黄继武基本情况性别:男
研究方向:多媒体信息安全、数字水印与信息隐藏、多媒体信号处理
办公电话:39943301/39332715
电子邮件:isshjw@mail.sysu.edu.cn
个人主页:http://sist.sysu.edu.cn/~isshjw
详细介绍基本情况工学博士。教授、博士导师。中山大学信息科学与技术学院院长。国家杰出青年科学基金获得者。教育情况西安电子科技大学电子对抗专业,工学学士;清华大学通信与电子系统专业,工学硕士;中国科学院自动化研究所模式识别与智能系统专业,工学博士。研究兴趣多媒体取证、数字水印与信息隐藏、多媒体信息安全、多媒体信号处理主要学术活动与兼职Associateeditor,IEEETransactionsonInformationForensicsandSecurityAssociateeditor,EURASIPJournalonInformationSecurity(Hindawi),Associateeditor,LNCSTransactionsonDataHidingandMultimediaSecurity(Springer)编委:计算机学报、通信学报、软件学报、自动化学报、计算机研究与发展。BoG(BoardofGovernors)成员,Asia-PacificSignalandInformationProcessingAssociation(APSIPA)IEEE电路与系统学会(CASS)多媒体系统与应用技术委员会(MSATC)成员(2002~)IEEE信号处理学会(SPS)信息取证与安全技术委员会(IFSTC)成员(2012.1~2014.12)IEEECircuits&SystemsSocietyGuangzhouChapter主席,2008-2011IEEESignalProcessingSocietyGuangzhouChapte5主席,2010-现在信息安全国家重点实验室学术委员会委员主讲课程图象信息处理、信息处理技术应用、信号与系统研究生、博士后招生硕士生、博士生、博士后:计算机科学与技术、信息与通信工程近年所承担的主要科研项目1)NSFC-广东联合基金重点项目“网络媒体内容服务安全理论与关键技术”,(2012.1-2015.12)(U1135001).2)国家自然科学基金重点项目“数字媒体内容安全关键技术及评测方法的研究”(2007.1-2010.12)(60633030)3)国家973计划项目“网络媒体智能处理的理论与方法”(2011CB302200)课题4“网络可视媒体安全”(2011CB302204)(2010.1-2014.8)4)国家973计划项目“可视媒体智能处理的理论与方法”(2006CB303100)课题4“基于内容的可视媒体安全”(2006CB303104)(2006.9-2010.8)。获奖稳健数字水印方法。教育部提名国家科学技术奖自然科学一等奖(第一)。BestStudentPaperAward,IWDW2008(RuiYang,XianguiKang,JiwuHuang.RobustAudioWatermarkingBasedOnLog-polarFrequencyIndex.IWDW2008),2008.(第三)近年著作和章节[1]王育民、张彤、黄继武、董庆宽编著。信息隐藏技术——理论与应用。清华大学出版社,ISBN7302119252.2006.3。[1]Y.Q.Shi,J.Huang,andH.K.Lee.SpreadSpectrumVideoDataHiding,InterleavingandSynchronization.IntelligentWatermarkingTechniques,Chapter18,pp.515-558,WorldScientificPublishingCompany.[2]XianguiKang,JiwuHuang,Yun.Q.Shi.ImageDataHidingRobusttoBothGeometricDistortionandJPEGCompression.MultimediaSecurityHandbook(Ed.BorkoFurhtandDarkoKirovski),Chapter15,pp.467-492.CRCPress.2004.[3]FangjunHuang,BinLi,Y.Q.Shi,JiwuHuang,GuorongXuan,“ImageSteganalysis”,IntelligentMultimediaAnalysisforSecurityApplications,(Ed.HusrevTahaSencar),Chapter3,pp.275-303,Springer,2010.部分期刊论文[1]YanqiangLei,WeiqiLuo,YuangenWang,JiwuHuang.VideoSequenceMatchingBasedontheInvarianceofColorCorrelation.IEEETrans.onCircuitsandSystemsforVideoTechnology.(accepted)[2]ChuntaoWang,JiangqunNi,JiwuHuang.AnInformedWatermarkingSchemeUsingHiddenMarkovModelintheWaveletDomain.IEEETrans.onInformationForensics&Security.(accepted)[3]RuiYang,ZhenhuaQu,JiwuHuang.ExposingMP3AudioForgeriesUsingFrameOffsets.ACMTrans.onMultimediaComputing,Communications,andApplications.(accepted)[4]JianLi,HongmeiLiu,JiwuHuang,YunQ.shi.ReferenceIndex-BasedH.264VideoWatermarkingScheme.ACMTrans.onMultimediaComputing,Communications,andApplications.(accepted)[5]XianguiKang,YanxiangLi,ZhenhuaQu,JiwuHuang.nhancingSourceCameraIdentificationPerformancewithaCameraReferencePhaseSensorPatternNoise.IEEETrans.onInformationForensics&Security(accepted)[6]GuopuZhu,SamKwong,JiwuHuang,andJianquanYang.RandomGrayCodeandItsPerformanceAnalysisforImageHashing.SignalProcessing.91(2011)2178–2193.[7]YanqingLei,YunagenWang,JiwuHuang.RobustImageHashinRadonTransformDomainforAuthentication.SignalProcessing:ImageCommunication.26(2011)280–288[8]ShijunXiang,JianquanYang,JiwuHuang,“PerceptualVideoHashingRobustAgainstGeometricDistortions,”ScienceChina:InformationSciences.(accepted)[9]XianguiKang,Member,IEEE,RuiYang,StudentMember,IEEE,andJiwuHuang.GeometricInvariantAudioWatermarkingBasedonanLCMFeature.IEEETrans.onMultimedia,13(2):181-190,April,2011.[10]WeiqiLuo,JiwuHuang.SecurityAnalysisonSpatial±1SteganographyforJPEGDecompressedImages.IEEESignalProcessingLetters,18(1):39-42,2011.[11]FangjunHuang,WeiqiLuo,JiwuHuang.SteganalysisofJPEGsteganographywithcomplementaryembeddingstrategy.IETInformationSecurity,5(1):10-18.2011[12]WeiqiLuo,JiwuHuang.AMoreSecureSteganographyBasedonAdaptivePixel-ValueDifferencingScheme.MultimediaToolsandApplications.Volume52,Issue2,Page407-430,2011[13]HongmeiLiu,XinzhiYao,JiwuHuang:Minoritycodeswithimprovedembedding
