error Correcting Coding in Watermarking Channel.**[Citation Graph (0, 0)][DBLP] CANS, 2005, pp:274-287 [Conf] - Xiaoping Liang, Xiaoyun Wu, Jiwu Huang
**Reversible Data Hiding for Image Based on Histogram Modification of Wavelet Coefficients.**[Citation Graph (0, 0)][DBLP] CIS (2), 2005, pp:573-580 [Conf] - Hongmei Liu, Fenglian Shao, Jiwu Huang
**A MPEG-2 Video Watermarking Algorithm with Compensation in Bit Stream.**[Citation Graph (0, 0)][DBLP] DRMTICS, 2005, pp:123-134 [Conf] - Xiaoyun Wu, Xiaoping Liang, Hongmei Liu, Jiwu Huang, Guoping Qiu
**Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform.**[Citation Graph (0, 0)][DBLP] DRMTICS, 2005, pp:135-145 [Conf] - Jiwu Huang, Junquan Hu, Daren Huang, Yun Q. Shi
**Improve security of fragile watermarking via parameterized wavelet.**[Citation Graph (0, 0)][DBLP] ICIP, 2004, pp:721-724 [Conf] - Xiangui Kang, Jiwu Huang, Yun Q. Shi
**Improve robustness of image watermarking via adaptive receiving.**[Citation Graph (0, 0)][DBLP] ICIP, 2004, pp:2343-2346 [Conf] - Yanmei Fang, Ning Bi, Daren Huang, Jiwu Huang
**The M-band wavelets in image watermarking.**[Citation Graph (0, 0)][DBLP] ICIP (1), 2005, pp:245-248 [Conf] - Zewen Chen, Jilin Wang, Yumin Wang, Jiwu Huang, Daren Huang
**An Efficient Revocation Algorithm in Group Signatures.**[Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:339-351 [Conf] - Limin Gu, Jiwu Huang, Zewen Chen
**Analysis of the Bounds for Linear Block Codes in Watermark Channel.**[Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:294-304 [Conf] - Daren Huang, Jiufen Liu, Jiwu Huang, Hongmei Liu
**A Dwt-Based Image Watermarking Algorithm.**[Citation Graph (0, 0)][DBLP] ICME, 2001, pp:- [Conf] - Hong-mei Liu, Ji-wu Huang, Zi-mei Xiao
**An Adaptive Video Watermarking Algorithm.**[Citation Graph (0, 0)][DBLP] ICME, 2001, pp:- [Conf] - Weiqi Luo, Jiwu Huang, Guoping Qiu
**Robust Detection of Region-Duplication Forgery in Digital Image.**[Citation Graph (0, 0)][DBLP] ICPR (4), 2006, pp:746-749 [Conf] - Mai Yang, Guoping Qiu, Jiwu Huang, Dave Elliman
**Near-Duplicate Image Recognition and Content-based Image Retrieval using Adaptive Hierarchical Geometric Centroids.**[Citation Graph (0, 0)][DBLP] ICPR (2), 2006, pp:958-961 [Conf] - Yanmei Fang, Jiwu Huang, Yun Q. Shi
**Image watermarking algorithm applying CDMA.**[Citation Graph (0, 0)][DBLP] ISCAS (2), 2003, pp:948-951 [Conf] - Limin Gu, Jiwu Huang, Yun Q. Shi
**Analysis of the role played by error correcting coding in robust watermarking.**[Citation Graph (0, 0)][DBLP] ISCAS (3), 2003, pp:798-801 [Conf] - Hongmei Liu, Zhang Zhefeng, Jiwu Huang, Huang Xialing, Yun Q. Shi
**A high capacity distortion-free data hiding algorithm for palette image.**[Citation Graph (0, 0)][DBLP] ISCAS (2), 2003, pp:916-919 [Conf] - Yongjian Hu, Sam Kwong, Jiwu Huang
**Using invisible watermarks to protect visibly watermarked images.**[Citation Graph (0, 0)][DBLP] ISCAS (5), 2004, pp:584-587 [Conf] - Yun Q. Shi, Zhicheng Ni, Nirwan Ansari, Jiwu Huang
**2-D and 3-D successive packing interleaving techniques and their applications to image and video data hiding.**[Citation Graph (0, 0)][DBLP] ISCAS (2), 2003, pp:924-927 [Conf] - Shaoquan Wu, Jiwu Huang, Daren Huang, Yun Q. Shi
**Self-synchronized audio watermark in DWT domain.**[Citation Graph (0, 0)][DBLP] ISCAS (5), 2004, pp:712-715 [Conf] - Jiwu Huang, Yun Q. Shi
**Embedding gray level images.**[Citation Graph (0, 0)][DBLP] ISCAS (5), 2001, pp:239-242 [Conf] - Yanmei Fang, Jiwu Huang, Shaoquan Wu
**CDMA-based watermarking resisting to cropping.