欧美在线一级ⅤA免费观看,好吊妞国产欧美日韩观看,日本韩国亚洲综合日韩欧美国产,日本免费A在线

    <menu id="gdpeu"></menu>

  • Aڣ

    1962hAW(xu)cϢW(xu)Ժʿ(do)


    r

    W(xu)(x)(jin)v

    1990ꮅI(y)ͨW(xu)Ϣcƹϵ@Ϣcƹ̌I(y)TʿW(xu)λ2002ꮅI(y)AW(xu)cͨŹϵ@ͨcϢϵy(tng)I(y)ʿW(xu)λ20022004ɽW(xu)(sh)W(xu)ϵ(yng)Ô(sh)W(xu)վӋ(j)㔵(sh)W(xu)I(y)ʿо

    (jin)v

    1998ȺAW(xu)Ԅ(dng)W(xu)ԺŌW(xu)Ժν2004걻Ƹ鸱2008x2010걻(zhn)鲩ʿ(do)20002004gȺ4۳дW(xu)XƌW(xu)ϵքeооTоTо2005520068n(gu)ɾ^W(xu)Sungkyunkwan UniversityϢcͨŹ̌W(xu)Ժо2006920088n(gu)ƌW(xu)g(sh)ԺKAISTӋ(j)C(j)ƌW(xu)ϵоڡ2011420134ܚWFP7ȻƌW(xu)YԬоTMarie Curie FellowӢ(gu)AW(xu)The University of WarwickӋ(j)C(j)ƌW(xu)ϵ¶ýwȫо

    W(xu)g(sh)š

    V|ʡDDΌW(xu)(hu)(gu)(gu)H늚cӹ̎W(xu)(hu)IEEE߼(j)(hu)TЇ(gu)ӌW(xu)(hu)߼(j)(hu)TЇ(gu)Ӌ(j)C(j)W(xu)(hu)߼(j)(hu)T·(gu)Hڿ(sh)ַȡCInternational Journalof Digital Crime and Forensicsĸ(dn)^(g)(gu)HW(xu)g(sh)(hu)hίT(hu)ίT

    ҪоdȤcɹ

    ҪоdȤ

    1Ϣ[أ(sh)ֈDҕlϢ[ȣ2ýwϢȫ(sh)ֈD/ҕl/lȡCʹ۸ęzy(c)ȣ3(sh)ֈD̎䑪(yng)ãĘͲB(ti)R(sh)eȣ

    гɹ

    ֲc10(xing)(gu)H(gu)ʡ(j)(xing)Ŀ˜I(y)λί(xing)Ŀ2000ڇ(gu)(ni)ҪW(xu)g(sh)ڿ(hu)hϰl(f)оՓ60ƪ40ƪSCIEI䛡ҪоdȤ飨1Ϣ[أ(sh)ֈDҕlϢ[ȣ2ýwϢȫ(sh)ֈD/ҕl/lȡCʹ۸ęzy(c)ȣ3(sh)ֈD̎䑪(yng)ãĘͲB(ti)R(sh)eȣ

    W(xu)g(sh)Փ

    Եһl(f)ć(gu)HڿՓx䛣

    [1] Yongjian Hu(), Heung-Kyu Lee, and Jianwei Li, DE-based reversible data hiding with improved overflow location map, IEEE Trans. on Circuits and Systems for Video Technology, vol. 19, no. 2, pp. 250-260, Feb. 2009. 201410ǰΔ(sh)182.SCI䛣

    [2] Yongjian Hu(), Heung-Kyu Lee, Kaiying Chen, and Jianwei Li, Difference expansion based reversible data hiding using two embedding directions, IEEE Trans. on Multimedia, vol. 10, no. 8, pp. 1500-1512, Dec. 2008. 201410ǰΔ(sh)37.SCI䛣

    [3] Yongjian Hu() and Byeungwoo Jeon, Reversible visible watermarking and lossless recovery of original images, IEEE Trans. on Circuits and Systems for Video Technology, vol. 16, no. 11, pp. 1423-1429, Nov. 2006. 201410ǰΔ(sh)81.SCI䛣

    [4] Yongjian Hu(), Sam Kwong and Jiwu Huang, An algorithm for removable visible watermarking, IEEE Trans. on Circuits and Systems for Video Technology, vol. 16, no. 1, pp. 129-133, Jan. 2006. 201410ǰΔ(sh)76.SCI䛣

    [5] Yongjian Hu(), Chang-Tsun Li, Yufei Wang, Bei-bei Liu, An improved fingerprinting algorithm for detection of video frame duplication forgery, International Journal of Digital Crime and Forensics, vol. 4, no. 3, pp. 20-32,July-September 2012.