efficiencyforlargepayloads.MultimediaToolsApplications.52(2-3):431-443(2011)[14]FangjunHuang,JiwuHuang,YunQ.Shi.DetectingDoubleJPEGCompressionwiththeSameQuantizationMatrix.IEEETrans.onInformationForensics&Security,5(4):838-856.[15]WeiqiLuo,YuangenWang,JiwuHuang.DetectionofQuantizationArtifactsandItsApplicationstoTransformEncoderIdentification.IEEETrans.onInformationForensics&Security,5(4):810-815,2010[16]FangjunHuang,JiwuHuang,YunQ.Shi.AnExperimentalStudyontheSecurityPerformanceofYASS.IEEETrans.onInformationForensics&Security,5(3):374-380[17]WeiqiLuo,JiwuHuang.JPEGErrorAnalysisandItsApplicationstoDigitalImageForensics.IEEETrans.onInformationForensics&Security,5(3):480-491[18]WeiqiLuo,FangjunHuang,JiwuHuang.EdgeAdaptiveImageSteganographyBasedonLSBMatchingRevisited.IEEETrans.onInformationForensics&Security,5(2):201-214,2010.[19]XianguiKang,JiwuHuang,WenjunZeng.EfficientGeneralPrint-ScanningResilientDataHidingBasedonUniformLog-polarMapping.IEEETrans.onInformationForensics&Security,5(1):1-12,2010.[20]GuopuZhu,JiwuHuang,SamKwong,JianquanYang.FragilityAnalysisofAdaptiveQuantizationBasedImageHashing.IEEETrans.onInformationForensics&Security,5(1):133-147,2010.[21]YongWang,ShaoquanWu,andJiwuHuang.AudioWatermarkingSchemeRobustagainstDesynchronizationBasedontheDyadicWaveletTransform,EURASIPJournalonAdvancesinSignalProcessing,Volume2010(2010),ArticleID232616,17pages[22]HongmeiLiu,XinzhiYaoandJiwuHuang.“Semi-FragileZernikeMoment-BasedImageWatermarkingforAuthentication”EURASIPJournalonAdvancesinSignalProcessing,Volume2010(2010),ArticleID341856,17pages[23]YongWang,JiwuHuang.RobustAVSAudioWatermarking.ScienceChina:InformationSciences.53(3):607-618.2010[24]GuopuZhu,JiwuHuang,SamKwong,JianquanYang.AStudyontheRandomnessMeasureofImage.IEEETrans.onInformationForensics&Security,4(4):928-932,2009[25]BinLi,JiwuHuang,YunQ.Shi.SteganalysisofYASS.IEEETrans.onInformationForensics&Security,4(3):369-382,2009.[26]XianguiKang,JiwuHuang,WenjunZeng,YunQ.Shi.Non-ambiguityofBlindWatermarking:aRevisitwithAnalyticalResolution.ScienceinChinaSeriesF:InformationSciences.52(2):276-285,2009.2.[27]FengPan,JiongbinChen,JiwuHuang.DiscriminatingComputerGraphicsImagesandNaturalImagesUsingFractalGeometry.ScienceinChinaSeriesF:InformationSciences.52(2):329-337,2009.2.[28]FangJunHuang,JiwuHuang:CalibrationbaseduniversalJPEGsteganalysis.ScienceinChinaSeriesF:InformationSciences,52(2):260-268(2009)[29]XianguiKang,JiwuHuang,WenjunZeng.ImprovingRobustnessofQuantization-BasedImagewatermarkingviaAdaptiveReceiver.IEEETrans.onMultimedia,vol.10,no.6,pp.953-959,Oct.2008.[30]ShijunXiang,Hyoung-JoongKim,JiwuHuang.InvariantImageWatermarkingBasedontheStatisticalFeaturesintheLow-FrequencyDomain.IEEETrans.onCircuitsandSystemsforVideoTechnology,18(6):777-790,2008.[31]ShijunXiang,HJKimandJiwuHuang“AudioWatermarkingRobusttoTime-ScaleModificationandMP3Compression”SignalProcessing,vol.88,pp.2372-2388.2008.[32]BinLi,YanmeiFangandJiwuHuang.SteganalysisofMultiple-BaseNotationalSystemSteganography.IEEESignalProcessingLetter,vol.15,pp.493-496.2008[33]ShijunXiang,JiwuHuang.Histogram-BasedAudioWatermarkingagainstTime-ScaleModificationsandCroppingAttacks.IEEETrans.onMultimedia.9(7):1357-1372,2007.[34]NingBi;QiyuSun;DarenHuang;ZhihuaYang;JiwuHuang.RobustImageWatermarkingBasedonMultibandWaveletsandEmpiricalModeDecomposition.IEEETrans.onImageProcessing.2007,16(8):1956-1966.