[1]Ligang Zheng, Guoping Qiu, Yanqiang Lei and Jiwu Huang. Near-duplicate Image Detection in a Visually Salient Riemannian Space. IEEE Trans. on Information Forensics & Security. 7(5): 1578 – 1593, 2012.[2]Yanqiang Lei, Weiqi Luo, Yuangen Wang, Jiwu Huang. Video Sequence Matching Based on the Invariance of Color Correlation. IEEE Trans. on Circuits and Systems for Video Technology. 22(9): 1332-1343, 2012[3]Chuntao Wang, Jiangqun Ni, Jiwu Huang. An Informed Watermarking Scheme Using Hidden Markov Model in the Wavelet Domain. IEEE Trans. on Information Forensics & Security. 7(3):853-867, 2012.[4]Jian Li, Hongmei Liu, Jiwu Huang, Yun Q. shi. Reference Index-Based H.264 Video Watermarking Scheme. ACM Trans. on Multimedia Computing, Communications, and Applications. Volume 8, Issue 2S, Article No. 33, p1-22, September 2012[5]Rui Yang, Zhenhua Qu, Jiwu Huang. Exposing MP3 Audio Forgeries Using Frame Offsets. ACM Trans. on Multimedia Computing, Communications, and Applications. Volume 8, Issue 2S, Article No. 33, p. 1-20, September 2012[6]Zhongwei He, Wei Lu, Wei Sun, Jiwu Huang. Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recognition, 45(12): 4292-4299, 2012[7]Haotian Wu and Jiwu Huang. Reversible Image Watermarking on Prediction Errors by Efficient Histogram Modification. Signal Processing. Volume 92, Issue 12, Pages 3000-3009, 2012.[8]Fangjun Huang, Jiwu Huang, Yun Q. Shi. New Channel Selection Rule for JPEG Steganography. IEEE Trans. on Information Forensics & Security. 7(4):1181-1191, 2012.[9]Jian Cao and Jiwu Huang. Controllable Secure Watermarking Technique for Tradeoff Between Robustness and Security. IEEE Trans. on Information Forensics & Security. 7(1): 821 – 826, 2012.[10]Xiangui Kang, Yinxiang Li, Zhenhua Qu and Jiwu Huang. Enhancing Source Camera Identification Performance with a Camera Reference Phase Sensor Pattern Noise. IEEE Trans. on Information Forensics & Security. 7(2): 393-402, 2012.[11]Guopu Zhu, Sam Kwong, Jiwu Huang, and Jianquan Yang. Random Gray Code and Its Performance Analysis for Image Hashing. Signal Processing. 91 (2011) 2178–2193.[12]Yanqing Lei, Yunagen Wang, Jiwu Huang. Robust Image Hash in Radon Transform Domain for Authentication.Signal Processing: Image Communication. 26 (2011) 280–288[13]Xiangui Kang, Member, IEEE, Rui Yang, Student Member, IEEE, and Jiwu Huang. Geometric Invariant Audio Watermarking Based on an LCM Feature. IEEE Trans. on Multimedia, 13(2): 181-190, April, 2011.[14]Weiqi Luo, Jiwu Huang. Security Analysis on Spatial ±1 Steganography for JPEG Decompressed Images. IEEE Signal Processing Letters, 18(1): 39-42, 2011.[15]Fangjun Huang, Weiqi Luo, Jiwu Huang. Steganalysis of JPEG steganography with complementary embedding strategy. IET Information Security, 5(1):10-18. 2011[16]Weiqi Luo, Jiwu Huang. A More Secure Steganography Based on Adaptive Pixel-Value Differencing Scheme. Multimedia Tools and Applications. Volume 52, Issue 2, Page 407-430, 2011[17]Hongmei Liu, Xinzhi Yao, Jiwu Huang: Minority codes with improved embedding efficiency for large payloads. Multimedia Tools Applications. 52(2-3): 431-443 (2011)[18]Fangjun Huang, Jiwu Huang, Yun Q.Shi. Detecting Double JPEG Compression with the Same Quantization Matrix.IEEE Trans. on Information Forensics & Security, 5(4): 838-856.