HUANG Jiwu
POSITION AND CONTACT INFORMATION:
  Professor, School of Information Science and Technology, Sun Yat-sen University, China.
  Address: Dr. Jiwu HUANG
       School of Information Science and Technology
       Sun Yat-sen University
       Guangzhou Higher Education Mega City, Guangzhou, 510006
       P. R. China
  Tel: (86)20-39332715(o)
  Fax: (86)20-39332716
  Email: isshjw@mail.sysu.edu.cn

EDUCATION:
  Ph.D. Pattern Recognition and Intelligent System,
     Institute of Automation, Chinese Academy of Science, China, 1998
  M.S.   Electronic Engineering, Tsinghua University, China, 1987
  B.S.   Electronic Engineering, Xidian University, China, 1982

RESEARCH AREAS:
  Digital Watermarking and Data Hiding, Multimedia Forensics and Security, Multimedia Signal Processing.

HONORS AND AWARDS:
1. Ligang Zheng, Guoping Qiu, Jiwu Huang, Hao Fu. Salient Covariance for Near-duplicate Image and Video Detection. Prof. of IEEE Int. Conf. on Image Processing, 2585-2588, 2011. Best Student Paper Award Nominated.
2. The First-grade Award in Teaching, Guangdong Province Government, China, 2010
3. The Best Student Paper Award, 8th International Workshop on Digital Watermarking (Pusan, Korea) in 2008.
4. The First-grade Award in Science Research, the National Ministry of Education, China, 2004
5. China National Funds for Distinguished Young Scientists, NSF of China, 2003

PROFESSIONAL ACTIVITIES:
  Associate Editor, IEEE Trans. on Information Forensics and Security
  Associate Editor, EURASIP Journal on Information Security (Hindawi), 2008-present
  Associate editor, Digital Signal Processing (Elsevier)
  Associate Editor, LNCS Transactions on Data Hiding and Multimedia Security (Springer-Verlag) 2006-present
  Associate Editor, APSIPA Transactions on Signal and Information Processing (Cambridge University Press)
  Member of Multimedia Systems and Applications Technical Committee, IEEE Circuits and Systems Society, 2002-present
  Member of Information Forensics and Security Technical Committee, IEEE Signal Processing Society, 2012.1-2014.12
  Member of the IEEE ChinaSIP (SPS) Steering Committee
  Member of the IEEE SPS Chapters Committee, 2012-present
  Chair, Guangzhou Chapter of IEEE Circuits and Systems Society, 2008-2011
  Chair, Guangzhou Chapter of IEEE Signal Processing Society, 2010-present
  BoG Member, Asia Pacific Signal and Information Processing Association (APSIPA), 2009-present

BOOKS AND BOOK CHAPTERS:
1. Yumin Wang, Tong Zhang, Jiwu Huang, Qingkuan Dong. Information Hiding Technology: Theory and Applications. Tsinghua University Press, 2006
2. Y. Q. Shi, J. Huang, and H. K. Lee. Spread Spectrum Video Data Hiding, Interleaving and Synchronization. Intelligent Watermarking Techniques, Chapter 18, pp. 515-558, World Scientific Publishing Company.
3. Xiangui Kang, Jiwu Huang, Yun. Q. Shi. Image Data Hiding Robust to Both Geometric Distortion and JPEG Compression. Multimedia Security Handbook (Ed. Borko Furht and Darko Kirovski), Chapter 15, pp. 467-492. CRC Press. 2004.
4. Fangjun Huang, Bin Li, Y. Q. Shi, Jiwu Huang, Guorong Xuan. “Image Steganalysis”, Intelligent Multimedia Analysis for Security Applications, (Ed. Husrev Taha Sencar), Chapter 3, pp. 275-303, Springer, 2010.

SOME SELECTED JOURNAL PAPERS:
1. Ligang Zheng, Guoping Qiu, Yanqiang Lei and Jiwu Huang. Near-duplicate Image Detection in a Visually Salient Riemannian Space. IEEE Trans. on Information Forensics & Security. 7(5): 1578 – 1593, 2012.
2. Yanqiang Lei, Weiqi Luo, Yuangen Wang, Jiwu Huang. Video Sequence Matching Based on the Invariance of Color Correlation. IEEE Trans. on Circuits and Systems for Video Technology. 22(9): 1332-1343, 2012.
