Tong Qiao
Tong Qiao
Assistant Professor, School of Cyberspace, Hangzhou Dianzi University
Verified email at hdu.edu.cn
TitleCited byYear
Detecting copy-move forgery using non-negative matrix factorization
H Yao, T Qiao, Z Tang, Y Zhao, H Mao
2011 Third International Conference on Multimedia Information Networking and …, 2011
262011
Steganalysis of JSteg algorithm using hypothesis testing theory
T Qiao, F Retraint, R Cogranne, C Zitzmann
EURASIP Journal on Information Security 2015 (1), 2, 2015
232015
An edge detection method in DCT domain
Z Qian, W Wang, T Qiao
Procedia Engineering 29, 344-348, 2012
192012
Source camera device identification based on raw images
T Qiao, F Retraint, R Cogranne, TH Thai
2015 IEEE international conference on image processing (ICIP), 3812-3816, 2015
162015
Individual camera device identification from JPEG images
T Qiao, F Retraint, R Cogranne, TH Thai
Signal Processing: Image Communication 52, 74-86, 2017
132017
Robust multi-classifier for camera model identification based on convolution neural network
H Yao, T Qiao, M Xu, N Zheng
IEEE Access 6, 24973-24982, 2018
122018
Exposing image resampling forgery by using linear parametric model
T Qiao, A Zhu, F Retraint
Multimedia Tools and Applications 77 (2), 1501-1523, 2018
122018
Detection of JSteg algorithm using hypothesis testing theory and a statistical model with nuisance parameters
T Qiao, C Ziitmann, R Cogranne, F Retraint
Proceedings of the 2nd ACM workshop on Information hiding and multimedia …, 2014
122014
Statistical model-based detector via texture weight map: application in re-sampling authentication
T Qiao, R Shi, X Luo, M Xu, N Zheng, Y Wu
IEEE Transactions on Multimedia 21 (5), 1077-1092, 2018
92018
Statistical detection of jsteg steganography using hypothesis testing theory
T Qiao, C Zitzmann, F Retraint, R Cogranne
2014 IEEE International Conference on Image Processing (ICIP), 5517-5521, 2014
82014
Expose noise level inconsistency incorporating the inhomogeneity scoring strategy
H Yao, F Cao, Z Tang, J Wang, T Qiao
Multimedia Tools and Applications 77 (14), 18139-18161, 2018
62018
A novel file carving algorithm for National Marine Electronics Association (NMEA) logs in GPS forensics
K Shi, M Xu, H Jin, T Qiao, X Yang, N Zheng, J Xu, KKR Choo
Digital Investigation 23, 11-21, 2017
42017
Image authentication by statistical analysis
T Qiao, F Retraint, R Cogranne
21st European Signal Processing Conference (EUSIPCO 2013), 1-5, 2013
42013
Digital image forensics based on local energy variance properties
T Qiao, ZX Qian, XP Zhang, WW WANG
Pattern Recognition and Artificial Intelligence 25 (2), 280-284, 2012
4*2012
Using machine learning for determining network robustness of multi-agent systems under attacks
G Wang, M Xu, Y Wu, N Zheng, J Xu, T Qiao
Pacific Rim International Conference on Artificial Intelligence, 491-498, 2018
32018
Identifying wechat red packets and fund transfers via analyzing encrypted network traffic
F Yan, M Xu, T Qiao, T Wu, X Yang, N Zheng, KKR Choo
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
32018
Simplified Anti-Forensics of JPEG Compression.
Z Qian, T Qiao
JCP 8 (10), 2483-2488, 2013
32013
Image Self-Embedding with Large-Area Restoration Capability
Z Qian, T Qiao
2010 International Conference on Multimedia Information Networking and …, 2010
32010
Multiple human upper bodies detection via candidate-region convolutional neural network
A Zhu, T Wang, T Qiao
Multimedia Tools and Applications 78 (12), 16077-16096, 2019
12019
Source camera identification via low dimensional PRNU features
Y Zhao, N Zheng, T Qiao, M Xu
Multimedia Tools and Applications 78 (7), 8247-8269, 2019
12019
The system can't perform the operation now. Try again later.
Articles 1–20