Publications

(2019). On the Generalization of GAN Image Forensics. Chinese Conference on Biometric Recognition.

PDF DOI

(2019). An Accurate LSTM Based Video Heart Rate Estimation Method. Chinese Conference on Pattern Recognition and Computer Vision (PRCV).

PDF DOI

(2018). Feature Pyramid Deep Matching and Localization Network for Image Forensics. 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC).

PDF DOI

(2018). Ensemble Reversible Data Hiding. 2018 24th International Conference on Pattern Recognition (ICPR).

PDF DOI

(2018). Image Forensics Based on Planar Contact Constraints of 3D Objects. IEEE Transactions on Information Forensics and Security.

PDF DOI

(2018). SSGAN: Secure Steganography Based on Generative Adversarial Networks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

PDF DOI

(2018). Reversible Embedding to Covers Full of Boundaries. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

PDF DOI

(2017). Position Determines Perspective: Investigating Perspective Distortion for Image Forensics of Faces. 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

PDF DOI

(2017). MFC: A multi-scale fully convolutional approach for visual instance retrieval. 2017 IEEE International Conference on Multimedia & Expo Workshops (ICMEW).

PDF DOI

(2017). Optimized 3D Lighting Environment Estimation for Image Forgery Detection. IEEE Transactions on Information Forensics and Security.

PDF DOI

(2017). Recent Advances in Image Steganalysis. Journal of Image and Signal Processing.

PDF DOI

(2015). Improved 3D lighting environment estimation for image forgery detection. 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

PDF DOI

(2015). Local correlation pattern for image steganalysis. 2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP).

PDF DOI

(2015). Detection of computer generated faces in videos based on pulse signal. 2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP).

PDF DOI

(2015). Effects of Fragile and Semi-fragile Watermarking on Iris Recognition System. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

PDF DOI

(2015). Deep learning for steganalysis via convolutional neural networks. Media Watermarking, Security, and Forensics 2015.

DOI

(2014). Exploring DCT Coefficient Quantization Effects for Local Tampering Detection. IEEE Transactions on Information Forensics and Security.

PDF DOI

(2014). An effective watermarking method against valumetric distortions. 2014 IEEE International Conference on Image Processing (ICIP).

PDF DOI

(2013). Video steganalysis based on the constraints of motion vectors. 2013 IEEE International Conference on Image Processing.

PDF DOI

(2013). CASIA Image Tampering Detection Evaluation Database. 2013 IEEE China Summit and International Conference on Signal and Information Processing.

PDF DOI

(2011). Tampered Region Localization of Digital Color Images Based on JPEG Compression Noise. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

PDF DOI

(2011). Exploring DCT coefficient quantization effect for image tampering localization. 2011 IEEE International Workshop on Information Forensics and Security.

PDF DOI

(2011). Blind Quantitative Steganalysis Based on Feature Fusion and Gradient Boosting. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI

(2010). Image tampering detection based on stationary distribution of Markov chain. 2010 IEEE International Conference on Image Processing.

PDF DOI

(2010). New developments in color image tampering detection. ISCAS 2010 - 2010 IEEE International Symposium on Circuits and Systems: Nano-Bio Circuit Fabrics and Systems.

DOI

(2010). Evaluation of feature sets for steganalysis of JPEG image. Proceedings - 2010 IEEE Youth Conference on Information, Computing and Telecommunications, YC-ICT 2010.

DOI

(2009). Effective image splicing detection based on image chroma. 2009 16th IEEE International Conference on Image Processing (ICIP).

PDF DOI

(2009). Run-Length and Edge Statistics Based Approach for Image Splicing Detection. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

PDF DOI

(2009). Multi-class Blind Steganalysis Based on Image Run-Length Analysis. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

PDF DOI

(2009). A Survey of Passive Image Tampering Detection. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

PDF DOI

(2008). Fusion based blind image seganalysis by boosting feature selection. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).

DOI

(2008). Effects of watermarking on iris recognition performance. 2008 10th International Conference on Control, Automation, Robotics and Vision, ICARCV 2008.

DOI

(2008). Blind image steganalysis based on run-length histogram analysis. Proceedings - International Conference on Image Processing, ICIP.

DOI