Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jiwu Huang is active.

Publication


Featured researches published by Jiwu Huang.


IEEE Transactions on Information Forensics and Security | 2010

Edge Adaptive Image Steganography Based on LSB Matching Revisited

Weiqi Luo; Fangjun Huang; Jiwu Huang

The least-significant-bit (LSB)-based approach is a popular type of steganographic algorithms in the spatial domain. However, we find that in most existing approaches, the choice of embedding positions within a cover image mainly depends on a pseudorandom number generator without considering the relationship between the image content itself and the size of the secret message. Thus the smooth/flat regions in the cover images will inevitably be contaminated after data hiding even at a low embedding rate, and this will lead to poor visual quality and low security based on our analysis and extensive experiments, especially for those images with many smooth regions. In this paper, we expand the LSB matching revisited image steganography and propose an edge adaptive scheme which can select the embedding regions according to the size of secret message and the difference between two consecutive pixels in the cover image. For lower embedding rates, only sharper edge regions are used while keeping the other smoother regions as they are. When the embedding rate increases, more edge regions can be released adaptively for data hiding by adjusting just a few parameters. The experimental results evaluated on 6000 natural images with three specific and four universal steganalytic algorithms show that the new scheme can enhance the security significantly compared with typical LSB-based approaches as well as their edge adaptive ones, such as pixel-value-differencing-based approaches, while preserving higher visual quality of stego images at the same time.


IEEE Transactions on Circuits and Systems for Video Technology | 2003

A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression

Xiangui Kang; Jiwu Huang; Yun Q. Shi; Yan Lin

Robustness is a crucially important issue in watermarking. Robustness against geometric distortion and JPEG compression at the same time with blind extraction remains especially challenging. A blind discrete wavelet transform-discrete Fourier transform (DWT-DFT) composite image watermarking algorithm that is robust against both affine transformation and JPEG compression is proposed. The algorithm improves robustness by using a new embedding strategy, watermark structure, 2D interleaving, and synchronization technique. A spread-spectrum-based informative watermark with a training sequence is embedded in the coefficients of the LL subband in the DWT domain while a template is embedded in the middle frequency components in the DFT domain. In watermark extraction, we first detect the template in a possibly corrupted watermarked image to obtain the parameters of an affine transform and convert the image back to its original shape. Then, we perform translation registration using the training sequence embedded in the DWT domain, and, finally, extract the informative watermark. Experimental work demonstrates that the proposed algorithm generates a more robust watermark than other reported watermarking algorithms. Specifically it is robust simultaneously against almost all affine transform related testing functions in StirMark 3.1 and JPEG compression with quality factor as low as 10. While the approach is presented for gray-level images, it can also be applied to color images and video sequences.


IEEE Transactions on Circuits and Systems for Video Technology | 2000

Embedding image watermarks in dc components

Jiwu Huang; Yun Q. Shi; Yi Shi

Both watermark structure and embedding strategy affect robustness of image watermarks. Where should watermarks be embedded in the discrete cosine transform (DCT) domain in order for the invisible image watermarks to be robust? Though many papers in the literature agree that watermarks should be embedded in perceptually significant components, dc components are explicitly excluded from watermark embedding. In this letter, a new embedding strategy for watermarking is proposed based on a quantitative analysis on the magnitudes of DCT components of host images. We argue that more robustness can be achieved if watermarks are embedded in dc components since dc components have much larger perceptual capacity than any ac components. Based on this idea, an adaptive watermarking algorithm is presented. We incorporate the feature of texture masking and luminance masking of the human visual system into watermarking. Experimental results demonstrate that the invisible watermarks embedded with the proposed watermark algorithm are very robust.


international conference on pattern recognition | 2006

Robust Detection of Region-Duplication Forgery in Digital Image

Weiqi Luo; Jiwu Huang; Guoping Qiu

Region duplication forgery, in which a part of a digital image is copied and then pasted to another portion of the same image in order to conceal an important object in the scene, is one of the common image forgery techniques. In this paper, we describe an efficient and robust algorithm for detecting and localizing this type of malicious tampering. We present experimental results which show that our method is robust and can successfully detect this type of tampering for images that have been subjected to various forms of post region duplication image processing, including blurring, noise contamination, severe lossy compression, and a mixture of these processing operations


IEEE Transactions on Broadcasting | 2005

Efficiently self-synchronized audio watermarking for assured audio data transmission

Shaoquan Wu; Jiwu Huang; Daren Huang; Yun Q. Shi

In this paper, we propose a self-synchronization algorithm for audio watermarking to facilitate assured audio data transmission. The synchronization codes are embedded into audio with the informative data, thus the embedded data have the self-synchronization ability. To achieve robustness, we embed the synchronization codes and the hidden informative data into the low frequency coefficients in DWT (discrete wavelet transform) domain. By exploiting the time-frequency localization characteristics of DWT, the computational load in searching synchronization codes has been dramatically reduced, thus resolving the contending requirements between robustness of hidden data and efficiency of synchronization codes searching. The performance of the proposed scheme in terms of SNR (signal to noise ratio) and BER (bit error rate) is analyzed. An estimation formula that connects SNR with embedding strength has been provided to ensure the transparency of embedded data. BER under Gaussian noise corruption has been estimated to evaluate the performance of the proposed scheme. The experimental results are presented to demonstrate that the embedded data are robust against most common signal processing and attacks, such as Gaussian noise corruption, resampling, requantization, cropping, and MP3 compression.


