学术活动
  2010-3-16
  2010-3-16
  2010-3-16
  2009-7-18
  2009-7-18
 

黄继武    Huang Jiwu







同名作者区分

黄继武 中山大学黄继武 汕头大学
注:C-DBLP的重名区分功能部分使用了清华大学王建勇老师课题组提出的GHOST(GrapH-based framewOrk for name diStincTion)算法,在此表示感谢。
共检索到结果36条  被引100次[注:ScholarSpace内自引数]
查看黄继武的合作作者    在DBLP中查找该作者文献
查看该作者的单位历史    作者项目历史

论文列表


注:被引数指ScholarSpace内自引数
No. 论文信息 被引数
2013
36 杨锐 骆伟祺 黄继武 . 多媒体取证. 中国科学F辑, 2013, (12): 0
2012
35 项世军 杨建权 黄继武 . 抗几何失真的视频Hashing算法研究. 中国科学F辑, 2012, (05): - 0
2009
34 赵慧民 康显桂 黄继武 . 基于非对称数据结构实现信息隐藏通信的方法研究. , 2009, (06): 1362-1367 0
33 黄方军 黄继武 . 基于图像校准的通用型JPEG隐写分析. 中国科学F辑, 2009, (04): 0
32 康显桂 黄继武 曾文军 施云庆 . 数字媒体水印非协议模糊性. 中国科学F辑, 2009, (04): 0
2008
31 王春桃 倪江群 黄继武 张荣跃 . 结合Zernike矩和模板具有RST不变性的DWT-HMM鲁棒水印算法. 中国图象图形学报, 2008, 13 (07): 1250-1257 0
30 梁长垠 李昂 黄继武 . 基于MPEG压缩的视频认证算法测试平台. 电子学报, 2008, (S1): 2
2007
29 骆伟祺 黄继武 丘国平 . 鲁棒的区域复制图像篡改检测技术. 计算机学报, 2007, 30 (11): 1998-2007 9
28 沈昌祥 张焕国 冯登国 曹珍富 黄继武 . 信息安全综述. , 2007, (): 129-151 29
27 沈昌祥 张焕国 冯登国 曹珍富 黄继武 . 信息安全综述. 中国科学F辑, 2007, 37 (02): 129-150 0
2006
26 项世军 黄继武 王永雄 . 一种抗D/A和A/D变换的音频水印算法. 计算机学报, 2006, 29 (02): 308-316 0
25 李春 黄继武 . 一种抗JPEG压缩的半脆弱图像水印算法. 软件学报, 2006, 17 (02): 315-324 7
24 方艳梅 谷利民 黄继武 . 利用边信息嵌入的CDMA水印信道性能研究. 电子学报, 2006, 34 (01): 45-50 1
23 谭舜泉 黄继武 杨志华 . 基于Hilbert-Huang变换的JPEG2000隐写分析. 计算机学报, 2006, 29 (09): 1702-1710 0
2005
22 谷利民 方艳梅 黄继武 . 基于叠加嵌入的码分多址数字水印信道性能分析. 计算机学报, 2005, 28 (02): 268-273 1
21 张荣跃 倪江群 黄继武 . 基于小波域HMM模型的稳健多比特图像水印算法. 软件学报, 2005, 16 (07): 1323-1332 2
20 陈泽文 王继林 黄继武 王育民 黄达人 . ACJT群签名方案中成员撤消的高效实现. 软件学报, 2005, 16 (01): 151-157 6
2004
19 康显桂 黄继武 林彦 杨群生 . 抗仿射变换的扩频图像水印算法. 电子学报, 2004, 32 (01): 8-12 4
18 吴绍权 黄继武 黄达人 . 基于小波变换的自同步音频水印算法. 计算机学报, 2004, 27 (03): 365-370 5
17 谷利民 黄继武 . 数字水印信道中的分组码编码策略分析. 软件学报, 2004, 15 (09): 1413-1422 1
16 陈泽文 张龙军 王育民 黄继武 黄达人 . 一种基于中国剩余定理的群签名方案. 电子学报, 2004, 32 (07): 1062-1065 2
15 杨群生 黄继武 康显桂 . 直方图加权均值滤波器. 电子学报, 2004, 32 (07): 1108-1111 0
2003
14 王泳 黄继武 Yun Q.Shi . 快速重同步的有意义音频水印盲检测算法. 计算机研究与发展, 2003, 40 (02): 215-220 0
13 胡军全 黄继武 黄达人 . 一种基于HVS的图像易碎水印. 电子学报, 2003, 31 (07): 1057-1061 1
12 胡军全 黄继武 张龙军 黄达人 . 结合数字签名和数字水印的多媒体认证系统. 软件学报, 2003, 14 (06): 1157-1163 1
11 方艳梅 黄继武 . 基于CDMA扩频技术的图象水印算法. 中国图象图形学报, 2003, 8 (11): 1314-1319 0
2002
10 黄达人 刘九芬 黄继武 . 小波变换域图像水印嵌入对策和算法. 软件学报, 2002, 13 (07): 1290-1297 19
2001
9 刘红梅 黄继武 肖自美 . 一种小波变换域的自适应视频水印算法. 电子学报, 2001, 29 (12): 1656-1660 2
8 张敏 黄继武 戴宪华 钟京 . 面向任务的医学图象压缩. 中国图象图形学报, 2001, 6 (07): 675-680 0
7 程卫东 黄继武 刘红梅 . 基于三维DCT的彩色图象自适应水印算法. 电子学报, 2001, (S1): 2
6 黄继武 G.F.Elmasry 程卫东 Yun Q.Shi . 基于匹配滤波的有意义图像水印算法. 电子学报, 2001, 29 (04): 447-451 0
2000
5 黄继武 YunQ.SHI 程卫东 . DCT域图像水印:嵌入对策和算法. 电子学报, 2000, 28 (04): 57-61 0
1999
4 黄继武 YunQ.Shi 姚若河 . 基于块分类的自适应图象水印算法. 中国图象图形学报, 1999, 4 (08): 640-643 0
3 黄继武 戴宪华 . 基于视觉特性的图象分割编码算法. 中国图象图形学报, 1999, 4 (05): 400-404 5
1997
2 黄继武 戴汝为 . 图象块编码—分类的方法. 中国图象图形学报, 1997, 2 (12): 890-894 1
1 戴宪华 黄继武 . 一种收敛于全局无偏最优解的非线性自回归(NAR)预测. 电子学报, 1997, 25 (12): 96-99 0

