HOME
SERVICE
PUBLICATIONS
PROJECTS
LAB
ALUMNI
RECRUIT
English
English
中文 (简体)
Publications
Type
Conference paper
Journal article
Book section
Date
2019
2018
2017
2016
2015
2014
2013
2011
2010
2009
2008
Ziwen He
,
Wei Wang
,
Xinsheng Xuan
,
Jing Dong
,
Tieniu Tan
(2019).
A New Ensemble Method for Concessively Targeted Multi-model Attack
.
arXiv preprint arXiv:1912.10833
.
PDF
Cite
Xinsheng Xuan
,
Bo Peng
,
Wei Wang
,
Jing Dong
(2019).
On the Generalization of GAN Image Forensics
.
Chinese Conference on Biometric Recognition
.
PDF
Cite
DOI
Hanzhou Wu
,
Wei Wang
,
Jing Dong
,
Hongxia Wang
(2019).
New Graph-Theoretic Approach to Social Steganography
.
Electronic Imaging
.
PDF
Cite
DOI
Zhigao Zeng
,
Lianghua Guan
,
Wenqiu Zhu
,
Jing Dong
,
Jun Li
(2019).
Face Recognition Based on SVM Optimized by the Improved Bacterial Foraging Optimization Algorithm
.
International Journal of Pattern Recognition and Artificial Intelligence
.
Cite
DOI
Mingyun Bian
,
Bo Peng
,
Wei Wang
,
Jing Dong
(2019).
An Accurate LSTM Based Video Heart Rate Estimation Method
.
Chinese Conference on Pattern Recognition and Computer Vision (PRCV)
.
PDF
Cite
DOI
Kui Ye
,
Jing Dong
,
Wei Wang
,
Bo Peng
,
Tieniu Tan
(2018).
Feature Pyramid Deep Matching and Localization Network for Image Forensics
.
2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC)
.
PDF
Cite
DOI
Yinlong Qian
,
Jing Dong
,
Wei Wang
,
Tieniu Tan
(2018).
Feature learning for steganalysis using convolutional neural networks
.
Multimedia Tools and Applications
.
PDF
Cite
DOI
Hanzhou Wu
,
Wei Wang
,
Jing Dong
,
Hongxia Wang
(2018).
Ensemble Reversible Data Hiding
.
2018 24th International Conference on Pattern Recognition (ICPR)
.
PDF
Cite
DOI
Jiedong Hao
,
Jing Dong
,
Wei Wang
,
Tieniu Tan
(2018).
DeepFirearm: Learning Discriminative Feature Representation for Fine-grained Firearm Retrieval
.
2018 24th International Conference on Pattern Recognition (ICPR)
.
PDF
Cite
DOI
Wei Wang
,
Jing Dong
,
Yinlong Qian
,
Tieniu Tan
(2018).
Deep Steganalysis: End-to-End Learning with Supervisory Information beyond Class Labels
.
arXiv preprint arXiv:1806.10443
.
PDF
Cite
Hanzhou Wu
,
Wei Wang
,
Jing Dong
,
Hongxia Wang
,
Lizhi Xiong
(2018).
The Cut and Dominating Set Problem in A Steganographer Network
.
arXiv preprint arXiv:1802.09333
.
PDF
Cite
Bo Peng
,
Wei Wang
,
Jing Dong
,
Tieniu Tan
(2018).
Image Forensics Based on Planar Contact Constraints of 3D Objects
.
IEEE Transactions on Information Forensics and Security
.
PDF
Cite
DOI
Haichao Shi
,
Jing Dong
,
Wei Wang
,
Yinlong Qian
,
Xiaoyu Zhang
(2018).
SSGAN: Secure Steganography Based on Generative Adversarial Networks
.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
.
PDF
Cite
DOI
Hanzhou Wu
,
Wei Wang
,
Jing Dong
,
Yanli Chen
,
Hongxia Wang
,
Songyang Wu
(2018).
Reversible Embedding to Covers Full of Boundaries
.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
.
PDF
Cite
DOI
Chuan Qin
,
Ping Ji
,
Chin Chen Chang
,
Jing Dong
,
Xingming Sun
(2018).
Non-uniform Watermark Sharing Based on Optimal Iterative BTC for Image Tampering Recovery
.
IEEE Multimedia
.
Cite
DOI
Hailiang Li
,
Qingxiao Guan
,
Haidong Wang
,
Jing Dong
(2018).
Deep-MATEM: TEM query image based cross-modal retrieval for material science literature
.
Multimedia Tools and Applications
.
Cite
DOI
Yonggwon Ri
,
Jing Dong
,
Wei Wang
,
Tieniu Tan
(2018).
Adaptive Histogram Shifting Based Reversible Data Hiding
.
Smart Innovation, Systems and Technologies
.
PDF
Cite
DOI
Zai-Ran Wang
,
Jing Dong
,
Wei Wang
(2017).
