Seuraa
Weiqi Luo
Weiqi Luo
School of Software, Sun Yat-Sen Univ. Guangzhou, P.R. China
Vahvistettu sähköpostiosoite verkkotunnuksessa mail.sysu.edu.cn - Kotisivu
Nimike
Viittaukset
Viittaukset
Vuosi
Edge adaptive image steganography based on LSB matching revisited
W Luo, F Huang, J Huang
IEEE Transactions on information forensics and security 5 (2), 201-214, 2010
8442010
Robust detection of region-duplication forgery in digital image
W Luo, J Huang, G Qiu
18th International Conference on Pattern Recognition (ICPR'06) 4, 746-749, 2006
5312006
JPEG error analysis and its applications to digital image forensics
W Luo, J Huang, G Qiu
IEEE Transactions on Information Forensics and Security 5 (3), 480-491, 2010
3252010
A novel method for detecting cropped and recompressed image block
W Luo, Z Qu, J Huang, G Qiu
2007 IEEE International Conference on Acoustics, Speech and Signal …, 2007
2832007
Fake faces identification via convolutional neural network
H Mo, B Chen, W Luo
Proceedings of the 6th ACM workshop on information hiding and multimedia …, 2018
1862018
Identification of various image operations using residual-based features
H Li, W Luo, X Qiu, J Huang
IEEE Transactions on Circuits and Systems for Video Technology 28 (1), 31-45, 2016
1702016
A survey of passive technology for digital image forensics
W Luo, Z Qu, F Pan, J Huang
Frontiers of Computer Science in China 1, 166-179, 2007
1592007
Localization of diffusion-based inpainting in digital images
H Li, W Luo, J Huang
IEEE transactions on information forensics and security 12 (12), 3050-3064, 2017
1392017
Adaptive steganalysis against WOW embedding algorithm
W Tang, H Li, W Luo, J Huang
Proceedings of the 2nd ACM workshop on Information hiding and multimedia …, 2014
1302014
Image forgery localization via integrating tampering possibility maps
H Li, W Luo, X Qiu, J Huang
IEEE Transactions on Information Forensics and Security 12 (5), 1240-1252, 2017
1172017
A more secure steganography based on adaptive pixel-value differencing scheme
W Luo, F Huang, J Huang
Multimedia tools and applications 52, 407-430, 2011
1122011
A universal image forensic strategy based on steganalytic model
X Qiu, H Li, W Luo, J Huang
Proceedings of the 2nd ACM workshop on Information hiding and multimedia …, 2014
1072014
Adaptive steganalysis based on embedding probabilities of pixels
W Tang, H Li, W Luo, J Huang
IEEE Transactions on Information Forensics and Security 11 (4), 734-745, 2015
1062015
A convolutive mixing model for shifted double JPEG compression with application to passive image authentication
Z Qu, W Luo, J Huang
2008 IEEE International Conference on Acoustics, Speech and Signal …, 2008
862008
MPEG recompression detection based on block artifacts
W Luo, M Wu, J Huang
Security, forensics, steganography, and watermarking of multimedia contents …, 2008
852008
Fast and effective global covariance pooling network for image steganalysis
X Deng, B Chen, W Luo, D Luo
Proceedings of the ACM workshop on information hiding and multimedia …, 2019
662019
鲁棒的区域复制图像篡改检测技术
骆伟祺, 黄继武, 丘国平
计算机学报 30 (011), 1998-2007, 2007
642007
Audio steganography based on iterative adversarial attacks against convolutional neural networks
J Wu, B Chen, W Luo, Y Fang
IEEE transactions on information forensics and security 15, 2282-2294, 2020
592020
A novel high-capacity reversible data hiding scheme for encrypted JPEG bitstreams
J He, J Chen, W Luo, S Tang, J Huang
IEEE Transactions on Circuits and Systems for Video Technology 29 (12), 3501 …, 2018
562018
Countering anti-JPEG compression forensics
H Li, W Luo, J Huang
2012 19th IEEE International Conference on Image Processing, 241-244, 2012
552012
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20