Author of the publication

Steganalysis of least significant bit matching using multi-order differences.

, , , and . Secur. Commun. Networks, 7 (8): 1283-1291 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptor: Improving the Robustness and Imperceptibility of Watermarking by the Adaptive Strength Factor., , and . IEEE Trans. Circuits Syst. Video Technol., 33 (11): 6260-6272 (November 2023)Enhancing Robustness and Imperceptibility of Blind Watermarking with Improved Message Processor., , , , , , and . ICASSP, page 1-5. IEEE, (2023)Data collection from WSNs to the cloud based on mobile Fog elements., , , , , , and . Future Gener. Comput. Syst., (2020)An air quality forecasting model based on improved convnet and RNN., , and . Soft Comput., 25 (14): 9209-9218 (2021)Beam-GBAS for Multidimensional Knapsack Problems., , , , , and . ICSI (1), volume 13968 of Lecture Notes in Computer Science, page 345-355. Springer, (2023)Large Capacity Image Watermarking Model using SWT and Laplacian Pyramid., , , , , and . HPCC/DSS/SmartCity/DependSys, page 459-465. IEEE, (2023)A Steganography Scheme in P2P Network., , , and . IIH-MSP, page 20-24. IEEE Computer Society, (2008)A New Sufficient & Necessary Condition for Testing Linear Separability Between Two Sets., , , , and . IEEE Trans. Pattern Anal. Mach. Intell., 46 (6): 4160-4173 (June 2024)Opportunistic broadcasting for low-power sensor networks with adaptive performance requirements., , , , and . Wireless Networks, 24 (6): 2297-2317 (2018)Density Self-Adaptive Hybrid Clustering Routing Protocol for Wireless Sensor Networks., and . Future Internet, 8 (3): 27 (2016)