Quantization based watermarking methods against valumetric distortions
.
International Journal of Automation and Computing
.
PDF
Cite
DOI
Hanzhou Wu
,
Wei Wang
,
Jing Dong
,
Yiliang Xiong
,
Hongxia Wang
(2017).
A Graph-theoretic Model to Steganography on Social Networks
.
arXiv preprint arXiv:1712.03621
.
PDF
Cite
Bo Peng
,
Wei Wang
,
Jing Dong
,
Tieniu Tan
(2017).
Position Determines Perspective: Investigating Perspective Distortion for Image Forensics of Faces
.
2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)
.
PDF
Cite
DOI
Jiedong Hao
,
Wei Wang
,
Jing Dong
,
Tieniu Tan
(2017).
MFC: A multi-scale fully convolutional approach for visual instance retrieval
.
2017 IEEE International Conference on Multimedia & Expo Workshops (ICMEW)
.
PDF
Cite
DOI
Bo Peng
,
Wei Wang
,
Jing Dong
,
Tieniu Tan
(2017).
Optimized 3D Lighting Environment Estimation for Image Forgery Detection
.
IEEE Transactions on Information Forensics and Security
.
PDF
Cite
DOI
Jing Dong
,
Wei Wang
,
Yinlong Qian
(2017).
Recent Advances in Image Steganalysis
.
Journal of Image and Signal Processing
.
PDF
Cite
DOI
Kui Ye
,
Jing Dong
,
Wei Wang
,
Jindong Xu
,
Tieniu Tan
(2017).
Image Forgery Detection Based on Semantic Image Understanding
.
Communications in Computer and Information Science
.
PDF
Cite
DOI
Yonggwon Ri
,
Jing Dong
,
Wei Wang
,
Tieniu Tan
(2017).
High Capacity Reversible Data Hiding with Contrast Enhancement
.
Communications in Computer and Information Science
.
PDF
Cite
DOI
Chuan Qin
,
Ping Ji
,
Xinpeng Zhang
,
Jing Dong
,
Jinwei Wang
(2017).
Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy
.
Signal Processing
.
Cite
DOI
Chuan Qin
,
Xueqin Chen
,
Jing Dong
,
Xinpeng Zhang
(2016).
Perceptual image hashing with selective sampling for salient structure features
.
Displays
.
Cite
DOI
Jiedong Hao
,
Jing Dong
,
Wei Wang
,
Tieniu Tan
(2016).
What Is the Best Practice for CNNs Applied to Visual Instance Retrieval?
.
arXiv preprint arXiv:1611.01640
.
PDF
Cite
Yinlong Qian
,
Jing Dong
,
Wei Wang
,
Tieniu Tan
(2016).
Learning and transferring representations for image steganalysis using convolutional neural network
.
2016 IEEE International Conference on Image Processing (ICIP)
.
PDF
Cite
DOI
Bo Peng
,
Wei Wang
,
Jing Dong
,
Tieniu Tan
(2016).
Automatic detection of 3D lighting inconsistencies via a facial landmark based morphable model
.
2016 IEEE International Conference on Image Processing (ICIP)
.
PDF
Cite
DOI
Yinlong Qian
,
Jing Dong
,
Wei Wang
,
Tieniu Tan
(2016).
Learning Representations for Steganalysis from Regularized CNN Model with Auxiliary Tasks
.
Lecture Notes in Electrical Engineering
.
PDF
Cite
DOI
Xikai Xu
,
Jing Dong
,
Wei Wang
,
Tieniu Tan
(2016).
An Adaptive Ensemble Classifier for Steganalysis Based on Dynamic Weighted Fusion
.
Lecture Notes in Electrical Engineering
.
PDF
Cite
DOI
Bo Peng
,
Wei Wang
,
Jing Dong
,
Tieniu Tan
(2015).
Improved 3D lighting environment estimation for image forgery detection
.
2015 IEEE International Workshop on Information Forensics and Security (WIFS)
.
PDF
Cite
DOI
Xikai Xu
,
Jing Dong
,
Wei Wang
,
Tieniu Tan
(2015).
Robust steganalysis based on training set construction and ensemble classifiers weighting
.
2015 IEEE International Conference on Image Processing (ICIP)
.
PDF
Cite
DOI
Xikai Xu
,
Jing Dong
,
Wei Wang
,
Tieniu Tan
(2015).
Local correlation pattern for image steganalysis
.
2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP)
.
PDF
Cite
DOI
Bo Peng
,
Wei Wang
,
Jing Dong
,
Tieniu Tan
(2015).
Detection of computer generated faces in videos based on pulse signal
.
2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP)
.
PDF
Cite
DOI
Yinlong Qian
,
Jing Dong
,
Wei Wang
,
Tieniu Tan
(2015).
Deep learning for steganalysis via convolutional neural networks
.
Media Watermarking, Security, and Forensics 2015
.
