default search action
Fangjun Huang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Qinghua Zhang, Fangjun Huang:
Fast hypercomplex continuous orthogonal moments. Expert Syst. Appl. 257: 125056 (2024) - [j30]Yunshu Dai, Jianwei Fei, Fangjun Huang, Zhihua Xia:
Face Omron Ring: Proactive defense against face forgery with identity awareness. Neural Networks 180: 106639 (2024) - [j29]Shengwei Luo, Fangjun Huang:
MaGAT: Mask-Guided Adversarial Training for Defending Face Editing GAN Models From Proactive Defense. IEEE Signal Process. Lett. 31: 969-973 (2024) - [c24]Yunshu Dai, Jianwei Fei, Fangjun Huang:
IDGuard: Robust, General, Identity-Centric POI Proactive Defense Against Face Editing Abuse. CVPR 2024: 11934-11943 - [c23]Shaoyou Zeng, Wenhao Wang, Fangjun Huang, Yanmei Fang:
LOFT: Latent Space Optimization and Generator Fine-Tuning for Defending Against Deepfakes. ICASSP 2024: 4750-4754 - [c22]Haoyu Deng, Yanmei Fang, Fangjun Huang:
Enhancing Adversarial Transferability on Vision Transformer by Permutation-Invariant Attacks. ICME 2024: 1-6 - [c21]Wenhao Wang, Fangjun Huang:
Evading DeepFake Detectors via Conditional Diffusion Models. IH&MMSec 2024: 159-164 - 2023
- [j28]Chen Wan, Fangjun Huang, Xianfeng Zhao:
Average Gradient-Based Adversarial Attack. IEEE Trans. Multim. 25: 9572-9585 (2023) - [i1]Chen Wan, Fangjun Huang:
Adversarial Attack Based on Prediction-Correction. CoRR abs/2306.01809 (2023) - 2022
- [j27]Wenkang Su, Jiangqun Ni, Xianglei Hu, Fangjun Huang:
Towards improving the security of image steganography via minimizing the spatial embedding impact. Digit. Signal Process. 131: 103758 (2022) - [j26]Xie Yang, Taoyu Wu, Fangjun Huang:
Reversible data hiding in JPEG images based on coefficient-first selection. Signal Process. 200: 108639 (2022) - [j25]Xie Yang, Fangjun Huang:
New CNN-Based Predictor for Reversible Data Hiding. IEEE Signal Process. Lett. 29: 2627-2631 (2022) - [c20]Fan Li, Chen Wan, Fangjun Huang:
Adaptive Robust Watermarking Method Based on Deep Neural Networks. IWDW 2022: 162-173 - 2021
- [c19]Chen Wan, Biaohua Ye, Fangjun Huang:
PID-Based Approach to Adversarial Attacks. AAAI 2021: 10033-10040 - 2020
- [j24]Jizhao Liu, Xiangzi Zhang, Qingchun Zhao, Jing Lian, Fangjun Huang, Yide Ma:
A Torus-Chaotic System and Its Pseudorandom Properties. Complex. 2020: 8315658:1-8315658:12 (2020) - [j23]Dan Huang, Fangjun Huang:
Reversible Data Hiding Based on Adaptive Block Selection Strategy. Int. J. Digit. Crime Forensics 12(1): 157-168 (2020) - [j22]Nan Li, Fangjun Huang:
Reversible data hiding for JPEG images based on pairwise nonzero AC coefficient expansion. Signal Process. 171: 107476 (2020) - [c18]Jianqiang Qin, Fangjun Huang:
Reversible Data Hiding Based on Prediction-Error-Ordering. PRCV (1) 2020: 527-537
2010 – 2019
- 2019
- [j21]Suah Kim, Fangjun Huang, Hyoung Joong Kim:
Reversible Data Hiding in JPEG Images Using Quantized DC. Entropy 21(9): 835 (2019) - [j20]Ge Liu, Fangjun Huang, Zhonghua Li:
