r
W(xu)(x)(jin)v
1990ꮅI(y)ͨW(xu)Ϣcƹϵ@Ϣcƹ̌I(y)TʿW(xu)λ2002ꮅI(y)AW(xu)cͨŹϵ@ͨcϢϵy(tng)I(y)ʿW(xu)λ20022004ɽW(xu)(sh)W(xu)ϵ(yng)Ô(sh)W(xu)վӋ(j)㔵(sh)W(xu)I(y)ʿо
(jin)v
1998ȺAW(xu)Ԅ(dng)W(xu)ԺŌW(xu)Ժν2004걻Ƹ鸱2008x2010걻(zhn)鲩ʿ(do)20002004gȺ4۳дW(xu)XƌW(xu)ϵքeооTоTо2005520068n(gu)ɾ^W(xu)Sungkyunkwan UniversityϢcͨŹ̌W(xu)Ժо2006920088n(gu)ƌW(xu)g(sh)ԺKAISTӋ(j)C(j)ƌW(xu)ϵоڡ2011420134ܚWFP7ȻƌW(xu)YԬоTMarie Curie FellowӢ(gu)AW(xu)The University of WarwickӋ(j)C(j)ƌW(xu)ϵ¶ýwȫо
W(xu)g(sh)
V|ʡDDΌW(xu)(hu)(gu)(gu)H늚cӹ̎W(xu)(hu)IEEE(j)(hu)TЇ(gu)ӌW(xu)(hu)(j)(hu)TЇ(gu)Ӌ(j)C(j)W(xu)(hu)(j)(hu)T·(gu)Hڿ(sh)ַȡCInternational Journalof Digital Crime and Forensicsĸ(dn)^(g)(gu)HW(xu)g(sh)(hu)hίT(hu)ίT
ҪоdȤcɹ
ҪоdȤ
1Ϣ[أ(sh)ֈDҕlϢ[ȣ2ýwϢȫ(sh)ֈD/ҕl/lȡCʹ۸ęzy(c)ȣ3(sh)ֈD̎䑪(yng)ãĘͲB(ti)R(sh)eȣ
гɹ
ֲc10(xing)(gu)H(gu)ʡ(j)(xing)ĿI(y)λί(xing)Ŀ2000ڇ(gu)(ni)ҪW(xu)g(sh)ڿ(hu)hϰl(f)оՓ60ƪ40ƪSCIEI䛡ҪоdȤ飨1Ϣ[أ(sh)ֈDҕlϢ[ȣ2ýwϢȫ(sh)ֈD/ҕl/lȡCʹ۸ęzy(c)ȣ3(sh)ֈD̎䑪(yng)ãĘͲB(ti)R(sh)eȣ
W(xu)g(sh)Փ
Եһl(f)ć(gu)HڿՓx䛣
[1] Yongjian Hu(), Heung-Kyu Lee, and Jianwei Li, DE-based reversible data hiding with improved overflow location map, IEEE Trans. on Circuits and Systems for Video Technology, vol. 19, no. 2, pp. 250-260, Feb. 2009. 201410ǰΔ(sh)182.SCI䛣
[2] Yongjian Hu(), Heung-Kyu Lee, Kaiying Chen, and Jianwei Li, Difference expansion based reversible data hiding using two embedding directions, IEEE Trans. on Multimedia, vol. 10, no. 8, pp. 1500-1512, Dec. 2008. 201410ǰΔ(sh)37.SCI䛣
[3] Yongjian Hu() and Byeungwoo Jeon, Reversible visible watermarking and lossless recovery of original images, IEEE Trans. on Circuits and Systems for Video Technology, vol. 16, no. 11, pp. 1423-1429, Nov. 2006. 201410ǰΔ(sh)81.SCI䛣
[4] Yongjian Hu(), Sam Kwong and Jiwu Huang, An algorithm for removable visible watermarking, IEEE Trans. on Circuits and Systems for Video Technology, vol. 16, no. 1, pp. 129-133, Jan. 2006. 201410ǰΔ(sh)76.SCI䛣
[5] Yongjian Hu(), Chang-Tsun Li, Yufei Wang, Bei-bei Liu, An improved fingerprinting algorithm for detection of video frame duplication forgery, International Journal of Digital Crime and Forensics, vol. 4, no. 3, pp. 20-32,July-September 2012.