[35]LUOWeiqi,QUZhenhua,PANFeng,HUANGJiwu.ASurveyofPassiveTechnologyforDigitalImageForensics.FrontiersofComputerScienceinChina.1(2):166-179.2007[36]YongjianHu,SamKwong,JiwuHuang.Anewmethodofreversiblevisiblewatermarking.IEEETrans.onCircuitsandSystemsforVideoTechnology.16(1):129-133,2006.[37]JunhuiHe,JiwuHuang.Steganalysisofstochasticmodulationsteganography.ScienceinChina:SeriesFInformationSciences,2006,49(3):273-285.[38]ShaoquanWu,JiwuHuang,DarenHuang,YunQ.Shi,EfficientlySelf-SynchronizedAudioWatermarkingforAssuredAudioDataTransmission.IEEETrans.onBroadcasting.2005,51(1):69-76.[39]XianguiKang,JiwuHuang,YunQ.Shi,YanLin.ADWT-DFTcompositewatermarkingschemerobusttobothaffinetransformandJPEGcompression.IEEETrans.onCircuitsandSystemsforVideoTechnology.2003,13(8):776-786.[40]JiwuHuang,YunQ.Shi.ReliableInformationBitHiding.IEEETrans.onCircuitsandSystemsforVideoTechnology.2002,12(10):916-920.[41]JunquanHu,JiwuHuang,DarenHuang.YunQ.Shi,ImageFragileWatermarkingBasedonFusionofMulti-ResolutionTamperDetection.IEEElectronicsLetters.2002,38(24):1512-1513.[42]JiwuHuang,YunQ.Shi,YiShi,EmbeddingimagewatermarksinDCcomponents,IEEETrans.onCircuitsandSystemsforVideoTechnology.2000,10(6),pp.974-979.部分会议论文[1]LigangZheng,GuopingQiu,JiwuHuang.EfficientCoarse-To-FineNear-DuplicateImageDetectionInRiemannianManifold.Proc.ofIEEEInt.Conf.onAcoustics,SpeechandSignalProcessing(accepted)[2]DaLuo,WeiqiLuo,RuiYang,JiwuHuang.CompressionHistoryIdentificationforDigitalAudioSignal.Proc.ofIEEEInt.Conf.onAcoustics,SpeechandSignalProcessing(accepted)[3]PeijiaZheng,JiwuHuang.ImplementationoftheDiscreteWaveletTransformandMultiresolutionAnalysisintheEncryptedDomain.ACMMultimedia2011,pp.413-422.[4]LigangZheng,GuopingQiu,JiwuHuang.SalientCovarianceForNear-duplicateImageAndVideoDetection.Proc.ofIEEEInt.Conf.onImageProcessing,pp.2585-2588,2011.[5]HaotianWu,JiwuHuang.SecureJPEGsteganographybyLSB+matchingandmulti-bandembedding.Proc.ofIEEEInt.Conf.onImageProcessing,pp.2793-2796,2011.[6]Yuan-GenWang,YanqiangLei,JiwuHuang.Animagecopydetectionschemebasedonradontransform.Proc.ofIEEEInt.Conf.onImageProcessing,pp.2893-2896,2010[7]ChuntaoWang,JiangqunNi,HuashuoZhuo,JiwuHuang.Ageometricallyresilientrobustimagewatermarkingschemeusingdeformablemulti-scaletransform.Proc.ofIEEEInt.Conf.onImageProcessing,pp.2893-2896,2010[8]JianCao,JiwuHuang,JiangqunNi.SpreadSpectrumWatermarkingtoAchieveaTrade-offBetweenSecurityandRobustness.Proc.ofInt.WorkshoponInformationHiding2010[9]JianCao,JiwuHuang.ProvablySecureSpread-spectrumWatermarkingSchemesintheKnownMessageAttack.Proc.ofInt.WorkshoponInformationHiding2010[10]DongZhang,JiangqunNi,QipingZeng,Dah-JyeLee,andJiwuHuang.SecurityAnalysisofISSWatermarkingUsingNaturalSceneStatistics.Proc.ofInt.WorkshoponInformationHiding2010[11]RuiYang,YunQ.Shi,JiwuHuang.Detectingdoublecompressionofaudiosignal.Proc.IS&T/SPIEElectronicImaging2010:MediaForensicsandSecurityXII,2010.1[12]ZhenhuaQu,GuopingQiu,andJiwuHuang.DetectDigitalImageSplicingwithVisualCues.Proc.of11thInt.WorkshoponInformationHiding.LNCS5806,pp.247-261,2009[13]XinzhiYao,HongmeiLiu,WeiRui,JiwuHuang.Content-basedauthenticationalgorithmforbinaryimages.Proc.of2007IEEEInt.Conf.onImageProcessing,pp.2893-2896,2009[14]RuiYang,YunQ.Shi,JiwuHuang.DefeatingFake-QualityMP3.Proc.ofthe11thACMWorkshoponMultimediaandSecurity,pp.117-124,2009[15]YongWang,JiwuHuang.RobustAVSAudioWatermarking.Proc.of8thIntWorkshoponDigitalProcessing,LNCS5703,pp.29-38,2009[16]ChongChen,JiangqunNi,JiwuHuang:TemporalStatisticBasedVideoWatermarkingSchemeRobustagainstGeometricAttacksandFrameDropping.Proc.of8thInt.WorkshoponDigitalWatermarking,LNCS5703,pp.81-95,2009[17]JiangqunNi,RongyueZhang,JiwuHuang.WatermarkingSecurityIncorporatingNaturalSceneStatistics.Proc.of10thInt.WorkshoponInformationHiding.LNCS5284,pp.132-146,2008.