Designing adaptive JPEG steganography based on the statistical properties in spatial domain. Multim. Tools Appl. 78(7): 8655-8665 (2019) - [j19]Fuqiang Di, Minqing Zhang, Fangjun Huang, Jia Liu, Yongjun Kong:
Reversible data hiding in JPEG images based on zero coefficients and distortion cost function. Multim. Tools Appl. 78(24): 34541-34561 (2019) - [j18]Qin Zhang, Huimei Xiao, Fei Xue, Wei Lu, Hongmei Liu, Fangjun Huang:
Digital image forensics of non-uniform deblurring. Signal Process. Image Commun. 76: 167-177 (2019) - [j17]Jianqiang Qin, Fangjun Huang:
Reversible Data Hiding Based on Multiple Two-Dimensional Histograms Modification. IEEE Signal Process. Lett. 26(6): 843-847 (2019) - [j16]Suah Kim, Rolf Lussi, Xiaochao Qu, Fangjun Huang, Hyoung Joong Kim:
Reversible Data Hiding With Automatic Brightness Preserving Contrast Enhancement. IEEE Trans. Circuits Syst. Video Technol. 29(8): 2271-2284 (2019) - [c17]Xing Lu, Fangjun Huang, Hyoung Joong Kim:
Reversible Data Hiding in JPEG Images Based on Multiple Histograms Modification. ICAIS (3) 2019: 442-454 - [c16]Fangjun Huang, Jiayong Li:
JPEG Reversible Data Hiding with Matrix Embedding. ICIG (3) 2019: 231-243 - [c15]Haihang Wu, Fangjun Huang:
Reversible Data Hiding Based on Partitioning the Prediction Values. IWDW 2019: 195-203 - 2018
- [j15]Fuqiang Di, Fangjun Huang, Minqing Zhang, Jia Liu, Xiaoyuan Yang:
Reversible data hiding in encrypted images with high capacity by bitplane operations and adaptive embedding. Multim. Tools Appl. 77(16): 20917-20935 (2018) - [c14]Sijin Cheng, Fangjun Huang:
Reversible Data Hiding in JPEG Images Based on Two-Dimensional Histogram Modification. ICCCS (4) 2018: 392-403 - 2017
- [j14]Fisseha Teju Wedaj, Suah Kim, Hyoung Joong Kim, Fangjun Huang:
Improved reversible data hiding in JPEG images based on new coefficient selection strategy. EURASIP J. Image Video Process. 2017: 63 (2017) - [c13]Ge Liu, Fangjun Huang, Qi Chen, Zhonghua Li:
A New Universal Steganalyzer for JPEG Images. MLICOM (1) 2017: 145-157 - 2016
- [j13]Fangjun Huang, Hyoung Joong Kim:
Framework for improving the security performance of ordinary distortion functions of JPEG steganography. Multim. Tools Appl. 75(1): 281-296 (2016) - [j12]Fangjun Huang, Xiaochao Qu, Hyoung Joong Kim, Jiwu Huang:
Reversible Data Hiding in JPEG Images. IEEE Trans. Circuits Syst. Video Technol. 26(9): 1610-1621 (2016) - [j11]Fangjun Huang, Jiwu Huang, Yun-Qing Shi:
New Framework for Reversible Data Hiding in Encrypted Domain. IEEE Trans. Inf. Forensics Secur. 11(12): 2777-2789 (2016) - 2015
- [j10]Fangjun Huang, Xiaochao Qu, Hyoung Joong Kim, Jiwu Huang:
Local pixel patterns. Comput. Vis. Media 1(2): 157-170 (2015) - [c12]Yanping Tan, Fangjun Huang, Jiwu Huang:
Feature Selection for High Dimensional Steganalysis. IWDW 2015: 134-144 - 2014
- [c11]Zhensheng Huang, Fangjun Huang, Jiwu Huang:
Detection of double compression with the same bit rate in MPEG-2 videos. ChinaSIP 2014: 306-309 - [c10]Xiaochao Qu, Suah Kim, Run Cui, Fangjun Huang, Hyoung Joong Kim:
