Search Results for author: Jiwu Huang

Found 16 papers, 7 papers with code

Prompt Engineering-assisted Malware Dynamic Analysis Using GPT-4

1 code implementation13 Dec 2023 Pei Yan, Shunquan Tan, Miaohui Wang, Jiwu Huang

As a significant representation of dynamic malware behavior, the API (Application Programming Interface) sequence, comprised of consecutive API calls, has progressively become the dominant feature of dynamic analysis methods.

Few-Shot Learning Language Modelling +2

Evading Detection Actively: Toward Anti-Forensics against Forgery Localization

no code implementations16 Oct 2023 Long Zhuo, Shenghai Luo, Shunquan Tan, Han Chen, Bin Li, Jiwu Huang

In adversarial training, SEAR employs a forgery localization model as a supervisor to explore tampering features and constructs a deep-learning concealer to erase corresponding traces.

Adversarial Attack Self-Supervised Learning

Forgery-aware Adaptive Vision Transformer for Face Forgery Detection

no code implementations20 Sep 2023 Anwei Luo, Rizhao Cai, Chenqi Kong, Xiangui Kang, Jiwu Huang, Alex C. Kot

To circumvent these issues, we propose a novel Forgery-aware Adaptive Vision Transformer (FA-ViT).

Face Swapping

ReLoc: A Restoration-Assisted Framework for Robust Image Tampering Localization

1 code implementation8 Nov 2022 Peiyu Zhuang, Haodong Li, Rui Yang, Jiwu Huang

The ReLoc framework mainly consists of an image restoration module and a tampering localization module.

Image Restoration

Forensicability Assessment of Questioned Images in Recapturing Detection

no code implementations5 Sep 2022 Changsheng chen, Lin Zhao, Rizhao Cai, Zitong Yu, Jiwu Huang, Alex C. Kot

We integrate the trained FANet with practical recapturing detection schemes in face anti-spoofing and recaptured document detection tasks.

Face Anti-Spoofing Image Quality Assessment

STD-NET: Search of Image Steganalytic Deep-learning Architecture via Hierarchical Tensor Decomposition

1 code implementation12 Jun 2022 Shunquan Tan, Qiushi Li, Laiyuan Li, Bin Li, Jiwu Huang

We propose a normalized distortion threshold to evaluate the sensitivity of each involved convolutional layer of the base model to guide STD-NET to compress target network in an efficient and unsupervised approach, and obtain two network structures of different shapes with low computation cost and similar performance compared with the original one.

Model Compression Steganalysis +1

Robust Privacy-Preserving Motion Detection and Object Tracking in Encrypted Streaming Video

no code implementations30 Aug 2021 Xianhao Tian, Peijia Zheng, Jiwu Huang

In this paper, we propose an efficient and robust privacy-preserving motion detection and multiple object tracking scheme for encrypted surveillance video bitstreams.

Motion Detection Moving Object Detection +5

Self-Adversarial Training incorporating Forgery Attention for Image Forgery Localization

1 code implementation6 Jul 2021 Long Zhuo, Shunquan Tan, Bin Li, Jiwu Huang

In this paper, we propose a self-adversarial training strategy and a reliable coarse-to-fine network that utilizes a self-attention mechanism to localize forged regions in forgery images.

Detection of Deepfake Videos Using Long Distance Attention

no code implementations24 Jun 2021 Wei Lu, Lingyi Liu, Junwei Luo, Xianfeng Zhao, Yicong Zhou, Jiwu Huang

And a spatial-temporal model is proposed which has two components for capturing spatial and temporal forgery traces in global perspective respectively.

Binary Classification Face Swapping

Improving Cost Learning for JPEG Steganography by Exploiting JPEG Domain Knowledge

no code implementations9 May 2021 Weixuan Tang, Bin Li, Mauro Barni, Jin Li, Jiwu Huang

To address the issue, in this paper we extend an existing automatic cost learning scheme to JPEG, where the proposed scheme called JEC-RL (JPEG Embedding Cost with Reinforcement Learning) is explicitly designed to tailor the JPEG DCT structure.

reinforcement-learning Reinforcement Learning (RL)

MCTSteg: A Monte Carlo Tree Search-based Reinforcement Learning Framework for Universal Non-additive Steganography

1 code implementation25 Mar 2021 Xianbo Mo, Shunquan Tan, Bin Li, Jiwu Huang

Recent research has shown that non-additive image steganographic frameworks effectively improve security performance through adjusting distortion distribution.

Self-Learning

Image Steganography based on Iteratively Adversarial Samples of A Synchronized-directions Sub-image

no code implementations13 Jan 2021 Xinghong Qin, Shunquan Tan, Bin Li, Weixuan Tang, Jiwu Huang

In this paper, we present a novel steganography scheme denoted as ITE-SYN (based on ITEratively adversarial perturbations onto a SYNchronized-directions sub-image), by which security data is embedded with synchronizing modification directions to enhance security and then iteratively increased perturbations are added onto a sub-image to reduce loss with cover class label of the target CNN classifier.

Image Steganography Steganalysis

An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning

1 code implementation journal 2020 Weixuan Tang, Bin Li, Mauro Barni, Jin Li, Jiwu Huang

In SPAR-RL, an agent utilizes a policy network which decomposes the embedding process into pixel-wise actions and aims at maximizing the total rewards from a simulated steganalytic environment, while the environment employs an environment network for pixel-wise reward assignment.

Image Steganography reinforcement-learning

Detection of Deep Network Generated Images Using Disparities in Color Components

1 code implementation22 Aug 2018 Haodong Li, Bin Li, Shunquan Tan, Jiwu Huang

In this paper, we address the problem of detecting deep network generated (DNG) images by analyzing the disparities in color components between real scene images and DNG images.

Multimedia

Cannot find the paper you are looking for? You can Submit a new open access paper.