3. Jian Li, Hongmei Liu, Jiwu Huang, Yun Q. shi. Reference Index-Based H.264 Video Watermarking Scheme. ACM Trans. on Multimedia Computing, Communications, and Applications. Volume 8, Issue 2S, Article No. 33, p1-22, September 2012
4. Rui Yang, Zhenhua Qu, Jiwu Huang. Exposing MP3 Audio Forgeries Using Frame Offsets. ACM Trans. on Multimedia Computing, Communications, and Applications. Volume 8, Issue 2S, Article No. 33, p. 1-20, September 2012
5. Jian Cao and Jiwu Huang. Controllable Secure Watermarking Technique for Tradeoff between Robustness and Security. IEEE Trans. on Information Forensics & Security. 7(1): 821-826, 2012.
6. Xiangui Kang, Yinxiang Li, Zhenhua Qu and Jiwu Huang. Enhancing Source Camera Identification Performance with a Camera Reference Phase Sensor Pattern Noise. IEEE Trans. on Information Forensics & Security. 7(2): 393-402, 2012.
7. Haotian Wu and Jiwu Huang. Reversible Image Watermarking on Prediction Errors by Efficient Histogram Modification. Signal Processing. Volume 92, Issue 12, Pages 3000-3009, 2012.
8. Fangjun Huang, Jiwu Huang, Yun Q. Shi. New Channel Selection Rule for JPEG Steganography. IEEE Trans. on Information Forensics & Security. 7(4):1181-1191, 2012.
9. Chuntao Wang, Jiangqun Ni, Jiwu Huang. An Informed Watermarking Scheme Using Hidden Markov Model in the Wavelet Domain. IEEE Trans. on Information Forensics & Security. 7(3):853-867, 2012.
10. Guopu Zhu, Sam Kwong, Jiwu Huang, and Jianquan Yang. Random Gray Code and Its Performance Analysis for Image Hashing. Signal Processing. 91 (2011) 2178-2193.
11. Yanqing Lei, Yunagen Wang, Jiwu Huang. Robust Image Hash in Radon Transform Domain for Authentication. Signal Processing: Image Communication. 26 (2011) 280-288.
12. Shijun Xiang, Jianquan Yang, Jiwu Huang, “Perceptual Video Hashing Robust Against Geometric Distortions,” Science China: Information Sciences.(accepted)
13. Xiangui Kang, Member, IEEE, Rui Yang, Student Member, IEEE, and Jiwu Huang. Geometric Invariant Audio Watermarking Based on an LCM Feature. IEEE Trans. on Multimedia, 13(2): 181-190, April, 2011.
14. Weiqi Luo, Jiwu Huang. Security Analysis on Spatial ±1 Steganography for JPEG Decompressed Images. IEEE Signal Processing Letters, 18(1): 39-42, 2011.
15. Fangjun Huang, Weiqi Luo, Jiwu Huang. Steganalysis of JPEG steganography with complementary embedding strategy. IET Information Security, 5(1): 10-18, 2011.
16. Weiqi Luo, Jiwu Huang. A More Secure Steganography Based on Adaptive Pixel-Value Differencing Scheme. Multimedia Tools and Applications. Volume 52, Issue 2, Page 407-430, 2011.
17. Hongmei Liu, Xinzhi Yao, Jiwu Huang: Minority codes with improved embedding efficiency for large payloads. Multimedia Tools Applications. 52(2-3): 431-443, 2011.
18. Fangjun Huang, Jiwu Huang, Yun Q. Shi. Detecting Double JPEG Compression with the Same Quantization Matrix. IEEE Trans. on Information Forensics & Security, 5(4): 838-856.
19. Weiqi Luo, Yuangen Wang, Jiwu Huang. Detection of Quantization Artifacts and Its Applications to Transform Encoder Identification. IEEE Trans. on Information Forensics & Security, 5(4): 810-815, 2010
20. Fangjun Huang, Jiwu Huang, Yun Q. Shi. An Experimental Study on the Security Performance of YASS. IEEE Trans. on Information Forensics & Security, 5(3): 374-380
21. Weiqi Luo, Jiwu Huang. JPEG Error Analysis and Its Applications to Digital Image Forensics. IEEE Trans. on Information Forensics & Security, 5(3): 480-491
22. Weiqi Luo, Fangjun Huang, Jiwu Huang. Edge Adaptive Image Steganography Based on LSB Matching Revisited. IEEE Trans. on Information Forensics & Security, 5(2): 201-214, 2010.
23. Xiangui Kang, Jiwu Huang, Wenjun Zeng. Efficient General Print-Scanning Resilient Data Hiding Based on Uniform Log-polar Mapping. IEEE Trans. on Information Forensics & Security, 5(1): 1-12, 2010.
24. Guopu Zhu, Jiwu Huang, Sam Kwong, Jianquan Yang. Fragility Analysis of Adaptive Quantization Based Image Hashing. IEEE Trans. on Information Forensics & Security, 5(1): 133-147, 2010.
25. Yong Wang, Shaoquan Wu, and Jiwu Huang. Audio Watermarking Scheme Robust against Desynchronization Based on the Dyadic Wavelet Transform, EURASIP Journal on Advances in Signal Processing, Volume 2010 (2010), Article ID 232616, 17 pages.
26. Hongmei Liu, Xinzhi Yao and Jiwu Huang. “Semi-Fragile Zernike Moment-Based Image Watermarking for Authentication” EURASIP Journal on Advances in Signal Processing, Volume 2010 (2010), Article ID 341856, 17 pages.
27. Yong Wang, Jiwu Huang. Robust AVS Audio Watermarking. Science China: Information Sciences. 53(3): 607-618. 2010.
28. Guopu Zhu, Jiwu Huang, Sam Kwong, Jianquan Yang. A Study on the Randomness Measure of Image. IEEE Trans. on Information Forensics & Security, 4(4): 928-932, 2009.
29. Bin Li, Jiwu Huang, Yun Q. Shi. Steganalysis of YASS. IEEE Trans. on Information Forensics & Security, 4(3): 369-382, 2009.
30. Xiangui Kang, Jiwu Huang, Wenjun Zeng, Yun Q. Shi. Non-ambiguity of Blind Watermarking: a Revisit with Analytical Resolution. Science in China Series F: Information Sciences. 52(2): 276-285, 2009. 2.
31. Feng Pan, Jiongbin Chen, Jiwu Huang. Discriminating Computer Graphics Images and Natural Images Using Fractal Geometry. Science in China Series F: Information Sciences. 52(2): 329-337, 2009. 2.
32. FangJun Huang, Jiwu Huang: Calibration based universal JPEG steganalysis. Science in China Series F: Information Sciences, 52(2): 260-268 (2009)
33. Xiangui Kang, Jiwu Huang, Wenjun Zeng. Improving Robustness of Quantization-Based Image watermarking via Adaptive Receiver. IEEE Trans. on Multimedia, vol.10, no.6, pp. 953-959, Oct. 2008.
34. Shijun Xiang, Hyoung-Joong Kim, Jiwu Huang. Invariant Image Watermarking Based on the Statistical Features in the Low-Frequency Domain. IEEE Trans. on Circuits and Systems for Video Technology, 18(6): 777-790, 2008.
35. Shijun Xiang, HJ Kim and Jiwu Huang “Audio Watermarking Robust to Time-Scale Modification and MP3 Compression” Signal Processing, vol. 88, pp. 2372-2388, 2008.
36. Bin Li, Yanmei Fang and Jiwu Huang. Steganalysis of Multiple-Base Notational System Steganography. IEEE Signal Processing Letter, vol.15, pp.493-496, 2008.
37. Shijun Xiang, Jiwu Huang. Histogram-Based Audio Watermarking against Time-Scale Modifications and Cropping Attacks. IEEE Trans. on Multimedia. 9(7): 1357-1372, 2007.
38. Ning Bi, Qiyu Sun, Daren Huang, Zhihua Yang, Jiwu Huang. Robust Image Watermarking Based on Multiband Wavelets and Empirical Mode Decomposition. IEEE Trans. on Image Processing. 2007, 16(8): 1956-1966.
39. LUO Weiqi, QU Zhenhua, PAN Feng, HUANG Jiwu. A Survey of Passive Technology for Digital Image Forensics. Frontiers of Computer Science in China. 1(2): 166-179, 2007.
40. Yongjian Hu, Sam Kwong, Jiwu Huang. A new method of reversible visible watermarking. IEEE Trans. on Circuits and Systems for Video Technology. 16(1): 129-133, 2006.
41. Shaoquan Wu, Jiwu Huang, Daren Huang, Yun Q. Shi, Efficiently Self-Synchronized Audio Watermarking for Assured Audio Data Transmission. IEEE Trans. on Broadcasting. 2005, 51(1): 69-76.
42. Xiangui Kang, Jiwu Huang, Yun Q. Shi, Yan Lin. A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Trans. on Circuits and Systems for Video Technology. 2003, 13(8): 776-786.
43. Jiwu Huang, Yun Q. Shi. Reliable Information Bit Hiding. IEEE Trans. on Circuits and Systems for Video Technology. 2002, 12(10): 916-920.
44. Junquan Hu, Jiwu Huang, Daren Huang. Yun Q. Shi, Image Fragile Watermarking Based on Fusion of Multi-Resolution Tamper Detection. IEE Electronics Letters. 2002, 38(24): 1512-1513.
45. Jiwu Huang, Yun Q. Shi, Yi Shi, Embedding image watermarks in DC components, IEEE Trans. on Circuits and Systems for Video Technology. 2000, 10(6), pp. 974-979.

SOME SELECTED CONFERENCE PAPERS:
1. Ligang Zheng, Guoping Qiu, Jiwu Huang. Efficient Coarse-To-Fine Near-Duplicate Image Detection in Riemannian Manifold. Proc. of IEEE Int. Conf. on Acoustics, Speech and Signal Processing, pp. 977-980, 2012.
2. Da Luo, Weiqi Luo, Rui Yang, Jiwu Huang. Compression History Identification for Digital Audio Signal. Proc. of IEEE Int. Conf. on Acoustics, Speech and Signal Processing, pp. 1733-1736, 2012.
3. Peijia Zheng, Jiwu Huang. Implementation of the Discrete Wavelet Transform and Multiresolution Analysis in the Encrypted Domain. ACM Multimedia 2011, pp. 413-422.
4. Ligang Zheng, Guoping Qiu, Jiwu Huang. Salient Covariance for Near-duplicate Image And Video Detection. Proc. of IEEE Int. Conf. on Image Processing, pp. 2585-2588, 2011.
5. Haotian Wu, Jiwu Huang. Secure JPEG steganography by LSB+ matching and multi-band embedding. Proc. of IEEE Int. Conf. on Image Processing, pp. 2793-2796, 2011.
6. Yuan-Gen Wang, Yanqiang Lei, Jiwu Huang. An image copy detection scheme based on radon transform. Proc. of IEEE Int. Conf. on Image Processing, pp. 2893-2896, 2010.
7. Chuntao Wang, Jiangqun Ni, Huashuo Zhuo, Jiwu Huang. A geometrically resilient robust image watermarking scheme using deformable multi-scale transform. Proc. of IEEE Int. Conf. on Image Processing, pp. 2893-2896, 2010.
8. Jian Cao, Jiwu Huang, Jiangqun Ni. Spread Spectrum Watermarking to Achieve a Trade-off Between Security and Robustness. Proc. of Int. Workshop on Information Hiding 2010.
9. Jian Cao, Jiwu Huang. Provably Secure Spread-spectrum Watermarking Schemes in the Known Message Attack. Proc. of Int. Workshop on Information Hiding 2010.
10. Dong Zhang, Jiangqun Ni, Qiping Zeng, Dah-Jye Lee, and Jiwu Huang. Security Analysis of ISS Watermarking Using Natural Scene Statistics. Proc. of Int. Workshop on Information Hiding 2010.
11. Rui Yang, Yun Q. Shi, Jiwu Huang. Detecting double compression of audio signal. Proc. IS&T/SPIE Electronic Imaging 2010: Media Forensics and Security XII, 2010. 1.
12. Zhenhua Qu, Guoping Qiu, and Jiwu Huang. Detect Digital Image Splicing with Visual Cues. Proc. of 11th Int. Workshop on Information Hiding. LNCS 5806, pp. 247-261, 2009.
13. Xinzhi Yao, Hongmei Liu, Wei Rui, Jiwu Huang. Content-based authentication algorithm for binary images. Proc. of 2007 IEEE Int. Conf. on Image Processing, pp. 2893-2896, 2009.
14. Rui Yang, Yun Q. Shi, Jiwu Huang. Defeating Fake-Quality MP3. Proc. of the 11th ACM Workshop on Multimedia and Security, pp. 117-124, 2009.
15. Yong Wang, Jiwu Huang. Robust AVS Audio Watermarking. Proc. of 8th Int Workshop on Digital Processing, LNCS 5703, pp. 29-38, 2009.
16. Chong Chen, Jiangqun Ni, Jiwu Huang: Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping. Proc. of 8th Int. Workshop on Digital Watermarking, LNCS 5703, pp. 81-95, 2009
17. Jiangqun Ni, Rongyue Zhang, Jiwu Huang. Watermarking Security Incorporating Natural Scene Statistics. Proc. of 10th Int. Workshop on Information Hiding. LNCS 5284, pp. 132-146, 2008.
18. Zhenhua Qu, Weiqi Luo, Jiwu Huang, “A convolutive mixing model for shifted double jpeg compression with application to passive image authentication,” Proc. of IEEE Int. Conf. on Accoust, Speech and Signal Processing, 2008, 1661-1664.
19. Fangjun Huang, Bin Li, Jiwu Huang. Universal JPEG steganalysis based on microscopic and macroscopic calibration. Proc. of 2008 IEEE Int. Conf. on Image Processing, pp. 2068-2071, 2008
20. Fangjun Huang, Yun Q. Shi, Jiwu Huang. A study on security performance of YASS. Proc. of 2008 IEEE Int. Conf. on Image Processing, pp.2084-2087, 2008.
21. Xiangui Kang, Xiong Zhong, Jiwu Huang, Wenjun Zeng. An efficient print-scanning resilient data hiding scheme based on a novel LPM. Proc. of 2008 IEEE Int. Conf. on Image Processing, pp. 2080-2083, 2008
22. Weiqi Luo, Min Wu, Jiwu Huang. MPEG recompression detection based on block artifacts. Proc. of SPIE: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X. Volume 6819, pp. 68190X-68190X-12, 2008.
23. Bin Li, Jiwu Huang, Yun Q. Shi. Textural feature based universal steganalysis. Proc. of SPIE: Forensics, Steganography, and Watermarking of Multimedia Contents X. Volume 6819, pp. 681912-681912-12, 2008.
24. Bin Li, Yun Q. Shi, Jiwu Huang: Steganalysis of YASS. Proc. of the 10th ACM Workshop on Multimedia and Security, pp: 139-148, 2008.
25. Rui Yang, Zhenhua Qu, Jiwu Huang: Detecting digital audio forgeries by checking frame offsets. Proc. of the 10th ACM Workshop on Multimedia and Security,pp: 21-26, 2008.
26. Chuntao Wang, Jiangqun Ni, Jiwu Huang, Rongyue Zhang, Meiying Huang. Robust and high capacity image watermarking based on jointly coding and embedding optimization. Proc. of 9th Int. Workshop on Information Hiding. LNCS 4567, pp. 65-79. 2007.
27. Weiqi Luo, Zhenhua Qu, Jiwu Huang, Guoping Qiu. A novel method for detecting cropped and recompressed image block. Proc. of IEEE Int. Conf. on Accoust, Speech and Signal Processing, 2007, vol. II 217-220.
28. Jiangqun Ni, Chuntao Wang, Jiwu Huang, Rongyue Zhang, Meiying Huang. A GA-based joint coding and embedding optimization for robust and high capacity image watermarking. Proc. of IEEE Int. Conf. on Accoust, Speech and Signal Processing, 2007, vol. II 181-184.
29. Hongmei Liu, Wei Rui, Jiwu Huang. Binary image authentication using Zernike moments. Proc. of 2007 IEEE Int. Conf. on Image Processing, vol. 1, pp. 385-388.
30. Bin Li, Fangjun Huang, Jiwu Huang. Steganalysis of LSB Greedy Embedding Algorithm for JPEG Images Using Coefficient Symmetry. Proc. of IEEE 2007 Int. Conf. on Image Processing. vol. 1, pp. 413-416, 2007.
31. Fangjun Huang, Bin Li, Jiwu Huang. Attack lsb matching steganography by counting alteration rate of the number of neighbourhood gray levels. Proc. of 2007 IEEE Int. Conf. on Image Processing. vol. 1, pp. 401-404, 2007.
32. Xiangui Kang, Chunhui Liu, Wenjun Zeng, Jiwu Huang, Congbai Liu. Fast and Automatic Watermark Resynchronization based on Zernike Moments. Proc. of SPIE: Security, Steganography, and Watermarking of Multimedia Contents VIII. 2007, vol. 6505, pp. 65050E-1-10.
33. Yong Wang, Shaoquan Wu, Jiwu Huang. Audio watermarking robust to geometrical distortions based on dyadic wavelet transform. Proc. of SPIE: Security, Steganography, and Watermarking of Multimedia Contents VIII. 2007, vol. 6505, pp. 65050A-1-12.
34. Shunquan Tan, Jiwu Huang, and Yun Q. Shi. Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis. Proc. of 6th Int Workshop on Digital Watermarking, LNCS 5041, pp. 143-157, 2007.
35. Bin Li, Fangjun Huang, Shunquan Tan, Jiwu Huang, Yun Q. Shi. Effect of Coding Pattern on Compression Domain Based Universal JPEG Steganalysis. Proc. of 6th Int. Workshop on Digital Watermarking, LNCS 5041, pp. 112-126, 2007.

PATENTS:
To have 29 authorized patents and other 26 patents pending.