[6] Yongjian Hu(), C.-T. Li, C. Zhou and X. Lin, Source camera identification issues: forensic features selection and robustness, International Journal of Digital Crime and Forensics, vol. 3, no. 4, pp. 1-15, October 2011.
[7] Yongjian Hu()bZhe-Ming Lu, An improved VLC-based lossless data hiding scheme for JPEG images,Elsevier, The Journal of Systems and Software, pp. 2166-2173, Mar. 2013. SCI䛣
[8] Yongjian Hu(), C.-T. Li, and Z. Lai, "Fast source camera identification using matching signs between query and reference fingerprints," Multimedia Tools and Applications, May 2104 SCIE䛣
¹(ji)
[1] Yongjian Hu, Yufei Wang, Chang-Tsun Li, and Bei-bei Liu, "An Improved Fingerprinting Algorithm for Detection of Video Frame Duplication Forgery", in Emerging Digital Forensics Applications for Crime Detection, Prevention,and Security, ed. by Chang-Tsun Li, IGI Global, Hershey, PA. USA, May 2013.
l(f)ć(gu)H(hu)hՓx
[1] Yongjian Hu, Chang-Tsun Li, Xufeng Lin, and Bei-bei Liu,"Audio forensic authentication based on MOCC between ENF and reference signals," in Proc. IEEE Summit & International Conference on Signal and Information Processing, 6-10 July 2013, Beijing China.
[2] X. Wei, C.-T. Li and Yongjian Hu, Face recognition with occlusion using dynamic Image-to-class warping (DICW), in Proc. IEEE Conference on Automatic Face and Gesture Recognition, Shanghai, China, 22-26 April, 2013.
[3] Yongjian Hu, Chang-Tsun Li, Zhisheng Lv and Bei-Bei Liu, " Audio forgery detection based on max offsets for cross correlation between ENF and reference signal," in Proc. 11th International Workshop on Digital-Forensics and
Watermarking, Shanghai, China, 31 Oct. -3 Nov., 2012.
[4] X. Wei, C.-T. Li and Yongjian Hu, Robust face recognition under varying illumination and occlusion considering structured sparsity, in Proc. International Conference on Digital Image Computing: Techniques and Applications (DICTAu201912), Perth, Australia, 3-5 December 2012.
[5] Yu Guan, Chang-Tsun Li, and Yongjian Hu, An adaptive system for gait recognition in multi-View environments, in Proc. 14th ACM Workshop on Multimedia and Security, September 6-7, 2012.
[6] Yu Guan, Chang-Tsun Li, and Yongjian Hu, Random subspace method for gait recognition, in Proc. IEEE International Conference on Multimedia and Expo, Melbourne, Australia, July 9-13, 2012.
[7] Kan Wang, Yongjian Hu, and Zhe-Ming Lu, "Reversible Data Hiding for Block Truncation Coding Compressed Images Based on Prediction-Error Expansion," in Proc. International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Piraeus-Athens, Greece, July 18-20, 2012.
[8] Yongjian Hu, Chang-Tsun Li, Xufeng Lin, and Bei-bei Liu, An improved algorithm for camera model identification using inter-channel demosaicking traces, in Proc. International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Piraeus-Athens, Greece, July 18-20, 2012.
[9] Y. Guan, C.-T. Li and Yongjian Hu, "Robust Clothing-Invariant Gait Recognition, in Proc. International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Piraeus-Athens, Greece, July 18-20, 2012.
[10] Yongjian Hu, C.-T. Li and Z. Lai, Fast camera fingerprint search algorithm for source camera identification, in Proc. IEEE 5th International Symposium on Communications, Control, and Signal Processing, Rome, Italy, May 2-4, 2012.
[11] Yu Guan, Chang-Tsun Li, and Yongjian Hu, Gait recognition under carrying condition: a static dynamic fusion method, in Proc. SPIE conference on Optics, Photonics and Digital Technologies for Multimedia Applications, April 16-19, 2012, Brussels, Belgium.
[12] Xiayang Shi, Bei-bei Liu and Yongjian Hu, Steganalysis using features based on Markov mesh models, in Proc. International Conference on Intelligent Computing and Intelligent Systems, Guangzhou, China, November 18-20, 2011.