Reversible Data Hiding Based on Combined Predictor and Prediction Error Expansion. IWDW 2014: 254-265 - 2013
- [c9]Fangjun Huang, Weiqi Luo, Jiwu Huang, Yun-Qing Shi:
Distortion function designing for JPEG steganography with uncompressed side-image. IH&MMSec 2013: 69-76 - [c8]Fangjun Huang, Yane Zhong, Jiwu Huang:
Improved Algorithm of Edge Adaptive Image Steganography Based on LSB Matching Revisited Algorithm. IWDW 2013: 19-31 - 2012
- [j9]Fangjun Huang, Jiwu Huang, Yun-Qing Shi:
New Channel Selection Rule for JPEG Steganography. IEEE Trans. Inf. Forensics Secur. 7(4): 1181-1191 (2012) - [c7]Yane Zhong, Fangjun Huang, Dong Zhang:
New Channel Selection Criterion for Spatial Domain Steganography. IWDW 2012: 1-7 - 2011
- [j8]Fangjun Huang, Weiqi Luo, Jiwu Huang:
Steganalysis of JPEG steganography with complementary embedding strategy. IET Inf. Secur. 5(1): 10-18 (2011) - [j7]Weiqi Luo, Fangjun Huang, Jiwu Huang:
A more secure steganography based on adaptive pixel-value differencing scheme. Multim. Tools Appl. 52(2-3): 407-430 (2011) - 2010
- [j6]Weiqi Luo, Fangjun Huang, Jiwu Huang:
Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inf. Forensics Secur. 5(2): 201-214 (2010) - [j5]Fangjun Huang, Jiwu Huang, Yun-Qing Shi:
An experimental study on the security performance of YASS. IEEE Trans. Inf. Forensics Secur. 5(3): 374-380 (2010) - [j4]Fangjun Huang, Jiwu Huang, Yun-Qing Shi:
Detecting Double JPEG Compression With the Same Quantization Matrix. IEEE Trans. Inf. Forensics Secur. 5(4): 848-856 (2010) - [c6]Fangjun Huang, Yun-Qing Shi, Jiwu Huang:
New JPEG Steganographic Scheme with High Security Performance. IWDW 2010: 189-201 - [p1]Fangjun Huang, Bin Li, Yun-Qing Shi, Jiwu Huang, Guorong Xuan:
Image Steganalysis. Intelligent Multimedia Analysis for Security Applications 2010: 275-303
2000 – 2009
- 2009
- [j3]Fangjun Huang, Jiwu Huang:
Calibration based universal JPEG steganalysis. Sci. China Ser. F Inf. Sci. 52(2): 260-268 (2009) - 2008
- [j2]Fangjun Huang:
A New General Transparency Model for Block-based Watermarking Method. Int. J. Netw. Secur. 7(2): 235-239 (2008) - [c5]Fangjun Huang, Bin Li, Jiwu Huang:
Universal JPEG steganalysis based on microscopic and macroscopic calibration. ICIP 2008: 2068-2071 - [c4]Fangjun Huang, Yun Q. Shi, Jiwu Huang:
A study on security performance of YASS. ICIP 2008: 2084-2087 - 2007
- [c3]Fangjun Huang, Bin Li, Jiwu Huang:
Attack LSB Matching Steganography by Counting Alteration Rate of the Number of Neighbourhood Gray Levels. ICIP (1) 2007: 401-404 - [c2]Bin Li, Fangjun Huang, Jiwu Huang:
Steganalysis of LSB Greedy Embedding Algorithm for JPEG Images using Coefficient Symmetry. ICIP (1) 2007: 413-416 - [c1]Bin Li, Fangjun Huang, Shunquan Tan, Jiwu Huang, Yun Q. Shi:
Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis. IWDW 2007: 143-157 - 2004
- [j1]Fangjun Huang, Zhi-Hong Guan:
A hybrid SVD-DCT watermarking method based on LPSNR. Pattern Recognit. Lett. 25(15): 1769-1775 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-08 21:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint