Deep learning hierarchical representations for image steganalysis J Ye, J Ni, Y Yi IEEE Transactions on Information Forensics and Security 12 (11), 2545-2557, 2017 | 713 | 2017 |
A deep learning approach to detection of splicing and copy-move forgeries in images Y Rao, J Ni 2016 IEEE international workshop on information forensics and security (WIFS …, 2016 | 569 | 2016 |
Uniform embedding for efficient JPEG steganography L Guo, J Ni, YQ Shi IEEE transactions on Information Forensics and Security 9 (5), 814-825, 2014 | 343 | 2014 |
Using statistical image model for JPEG steganography: Uniform embedding revisited L Guo, J Ni, W Su, C Tang, YQ Shi IEEE Transactions on Information Forensics and Security 10 (12), 2669-2680, 2015 | 310 | 2015 |
Rate and distortion optimization for reversible data hiding using multiple histogram shifting J Wang, J Ni, X Zhang, YQ Shi IEEE transactions on cybernetics 47 (2), 315-326, 2016 | 258 | 2016 |
Blind detection of median filtering in digital images: A difference domain based approach C Chen, J Ni, J Huang IEEE Transactions on Image Processing 22 (12), 4699-4710, 2013 | 153 | 2013 |
An efficient JPEG steganographic scheme using uniform embedding L Guo, J Ni, YQ Shi 2012 IEEE International Workshop on Information Forensics and Security (WIFS …, 2012 | 150 | 2012 |
Region duplication detection based on Harris corner points and step sector statistics L Chen, W Lu, J Ni, W Sun, J Huang Journal of Visual Communication and Image Representation 24 (3), 244-254, 2013 | 138 | 2013 |
Robust digital image stabilization using the Kalman filter C Wang, JH Kim, KY Byun, J Ni, SJ Ko IEEE Transactions on Consumer Electronics 55 (1), 6-14, 2009 | 117 | 2009 |
Multiple histograms-based reversible data hiding: Framework and realization J Wang, X Chen, J Ni, N Mao, Y Shi IEEE Transactions on Circuits and Systems for Video Technology 30 (8), 2313-2328, 2019 | 106 | 2019 |
Deep learning local descriptor for image splicing detection and localization Y Rao, J Ni, H Zhao IEEE access 8, 25611-25625, 2020 | 100 | 2020 |
An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients C Wang, J Ni 2012 IEEE International Conference on Acoustics, Speech and Signal …, 2012 | 94 | 2012 |
Multiple histograms based reversible data hiding by using FCM clustering J Wang, N Mao, X Chen, J Ni, C Wang, Y Shi Signal Processing 159, 193-203, 2019 | 87 | 2019 |
High-fidelity reversible data hiding using directionally enclosed prediction H Chen, J Ni, W Hong, TS Chen IEEE Signal Processing Letters 24 (5), 574-578, 2017 | 87 | 2017 |
A stable meaningful image encryption scheme using the newly-designed 2D discrete fractional-order chaotic map and Bayesian compressive sensing L Zhu, D Jiang, J Ni, X Wang, X Rong, M Ahmad, Y Chen Signal Processing 195, 108489, 2022 | 83 | 2022 |
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering H Chen, J Ni, W Hong, TS Chen Signal Processing: Image Communication 46, 1-16, 2016 | 77 | 2016 |
Image steganography with symmetric embedding using Gaussian Markov random field model W Su, J Ni, X Hu, J Fridrich IEEE Transactions on Circuits and Systems for Video Technology 31 (3), 1001-1015, 2020 | 76 | 2020 |
A new distortion function design for JPEG steganography using the generalized uniform embedding strategy W Su, J Ni, X Li, YQ Shi IEEE Transactions on Circuits and Systems for Video Technology 28 (12), 3545 …, 2018 | 67 | 2018 |
An informed watermarking scheme using hidden Markov model in the wavelet domain C Wang, J Ni, J Huang IEEE Transactions on Information Forensics and Security 7 (3), 853-867, 2012 | 56 | 2012 |
Blind median filtering detection using statistics in difference domain C Chen, J Ni, R Huang, J Huang Information Hiding: 14th International Conference, IH 2012, Berkeley, CA …, 2013 | 54 | 2013 |