[18]ZhenhuaQu,WeiqiLuo,JiwuHuang,“Aconvolutivemixingmodelforshifteddoublejpegcompressionwithapplicationtopassiveimageauthentication,”Proc.ofIEEEInt.Conf.onAccoust,SpeechandSignalProcessing,2008,1661-1664.[19]FangjunHuang,BinLi,JiwuHuang.UniversalJPEGsteganalysisbasedonmicroscopicandmacroscopiccalibration.Proc.of2008IEEEInt.Conf.onImageProcessing,pp.2068-2071,2008[20]FangjunHuang,YunQ.Shi,JiwuHuang.AstudyonsecurityperformanceofYASS.Proc.of2008IEEEInt.Conf.onImageProcessing,pp.2084-2087,2008.[21]XianguiKang,XiongZhong,JiwuHuang,WenjunZeng.Anefficientprint-scanningresilientdatahidingschemebasedonanovelLPM.Proc.of2008IEEEInt.Conf.onImageProcessing,pp.2080-2083,2008[22]WeiqiLuo,MinWu,JiwuHuang.MPEGrecompressiondetectionbasedonblockartifacts.Proc.ofSPIE:Security,Forensics,Steganography,andWatermarkingofMultimediaContentsX.Volume6819,pp.68190X-68190X-12,2008.[23]BinLi,JiwuHuang,YunQ.Shi.Texturalfeaturebaseduniversalsteganalysis.Proc.ofSPIE:Forensics,Steganography,andWatermarkingofMultimediaContentsX.Volume6819,pp.681912-681912-12,2008[24]BinLi,YunQ.Shi,JiwuHuang:SteganalysisofYASS.Proc.ofthe10thACMWorkshoponMultimediaandSecurity,pp:139-148,2008[25]RuiYang,ZhenhuaQu,JiwuHuang:Detectingdigitalaudioforgeriesbycheckingframeoffsets.Proc.ofthe10thACMWorkshoponMultimediaandSecurity,pp:21-26,2008[26]ChuntaoWang,JiangqunNi,JiwuHuang,RongyueZhang,MeiyingHuang.Robustandhighcapacityimagewatermarkingbasedonjointlycodingandembeddingoptimization.Proc.of9thInt.WorkshoponInformationHiding.LNCS4567,pp.65-79.2007[27]WeiqiLuo,ZhenhuaQu,JiwuHuang,GuopingQiu.Anovelmethodfordetectingcroppedandrecompressedimageblock.Proc.ofIEEEInt.Conf.onAccoust,SpeechandSignalProcessing,2007,vol.II217-220.[28]JiangqunNi,ChuntaoWang,JiwuHuang,RongyueZhang,MeiyingHuang.AGA-basedjointcodingandembeddingoptimizationforrobustandhighcapacityimagewatermarking.Proc.ofIEEEInt.Conf.onAccoust,SpeechandSignalProcessing,2007,vol.II181-184.[29]HongmeiLiu,WeiRui,JiwuHuang.BinaryimageauthenticationusingZernikemoments.Proc.of2007IEEEInt.Conf.onImageProcessing,vol.1,pp.385-388.[30]BinLi,FangjunHuang,JiwuHuang.SteganalysisofLSBGreedyEmbeddingAlgorithmforJPEGImagesUsingCoefficientSymmetry.Proc.ofIEEE2007Int.Conf.onImageProcessing.vol.1,pp.413-416,2007[31]FangjunHuang,BinLi,JiwuHuang.Attacklsbmatchingsteganographybycountingalterationrateofthenumberofneighbourhoodgraylevels.Proc.of2007IEEEInt.Conf.onImageProcessing.vol.1,pp.401-404,2007[32]XianguiKang,ChunhuiLiu,WenjunZeng,JiwuHuang,CongbaiLiu.FastandAutomaticWatermarkResynchronizationbasedonZernikeMoments.Proc.ofSPIE:Security,Steganography,andWatermarkingofMultimediaContentsVIII.2007,vol.6505,pp.65050E-1-10[33]YongWang,ShaoquanWu,JiwuHuang.Audiowatermarkingrobusttogeometricaldistortionsbasedondyadicwavelettransform.Proc.ofSPIE:Security,Steganography,andWatermarkingofMultimediaContentsVIII.2007,vol.6505,pp.65050A-1-12.[34]ShunquanTan,JiwuHuang,andYunQ.Shi.SteganalysisofEnhancedBPCSSteganographyUsingtheHilbert-HuangTransformBasedSequentialAnalysis.Proc.of6thIntWorkshoponDigitalWatermarking,LNCS5041,pp.143-157,2007[35]BinLi,FangjunHuang,ShunquanTan,JiwuHuang,YunQ.Shi.EffectofCodingPatternonCompressionDomainBasedUniversalJPEGSteganalysis.Proc.of6thInt.WorkshoponDigitalWatermarking,LNCS5041,pp.112-126,2007联系办法实验室:广州大学城中山大学东校区实验楼B-502。