Edge adaptive image steganography based on LSB matching revisited W Luo, F Huang, J Huang IEEE Transactions on information forensics and security 5 (2), 201-214, 2010 | 865 | 2010 |
Robust detection of region-duplication forgery in digital image W Luo, J Huang, G Qiu 18th International Conference on Pattern Recognition (ICPR'06) 4, 746-749, 2006 | 542 | 2006 |
JPEG error analysis and its applications to digital image forensics W Luo, J Huang, G Qiu IEEE Transactions on Information Forensics and Security 5 (3), 480-491, 2010 | 330 | 2010 |
A novel method for detecting cropped and recompressed image block W Luo, Z Qu, J Huang, G Qiu 2007 IEEE International Conference on Acoustics, Speech and Signal …, 2007 | 280 | 2007 |
Fake faces identification via convolutional neural network H Mo, B Chen, W Luo Proceedings of the 6th ACM workshop on information hiding and multimedia …, 2018 | 196 | 2018 |
Identification of various image operations using residual-based features H Li, W Luo, X Qiu, J Huang IEEE Transactions on Circuits and Systems for Video Technology 28 (1), 31-45, 2016 | 172 | 2016 |
A survey of passive technology for digital image forensics W Luo, Z Qu, F Pan, J Huang Frontiers of Computer Science in China 1, 166-179, 2007 | 158 | 2007 |
Localization of diffusion-based inpainting in digital images H Li, W Luo, J Huang IEEE transactions on information forensics and security 12 (12), 3050-3064, 2017 | 153 | 2017 |
Adaptive steganalysis against WOW embedding algorithm W Tang, H Li, W Luo, J Huang Proceedings of the 2nd ACM workshop on Information hiding and multimedia …, 2014 | 134 | 2014 |
Image forgery localization via integrating tampering possibility maps H Li, W Luo, X Qiu, J Huang IEEE Transactions on Information Forensics and Security 12 (5), 1240-1252, 2017 | 117 | 2017 |
A more secure steganography based on adaptive pixel-value differencing scheme W Luo, F Huang, J Huang Multimedia tools and applications 52, 407-430, 2011 | 112 | 2011 |
A universal image forensic strategy based on steganalytic model X Qiu, H Li, W Luo, J Huang Proceedings of the 2nd ACM workshop on Information hiding and multimedia …, 2014 | 109 | 2014 |
Adaptive steganalysis based on embedding probabilities of pixels W Tang, H Li, W Luo, J Huang IEEE Transactions on Information Forensics and Security 11 (4), 734-745, 2015 | 107 | 2015 |
A convolutive mixing model for shifted double JPEG compression with application to passive image authentication Z Qu, W Luo, J Huang 2008 IEEE International Conference on Acoustics, Speech and Signal …, 2008 | 88 | 2008 |
MPEG recompression detection based on block artifacts W Luo, M Wu, J Huang Security, forensics, steganography, and watermarking of multimedia contents …, 2008 | 83 | 2008 |
Fast and effective global covariance pooling network for image steganalysis X Deng, B Chen, W Luo, D Luo Proceedings of the ACM workshop on information hiding and multimedia …, 2019 | 75 | 2019 |
Audio steganography based on iterative adversarial attacks against convolutional neural networks J Wu, B Chen, W Luo, Y Fang IEEE transactions on information forensics and security 15, 2282-2294, 2020 | 66 | 2020 |
鲁棒的区域复制图像篡改检测技术 骆伟祺, 黄继武, 丘国平 计算机学报 30 (011), 1998-2007, 2007 | 66 | 2007 |
A novel high-capacity reversible data hiding scheme for encrypted JPEG bitstreams J He, J Chen, W Luo, S Tang, J Huang IEEE Transactions on Circuits and Systems for Video Technology 29 (12), 3501 …, 2018 | 57 | 2018 |
Video Sequence Matching Based on the Invariance of Color Correlation Y Lei, W Luo, Y Wang, J Huang IEEE Trans. on CSVT, 2012 | 55 | 2012 |