PDF
Cite
DOI
Zairan Wang
,
Jing Dong
,
Wei Wang
,
Tieniu Tan
(2015).
Effects of Fragile and Semi-fragile Watermarking on Iris Recognition System
.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
.
PDF
Cite
DOI
Yinlong Qian
,
Jing Dong
,
Wei Wang
,
Tieniu Tan
(2015).
Deep learning for steganalysis via convolutional neural networks
.
Media Watermarking, Security, and Forensics 2015
.
Cite
DOI
Wei Wang
,
Jing Dong
,
Tieniu Tan
(2014).
Exploring DCT Coefficient Quantization Effects for Local Tampering Detection
.
IEEE Transactions on Information Forensics and Security
.
PDF
Cite
DOI
Zairan Wang
,
Jing Dong
,
Wei Wang
,
Tieniu Tan
(2014).
An effective watermarking method against valumetric distortions
.
2014 IEEE International Conference on Image Processing (ICIP)
.
PDF
Cite
DOI
Zairan Wang
,
Jing Dong
,
Wei Wang
,
Tieniu Tan
(2014).
Improved Robust Watermarking Based on Rational Dither Modulation
.
Communications in Computer and Information Science
.
PDF
Cite
DOI
Xikai Xu
,
Jing Dong
,
Wei Wang
,
Tieniu Tan
(2013).
Video steganalysis based on the constraints of motion vectors
.
2013 IEEE International Conference on Image Processing
.
PDF
Cite
DOI
Jing Dong
,
Wei Wang
,
Tieniu Tan
(2013).
CASIA Image Tampering Detection Evaluation Database
.
2013 IEEE China Summit and International Conference on Signal and Information Processing
.
PDF
Cite
DOI
Wei Wang
,
Jing Dong
,
Tieniu Tan
(2011).
Tampered Region Localization of Digital Color Images Based on JPEG Compression Noise
.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
.
PDF
Cite
DOI
Wei Wang
,
Jing Dong
,
Tieniu Tan
(2011).
Exploring DCT coefficient quantization effect for image tampering localization
.
2011 IEEE International Workshop on Information Forensics and Security
.
PDF
Cite
DOI
Qingxiao Guan
,
Jing Dong
,
Tieniu Tan
(2011).
Blind Quantitative Steganalysis Based on Feature Fusion and Gradient Boosting
.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
.
Cite
DOI
Wei Wang
,
Jing Dong
,
Tieniu Tan
(2010).
Image tampering detection based on stationary distribution of Markov chain
.
2010 IEEE International Conference on Image Processing
.
PDF
Cite
DOI
Patchara Sutthiwan
,
Yun Qing Shi
,
Jing Dong
,
Tieniu Tan
,
Tian Tsong Ng
(2010).
New developments in color image tampering detection
.
ISCAS 2010 - 2010 IEEE International Symposium on Circuits and Systems: Nano-Bio Circuit Fabrics and Systems
.
Cite
DOI
Qingxiao Guan
,
Jing Dong
,
Tieniu Tan
(2010).
Evaluation of feature sets for steganalysis of JPEG image
.
Proceedings - 2010 IEEE Youth Conference on Information, Computing and Telecommunications, YC-ICT 2010
.
Cite
DOI
Wei Wang
,
Jing Dong
,
Tieniu Tan
(2009).
Effective image splicing detection based on image chroma
.
2009 16th IEEE International Conference on Image Processing (ICIP)
.
PDF
Cite
DOI
Jing Dong
,
Wei Wang
,
Tieniu Tan
,
Yun Q Shi
(2009).
Run-Length and Edge Statistics Based Approach for Image Splicing Detection
.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
.
PDF
Cite
DOI
Jing Dong
,
Wei Wang
,
Tieniu Tan
(2009).
Multi-class Blind Steganalysis Based on Image Run-Length Analysis
.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
.
PDF
Cite
DOI
Wei Wang
,
Jing Dong
,
Tieniu Tan
(2009).
A Survey of Passive Image Tampering Detection
.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
.
PDF
Cite
DOI
Jing Dong
,
Tieniu Tan
(2008).
Security enhancement of biometrics, cryptography and data hiding by their combinations
.
IET Conference Publications
.
Cite
DOI
Jing Dong
,
Xiaochuan Chen
,
Lei Guo
,
Tieniu Tan
(2008).
Fusion based blind image seganalysis by boosting feature selection
.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
.
Cite
DOI
Jing Dong
,
Tieniu Tan
(2008).
Effects of watermarking on iris recognition performance
.
2008 10th International Conference on Control, Automation, Robotics and Vision, ICARCV 2008
.
Cite
DOI
Jing Dong
,
Tieniu Tan
(2008).
Blind image steganalysis based on run-length histogram analysis
.
Proceedings - International Conference on Image Processing, ICIP
.
Cite
DOI
Cite
×