Tel:020-39332715,Fax:020-39332716Email:isshjw@mail.sysu.edu.cnJiwuHuang________________________________________________________________________________PositionandContactInformationProfessoranddean,SchoolofInformationScienceandTechnology,SunYat-senUniversity,China.Address:Dr.JiwuHUANGSchoolofInformationScienceandTechnologySunYat-SenUniversityGuangzhouHighEducationMegaCity,PanyuDistrictGuangzhou,510006P.R.ChinaTel:(86)20-39332715(o)Fax:(86)20-39332716Email:isshjw@mail.sysu.edu.cn________________________________________________________________________________Education:Ph.D.PatternRecognitionandIntelligentSystem,InstituteofAutomation,ChineseAcademyofScience,China,1998M.S.ElectronicEngineering,TsinghuaUniversity,China,1987B.S.ElectronicEngineering,XidianUniversity,China,1982,________________________________________________________________________________RESEARCHINTERESTING:DigitalWatermarkingandDataHiding,MultimediaForensicsandSecurity,MultimediaSignalProcessing________________________________________________________________________________HONORANDAWARDS:1.Thefirst-gradeawardinteaching,GuangdongProvinceGovernment,China,20102.Thebeststudentpaperaward,8thInternationalWorkshoponDigitalWatermarking(Pusan,Korea)in2008.3.Thefirst-gradeawardinscienceresearch,theNationalMinistryofEducation,China,20044.ChinaNationalFundsforDistinguishedYoungScientists,NSFofChina,20035.TheBestPaperAwardinNatureScienceinGuangdongProvince,20016.Thefirst-gradeawardforexcellentjournalpaper,ChinaSocietyandTechnologyAssociation,2009________________________________________________________________________________RECENTRESEARCHGRANTS(PI)1.“SecurityTechnologyandEvaluationforDigitalMedia,”NSFofChina,2007.1~2010.12.2.“SecurityforVisualMediainNetworks,”NationalBasicResearchProgramofChina(973program),theMinistryofScienceandTechnology,China,2010.1~2014.8.3.“ContentSecurityforVisualMedia,”NationalBasicResearchProgramofChina(973program),theMinistryofScienceandTechnology,China,2006.9~2010.8.________________________________________________________________________________ProfessionalActivitiesAssociateEditor,IEEETrans.onInformationForensicsandSecurityAssociateEditor,EURASIPJournalonInformationSecurity(Hindawi),2008-presentAssociateEditor,LNCSTransactionsonDataHidingandMultimediaSecurity(Springer-Verlag)2006-presentMemberofMultimediaSystemsandApplicationsTechnicalCommittee,IEEECircuitsandSystemsSociety,2002-presentMemberofInformationForensicsandSecurityTechnicalCommittee,IEEESignalProcessingSociety,2012.1-2014.12Chair,GuangzhouChapterofIEEECircuitsandSystemsSociety,2008-presentChair,GuangzhouChapterofIEEESignalProcessingSociety,2010-presentBoGmember,AsiaPacificSignalandInformationProcessingAssociation(APSIPA),2009-presentPresident,GuangdongAssociationofImageandGraphics,China,2001-2009.________________________________________________________________________________BOOKandBOOKCHAPTERs1.YuminWang,TongZhang,JiwuHuang,QingkuanDong.InformationHidingTechnology:TheoryandApplications.TsinghuaUniversityPress,20062.Y.Q.Shi,J.Huang,andH.K.Lee.SpreadSpectrumVideoDataHiding,InterleavingandSynchronization.IntelligentWatermarkingTechniques,Chapter18,pp.515-558,WorldScientificPublishingCompany.3.XianguiKang,JiwuHuang,Yun.Q.Shi.ImageDataHidingRobusttoBothGeometricDistortionandJPEGCompression.MultimediaSecurityHandbook(Ed.BorkoFurhtandDarkoKirovski),Chapter15,pp.467-492.CRCPress.2004.4.FangjunHuang,BinLi,Y.Q.Shi,JiwuHuang,GuorongXuan,“ImageSteganalysis”,IntelligentMultimediaAnalysisforSecurityApplications,(Ed.HusrevTahaSencar),Chapter3,pp.275-303,Springer,2010.