DBLP检索到的论文列表

No. Paper Inforamtion
2014
1 Bin Li, Shunquan Tan, Ming Wang, Jiwu Huang, Investigation on Cost Assignment in Spatial Image Steganography. IEEE Transactions on Information Forensics and Security, 2014, IEEE Transactions on Information Forensics and Security, 9(8): 1264-1277
0 Haojun Wu, Yong Wang, Jiwu Huang, Identification of Electronic Disguised Voices. IEEE Transactions on Information Forensics and Security, 2014, IEEE Transactions on Information Forensics and Security, 9(3): 489-500
-1 Ligang Zheng, Guoping Qiu, Jiwu Huang, Jiang Duan, Fast and accurate Nearest Neighbor search in the manifolds of symmetric positive definite matrices. ICASSP, 2014
-2 Yanqiang Lei, Ligang Zheng, Jiwu Huang, Geometric invariant features in the Radon transform domain for near-duplicate image detection. Pattern Recognition, 2014, Pattern Recognition, 47(11): 3630-3640
-3 Chao Chen, Haodong Li, Weiqi Luo, Rui Yang, Jiwu Huang, Anti-forensics of JPEG Detectors via Adaptive Quantization Table Replacement. ICPR, 2014
-4 Yanqiang Lei, Guoping Qiu, Ligang Zheng, Jiwu Huang, Fast Near-Duplicate Image Detection Using Uniform Randomized Trees. TOMCCAP, 2014, TOMCCAP, 10(4): 35
-5 Da Luo, Weiqi Luo, Rui Yang, Jiwu Huang, Identifying Compression History of Wave Audio and Its Applications. TOMCCAP, 2014, TOMCCAP, 10(3): 30
-6 Da Luo, Rui Yang, Jiwu Huang, Detecting double compressed AMR audio using deep learning. ICASSP, 2014
2013
-7 Hui Zeng, Xiangui Kang, Jiwu Huang, Mixed-strategy Nash equilibrium in the camera source identification game. ICIP, 2013
-8 Peijia Zheng, Jiwu Huang, An efficient image homomorphic encryption scheme with small ciphertext expansion. ACM Multimedia, 2013
-9 Chenglong Chen, Jiangqun Ni, Jiwu Huang, Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach. IEEE Transactions on Image Processing, 2013, IEEE Transactions on Image Processing, 22(12): 4699-4710
-10 Shan Bian, Weiqi Luo, Jiwu Huang, Exposing fake bitrate video and its original bitrate. ICIP, 2013
-11 Peijia Zheng, Jiwu Huang, Discrete Wavelet Transform and Data Expansion Reduction in Homomorphic Encrypted Domain. IEEE Transactions on Image Processing, 2013, IEEE Transactions on Image Processing, 22(6): 2455-2468
-12 Haojun Wu, Yong Wang, Jiwu Huang, Blind detection of electronic disguised voice. ICASSP, 2013
-13 Zhenhua Qu, Xiangui Kang, Jiwu Huang, Yinxiang Li, Forensic sensor pattern noise extraction from large image data set. ICASSP, 2013
2012
-14 Fangjun Huang, Jiwu Huang, Yun-Qing Shi, New Channel Selection Rule for JPEG Steganography. IEEE Transactions on Information Forensics and Security, 2012, IEEE Transactions on Information Forensics and Security, 7(4): 1181-1191
-15 Da Luo, Weiqi Luo, Rui Yang, Jiwu Huang, Compression history identification for digital audio signal. ICASSP, 2012
-16 Hao-Tian Wu, Jiwu Huang, Reversible image watermarking on prediction errors by efficient histogram modification. Signal Processing, 2012, Signal Processing, 92(12): 3000-3009
-17 Xiangui Kang, Yinxiang Li, Zhenhua Qu, Jiwu Huang, Enhancing Source Camera Identification Performance With a Camera Reference Phase Sensor Pattern Noise. IEEE Transactions on Information Forensics and Security, 2012, IEEE Transactions on Information Forensics and Security, 7(2): 393-402
-18 Zhongwei He, Wei Lu, Wei Sun 0007, Jiwu Huang, Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recognition, 2012, Pattern Recognition, 45(12): 4292-4299