IEEE Transactions on Image Processing | 2007

Robust Image Watermarking Based on Multiband Wavelets and Empirical Mode Decomposition

Ning Bi; Qiyu Sun; Daren Huang; Zhihua Yang; Jiwu Huang

In this paper, we propose a blind image watermarking algorithm based on the multiband wavelet transformation and the empirical mode decomposition. Unlike the watermark algorithms based on the traditional two-band wavelet transform, where the watermark bits are embedded directly on the wavelet coefficients, in the proposed scheme, we embed the watermark bits in the mean trend of some middle-frequency subimages in the wavelet domain. We further select appropriate dilation factor and filters in the multiband wavelet transform to achieve better performance in terms of perceptually invisibility and the robustness of the watermark. The experimental results show that the proposed blind watermarking scheme is robust against JPEG compression, Gaussian noise, salt and pepper noise, median filtering, and Con-vFilter attacks. The comparison analysis demonstrate that our scheme has better performance than the watermarking schemes reported recently.


multimedia signal processing | 2008

Detecting doubly compressed JPEG images by using Mode Based First Digit Features

Bin Li; Yun Q. Shi; Jiwu Huang

In this paper, we utilize the probabilities of the first digits of quantized DCT (discrete cosine transform) coefficients from individual AC (alternate current) modes to detect doubly compressed JPEG images. Our proposed features, named by mode based first digit features (MBFDF), have been shown to outperform all previous methods on discriminating doubly compressed JPEG images from singly compressed JPEG images. Furthermore, combining the MBFDF with a multi-class classification strategy can be exploited to identify the quality factor in the primary JPEG compression, thus successfully revealing the double JPEG compression history of a given JPEG image.


IEEE Transactions on Circuits and Systems for Video Technology | 2008

Invariant Image Watermarking Based on Statistical Features in the Low-Frequency Domain

Shijun Xiang; Hyoung Joong Kim; Jiwu Huang

Watermark resistance to geometric attacks is an important issue in the image watermarking community. Most countermeasures proposed in the literature usually focus on the problem of global affine transforms such as rotation, scaling and translation (RST), but few are resistant to challenging cropping and random bending attacks (RBAs). The main reason is that in the existing watermarking algorithms, those exploited robust features are more or less related to the pixel position. In this paper, we present an image watermarking scheme by the use of two statistical features (the histogram shape and the mean) in the Gaussian filtered low-frequency component of images. The two features are: 1) mathematically invariant to scaling the size of images; 2) independent of the pixel position in the image plane; 3)statistically resistant to cropping; and 4) robust to interpolation errors during geometric transformations, and common image processing operations. As a result, the watermarking system provides a satisfactory performance for those content-preserving geometric deformations and image processing operations, including JPEG compression, lowpass filtering, cropping and RBAs.


IEEE Transactions on Information Forensics and Security | 2012

Enhancing Source Camera Identification Performance With a Camera Reference Phase Sensor Pattern Noise

Xiangui Kang; Yinxiang Li; Zhenhua Qu; Jiwu Huang

Sensor pattern noise (SPN) extracted from digital images has been proved to be a unique fingerprint of digital cameras. However, SPN can be contaminated largely in the frequency domain by image content and nonunique artefacts of JPEG compression, on-sensor signal transfer, sensor design, color interpolation. The source camera identification (CI) performance based on SPN needs to be improved for small sizes of images and especially in resisting JPEG compression. Because the SPN is modelled as an additive white Gaussian noise (AWGN) in its extraction process from an image, it is reasonable to assume the camera reference SPN to be a white noise signal in order to remove the interference mentioned above. The noise residues (SPN) extracted from the original images are whitened first, then they are averaged to generate the camera reference SPN. Motivated by Goljan s test statistic peak to correlation energy (PCE), we propose to use correlation to circular correlation norm (CCN) as the test statistic, which can lower the false positive rate to be a half of that with PCE. Theoretical analysis shows that the proposed CI method can remove the interference and raise the CCN value of a positive sample and thus achieve greater CI performance, CCN values of the negative sample class with the proposed method follow the normal distribution N (0,1) and the false positive rate can be calculated. Compared with the existing state of the art on seven cameras, 1400 photos totally (200 for each camera), the experimental results show that the proposed CI method achieves the best receiver operating characteristic (ROC) performance among all CI methods in all cases and especially achieves much better resistance to JPEG compression than all of the existing state-of-the-art CI methods.


international symposium on circuits and systems | 2002

A blind audio watermarking algorithm with self-synchronization

Jiwu Huang; Yong Wang; Yun Q. Shi

A blind audio information bit hiding algorithm with effective synchronization is proposed in this paper. The algorithm embeds synchronization signals in the time domain to resist the attacks such as cropping while keeping the computation for resynchronization lower. The watermark is placed in blockwise DCT coefficients of the original audio exploiting the HAS (Human Audio System) features. To lower the bit error rate of the watermark in extraction, error-correcting coding is applied. The experimental results show that the hidden imperceptible watermark is robust to the attacks caused by additive noise, MP3 coding, and cropping.

Collaboration


Dive into the Jiwu Huang's collaboration.

Top Co-Authors

Avatar

Yun Q. Shi

New Jersey Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Weiqi Luo

Sun Yat-sen University

View shared research outputs
Top Co-Authors

Avatar

Bin Li

Sun Yat-sen University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hongmei Liu

Sun Yat-sen University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jiangqun Ni

Sun Yat-sen University

View shared research outputs
Top Co-Authors

Avatar

Rui Yang

Sun Yat-sen University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Haodong Li

Sun Yat-sen University

View shared research outputs
Researchain Logo
Decentralizing Knowledge