scispace - formally typeset
Search or ask a question
Author

Wei Wang

Other affiliations: Shenzhen University
Bio: Wei Wang is an academic researcher from Chinese Academy of Sciences. The author has contributed to research in topics: Steganalysis & Steganography. The author has an hindex of 19, co-authored 128 publications receiving 2165 citations. Previous affiliations of Wei Wang include Shenzhen University.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article, the seasonal variations of energy balance components over three different surfaces: irrigated cropland (Yingke, YK), alpine meadow (A'rou, AR), and spruce forest (Guantan, GT) were analyzed.
Abstract: . We analyzed the seasonal variations of energy balance components over three different surfaces: irrigated cropland (Yingke, YK), alpine meadow (A'rou, AR), and spruce forest (Guantan, GT). The energy balance components were measured using eddy covariance (EC) systems and a large aperture scintillometer (LAS) in the Heihe River Basin, China, in 2008 and 2009. We also determined the source areas of the EC and LAS measurements with a footprint model for each site and discussed the differences between the sensible heat fluxes measured with EC and LAS at AR. The results show that the main EC source areas were within a radius of 250 m at all of the sites. The main source area for the LAS (with a path length of 2390 m) stretched along a path line approximately 2000 m long and 700 m wide. The surface characteristics in the source areas changed with the season at each site, and there were characteristic seasonal variations in the energy balance components at all of the sites. The sensible heat flux was the main term of the energy budget during the dormant season. During the growing season, however, the latent heat flux dominated the energy budget, and an obvious "oasis effect" was observed at YK. The sensible heat fluxes measured by LAS at AR were larger than those measured by EC at the same site. This difference seems to be caused by the so-called energy imbalance phenomenon, the heterogeneity of the underlying surfaces, and the difference between the source areas of the LAS and EC measurements.

444 citations

Proceedings ArticleDOI
TL;DR: A new paradigm for steganalysis to learn features automatically via deep learning models through a customized Convolutional Neural Network that achieves comparable performance on BOSSbase and the realistic and large ImageNet database.
Abstract: Current work on steganalysis for digital images is focused on the construction of complex handcrafted features. This paper proposes a new paradigm for steganalysis to learn features automatically via deep learning models. We novelly propose a customized Convolutional Neural Network for steganalysis. The proposed model can capture the complex dependencies that are useful for steganalysis. Compared with existing schemes, this model can automatically learn feature representations with several convolutional layers. The feature extraction and classification steps are unified under a single architecture, which means the guidance of classification can be used during the feature extraction step. We demonstrate the effectiveness of the proposed model on three state-of-theart spatial domain steganographic algorithms - HUGO, WOW, and S-UNIWARD. Compared to the Spatial Rich Model (SRM), our model achieves comparable performance on BOSSbase and the realistic and large ImageNet database. © (2015) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.

421 citations

Proceedings ArticleDOI
06 Jul 2013
TL;DR: A natural color image database with realistic tampering operations is collected and made publicly available for researchers to compare and evaluate their proposed tampering detection techniques.
Abstract: Image forensics has now raised the anxiety of justice as increasing cases of abusing tampered images in newspapers and court for evidence are reported recently. With the goal of verifying image content authenticity, passive-blind image tampering detection is called for. More realistic open benchmark databases are also needed to assist the techniques. Recently, we collect a natural color image database with realistic tampering operations. The database is made publicly available for researchers to compare and evaluate their proposed tampering detection techniques. We call this database CASI-A Image Tampering Detection Evaluation Database. We describe the purpose, the design criterion, the organization and self-evaluation of this database in this paper.

352 citations

Proceedings ArticleDOI
07 Nov 2009
TL;DR: A color image splicing detection method based on gray level co-occurrence matrix (GLCM) of thresholded edge image of image chroma is proposed and the effectiveness of the proposed method has been demonstrated by the experimental results.
Abstract: A color image splicing detection method based on gray level co-occurrence matrix (GLCM) of thresholded edge image of image chroma is proposed in this paper. Edge images are generated by subtracting horizontal, vertical, main and minor diagonal pixel values from current pixel values respectively and then thresholded with a predefined threshold T. The GLCMs of edge images along the four directions serve as features for image splicing detection. Boosting feature selection is applied to select optimal features and Support Vector Machine (SVM) is utilized as classifier in our approach. The effectiveness of the proposed method has been demonstrated by our experimental results.