-19 Ligang Zheng, Yanqiang Lei, Guoping Qiu, Jiwu Huang, Near-Duplicate Image Detection in a Visually Salient Riemannian Space. IEEE Transactions on Information Forensics and Security, 2012, IEEE Transactions on Information Forensics and Security, 7(5): 1578-1593
-20 Chuntao Wang, Jiangqun Ni, Jiwu Huang, An Informed Watermarking Scheme Using Hidden Markov Model in the Wavelet Domain. IEEE Transactions on Information Forensics and Security, 2012, IEEE Transactions on Information Forensics and Security, 7(3): 853-867
-21 Ligang Zheng, Guoping Qiu, Jiwu Huang, Efficient coarse-to-fine near-duplicate image detection in riemannian manifold. ICASSP, 2012
-22 Haodong Li, Weiqi Luo, Jiwu Huang, Countering anti-JPEG compression forensics. ICIP, 2012
-23 Jian Cao, Jiwu Huang, Controllable Secure Watermarking Technique for Tradeoff Between Robustness and Security. IEEE Transactions on Information Forensics and Security, 2012, IEEE Transactions on Information Forensics and Security, 7(2): 821-826
2011
-24 Peijia Zheng, Jiwu Huang, Implementation of the discrete wavelet transform and multiresolution analysis in the encrypted domain. ACM Multimedia, 2011
-25 Ligang Zheng, Guoping Qiu, Jiwu Huang, Hao Fu, Salient covariance for near-duplicate image and video detection. ICIP, 2011
-26 Xiangui Kang, Rui Yang, Jiwu Huang, Geometric Invariant Audio Watermarking Based on an LCM Feature. IEEE Transactions on Multimedia, 2011, IEEE Transactions on Multimedia, 13(2): 181-190
-27 Hao-Tian Wu, Jiwu Huang, Secure JPEG steganography by LSB+ matching and multi-band embedding. ICIP, 2011
-28 Fangjun Huang, Weiqi Luo, Jiwu Huang, Steganalysis of JPEG steganography with complementary embedding strategy. IET Information Security, 2011, IET Information Security, 5(1): 10-18
-29 Guopu Zhu, Sam Kwong, Jiwu Huang, Jianquan Yang, Random Gray code and its performance analysis for image hashing. Signal Processing, 2011, Signal Processing, 91(9): 2178-2193
2010
-30 Weiqi Luo, Yuan-Gen Wang, Jiwu Huang, Detection of Quantization Artifacts and Its Applications to Transform Encoder Identification. IEEE Transactions on Information Forensics and Security, 2010, IEEE Transactions on Information Forensics and Security, 5(4): 810-815
-31 Xiangui Kang, Jiwu Huang, Wenjun Zeng, Efficient general print-scanning resilient data hiding based on uniform log-polar mapping. IEEE Transactions on Information Forensics and Security, 2010, IEEE Transactions on Information Forensics and Security, 5(1): 1-12
-32 Weiqi Luo, Fangjun Huang, Jiwu Huang, Edge adaptive image steganography based on LSB matching revisited. IEEE Transactions on Information Forensics and Security, 2010, IEEE Transactions on Information Forensics and Security, 5(2): 201-214
-33 Fangjun Huang, Jiwu Huang, Yun-Qing Shi, Detecting Double JPEG Compression With the Same Quantization Matrix. IEEE Transactions on Information Forensics and Security, 2010, IEEE Transactions on Information Forensics and Security, 5(4): 848-856
-34 Weiqi Luo, Jiwu Huang, Guoping Qiu, JPEG error analysis and its applications to digital image forensics. IEEE Transactions on Information Forensics and Security, 2010, IEEE Transactions on Information Forensics and Security, 5(3): 480-491
-35 Chuntao Wang, Jiangqun Ni, Huashuo Zhuo, Jiwu Huang, A geometrically resilient robust image watermarking scheme using deformable multi-scale transform. ICIP, 2010