    [6] Yongjian Hu(), C.-T. Li, C. Zhou and X. Lin, Source camera identification issues: forensic features selection and robustness, International Journal of Digital Crime and Forensics, vol. 3, no. 4, pp. 1-15, October 2011.

    [7] Yongjian Hu()bZhe-Ming Lu, An improved VLC-based lossless data hiding scheme for JPEG images,Elsevier, The Journal of Systems and Software, pp. 2166-2173, Mar. 2013. SCI䛣

    [8] Yongjian Hu(), C.-T. Li, and Z. Lai, "Fast source camera identification using matching signs between query and reference fingerprints," Multimedia Tools and Applications, May 2104 SCIE䛣

    ¹(ji)

    [1] Yongjian Hu, Yufei Wang, Chang-Tsun Li, and Bei-bei Liu, "An Improved Fingerprinting Algorithm for Detection of Video Frame Duplication Forgery", in Emerging Digital Forensics Applications for Crime Detection, Prevention,and Security, ed. by Chang-Tsun Li, IGI Global, Hershey, PA. USA, May 2013.

    l(f)ć(gu)H(hu)hՓx

    [1] Yongjian Hu, Chang-Tsun Li, Xufeng Lin, and Bei-bei Liu,"Audio forensic authentication based on MOCC between ENF and reference signals," in Proc. IEEE Summit & International Conference on Signal and Information Processing, 6-10 July 2013, Beijing China.

    [2] X. Wei, C.-T. Li and Yongjian Hu, Face recognition with occlusion using dynamic Image-to-class warping (DICW), in Proc. IEEE Conference on Automatic Face and Gesture Recognition, Shanghai, China, 22-26 April, 2013.

    [3] Yongjian Hu, Chang-Tsun Li, Zhisheng Lv and Bei-Bei Liu, " Audio forgery detection based on max offsets for cross correlation between ENF and reference signal," in Proc. 11th International Workshop on Digital-Forensics and

    Watermarking, Shanghai, China, 31 Oct. -3 Nov., 2012.

    [4] X. Wei, C.-T. Li and Yongjian Hu, Robust face recognition under varying illumination and occlusion considering structured sparsity, in Proc. International Conference on Digital Image Computing: Techniques and Applications (DICTAu201912), Perth, Australia, 3-5 December 2012.

    [5] Yu Guan, Chang-Tsun Li, and Yongjian Hu, An adaptive system for gait recognition in multi-View environments, in Proc. 14th ACM Workshop on Multimedia and Security, September 6-7, 2012.

    [6] Yu Guan, Chang-Tsun Li, and Yongjian Hu, Random subspace method for gait recognition, in Proc. IEEE International Conference on Multimedia and Expo, Melbourne, Australia, July 9-13, 2012.

    [7] Kan Wang, Yongjian Hu, and Zhe-Ming Lu, "Reversible Data Hiding for Block Truncation Coding Compressed Images Based on Prediction-Error Expansion," in Proc. International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Piraeus-Athens, Greece, July 18-20, 2012.

    [8] Yongjian Hu, Chang-Tsun Li, Xufeng Lin, and Bei-bei Liu, An improved algorithm for camera model identification using inter-channel demosaicking traces, in Proc. International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Piraeus-Athens, Greece, July 18-20, 2012.

    [9] Y. Guan, C.-T. Li and Yongjian Hu, "Robust Clothing-Invariant Gait Recognition, in Proc. International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Piraeus-Athens, Greece, July 18-20, 2012.

    [10] Yongjian Hu, C.-T. Li and Z. Lai, Fast camera fingerprint search algorithm for source camera identification, in Proc. IEEE 5th International Symposium on Communications, Control, and Signal Processing, Rome, Italy, May 2-4, 2012.

    [11] Yu Guan, Chang-Tsun Li, and Yongjian Hu, Gait recognition under carrying condition: a static dynamic fusion method, in Proc. SPIE conference on Optics, Photonics and Digital Technologies for Multimedia Applications, April 16-19, 2012, Brussels, Belgium.

    [12] Xiayang Shi, Bei-bei Liu and Yongjian Hu, Steganalysis using features based on Markov mesh models, in Proc. International Conference on Intelligent Computing and Intelligent Systems, Guangzhou, China, November 18-20, 2011.

    [13] Y.-C Chen, C.-T. Li and Yongjian Hu, Further studies on forensic features for camera source identification, in Proc. IET the 4rd International Conference on Imaging for Crime Detection and Prevention (ICDP-11), London, UK, 3 - 4 November, 2011.

    [14] Yongjian Hu, C.-T. Li and C. Zhou, Issues on selecting image features for robust source camera identification, in Proc. 6th International Annual Workshop on Digital Forensics and Incident Analysis, London, UK, 7- 8 July 2011.

    [15] B.-B Liu, Heung-Kyu Lee, Yongjian Hu, and Chang-Hee Choi, On classification of source cameras: a graph based approach, in Proc. IEEE Workshop on Information Forensics and Security - WIFS10, Seattle, US, December 12-15, 2010.

