The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jiwu Huang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xiaoyun Wu, Junquan Hu, Zhixiong Gu, Jiwu Huang
    A Secure Semi-Fragile Watermarking for Image Authentication Based on Integer Wavelet Transform with Parameters Abstract. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2005, pp:75-80 [Conf]
  2. Zewen Chen, Jiwu Huang, Daren Huang, Jianhong Zhang, Yumin Wang
    Provably Secure and ID-Based Group Signature Scheme. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2004, pp:384-388 [Conf]
  3. Limin Gu, Yanmei Fang, Jiwu Huang
    Revaluation of Error Correcting Coding in Watermarking Channel. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:274-287 [Conf]
  4. Xiaoping Liang, Xiaoyun Wu, Jiwu Huang
    Reversible Data Hiding for Image Based on Histogram Modification of Wavelet Coefficients. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:573-580 [Conf]
  5. Hongmei Liu, Fenglian Shao, Jiwu Huang
    A MPEG-2 Video Watermarking Algorithm with Compensation in Bit Stream. [Citation Graph (0, 0)][DBLP]
    DRMTICS, 2005, pp:123-134 [Conf]
  6. Xiaoyun Wu, Xiaoping Liang, Hongmei Liu, Jiwu Huang, Guoping Qiu
    Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform. [Citation Graph (0, 0)][DBLP]
    DRMTICS, 2005, pp:135-145 [Conf]
  7. Jiwu Huang, Junquan Hu, Daren Huang, Yun Q. Shi
    Improve security of fragile watermarking via parameterized wavelet. [Citation Graph (0, 0)][DBLP]
    ICIP, 2004, pp:721-724 [Conf]
  8. Xiangui Kang, Jiwu Huang, Yun Q. Shi
    Improve robustness of image watermarking via adaptive receiving. [Citation Graph (0, 0)][DBLP]
    ICIP, 2004, pp:2343-2346 [Conf]
  9. Yanmei Fang, Ning Bi, Daren Huang, Jiwu Huang
    The M-band wavelets in image watermarking. [Citation Graph (0, 0)][DBLP]
    ICIP (1), 2005, pp:245-248 [Conf]
  10. Zewen Chen, Jilin Wang, Yumin Wang, Jiwu Huang, Daren Huang
    An Efficient Revocation Algorithm in Group Signatures. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:339-351 [Conf]
  11. Limin Gu, Jiwu Huang, Zewen Chen
    Analysis of the Bounds for Linear Block Codes in Watermark Channel. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:294-304 [Conf]
  12. Daren Huang, Jiufen Liu, Jiwu Huang, Hongmei Liu
    A Dwt-Based Image Watermarking Algorithm. [Citation Graph (0, 0)][DBLP]
    ICME, 2001, pp:- [Conf]
  13. Hong-mei Liu, Ji-wu Huang, Zi-mei Xiao
    An Adaptive Video Watermarking Algorithm. [Citation Graph (0, 0)][DBLP]
    ICME, 2001, pp:- [Conf]
  14. Weiqi Luo, Jiwu Huang, Guoping Qiu
    Robust Detection of Region-Duplication Forgery in Digital Image. [Citation Graph (0, 0)][DBLP]
    ICPR (4), 2006, pp:746-749 [Conf]
  15. Mai Yang, Guoping Qiu, Jiwu Huang, Dave Elliman
    Near-Duplicate Image Recognition and Content-based Image Retrieval using Adaptive Hierarchical Geometric Centroids. [Citation Graph (0, 0)][DBLP]
    ICPR (2), 2006, pp:958-961 [Conf]
  16. Yanmei Fang, Jiwu Huang, Yun Q. Shi
    Image watermarking algorithm applying CDMA. [Citation Graph (0, 0)][DBLP]
    ISCAS (2), 2003, pp:948-951 [Conf]
  17. Limin Gu, Jiwu Huang, Yun Q. Shi
    Analysis of the role played by error correcting coding in robust watermarking. [Citation Graph (0, 0)][DBLP]
    ISCAS (3), 2003, pp:798-801 [Conf]
  18. Hongmei Liu, Zhang Zhefeng, Jiwu Huang, Huang Xialing, Yun Q. Shi
    A high capacity distortion-free data hiding algorithm for palette image. [Citation Graph (0, 0)][DBLP]
    ISCAS (2), 2003, pp:916-919 [Conf]
  19. Yongjian Hu, Sam Kwong, Jiwu Huang
    Using invisible watermarks to protect visibly watermarked images. [Citation Graph (0, 0)][DBLP]
    ISCAS (5), 2004, pp:584-587 [Conf]
  20. Yun Q. Shi, Zhicheng Ni, Nirwan Ansari, Jiwu Huang
    2-D and 3-D successive packing interleaving techniques and their applications to image and video data hiding. [Citation Graph (0, 0)][DBLP]
    ISCAS (2), 2003, pp:924-927 [Conf]
  21. Shaoquan Wu, Jiwu Huang, Daren Huang, Yun Q. Shi
    Self-synchronized audio watermark in DWT domain. [Citation Graph (0, 0)][DBLP]
    ISCAS (5), 2004, pp:712-715 [Conf]
  22. Jiwu Huang, Yun Q. Shi
    Embedding gray level images. [Citation Graph (0, 0)][DBLP]
    ISCAS (5), 2001, pp:239-242 [Conf]
  23. Yanmei Fang, Jiwu Huang, Shaoquan Wu
    CDMA-based watermarking resisting to cropping. [Citation Graph (0, 0)][DBLP]
    ISCAS (2), 2004, pp:25-28 [Conf]
  24. Yanmei Fang, Limin Gu, Jiwu Huang
    Performance Analysis of CDMA-Based Watermarking with Quantization Scheme. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:350-361 [Conf]
  25. Jiangqun Ni, Rongyue Zhang, Jiwu Huang, Chuntao Wang
    A Robust Multi-bit Image Watermarking Algorithm Based on HMM in Wavelet Domain. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:110-123 [Conf]