[13] Y.-C Chen, C.-T. Li and Yongjian Hu, Further studies on forensic features for camera source identification, in Proc. IET the 4rd International Conference on Imaging for Crime Detection and Prevention (ICDP-11), London, UK, 3 - 4 November, 2011.
[14] Yongjian Hu, C.-T. Li and C. Zhou, Issues on selecting image features for robust source camera identification, in Proc. 6th International Annual Workshop on Digital Forensics and Incident Analysis, London, UK, 7- 8 July 2011.
[15] B.-B Liu, Heung-Kyu Lee, Yongjian Hu, and Chang-Hee Choi, On classification of source cameras: a graph based approach, in Proc. IEEE Workshop on Information Forensics and Security - WIFS10, Seattle, US, December 12-15, 2010.
[16] Yongjian Hu, Chang-Tsun Li, and Changhui Zhou, "Selecting forensic features for robust source camera identification," in Proc. International Computer Symposium, Taiwan, December 14-16, 2010.
[17] Yongjian Hu, Chang-Tsun Li, and C. Jian, Building fingerprints with Information from Three Color Bands for Source Camera Identification, in Proc. ACM Multimedia International Conference, Firenze, Italy, Oct. 25-29, 2010.
[18] B.-B Liu, Yongjian Hu, and Heung-Kyu Lee, Source camera identification from significant noise residual regions, in Proc. IEEE International Conference on Image Processing, Hong Kong, Sept. 26-29, 2010.
[19] Yongjian Hu, C. Jian and Chang-Tsun Li, Using improved imaging sensor pattern noise for source camera identification, in Proc. IEEE International Conference on Multimedia & Expo, pp. 1481-1486, Singapore, July 19-23, 2010.
[20] Yongjian Hu, Binghua Yu, and Chao Jian, Source camera identification using large components of sensor pattern noise, in Proc. International Conference on Computer Science and its Applications, pp. 575-579, Dec. 10-12, 2009, South Korea.
[21] Yongjian Hu, Heung-Kyu Lee, Huafei Zeng, Curve watermarking technique for fingerprinting digital maps, in Proc. IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 223-226, Aug. 2008.
[22] Yongjian Hu, Heung-Kyu Lee, and Jianwei Li, Reversible data hiding giving priority to the use of edges and textures, in Proc. IET Visual Information Engineering Conference. July 2008.
[23] Yongjian Hu, Heung-Kyu Lee, Jianwei Li, Kaiying Chen, Reversible data hiding using prediction error values embedding, in 7th International Workshop on Digital Watermarking, Springer-Verlag LNCS vol. 5041, pp. 244-253, 2008.
[24] Yongjian Hu, Byeungwoo Jeon, Z. Lin, and H. Yang, Analysis and comparison of typical reversible watermarking methods, in 5th International Workshop on Digital Watermarking, Springer-Verlag LNCS vol. 4283, pp. 333-347, 2006.
[25] Yongjian Hu and Byeungwoo Jeon, Reversible visible watermarking technique for images, in Proc. IEEE International conference on Image Processing, pp. 2577-2580, Oct. 2006.
[26] Yongjian Hu, Sam Kwong and Jiwu Huang, Using invisible watermarks to protect visibly watermarked images, in Proc. IEEE International Symposium on Circuits and Systems, pp. 584-587, May 2004, Vancouver, Canada.
[27] Yongjian Hu, Jiwu Huang, Sam Kwong and Y.K. Chan, Image fusion based visible watermarking using dual-tree complex wavelet transform, in 2nd International Workshop on Digital Watermarking, Springer-Verlag LNCS vol. 2939, pp. 86-100, 2004.
[28] Yongjian Hu, Sam Kwong, An image fusion based visible watermarking algorithm, in Proc. IEEE International Symposium on Circuits and Systems, pp. 25-28, Bangkok, Thailand, May 2003.
[29] Yongjian Hu, Sam Kwong, The design and application of DWT-domain optimum decoders, in 1st International Workshop on Digital Watermarking, Springer-Verlag LNCS vol. 2613, pp. 22-30, 2002.
l(f)ĺڿՓx
[1] ꖣRِmͨߣ. һN؉Kļy탞(yu)m(yng)[㷨ӌW(xu)(bo)20141ͶãŰ.
[2] P(gun)Awoiؐ. DԴR(sh)㷨ĺ(jin)cAW(xu)W(xu)(bo)W(xu)棩2014vol 42(7): 0-6.
