Tong Qiao
Tong Qiao
Associate Professor, School of Cyberspace, Hangzhou Dianzi University
Verified email at hdu.edu.cn
Title
Cited by
Cited by
Year
Detecting copy-move forgery using non-negative matrix factorization
H Yao, T Qiao, Z Tang, Y Zhao, H Mao
2011 Third International Conference on Multimedia Information Networking and …, 2011
272011
Steganalysis of JSteg algorithm using hypothesis testing theory
T Qiao, F Retraint, R Cogranne, C Zitzmann
EURASIP Journal on Information Security 2015 (1), 1-16, 2015
252015
An edge detection method in DCT domain
Z Qian, W Wang, T Qiao
Procedia Engineering 29, 344-348, 2012
212012
Source camera device identification based on raw images
T Qiao, F Retraint, R Cogranne, TH Thai
2015 IEEE international conference on image processing (ICIP), 3812-3816, 2015
192015
Individual camera device identification from JPEG images
T Qiao, F Retraint, R Cogranne, TH Thai
Signal Processing: Image Communication 52, 74-86, 2017
172017
Robust multi-classifier for camera model identification based on convolution neural network
H Yao, T Qiao, M Xu, N Zheng
IEEE Access 6, 24973-24982, 2018
162018
Statistical model-based detector via texture weight map: Application in re-sampling authentication
T Qiao, R Shi, X Luo, M Xu, N Zheng, Y Wu
IEEE Transactions on Multimedia 21 (5), 1077-1092, 2018
142018
Exposing image resampling forgery by using linear parametric model
T Qiao, A Zhu, F Retraint
Multimedia Tools and Applications 77 (2), 1501-1523, 2018
132018
Detection of jsteg algorithm using hypothesis testing theory and a statistical model with nuisance parameters
T Qiao, C Ziitmann, R Cogranne, F Retraint
Proceedings of the 2nd ACM workshop on Information hiding and multimedia …, 2014
122014
Expose noise level inconsistency incorporating the inhomogeneity scoring strategy
H Yao, F Cao, Z Tang, J Wang, T Qiao
Multimedia Tools and Applications 77 (14), 18139-18161, 2018
102018
Statistical detection of jsteg steganography using hypothesis testing theory
T Qiao, C Zitzmann, F Retraint, R Cogranne
2014 IEEE International Conference on Image Processing (ICIP), 5517-5521, 2014
92014
Identifying wechat red packets and fund transfers via analyzing encrypted network traffic
F Yan, M Xu, T Qiao, T Wu, X Yang, N Zheng, KKR Choo
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
52018
Identifying individual camera device from raw images
T Qiao, F Retraint
IEEE Access 6, 78038-78054, 2018
42018
Using machine learning for determining network robustness of multi-agent systems under attacks
G Wang, M Xu, Y Wu, N Zheng, J Xu, T Qiao
Pacific Rim International Conference on Artificial Intelligence, 491-498, 2018
42018
A novel file carving algorithm for National Marine Electronics Association (NMEA) logs in GPS forensics
K Shi, M Xu, H Jin, T Qiao, X Yang, N Zheng, J Xu, KKR Choo
Digital Investigation 23, 11-21, 2017
42017
Image authentication by statistical analysis
T Qiao, F Retraint, R Cogranne
21st European Signal Processing Conference (EUSIPCO 2013), 1-5, 2013
42013
Digital image forensics based on local energy variance properties
T Qiao, ZX Qian, XP Zhang, WW WANG
Pattern Recognition and Artificial Intelligence 25 (2), 280-284, 2012
4*2012
Source camera identification via low dimensional PRNU features
Y Zhao, N Zheng, T Qiao, M Xu
Multimedia Tools and Applications 78 (7), 8247-8269, 2019
32019
Simplified Anti-Forensics of JPEG Compression.
Z Qian, T Qiao
JCP 8 (10), 2483-2488, 2013
32013
Hierarchical identifier: Application to user privacy eavesdropping on mobile payment app
Y Wang, N Zheng, M Xu, T Qiao, Q Zhang, F Yan, J Xu
Sensors 19 (14), 3052, 2019
22019
The system can't perform the operation now. Try again later.
Articles 1–20