________________________________________________________________________________SOMESELECTEDJOURNALPAPERS1.YanqiangLei,WeiqiLuo,YuangenWang,JiwuHuang.VideoSequenceMatchingBasedontheInvarianceofColorCorrelation.IEEETrans.onCircuitsandSystemsforVideoTechnology.(accepted)2.ChuntaoWang,JiangqunNi,JiwuHuang.AnInformedWatermarkingSchemeUsingHiddenMarkovModelintheWaveletDomain.IEEETrans.onInformationForensics&Security.(accepted)3.RuiYang,ZhenhuaQu,JiwuHuang.ExposingMP3AudioForgeriesUsingFrameOffsets.ACMTrans.onMultimediaComputing,Communications,andApplications.(accepted)4.JianLi,HongmeiLiu,JiwuHuang,YunQ.shi.ReferenceIndex-BasedH.264VideoWatermarkingScheme.ACMTrans.onMultimediaComputing,Communications,andApplications.(accepted)5.XianguiKang,YanxiangLi,ZhenhuaQu,JiwuHuang.nhancingSourceCameraIdentificationPerformancewithaCameraReferencePhaseSensorPatternNoise.IEEETrans.onInformationForensics&Security(accepted)6.GuopuZhu,SamKwong,JiwuHuang,andJianquanYang.RandomGrayCodeandItsPerformanceAnalysisforImageHashing.SignalProcessing.91(2011)2178–2193.7.YanqingLei,YunagenWang,JiwuHuang.RobustImageHashinRadonTransformDomainforAuthentication.SignalProcessing:ImageCommunication.26(2011)280–2888.ShijunXiang,JianquanYang,JiwuHuang,“PerceptualVideoHashingRobustAgainstGeometricDistortions,”ScienceChina:InformationSciences.(accepted)9.XianguiKang,Member,IEEE,RuiYang,StudentMember,IEEE,andJiwuHuang.GeometricInvariantAudioWatermarkingBasedonanLCMFeature.IEEETrans.onMultimedia,13(2):181-190,April,2011.10.WeiqiLuo,JiwuHuang.SecurityAnalysisonSpatial±1SteganographyforJPEGDecompressedImages.IEEESignalProcessingLetters,18(1):39-42,2011.11.FangjunHuang,WeiqiLuo,JiwuHuang.SteganalysisofJPEGsteganographywithcomplementaryembeddingstrategy.IETInformationSecurity,5(1):10-18.201112.WeiqiLuo,JiwuHuang.AMoreSecureSteganographyBasedonAdaptivePixel-ValueDifferencingScheme.MultimediaToolsandApplications.Volume52,Issue2,Page407-430,201113.HongmeiLiu,XinzhiYao,JiwuHuang:Minoritycodeswithimprovedembedding
efficiencyforlargepayloads.MultimediaToolsApplications.52(2-3):431-443(2011)14.FangjunHuang,JiwuHuang,YunQ.Shi.DetectingDoubleJPEGCompressionwiththeSameQuantizationMatrix.IEEETrans.onInformationForensics&Security,5(4):838-856.15.WeiqiLuo,YuangenWang,JiwuHuang.DetectionofQuantizationArtifactsandItsApplicationstoTransformEncoderIdentification.IEEETrans.onInformationForensics&Security,5(4):810-815,201016.FangjunHuang,JiwuHuang,YunQ.Shi.AnExperimentalStudyontheSecurityPerformanceofYASS.IEEETrans.onInformationForensics&Security,5(3):374-38017.WeiqiLuo,JiwuHuang.JPEGErrorAnalysisandItsApplicationstoDigitalImageForensics.IEEETrans.onInformationForensics&Security,5(3):480-49118.WeiqiLuo,FangjunHuang,JiwuHuang.EdgeAdaptiveImageSteganographyBasedonLSBMatchingRevisited.IEEETrans.onInformationForensics&Security,5(2):201-214,2010.19.XianguiKang,JiwuHuang,WenjunZeng.EfficientGeneralPrint-ScanningResilientDataHidingBasedonUniformLog-polarMapping.IEEETrans.onInformationForensics&Security,5(1):1-12,2010.20.GuopuZhu,JiwuHuang,SamKwong,JianquanYang.FragilityAnalysisofAdaptiveQuantizationBasedImageHashing.IEEETrans.onInformationForensics&Security,5(1):133-147,2010.21.YongWang,ShaoquanWu,andJiwuHuang.AudioWatermarkingSchemeRobustagainstDesynchronizationBasedontheDyadicWaveletTransform,EURASIPJournalonAdvancesinSignalProcessing,Volume2010(2010),ArticleID232616,17pages22.HongmeiLiu,XinzhiYaoandJiwuHuang.