-36 Fangjun Huang, Jiwu Huang, Yun-Qing Shi, An experimental study on the security performance of YASS. IEEE Transactions on Information Forensics and Security, 2010, IEEE Transactions on Information Forensics and Security, 5(3): 374-380
-37 Yuan-Gen Wang, Yanqiang Lei, Jiwu Huang, An image copy detection scheme based on radon transform. ICIP, 2010
-38 Guopu Zhu, Jiwu Huang, Sam Kwong, Jianquan Yang, Fragility analysis of adaptive quantization-based image hashing. IEEE Transactions on Information Forensics and Security, 2010, IEEE Transactions on Information Forensics and Security, 5(1): 133-147
2009
-39 Xinzhi Yao, Hongmei Liu, Wei Rui, Jiwu Huang, Content-based authentication algorithm for binary images. ICIP, 2009
-40 Guopu Zhu, Jiwu Huang, Sam Kwong, Jianquan Yang, A study on the randomness measure of image hashing. IEEE Transactions on Information Forensics and Security, 2009, IEEE Transactions on Information Forensics and Security, 4(4): 928-932
-41 Bin Li, Jiwu Huang, Yun-Qing Shi, Steganalysis of YASS. IEEE Transactions on Information Forensics and Security, 2009, IEEE Transactions on Information Forensics and Security, 4(3): 369-382
2008
-42 Fangjun Huang, Yun Q. Shi, Jiwu Huang, A study on security performance of YASS. ICIP, 2008
-43 Zhenhua Qu, Weiqi Luo, Jiwu Huang, A convolutive mixing model for shifted double JPEG compression with application to passive image authentication. ICASSP, 2008
-44 Xiangui Kang, Jiwu Huang, Wenjun Zeng, Improving Robustness of Quantization-Based Image Watermarking via Adaptive Receiver. IEEE Transactions on Multimedia, 2008, IEEE Transactions on Multimedia, 10(6): 953-959
-45 Xiangui Kang, Xiong Zhong, Jiwu Huang, Wenjun Zeng, An efficient print-scanning resilient data hiding scheme based on a novel LPM. ICIP, 2008
-46 Shijun Xiang, Hyoung-Joong Kim, Jiwu Huang, Audio watermarking robust against time-scale modification and MP3 compression. Signal Processing, 2008, Signal Processing, 88(10): 2372-2387
-47 Fangjun Huang, Bin Li, Jiwu Huang, Universal JPEG steganalysis based on microscopic and macroscopic calibration. ICIP, 2008
2007
-48 Shijun Xiang, Jiwu Huang, Histogram-Based Audio Watermarking Against Time-Scale Modification and Cropping Attacks. IEEE Transactions on Multimedia, 2007, IEEE Transactions on Multimedia, 9(7): 1357-1372
-49 Ning Bi, Qiyu Sun, Daren Huang, Zhihua Yang, Jiwu Huang, Robust Image Watermarking Based on Multiband Wavelets and Empirical Mode Decomposition. IEEE Transactions on Image Processing, 2007, IEEE Transactions on Image Processing, 16(8): 1956-1966
2006
-50 Hongmei Liu, Huiying Fu, Jiwu Huang, A Watermarking Algorithm for JPEG File. PCM, 2006
-51 Shunquan Tan, Jiwu Huang, Zhihua Yang, Yun Q. Shi, Steganalysis of JPEG2000 Lazy-Mode Steganography using the Hilbert-Huang Transform Based Sequential Analysis. ICIP, 2006
-52 Hongmei Liu, Ling Zhu, Jiwu Huang, A Hybrid Watermarking Scheme for Video Authentication. ICIP, 2006
-53 Jiangqun Ni, Chuntao Wang, Jiwu Huang, Rongyue Zhang, Performance Enhancement for DWT-HMM Image Watermarking with Content-Adaptive Approach. ICIP, 2006
2004
-54 Jiwu Huang, Junquan Hu, Daren Huang, Yun Q. Shi, Improve security of fragile watermarking via parameterized wavelet. ICIP, 2004
-55 Xiangui Kang, Jiwu Huang, Yun Q. Shi, Improve robustness of image watermarking via adaptive receiving. ICIP, 2004
2001
-56 Daren Huang, Jiufen Liu, Jiwu Huang, Hongmei Liu, A Dwt-Based Image Watermarking Algorithm. ICME, 2001
-57 Hongmei Liu, Jiwu Huang, Zi-mei Xiao, An Adaptive Video Watermarking Algorithm. ICME, 2001