139 citations

Proceedings ArticleDOI
19 Aug 2016
TL;DR: It is shown that feature representations learned with a pre-trained CNN for detecting a steganographic algorithm with a high payload can be efficiently transferred to improve the learning of features for detecting the same steganographs with a low pay-load.
Abstract: The major challenge of machine learning based image steganalysis lies in obtaining powerful feature representations. Recently, Qian et al. have shown that Convolutional Neural Network (CNN) is effective for learning features automatically for steganalysis. In this paper, we follow up this new paradigm in steganalysis, and propose a framework based on transfer learning to help the training of CNN for steganalysis, hence to achieve a better performance. We show that feature representations learned with a pre-trained CNN for detecting a steganographic algorithm with a high payload can be efficiently transferred to improve the learning of features for detecting the same steganographic algorithm with a low pay-load. By detecting representative WOW and S-UNIWARD steganographic algorithms, we demonstrate that the proposed scheme is effective in improving the feature learning in CNN models for steganalysis.

130 citations


Cited by
More filters
Proceedings Article
01 Jan 1999

2,010 citations

Journal ArticleDOI
TL;DR: Although it learns from only one type of noise residual, the proposed CNN is competitive in terms of detection performance compared with the SRM with ensemble classifiers on the BOSSbase for detecting S-UNIWARD and HILL.
Abstract: Recent studies have indicated that the architectures of convolutional neural networks (CNNs) tailored for computer vision may not be best suited to image steganalysis. In this letter, we report a CNN architecture that takes into account knowledge of steganalysis. In the detailed architecture, we take absolute values of elements in the feature maps generated from the first convolutional layer to facilitate and improve statistical modeling in the subsequent layers; to prevent overfitting, we constrain the range of data values with the saturation regions of hyperbolic tangent ( TanH ) at early stages of the networks and reduce the strength of modeling using $1\times1$ convolutions in deeper layers. Although it learns from only one type of noise residual, the proposed CNN is competitive in terms of detection performance compared with the SRM with ensemble classifiers on the BOSSbase for detecting S-UNIWARD and HILL. The results have implied that well-designed CNNs have the potential to provide a better detection performance in the future.

506 citations

Journal ArticleDOI
TL;DR: This paper presents an alternative approach to steganalysis of digital images based on convolutional neural network (CNN), which is shown to be able to well replicate and optimize these key steps in a unified framework and learn hierarchical representations directly from raw images.
Abstract: Nowadays, the prevailing detectors of steganographic communication in digital images mainly consist of three steps, ie, residual computation, feature extraction, and binary classification In this paper, we present an alternative approach to steganalysis of digital images based on convolutional neural network (CNN), which is shown to be able to well replicate and optimize these key steps in a unified framework and learn hierarchical representations directly from raw images The proposed CNN has a quite different structure from the ones used in conventional computer vision tasks Rather than a random strategy, the weights in the first layer of the proposed CNN are initialized with the basic high-pass filter set used in the calculation of residual maps in a spatial rich model (SRM), which acts as a regularizer to suppress the image content effectively To better capture the structure of embedding signals, which usually have extremely low SNR (stego signal to image content), a new activation function called a truncated linear unit is adopted in our CNN model Finally, we further boost the performance of the proposed CNN-based steganalyzer by incorporating the knowledge of selection channel Three state-of-the-art steganographic algorithms in spatial domain, eg, WOW, S-UNIWARD, and HILL, are used to evaluate the effectiveness of our model Compared to SRM and its selection-channel-aware variant maxSRMd2, our model achieves superior performance across all tested algorithms for a wide variety of payloads

483 citations

Proceedings ArticleDOI
Lingzhi Li1, Jianmin Bao2, Ting Zhang2, Hao Yang2, Dong Chen2, Fang Wen2, Baining Guo2 
14 Jun 2020
TL;DR: A novel image representation called face X-ray is proposed, which only assumes the existence of a blending step and does not rely on any knowledge of the artifacts associated with a specific face manipulation technique, and can be trained without fake images generated by any of the state-of-the-art face manipulation methods.
Abstract: In this paper we propose a novel image representation called face X-ray for detecting forgery in face images. The face X-ray of an input face image is a greyscale image that reveals whether the input image can be decomposed into the blending of two images from different sources. It does so by showing the blending boundary for a forged image and the absence of blending for a real image. We observe that most existing face manipulation methods share a common step: blending the altered face into an existing background image. For this reason, face X-ray provides an effective way for detecting forgery generated by most existing face manipulation algorithms. Face X-ray is general in the sense that it only assumes the existence of a blending step and does not rely on any knowledge of the artifacts associated with a specific face manipulation technique. Indeed, the algorithm for computing face X-ray can be trained without fake images generated by any of the state-of-the-art face manipulation methods. Extensive experiments show that face X-ray remains effective when applied to forgery generated by unseen face manipulation techniques, while most existing face forgery detection or deepfake detection algorithms experience a significant performance drop.

479 citations