Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Finding robust domain from attacks: A learning framework for blind watermarking., , , , and . Neurocomputing, (2019)A Robust Blind Watermarking Using Convolutional Neural Network., , , , and . CoRR, (2017)Robust curvelet domain watermarking technique that preserves cleanness of high quality images., , , and . CoRR, (2018)Manipulation Classification for JPEG Images Using Multi-Domain Features., , , , and . IEEE Access, (2020)Dual-path convolutional neural network for classifying fine-grained manipulations in H.264 videos., , , , , and . Multim. Tools Appl., 80 (20): 30879-30906 (2021)Learning JPEG Compression Artifacts for Image Manipulation Detection and Localization., , , , and . CoRR, (2021)Robust video watermarking for MPEG compression and DA-AD conversion., , , , and . IWIHC@AsiaCCS, page 2-8. ACM, (2014)DreamStyler: Paint by Style Inversion with Text-to-Image Diffusion Models., , , , , , and . AAAI, page 674-681. AAAI Press, (2024)WAN: Watermarking Attack Network., , , , and . BMVC, page 420. BMVA Press, (2021)Deep Convolutional Neural Network for Identifying Seam-Carving Forgery., , , , , and . IEEE Trans. Circuits Syst. Video Technol., 31 (8): 3308-3326 (2021)