承担项目历史

*注:由于资助项目信息是由程序自动集成,因此以下项目信息仅供参考,如有任何错误,请联系rucwamdm(at)gmail(dot)com
项目起止年份项目名称项目类别经费(万)
2012~2015网络媒体内容服务安全理论与关键技术 国家自然科学基金-联合资助基金项目
项目号:U1135001
260
2007~2007第6届国际数字水印学术会议 国家自然科学基金-国际(地区)合作与交流项目
项目号:60710300018
4
2007~2010数字媒体内容安全关键技术及评测方法的研究 国家自然科学基金-重点项目
项目号:60633030
220
2006~2008信息隐藏的安全性和稳健性研究 国家自然科学基金-重大研究计划
项目号:90604008
35
2004~20042004年度NSFC/RGC联合基金评审会 国家自然科学基金-国际(地区)合作与交流项目
项目号:60410260485
.6
2004~2004IEEE 电路与系统学会2004年会 国家自然科学基金-国际(地区)合作与交流项目
项目号:60410206110
1
2004~2007计算机在新应用领域中的基础研究 国家自然科学基金-国家杰出青年科学基金
项目号:60325208
100
2003~20032003国际数字水印研讨会 国家自然科学基金-国际(地区)合作与交流项目
项目号:60310206239
1
2002~20022002中韩双边电子商务及安全研讨会 国家自然科学基金-国际(地区)合作与交流项目
项目号:60211240367
.4
2002~2004信息隐藏理论与方法的研究 国家自然科学基金-面上项目
项目号:60172067
20
2000~2002数字图像隐形水印理论与方法的研究 国家自然科学基金-面上项目
项目号:69975011
13

合作作者列表

1 G.F.Elmasry [6]  
2 Yun Q.Shi [14]   [6]  
3 YunQ.Shi [4]  
4 YunQ.SHI [5]  
5 丘国平 [29]  
6 倪江群 [21]   [31]  
7 冯登国 [27]   [28]  
8 刘九芬 [10]  
9 刘红梅 [7]   [9]  
10 吴绍权 [18]  
11 姚若河 [4]  
12 康显桂 [19]   [15]  [34]  [32]  
13 张敏 [8]  
14 张焕国 [27]   [28]  
15 张荣跃 [21]   [31]  
16 张龙军 [12]   [16]  
17 戴宪华 [3]   [8]  [1]  
18 戴汝为 [2]  
19 方艳梅 [22]   [11]  [24]  
20 施云庆 [32]  
21 曹珍富 [27]   [28]  
22 曾文军 [32]  
23 李昂 [30]  
24 李春 [25]  
25 杨建权 [35]  
26 杨志华 [23]  
27 杨群生 [19]   [15]  
28 杨锐 [36]  
29 林彦 [19]  
30 梁长垠 [30]  
31 沈昌祥 [27]   [28]  
32 王春桃 [31]  
33 王永雄 [26]  
34 王泳 [14]  
35 王继林 [20]  
36 王育民 [20]   [16]  
37 程卫东 [5]   [7]  [6]  
38 肖自美 [9]  
39 胡军全 [12]   [13]  
40 谭舜泉 [23]  
41 谷利民 [22]   [17]  [24]  
42 赵慧民 [34]  
43 钟京 [8]  
44 陈泽文 [20]   [16]  
45 项世军 [26]   [35]  
46 骆伟祺 [29]   [36]  
47 黄方军 [33]  
48 黄达人 [10]   [12]  [18]  [20]  [13]  [16]  

单位历史信息

中山大学信息科学与技术学院 (2003--2013)
中山大学电子与通信工程系 (2001--2008)

说明: 作者的单位历史信息是根据本系统中论文的单位信息采用算法自动计算得到,部分信息可能不准确,仅供参考。