  26. Jiangqun Ni, Rongyue Zhang, Jiwu Huang, Chuntao Wang, Quanbo Li
    A Rotation-Invariant Secure Image Watermarking Algorithm Incorporating Steerable Pyramid Transform. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:446-460 [Conf]
  27. Junhui He, Jiwu Huang, Guoping Qiu
    A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:1-14 [Conf]
  28. Junquan Hu, Jiwu Huang, Daren Huang, Yun Q. Shi
    A DWT-Based Fragile Watermarking Tolerant of JPEG Compression. [Citation Graph (0, 0)][DBLP]
    IWDW, 2002, pp:179-188 [Conf]
  29. Yongjian Hu, Jiwu Huang, Sam Kwong, Yiu-Keung Chan
    Image Fusion Based Visible Watermarking Using Dual-Tree Complex Wavelet Transform. [Citation Graph (0, 0)][DBLP]
    IWDW, 2003, pp:86-100 [Conf]
  30. Xiangui Kang, Jiwu Huang, Yun Q. Shi
    An Image Watermarking Algorithm Robust to Geometric Distortion. [Citation Graph (0, 0)][DBLP]
    IWDW, 2002, pp:212-223 [Conf]
  31. Xiangui Kang, Jiwu Huang, Yun Q. Shi, Jianxiang Zhu
    Robust Watermarking with Adaptive Receiving. [Citation Graph (0, 0)][DBLP]
    IWDW, 2003, pp:396-407 [Conf]
  32. Xiangui Kang, Yun Q. Shi, Jiwu Huang, Wenjun Zeng
    Multi-band Wavelet Based Digital Watermarking Using Principal Component Analysis. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:139-146 [Conf]
  33. Shijun Xiang, Jiwu Huang, Rui Yang, Chuntao Wang, Hongmei Liu
    Robust Audio Watermarking Based on Low-Order Zernike Moments. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:226-240 [Conf]
  34. Jiangqun Ni, Chuntao Wang, Jiwu Huang, Rongyue Zhang
    A RST-Invariant Robust DWT-HMM Watermarking Algorithm Incorporating Zernike Moments and Template. [Citation Graph (0, 0)][DBLP]
    KES (1), 2005, pp:1233-1239 [Conf]
  35. Xiaoyun Wu, Hongmei Liu, Jiwu Huang
    Semi-fragile Watermarking Based on Zernike Moments and Integer Wavelet Transform. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:1108-1114 [Conf]
  36. Shijun Xiang, Jiwu Huang, Xiaoyun Feng
    Analysis of Quantization-Based Audio Watermarking in DA/AD Conversions. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:587-592 [Conf]
  37. Hongmei Liu, Huiying Fu, Jiwu Huang
    A Watermarking Algorithm for JPEG File. [Citation Graph (0, 0)][DBLP]
    PCM, 2006, pp:319-328 [Conf]
  38. Hongmei Liu, Jiwu Huang, Yun Q. Shi
    Dwt-Based Video Data Hiding Robust To Mpeg Compression And Frame Loss. [Citation Graph (0, 0)][DBLP]
    Int. J. Image Graphics, 2005, v:5, n:1, pp:111-134 [Journal]
  39. Jiwu Huang, Yun Q. Shi
    Reliable information bit hiding. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Circuits Syst. Video Techn., 2002, v:12, n:10, pp:916-0 [Journal]
  40. Yongjian Hu, Sam Kwong, Jiwu Huang
    An algorithm for removable visible watermarking. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Circuits Syst. Video Techn., 2006, v:16, n:1, pp:129-133 [Journal]
  41. Xiangui Kang, Jiwu Huang, Yun Q. Shi, Yan Lin
    A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Circuits Syst. Video Techn., 2003, v:13, n:8, pp:776-786 [Journal]
  42. Jiwu Huang, Yun Q. Shi, Yi Shi
    Embedding image watermarks in dc components. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Circuits Syst. Video Techn., 2000, v:10, n:6, pp:974-979 [Journal]
  43. Hongmei Liu, Ling Zhu, Jiwu Huang
    A Hybrid Watermarking Scheme for Video Authentication. [Citation Graph (0, 0)][DBLP]
    ICIP, 2006, pp:2569-2572 [Conf]
  44. Jiangqun Ni, Chuntao Wang, Jiwu Huang, Rongyue Zhang
    Performance Enhancement for DWT-HMM Image Watermarking with Content-Adaptive Approach. [Citation Graph (0, 0)][DBLP]
    ICIP, 2006, pp:1377-1380 [Conf]
  45. Shunquan Tan, Jiwu Huang, Zhihua Yang, Yun Q. Shi
    Steganalysis of JPEG2000 Lazy-Mode Steganography using the Hilbert-Huang Transform Based Sequential Analysis. [Citation Graph (0, 0)][DBLP]
    ICIP, 2006, pp:101-104 [Conf]
  46. Shijun Xiang, Jiwu Huang, Rui Yang
    Time-Scale Invariant Audio Watermarking Based on the Statistical Features in Time Domain. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:93-108 [Conf]
  47. Shijun Xiang, Hyoung-Joong Kim, Jiwu Huang
    Histogram-based image hashing scheme robust against geometric deformations. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:121-128 [Conf]
  48. Shijun Xiang, Jiwu Huang
    Robust Audio Watermarking Against the D/A and A/D conversions [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]
  49. Ning Bi, Qiyu Sun, Daren Huang, Zhihua Yang, Jiwu Huang
    Robust Image Watermarking Based on Multiband Wavelets and Empirical Mode Decomposition. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 2007, v:16, n:8, pp:1956-1966 [Journal]

  50. Binary Image Authentication using Zernike Moments. [Citation Graph (, )][DBLP]


  51. Steganalysis of LSB Greedy Embedding Algorithm for JPEG Images using Coefficient Symmetry. [Citation Graph (, )][DBLP]


  52. Attack LSB Matching Steganography by Counting Alteration Rate of the Number of Neighbourhood Gray Levels. [Citation Graph (, )][DBLP]


  53. A study on security performance of YASS. [Citation Graph (, )][DBLP]


  54. Universal JPEG steganalysis based on microscopic and macroscopic calibration. [Citation Graph (, )][DBLP]


  55. An efficient print-scanning resilient data hiding scheme based on a novel LPM. [Citation Graph (, )][DBLP]


  56. Content-based authentication algorithm for binary images. [Citation Graph (, )][DBLP]


  57. Robust and High Capacity Image Watermarking Based on Jointly Coding and Embedding Optimization. [Citation Graph (, )][DBLP]


  58. Watermarking Security Incorporating Natural Scene Statistics. [Citation Graph (, )][DBLP]


  59. Detect Digital Image Splicing with Visual Cues. [Citation Graph (, )][DBLP]


  60. Image authentication using content based watermark. [Citation Graph (, )][DBLP]


  61. Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis. [Citation Graph (, )][DBLP]


  62. Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis. [Citation Graph (, )][DBLP]


  63. Robust AVS Audio Watermarking. [Citation Graph (, )][DBLP]


  64. Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping. [Citation Graph (, )][DBLP]


  65. GSM Based Security Analysis for Add-SS Watermarking. [Citation Graph (, )][DBLP]


  66. A Robust Watermarking Scheme for H.264. [Citation Graph (, )][DBLP]


  67. Robust Audio Watermarking Based on Log-Polar Frequency Index. [Citation Graph (, )][DBLP]


  68. A Novel Method for Block Size Forensics Based on Morphological Operations. [Citation Graph (, )][DBLP]


  69. Steganalysis of YASS. [Citation Graph (, )][DBLP]


  70. Detecting digital audio forgeries by checking frame offsets. [Citation Graph (, )][DBLP]


  71. Detecting doubly compressed JPEG images by using Mode Based First Digit Features. [Citation Graph (, )][DBLP]


  72. A convolutive mixing model for shifted double JPEG compression with application to passive image authentication. [Citation Graph (, )][DBLP]


  73. Detecting double compression of audio signal. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.009secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002