乔通

  • 学  位:博士
  • 职  称:讲师、None
  • 研究方向:隐写分析,多媒体取证, 假设检验分析, 图像获取与建模

     谷歌学术个人主页

研究成果:

[1] T. Qiao, F. Retraint, R. Cogranne, and T. H. Thai, "Individual Camera Device Identification from JPEG Images", EURASIP Journal on Signal Processing: Image Communication, Mar, 2017.

[2] T. Qiao, A. Zhu, and F. Retraint, "Exposing Image Resampling Forgery by Using Linear Parametric Model", An International Journal on Multimedia Tools and Applications., 2017

[3] T. Qiao, F. Retraint, R. Cogranne, and C. Zitzmann, "Steganalysis of JSteg algorithm using hypothesis testing theory", EURASIP Journal on Information Security, vol. 2015, no. 1, pp. 1-16, Mar. 2015.

[4] T. Qiao, F. Retraint, R. Cogranne, and T. H. Thai, "Source camera device identification based on RAW images", in IEEE International Conference on Image Processing (ICIP), pp. 3812-3816, Sep. 2015.

[5] T. Qiao,C. Zitzmann, F. Retraint, and R. Cogranne, "Statistical detection of Jsteg steganography using hypothesis testing theory", in IEEE International Conference on Image Processing (ICIP), pp. 5617-5521, Oct. 2014.

[6] T. Qiao, C. Zitzmann, R. Cogranne, and F. Retraint, "Detection of Jsteg algorithm using hypothesis testing theory and a statistical model with nuisance parameters", in 2nd ACM workshop on Information hiding and multimedia security (IH&MMSEC), pp. 3-13, Jun. 2014.

[7] T. Qiao, F. Retraint, and R. Cogranne, "Image authentication by statistical analysis", in 21st European Signal Processing Conference (EUSIPCO), pp. 1-5, Sep. 2013.

[8] Z. Qian, T. Qiao, “Simplified anti-forensics of JPEG compression”, Journal of Computers, vol. 8, no. 10, pp. 2483-2488, Jan. 2013.

[9] 乔通, 钱振兴, 张新鹏, 王文文, “基于局部能量方差特性的数字图像取证”, 模式识别与人工智能, vol. 25, no. 2, pp. 280-284, Jun. 2012.

[10] 姚恒, 陈颖,赵琰,陈岳军,乔通,“稳健性图像复制-粘贴篡改被动取证”, 电视技术, vol. 9, no. 7, Sep. 2012.

[11] Z. Qian, W. Wang, and T. Qiao, “An Edge Detection Method in DCT Domain”, on  International Workshop on Information and Electronics Engineering, Vol. 39, pp. 344-348, Dec, 2012.

[12] H. Yao, T. Qiao, Z. Tang, et al. “Detecting copy-move forgery using non-negative matrix factorization”, International Conference on Multimedia Information Networking and Security (MINES), pp. 591-594, Nov, 2011.

[13] Z. Qian, T. Qiao, “Image Self-embedding with Large-area Restoration Capability”, International Conference on Multimedia Information Networking and Security (MINES), pp. 649-652, Nov, 2010.

联系邮箱:tong.qiao@hdu.edu.cn