[19]Weiqi Luo, Yuangen Wang, Jiwu Huang. Detection of Quantization Artifacts and Its Applications to Transform Encoder Identification. IEEE Trans. on Information Forensics & Security, 5(4): 810-815, 2010[20]Fangjun Huang, Jiwu Huang, Yun Q. Shi. An Experimental Study on the Security Performance of YASS. IEEE Trans. on Information Forensics & Security, 5(3): 374-380[21]Weiqi Luo, Jiwu Huang. JPEG Error Analysis and Its Applications to Digital Image Forensics. IEEE Trans. on Information Forensics & Security, 5(3): 480-491[22]Weiqi Luo, Fangjun Huang, Jiwu Huang. Edge Adaptive Image Steganography Based on LSB Matching Revisited. IEEE Trans. on Information Forensics & Security, 5(2):201-214, 2010.[23]Xiangui Kang, Jiwu Huang, Wenjun Zeng. Efficient General Print-Scanning Resilient Data Hiding Based on Uniform Log-polar Mapping. IEEE Trans. on Information Forensics & Security, 5(1):1-12, 2010.[24]Guopu Zhu, Jiwu Huang, Sam Kwong, Jianquan Yang. Fragility Analysis of Adaptive Quantization Based Image Hashing. IEEE Trans. on Information Forensics & Security, 5(1):133-147, 2010.[25]Yong Wang, Shaoquan Wu, and Jiwu Huang. Audio Watermarking Scheme Robust against Desynchronization Based on the Dyadic Wavelet Transform, EURASIP Journal on Advances in Signal Processing, Volume 2010 (2010), Article ID 232616, 17 pages[26]Hongmei Liu, Xinzhi Yao and Jiwu Huang. “Semi-Fragile Zernike Moment-Based Image Watermarking for Authentication” EURASIP Journal on Advances in Signal Processing, Volume 2010 (2010), Article ID 341856, 17 pages[27]Yong Wang, Jiwu Huang. Robust AVS Audio Watermarking. Science China: Information Sciences. 53(3): 607-618. 2010[28]Guopu Zhu, Jiwu Huang, Sam Kwong, Jianquan Yang. A Study on the Randomness Measure of Image. IEEE Trans. on Information Forensics & Security, 4(4):928-932, 2009[29]Bin Li, Jiwu Huang, Yun Q. Shi. Steganalysis of YASS. IEEE Trans. on Information Forensics & Security, 4(3): 369-382, 2009.[30]Xiangui Kang, Jiwu Huang, Wenjun Zeng. Improving Robustness of Quantization-Based Image watermarking via Adaptive Receiver. IEEE Trans. on Multimedia, vol.10, no.6, pp. 953-959, Oct. 2008.[31]Shijun Xiang, Hyoung-Joong Kim, Jiwu Huang. Invariant Image Watermarking Based on the Statistical Features in the Low-Frequency Domain. IEEE Trans. on Circuits and Systems for Video Technology, 18(6): 777-790, 2008.[32]Shijun Xiang, HJ Kim and Jiwu Huang “Audio Watermarking Robust to Time-Scale Modification and MP3 Compression” Signal Processing, vol. 88, pp. 2372-2388. 2008.[33]Bin Li, Yanmei Fang and Jiwu Huang. Steganalysis of Multiple-Base Notational System Steganography. IEEE Signal Processing Letter, vol.15, pp.493-496.2008[34]Shijun Xiang, Jiwu Huang. Histogram-Based Audio Watermarking against Time-Scale Modifications and Cropping Attacks. IEEE Trans. on Multimedia. 9(7): 1357-1372, 2007.[35]Ning Bi; Qiyu Sun; Daren Huang; Zhihua Yang; Jiwu Huang. Robust Image Watermarking Based on Multiband Wavelets and Empirical Mode Decomposition. IEEE Trans. on Image Processing. 2007, 16(8):1956-1966.[36]Yongjian Hu, Sam Kwong, Jiwu Huang. A new method of reversible visible watermarking. IEEE Trans. on Circuits and Systems for Video Technology. 16(1): 129-133, 2006.[37]Shaoquan Wu, Jiwu Huang, Daren Huang, Yun Q. Shi, Efficiently Self-Synchronized Audio Watermarking for Assured Audio Data Transmission. IEEE Trans. on Broadcasting. 2005, 51(1): 69-76.[38]Xiangui Kang, Jiwu Huang, Yun Q. Shi, Yan Lin. A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Trans. on Circuits and Systems for Video Technology. 2003, 13(8): 776-786.[39]Jiwu Huang, Yun Q. Shi. Reliable Information Bit Hiding. IEEE Trans. on Circuits and Systems for Video Technology. 2002, 12(10): 916-920.[40]Jiwu Huang, Yun Q. Shi, Yi Shi, Embedding image watermarks in DC components, IEEE Trans. on Circuits and Systems for Video Technology. 2000, 10(6), pp. 974-979.