**[Citation Graph (0, 0)][DBLP] ISCAS (2), 2004, pp:25-28 [Conf] - Yanmei Fang, Limin Gu, Jiwu Huang
**Performance Analysis of CDMA-Based Watermarking with Quantization Scheme.**[Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:350-361 [Conf] - Jiangqun Ni, Rongyue Zhang, Jiwu Huang, Chuntao Wang
**A Robust Multi-bit Image Watermarking Algorithm Based on HMM in Wavelet Domain.**[Citation Graph (0, 0)][DBLP] IWDW, 2005, pp:110-123 [Conf] - Jiangqun Ni, Rongyue Zhang, Jiwu Huang, Chuntao Wang, Quanbo Li
**A Rotation-Invariant Secure Image Watermarking Algorithm Incorporating Steerable Pyramid Transform.**[Citation Graph (0, 0)][DBLP] IWDW, 2006, pp:446-460 [Conf] - Junhui He, Jiwu Huang, Guoping Qiu
**A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography.**[Citation Graph (0, 0)][DBLP] IWDW, 2005, pp:1-14 [Conf] - Junquan Hu, Jiwu Huang, Daren Huang, Yun Q. Shi
**A DWT-Based Fragile Watermarking Tolerant of JPEG Compression.**[Citation Graph (0, 0)][DBLP] IWDW, 2002, pp:179-188 [Conf] - Yongjian Hu, Jiwu Huang, Sam Kwong, Yiu-Keung Chan
**Image Fusion Based Visible Watermarking Using Dual-Tree Complex Wavelet Transform.**[Citation Graph (0, 0)][DBLP] IWDW, 2003, pp:86-100 [Conf] - Xiangui Kang, Jiwu Huang, Yun Q. Shi
**An Image Watermarking Algorithm Robust to Geometric Distortion.**[Citation Graph (0, 0)][DBLP] IWDW, 2002, pp:212-223 [Conf] - Xiangui Kang, Jiwu Huang, Yun Q. Shi, Jianxiang Zhu
**Robust Watermarking with Adaptive Receiving.**[Citation Graph (0, 0)][DBLP] IWDW, 2003, pp:396-407 [Conf] - Xiangui Kang, Yun Q. Shi, Jiwu Huang, Wenjun Zeng
**Multi-band Wavelet Based Digital Watermarking Using Principal Component Analysis.**[Citation Graph (0, 0)][DBLP] IWDW, 2005, pp:139-146 [Conf] - Shijun Xiang, Jiwu Huang, Rui Yang, Chuntao Wang, Hongmei Liu
**Robust Audio Watermarking Based on Low-Order Zernike Moments.**[Citation Graph (0, 0)][DBLP] IWDW, 2006, pp:226-240 [Conf] - Jiangqun Ni, Chuntao Wang, Jiwu Huang, Rongyue Zhang
**A RST-Invariant Robust DWT-HMM Watermarking Algorithm Incorporating Zernike Moments and Template.**[Citation Graph (0, 0)][DBLP] KES (1), 2005, pp:1233-1239 [Conf] - Xiaoyun Wu, Hongmei Liu, Jiwu Huang
**Semi-fragile Watermarking Based on Zernike Moments and Integer Wavelet Transform.**[Citation Graph (0, 0)][DBLP] KES (2), 2005, pp:1108-1114 [Conf] - Shijun Xiang, Jiwu Huang, Xiaoyun Feng
**Analysis of Quantization-Based Audio Watermarking in DA/AD Conversions.**[Citation Graph (0, 0)][DBLP] KES (2), 2005, pp:587-592 [Conf] - Hongmei Liu, Huiying Fu, Jiwu Huang
**A Watermarking Algorithm for JPEG File.**[Citation Graph (0, 0)][DBLP] PCM, 2006, pp:319-328 [Conf] - Hongmei Liu, Jiwu Huang, Yun Q. Shi
**Dwt-Based Video Data Hiding Robust To Mpeg Compression And Frame Loss.**[Citation Graph (0, 0)][DBLP] Int. J. Image Graphics, 2005, v:5, n:1, pp:111-134 [Journal] - Jiwu Huang, Yun Q. Shi
**Reliable information bit hiding.**[Citation Graph (0, 0)][DBLP] IEEE Trans. Circuits Syst. Video Techn., 2002, v:12, n:10, pp:916-0 [Journal] - Yongjian Hu, Sam Kwong, Jiwu Huang
**An algorithm for removable visible watermarking.**[Citation Graph (0, 0)][DBLP] IEEE Trans. Circuits Syst. Video Techn., 2006, v:16, n:1, pp:129-133 [Journal] - Xiangui Kang, Jiwu Huang, Yun Q. Shi, Yan Lin
**A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression.**[Citation Graph (0, 0)][DBLP] IEEE Trans. Circuits Syst. Video Techn., 2003, v:13, n:8, pp:776-786 [Journal] - Jiwu Huang, Yun Q. Shi, Yi Shi
**Embedding image watermarks in dc components.**[Citation Graph (0, 0)][DBLP] IEEE Trans. Circuits Syst. Video Techn., 2000, v:10, n:6, pp:974-979 [Journal] - Hongmei Liu, Ling Zhu, Jiwu Huang
**A Hybrid Watermarking Scheme for Video Authentication.