    [16] Yongjian Hu, Chang-Tsun Li, and Changhui Zhou, "Selecting forensic features for robust source camera identification," in Proc. International Computer Symposium, Taiwan, December 14-16, 2010.

    [17] Yongjian Hu, Chang-Tsun Li, and C. Jian, Building fingerprints with Information from Three Color Bands for Source Camera Identification, in Proc. ACM Multimedia International Conference, Firenze, Italy, Oct. 25-29, 2010.

    [18] B.-B Liu, Yongjian Hu, and Heung-Kyu Lee, Source camera identification from significant noise residual regions, in Proc. IEEE International Conference on Image Processing, Hong Kong, Sept. 26-29, 2010.

    [19] Yongjian Hu, C. Jian and Chang-Tsun Li, Using improved imaging sensor pattern noise for source camera identification, in Proc. IEEE International Conference on Multimedia & Expo, pp. 1481-1486, Singapore, July 19-23, 2010.

    [20] Yongjian Hu, Binghua Yu, and Chao Jian, Source camera identification using large components of sensor pattern noise, in Proc. International Conference on Computer Science and its Applications, pp. 575-579, Dec. 10-12, 2009, South Korea.

    [21] Yongjian Hu, Heung-Kyu Lee, Huafei Zeng, Curve watermarking technique for fingerprinting digital maps, in Proc. IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 223-226, Aug. 2008.

    [22] Yongjian Hu, Heung-Kyu Lee, and Jianwei Li, Reversible data hiding giving priority to the use of edges and textures, in Proc. IET Visual Information Engineering Conference. July 2008.

    [23] Yongjian Hu, Heung-Kyu Lee, Jianwei Li, Kaiying Chen, Reversible data hiding using prediction error values embedding, in 7th International Workshop on Digital Watermarking, Springer-Verlag LNCS vol. 5041, pp. 244-253, 2008.

    [24] Yongjian Hu, Byeungwoo Jeon, Z. Lin, and H. Yang, Analysis and comparison of typical reversible watermarking methods, in 5th International Workshop on Digital Watermarking, Springer-Verlag LNCS vol. 4283, pp. 333-347, 2006.

    [25] Yongjian Hu and Byeungwoo Jeon, Reversible visible watermarking technique for images, in Proc. IEEE International conference on Image Processing, pp. 2577-2580, Oct. 2006.

    [26] Yongjian Hu, Sam Kwong and Jiwu Huang, Using invisible watermarks to protect visibly watermarked images, in Proc. IEEE International Symposium on Circuits and Systems, pp. 584-587, May 2004, Vancouver, Canada.

    [27] Yongjian Hu, Jiwu Huang, Sam Kwong and Y.K. Chan, Image fusion based visible watermarking using dual-tree complex wavelet transform, in 2nd International Workshop on Digital Watermarking, Springer-Verlag LNCS vol. 2939, pp. 86-100, 2004.

    [28] Yongjian Hu, Sam Kwong, An image fusion based visible watermarking algorithm, in Proc. IEEE International Symposium on Circuits and Systems, pp. 25-28, Bangkok, Thailand, May 2003.

    [29] Yongjian Hu, Sam Kwong, The design and application of DWT-domain optimum decoders, in 1st International Workshop on Digital Watermarking, Springer-Verlag LNCS vol. 2613, pp. 22-30, 2002.

    l(f)ĺڿՓx

    [1] ꖣRِmͨߣ. һN؉Kļy탞(yu)m(yng)[㷨ӌW(xu)(bo)20141ͶãŰ.

    [2] P(gun)Awoiؐ. DԴR(sh)㷨ĺ(jin)cAW(xu)W(xu)(bo)W(xu)棩2014vol 42(7): 0-6.

    [3] ־٣ϣiؐ. һNpДC(j)Ƶl۸äzy(c)㷨AW(xu)W(xu)(bo)W(xu)棩20148ڣŰУ.

    [4] _(d)iؐ. ھֲ^(q)ģʽ•Ĕ(sh)ֈDԴR(sh)㷨ϷʹI(y)W(xu)W(xu)(bo), 2012, 35(10).

    [5] iؐ. ɫͨgP(gun)ϵC(j)Դɽ|W(xu)W(xu)(bo), 20123.

    [6] зiؐT. pДC(j)ƵĈD۸ęzy(c)㷨AW(xu)W(xu)(bo)20124.

    [7] iؐ. “(lin)SIFTc(din)CS-LBPӵď(f)ճN۸ęzy(c),ϷʹI(y)W(xu)W(xu)(bo), 2012, 35(3).

    [8] BiT. ģʽĈD^(q)Ιzy(c), Ӌ(j)C(j)cO(sh)Ӌ(j), 20122.