[3] ־٣ϣiؐ. һNpДC(j)Ƶl۸äzy(c)㷨AW(xu)W(xu)(bo)W(xu)棩20148ڣŰУ.
[4] _(d)iؐ. ھֲ^(q)ģʽĔ(sh)ֈDԴR(sh)㷨ϷʹI(y)W(xu)W(xu)(bo), 2012, 35(10).
[5] iؐ. ɫͨgP(gun)ϵC(j)Դɽ|W(xu)W(xu)(bo), 20123.
[6] зiؐT. pДC(j)ƵĈD۸ęzy(c)㷨AW(xu)W(xu)(bo)20124.
[7] iؐ. (lin)SIFTc(din)CS-LBPӵď(f)ճN۸ęzy(c),ϷʹI(y)W(xu)W(xu)(bo), 2012, 35(3).
[8] BiT. ģʽĈD^(q)Ιzy(c), Ӌ(j)C(j)cO(sh)Ӌ(j), 20122.
[9] ,ه־ï,iؐ. ģʽ̖(ho)ϢĿԴC(j)R(sh), AW(xu)W(xu)(bo). 2011, 39(12): 1-5
[10] L(zhng)x,,T. ԴC(j)㷨оӋ(j)C(j)(yng)2011, 31 (4):1133-1137.
[11] L(zhng)x, , Bi. ԴxR(sh)㷨O(sh)Ӌ(j), ɽ|W(xu)W(xu)(bo) 2011, 41(2)62-65.
[12] , w, . ݆׃Q[㷨ɽ|W(xu)W(xu)(bo) 2011, 41(2): 75-79.
[13] (jin), òɫDϢԴC(j)R(sh). Ӌ(j)C(j)(yng), 2010, 30(10): 2694-2697.
[14] A(jin). ģʽϢԴC(j)R(sh)g(sh). Ӌ(j)C(j)(yng), 2010, 30(1): 31-35.
[15] iؐRǰA. (sh)ֶýwȡCg(sh)C. Ӌ(j)C(j)(yng). 2010, 30(3): 657-661.
[16] , wt, W(xu), . ڈDֽĈDޏ(f)g(sh). Ӌ(j)C(j), 2010, 36(10): 187-189.
[17] , wt, W(xu), . M(jn)TVģ͈Dޏ(f)㷨. Ӌ(j)C(j)cO(sh)Ӌ(j), 2010, 31 (4): 776-779.
[18] , wt, W(xu), . M(jn)ļyϳɈDޏ(f)㷨. Ӌ(j)C(j)(yng)cܛ, 2010, 27(10): 11-13.
[19] Aw. ʸ(sh)ֵ؈DĿ攵(sh)(j)[㷨. Ӌ(j)C(j)(yng), 2009, 29 (4): 990-993.
[20] . A(y)y(c)`ֱDƽƵĿ攵(sh)(j)[ؼg(sh). Ї(gu)DDΌW(xu)(bo), 2009, 14(6): 1088-1095.
[21] Aw, . ڱo(h)؈D(qun)ˮӡ㷨. Ӌ(j)C(j)(yng). 2008, 28(10): 2488-2491.
[22] . ߅ͼy탞(yu)ȵĿ攵(sh)(j)[㷨. Ӌ(j)C(j)(yng). 2008, 28(6): 76-81.
[23] _Ӣ. òֵU(ku)չM(jn)п攵(sh)(j)[ص㷨. Ӌ(j)C(j)(yng). 2008, 28(3): 455-459.
[24] ־Ȫ. һNļsƥ㷨. Ї(gu)DDΌW(xu)(bo). 2007, 12(11): 2104-2108.
[25] ־Ȫ. LinuxS3C2410ǶʽDݔϵy(tng)O(sh)Ӌ(j). Ӌ(j)C(j)Ϣ, 2007, 8: 20-24.
[26] ־Ȫ. ڿ(sh)׃Qğopˮӡ㷨. Ӌ(j)C(j)Ϣ. 2007, 12: 199-201.
[27] Ӣ. СĿҊˮӡ̎. ӌW(xu)(bo), 2003, 31(4): 59-62.
[28] Ӣ. DWTˮӡzy(c)wϵ䑪(yng). AW(xu)W(xu)(bo)200230(8)44-48.