Author of the publication

A Fully Reversible Data Hiding Scheme in Encrypted Images Based on Homomorphic Encryption and Pixel Prediction.

, , and . Circuits Syst. Signal Process., 39 (7): 3532-3552 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Underdetermined Wideband DOA Estimation for Off-Grid Sources with Coprime Array Using Sparse Bayesian Learning., , , and . Sensors, 18 (1): 253 (2018)A Steganography Algorithm Based on MP3 Linbits Bit of Huffman Codeword., , and . IIH-MSP (2), volume 82 of Smart Innovation, Systems and Technologies, page 169-176. Springer, (2017)Individual retrieval based on oral cavity point cloud data and correntropy-based registration algorithm., , , , , , , , and . IET Image Process., 14 (12): 2675-2681 (2020)Keyword Indexing System with HowNet and PageRank., , , and . ICNSC, page 389-393. IEEE, (2008)Research on Text Network Representation., , and . ICNSC, page 1217-1221. IEEE, (2008)Robotic Self-Replication in a Structured Environment without Computer Control., , , , , , , and . CIRA, page 327-332. IEEE, (2007)APRS: Automatic pruning ratio search using Siamese network with layer-level rewards., , , , , and . Digit. Signal Process., (March 2023)Network Security Situation Assessment Approach Based on Attack-Defense Stochastic Game Model., , , and . ICCCS (3), volume 11065 of Lecture Notes in Computer Science, page 161-173. Springer, (2018)Multi-step Attack Scenarios Mining Based on Neural Network and Bayesian Network Attack Graph., , , and . ICAIS (2), volume 11633 of Lecture Notes in Computer Science, page 62-74. Springer, (2019)Interactive Poisson Photometric Propagation for Facial Composite., , , and . J. Multim., 8 (2): 153-160 (2013)