“Semi-FragileZernikeMoment-BasedImageWatermarkingforAuthentication”EURASIPJournalonAdvancesinSignalProcessing,Volume2010(2010),ArticleID341856,17pages23.YongWang,JiwuHuang.RobustAVSAudioWatermarking.ScienceChina:InformationSciences.53(3):607-618.201024.GuopuZhu,JiwuHuang,SamKwong,JianquanYang.AStudyontheRandomnessMeasureofImage.IEEETrans.onInformationForensics&Security,4(4):928-932,200925.BinLi,JiwuHuang,YunQ.Shi.SteganalysisofYASS.IEEETrans.onInformationForensics&Security,4(3):369-382,2009.26.XianguiKang,JiwuHuang,WenjunZeng,YunQ.Shi.Non-ambiguityofBlindWatermarking:aRevisitwithAnalyticalResolution.ScienceinChinaSeriesF:InformationSciences.52(2):276-285,2009.2.27.FengPan,JiongbinChen,JiwuHuang.DiscriminatingComputerGraphicsImagesandNaturalImagesUsingFractalGeometry.ScienceinChinaSeriesF:InformationSciences.52(2):329-337,2009.2.28.FangJunHuang,JiwuHuang:CalibrationbaseduniversalJPEGsteganalysis.ScienceinChinaSeriesF:InformationSciences,52(2):260-268(2009)29.XianguiKang,JiwuHuang,WenjunZeng.ImprovingRobustnessofQuantization-BasedImagewatermarkingviaAdaptiveReceiver.IEEETrans.onMultimedia,vol.10,no.6,pp.953-959,Oct.2008.30.ShijunXiang,Hyoung-JoongKim,JiwuHuang.InvariantImageWatermarkingBasedontheStatisticalFeaturesintheLow-FrequencyDomain.IEEETrans.onCircuitsandSystemsforVideoTechnology,18(6):777-790,2008.31.ShijunXiang,HJKimandJiwuHuang“AudioWatermarkingRobusttoTime-ScaleModificationandMP3Compression”SignalProcessing,vol.88,pp.2372-2388.2008.32.BinLi,YanmeiFangandJiwuHuang.SteganalysisofMultiple-BaseNotationalSystemSteganography.IEEESignalProcessingLetter,vol.15,pp.493-496.200833.ShijunXiang,JiwuHuang.Histogram-BasedAudioWatermarkingagainstTime-ScaleModificationsandCroppingAttacks.IEEETrans.onMultimedia.9(7):1357-1372,2007.34.NingBi;QiyuSun;DarenHuang;ZhihuaYang;JiwuHuang.RobustImageWatermarkingBasedonMultibandWaveletsandEmpiricalModeDecomposition.IEEETrans.onImageProcessing.2007,16(8):1956-1966.35.LUOWeiqi,QUZhenhua,PANFeng,HUANGJiwu.ASurveyofPassiveTechnologyforDigitalImageForensics.FrontiersofComputerScienceinChina.1(2):166-179.200736.YongjianHu,SamKwong,JiwuHuang.Anewmethodofreversiblevisiblewatermarking.IEEETrans.onCircuitsandSystemsforVideoTechnology.16(1):129-133,2006.37.JunhuiHe,JiwuHuang.Steganalysisofstochasticmodulationsteganography.ScienceinChina:SeriesFInformationSciences,2006,49(3):273-285.38.ShaoquanWu,JiwuHuang,DarenHuang,YunQ.Shi,EfficientlySelf-SynchronizedAudioWatermarkingforAssuredAudioDataTransmission.IEEETrans.onBroadcasting.2005,51(1):69-76.39.XianguiKang,JiwuHuang,YunQ.Shi,YanLin.ADWT-DFTcompositewatermarkingschemerobusttobothaffinetransformandJPEGcompression.IEEETrans.onCircuitsandSystemsforVideoTechnology.2003,13(8):776-786.40.JiwuHuang,YunQ.Shi.ReliableInformationBitHiding.IEEETrans.onCircuitsandSystemsforVideoTechnology.2002,12(10):916-920.41.JunquanHu,JiwuHuang,DarenHuang.YunQ.Shi,ImageFragileWatermarkingBasedonFusionofMulti-ResolutionTamperDetection.IEEElectronicsLetters.2002,38(24):1512-1513.42.JiwuHuang,YunQ.Shi,YiShi,EmbeddingimagewatermarksinDCcomponents,IEEETrans.onCircuitsandSystemsforVideoTechnology.2000,10(6),pp.974-979.________________________________________________________________________________SOMESELECTEDCONFERENCEPAPERS1.LigangZheng,GuopingQiu,JiwuHuang.EfficientCoarse-To-FineNear-DuplicateImageDetectionInRiemannianManifold.Proc.ofIEEEInt.Conf.onAcoustics,SpeechandSignalProcessing(accepted)2.DaLuo,WeiqiLuo,RuiYang,JiwuHuang.CompressionHistoryIdentificationforDigitalAudioSignal.Proc.ofIEEEInt.Conf.onAcoustics,SpeechandSignalProcessing(accepted)3.PeijiaZheng,JiwuHuang.ImplementationoftheDiscreteWaveletTransformandMultiresolutionAnalysisintheEncryptedDomain.ACMMultimedia2011,pp.413-422.4.LigangZheng,GuopingQiu,JiwuHuang.SalientCovarianceForNear-duplicateImageAndVideoDetection.Proc.ofIEEEInt.Conf.onImageProcessing,pp.2585-2588,2011.5.HaotianWu,JiwuHuang