    [9] ,ه־ï,iؐ. ģʽ•̖(ho)ϢĿԴC(j)R(sh), AW(xu)W(xu)(bo). 2011, 39(12): 1-5

    [10] L(zhng)x,,T. ԴC(j)㷨оӋ(j)C(j)(yng)2011, 31 (4):1133-1137.

    [11] L(zhng)x, , Bi. ԴxR(sh)㷨O(sh)Ӌ(j), ɽ|W(xu)W(xu)(bo) 2011, 41(2)62-65.

    [12] , w, . ݆׃Q[㷨ɽ|W(xu)W(xu)(bo) 2011, 41(2): 75-79.

    [13] (jin), òɫDϢԴC(j)R(sh). Ӌ(j)C(j)(yng), 2010, 30(10): 2694-2697.

    [14] A(jin). ģʽ•ϢԴC(j)R(sh)g(sh). Ӌ(j)C(j)(yng), 2010, 30(1): 31-35.

    [15] iؐRǰA. (sh)ֶýwȡCg(sh)C. Ӌ(j)C(j)(yng). 2010, 30(3): 657-661.

    [16] , wt, W(xu), . ڈDֽĈDޏ(f)g(sh). Ӌ(j)C(j), 2010, 36(10): 187-189.

    [17] , wt, W(xu), . M(jn)TVģ͈Dޏ(f)㷨. Ӌ(j)C(j)cO(sh)Ӌ(j), 2010, 31 (4): 776-779.

    [18] , wt, W(xu), . M(jn)ļyϳɈDޏ(f)㷨. Ӌ(j)C(j)(yng)cܛ, 2010, 27(10): 11-13.

    [19] Aw. ʸ(sh)ֵ؈DĿ攵(sh)(j)[㷨. Ӌ(j)C(j)(yng), 2009, 29 (4): 990-993.

    [20] . A(y)y(c)`ֱDƽƵĿ攵(sh)(j)[ؼg(sh). Ї(gu)DDΌW(xu)(bo), 2009, 14(6): 1088-1095.

    [21] Aw, . ڱo(h)؈D(qun)ˮӡ㷨. Ӌ(j)C(j)(yng). 2008, 28(10): 2488-2491.

    [22] . ߅ͼy탞(yu)ȵĿ攵(sh)(j)[㷨. Ӌ(j)C(j)(yng). 2008, 28(6): 76-81.

    [23] _Ӣ. òֵU(ku)չM(jn)п攵(sh)(j)[ص㷨. Ӌ(j)C(j)(yng). 2008, 28(3): 455-459.

    [24] ־Ȫ. һNļsƥ㷨. Ї(gu)DDΌW(xu)(bo). 2007, 12(11): 2104-2108.

    [25] ־Ȫ. LinuxS3C2410ǶʽDݔϵy(tng)O(sh)Ӌ(j). ΢Ӌ(j)C(j)Ϣ, 2007, 8: 20-24.

    [26] ־Ȫ. ڿ(sh)׃Qğopˮӡ㷨. ΢Ӌ(j)C(j)Ϣ. 2007, 12: 199-201.

    [27] Ӣ. СĿҊˮӡ̎. ӌW(xu)(bo), 2003, 31(4): 59-62.

    [28] Ӣ. DWTˮӡzy(c)wϵ䑪(yng). AW(xu)W(xu)(bo)200230(8)44-48.

    TAGS: ИI(y)
    ]
    • Ԭh
      Ԭh ʿ(gu)ݴW(xu)ӞIW(xu)ϵʿhW(xu)W(xu)cӿƌW(xu)W(xu)Ժ/(do)
    • Ů
      Ůָ|hĩIJļļs177ꡪ?ԭѼxr(sh)˾RMļ|hĩ_轿h|hČW(xu)ҲߵŮ...
    • Z
      ZһŰF(xin)ӱ,(x), L(zhng)Ї(gu)BɽˮͨîФ.Rf(xi)(hu)(hu)TЇ(gu)ī“(lin)˕(hu)TЇ(gu)(gu)Hˇg(sh)f(xi)(hu)...
    • Ŵɏ
      ŴɏɽУһ߼(j)r(nng)ˇƷССȫgCϷμg(sh)(du)ջջȫ¶ʮ˵ĿCȡ
    • ܵ
      ܵhˎﻯW(xu)ʿW(xu)W(xu)ڣƼ973ϯƌW(xu)ȫ(gu)xˎ^ƌW(xu)W(xu)ˎW(xu)ԺԺL(zhng)ȻˎPˎ(gu)c(din)(sh)(yn)20..
    •  W(xu)̌W(xu)ԺšW(xu)꼉(j)ML(zhng)(gu)HͯW(xu)Ժ(zh)ԺL(zhng)
    ]