**[Citation Graph (0, 0)][DBLP] ICIP, 2006, pp:2569-2572 [Conf] - Jiangqun Ni, Chuntao Wang, Jiwu Huang, Rongyue Zhang
**Performance Enhancement for DWT-HMM Image Watermarking with Content-Adaptive Approach.**[Citation Graph (0, 0)][DBLP] ICIP, 2006, pp:1377-1380 [Conf] - Shunquan Tan, Jiwu Huang, Zhihua Yang, Yun Q. Shi
**Steganalysis of JPEG2000 Lazy-Mode Steganography using the Hilbert-Huang Transform Based Sequential Analysis.**[Citation Graph (0, 0)][DBLP] ICIP, 2006, pp:101-104 [Conf] - Shijun Xiang, Jiwu Huang, Rui Yang
**Time-Scale Invariant Audio Watermarking Based on the Statistical Features in Time Domain.**[Citation Graph (0, 0)][DBLP] Information Hiding, 2006, pp:93-108 [Conf] - Shijun Xiang, Hyoung-Joong Kim, Jiwu Huang
**Histogram-based image hashing scheme robust against geometric deformations.**[Citation Graph (0, 0)][DBLP] MM&Sec, 2007, pp:121-128 [Conf] - Shijun Xiang, Jiwu Huang
**Robust Audio Watermarking Against the D/A and A/D conversions**[Citation Graph (0, 0)][DBLP] CoRR, 2007, v:0, n:, pp:- [Journal] - Ning Bi, Qiyu Sun, Daren Huang, Zhihua Yang, Jiwu Huang
**Robust Image Watermarking Based on Multiband Wavelets and Empirical Mode Decomposition.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Image Processing, 2007, v:16, n:8, pp:1956-1966 [Journal] **Binary Image Authentication using Zernike Moments.**[Citation Graph (, )][DBLP]**Steganalysis of LSB Greedy Embedding Algorithm for JPEG Images using Coefficient Symmetry.**[Citation Graph (, )][DBLP]**Attack LSB Matching Steganography by Counting Alteration Rate of the Number of Neighbourhood Gray Levels.**[Citation Graph (, )][DBLP]**A study on security performance of YASS.**[Citation Graph (, )][DBLP]**Universal JPEG steganalysis based on microscopic and macroscopic calibration.**[Citation Graph (, )][DBLP]**An efficient print-scanning resilient data hiding scheme based on a novel LPM.**[Citation Graph (, )][DBLP]**Content-based authentication algorithm for binary images.**[Citation Graph (, )][DBLP]**Robust and High Capacity Image Watermarking Based on Jointly Coding and Embedding Optimization.**[Citation Graph (, )][DBLP]**Watermarking Security Incorporating Natural Scene Statistics.**[Citation Graph (, )][DBLP]**Detect Digital Image Splicing with Visual Cues.**[Citation Graph (, )][DBLP]**Image authentication using content based watermark.**[Citation Graph (, )][DBLP]**Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis.**[Citation Graph (, )][DBLP]**Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis.**[Citation Graph (, )][DBLP]**Robust AVS Audio Watermarking.**[Citation Graph (, )][DBLP]**Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping.**[Citation Graph (, )][DBLP]**GSM Based Security Analysis for Add-SS Watermarking.**[Citation Graph (, )][DBLP]**A Robust Watermarking Scheme for H.264.**[Citation Graph (, )][DBLP]**Robust Audio Watermarking Based on Log-Polar Frequency Index.**[Citation Graph (, )][DBLP]**A Novel Method for Block Size Forensics Based on Morphological Operations.**[Citation Graph (, )][DBLP]**Steganalysis of YASS.**[Citation Graph (, )][DBLP]**Detecting digital audio forgeries by checking frame offsets.**[Citation Graph (, )][DBLP]**Detecting doubly compressed JPEG images by using Mode Based First Digit Features.**[Citation Graph (, )][DBLP]**A convolutive mixing model for shifted double JPEG compression with application to passive image authentication.**[Citation Graph (, )][DBLP]**Detecting double compression of audio signal.**[Citation Graph (, )][DBLP]
Search in 0.005secs, Finished in 0.009secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |