关注
Jiangqun Ni
Jiangqun Ni
在 mail.sysu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Deep learning hierarchical representations for image steganalysis
J Ye, J Ni, Y Yi
IEEE Transactions on Information Forensics and Security 12 (11), 2545-2557, 2017
7132017
A deep learning approach to detection of splicing and copy-move forgeries in images
Y Rao, J Ni
2016 IEEE international workshop on information forensics and security (WIFS …, 2016
5692016
Uniform embedding for efficient JPEG steganography
L Guo, J Ni, YQ Shi
IEEE transactions on Information Forensics and Security 9 (5), 814-825, 2014
3432014
Using statistical image model for JPEG steganography: Uniform embedding revisited
L Guo, J Ni, W Su, C Tang, YQ Shi
IEEE Transactions on Information Forensics and Security 10 (12), 2669-2680, 2015
3102015
Rate and distortion optimization for reversible data hiding using multiple histogram shifting
J Wang, J Ni, X Zhang, YQ Shi
IEEE transactions on cybernetics 47 (2), 315-326, 2016
2582016
Blind detection of median filtering in digital images: A difference domain based approach
C Chen, J Ni, J Huang
IEEE Transactions on Image Processing 22 (12), 4699-4710, 2013
1532013
An efficient JPEG steganographic scheme using uniform embedding
L Guo, J Ni, YQ Shi
2012 IEEE International Workshop on Information Forensics and Security (WIFS …, 2012
1502012
Region duplication detection based on Harris corner points and step sector statistics
L Chen, W Lu, J Ni, W Sun, J Huang
Journal of Visual Communication and Image Representation 24 (3), 244-254, 2013
1382013
Robust digital image stabilization using the Kalman filter
C Wang, JH Kim, KY Byun, J Ni, SJ Ko
IEEE Transactions on Consumer Electronics 55 (1), 6-14, 2009
1172009
Multiple histograms-based reversible data hiding: Framework and realization
J Wang, X Chen, J Ni, N Mao, Y Shi
IEEE Transactions on Circuits and Systems for Video Technology 30 (8), 2313-2328, 2019
1062019
Deep learning local descriptor for image splicing detection and localization
Y Rao, J Ni, H Zhao
IEEE access 8, 25611-25625, 2020
1002020
An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients
C Wang, J Ni
2012 IEEE International Conference on Acoustics, Speech and Signal …, 2012
942012
Multiple histograms based reversible data hiding by using FCM clustering
J Wang, N Mao, X Chen, J Ni, C Wang, Y Shi
Signal Processing 159, 193-203, 2019
872019
High-fidelity reversible data hiding using directionally enclosed prediction
H Chen, J Ni, W Hong, TS Chen
IEEE Signal Processing Letters 24 (5), 574-578, 2017
872017
A stable meaningful image encryption scheme using the newly-designed 2D discrete fractional-order chaotic map and Bayesian compressive sensing
L Zhu, D Jiang, J Ni, X Wang, X Rong, M Ahmad, Y Chen
Signal Processing 195, 108489, 2022
832022
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering
H Chen, J Ni, W Hong, TS Chen
Signal Processing: Image Communication 46, 1-16, 2016
772016
Image steganography with symmetric embedding using Gaussian Markov random field model
W Su, J Ni, X Hu, J Fridrich
IEEE Transactions on Circuits and Systems for Video Technology 31 (3), 1001-1015, 2020
762020
A new distortion function design for JPEG steganography using the generalized uniform embedding strategy
W Su, J Ni, X Li, YQ Shi
IEEE Transactions on Circuits and Systems for Video Technology 28 (12), 3545 …, 2018
672018
An informed watermarking scheme using hidden Markov model in the wavelet domain
C Wang, J Ni, J Huang
IEEE Transactions on Information Forensics and Security 7 (3), 853-867, 2012
562012
Blind median filtering detection using statistics in difference domain
C Chen, J Ni, R Huang, J Huang
Information Hiding: 14th International Conference, IH 2012, Berkeley, CA …, 2013
542013
系统目前无法执行此操作,请稍后再试。
文章 1–20