.SecureJPEGsteganographybyLSB+matchingandmulti-bandembedding.Proc.ofIEEEInt.Conf.onImageProcessing,pp.2793-2796,2011.6.Yuan-GenWang,YanqiangLei,JiwuHuang.Animagecopydetectionschemebasedonradontransform.Proc.ofIEEEInt.Conf.onImageProcessing,pp.2893-2896,20107.ChuntaoWang,JiangqunNi,HuashuoZhuo,JiwuHuang.Ageometricallyresilientrobustimagewatermarkingschemeusingdeformablemulti-scaletransform.Proc.ofIEEEInt.Conf.onImageProcessing,pp.2893-2896,20108.JianCao,JiwuHuang,JiangqunNi.SpreadSpectrumWatermarkingtoAchieveaTrade-offBetweenSecurityandRobustness.Proc.ofInt.WorkshoponInformationHiding20109.JianCao,JiwuHuang.ProvablySecureSpread-spectrumWatermarkingSchemesintheKnownMessageAttack.Proc.ofInt.WorkshoponInformationHiding201010.DongZhang,JiangqunNi,QipingZeng,Dah-JyeLee,andJiwuHuang.SecurityAnalysisofISSWatermarkingUsingNaturalSceneStatistics.Proc.ofInt.WorkshoponInformationHiding201011.RuiYang,YunQ.Shi,JiwuHuang.Detectingdoublecompressionofaudiosignal.Proc.IS&T/SPIEElectronicImaging2010:MediaForensicsandSecurityXII,2010.112.ZhenhuaQu,GuopingQiu,andJiwuHuang.DetectDigitalImageSplicingwithVisualCues.Proc.of11thInt.WorkshoponInformationHiding.LNCS5806,pp.247-261,200913.XinzhiYao,HongmeiLiu,WeiRui,JiwuHuang.Content-basedauthenticationalgorithmforbinaryimages.Proc.of2007IEEEInt.Conf.onImageProcessing,pp.2893-2896,200914.RuiYang,YunQ.Shi,JiwuHuang.DefeatingFake-QualityMP3.Proc.ofthe11thACMWorkshoponMultimediaandSecurity,pp.117-124,200915.YongWang,JiwuHuang.RobustAVSAudioWatermarking.Proc.of8thIntWorkshoponDigitalProcessing,LNCS5703,pp.29-38,200916.ChongChen,JiangqunNi,JiwuHuang:TemporalStatisticBasedVideoWatermarkingSchemeRobustagainstGeometricAttacksandFrameDropping.Proc.of8thInt.WorkshoponDigitalWatermarking,LNCS5703,pp.81-95,200917.JiangqunNi,RongyueZhang,JiwuHuang.WatermarkingSecurityIncorporatingNaturalSceneStatistics.Proc.of10thInt.WorkshoponInformationHiding.LNCS5284,pp.132-146,2008.18.ZhenhuaQu,WeiqiLuo,JiwuHuang,“Aconvolutivemixingmodelforshifteddoublejpegcompressionwithapplicationtopassiveimageauthentication,”Proc.ofIEEEInt.Conf.onAccoust,SpeechandSignalProcessing,2008,1661-1664.19.FangjunHuang,BinLi,JiwuHuang.UniversalJPEGsteganalysisbasedonmicroscopicandmacroscopiccalibration.Proc.of2008IEEEInt.Conf.onImageProcessing,pp.2068-2071,200820.FangjunHuang,YunQ.Shi,JiwuHuang.AstudyonsecurityperformanceofYASS.Proc.of2008IEEEInt.Conf.onImageProcessing,pp.2084-2087,2008.21.XianguiKang,XiongZhong,JiwuHuang,WenjunZeng.Anefficientprint-scanningresilientdatahidingschemebasedonanovelLPM.Proc.of2008IEEEInt.Conf.onImageProcessing,pp.2080-2083,200822.WeiqiLuo,MinWu,JiwuHuang.MPEGrecompressiondetectionbasedonblockartifacts.Proc.ofSPIE:Security,Forensics,Steganography,andWatermarkingofMultimediaContentsX.Volume6819,pp.68190X-68190X-12,2008.23.BinLi,JiwuHuang,YunQ.Shi.Texturalfeaturebaseduniversalsteganalysis.Proc.ofSPIE:Forensics,Steganography,andWatermarkingofMultimediaContentsX.Volume6819,pp.681912-681912-12,200824.BinLi,YunQ.Shi,JiwuHuang:SteganalysisofYASS.Proc.ofthe10thACMWorkshoponMultimediaandSecurity,pp:139-148,200825.RuiYang,ZhenhuaQu,JiwuHuang:Detectingdigitalaudioforgeriesbycheckingframeoffsets.Proc.ofthe10thACMWorkshoponMultimediaandSecurity,pp:21-26,200826.ChuntaoWang,JiangqunNi,JiwuHuang,RongyueZhang,MeiyingHuang.Robustandhighcapacityimagewatermarkingbasedonjointlycodingandembeddingoptimization.Proc.of9thInt.WorkshoponInformationHiding.LNCS4567,pp.65-79.200727.WeiqiLuo,ZhenhuaQu,JiwuHuang,GuopingQiu.Anovelmethodfordetectingcroppedandrecompressedimageblock.Proc.ofIEEEInt.Conf.onAccoust,SpeechandSignalProcessing,2007,vol.II217-220.