Author of the publication

Robust Imperceptible Video Watermarking for MPEG Compression and DA-AD Conversion Using Visual Masking.

, , , , and . IWDW, volume 9569 of Lecture Notes in Computer Science, page 285-298. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A robust 3D mesh watermarking scheme against cropping., , , , and . IC3D, page 1-6. IEEE, (2015)Exposing Digital Forgeries by Detecting a Contextual Violation Using Deep Neural Networks., , , and . WISA, volume 10763 of Lecture Notes in Computer Science, page 16-24. Springer, (2017)Median Filtered Image Restoration and Anti-Forensics Using Adversarial Networks., , , , and . IEEE Signal Process. Lett., 25 (2): 278-282 (2018)Detecting composite image manipulation based on deep neural networks., , , , , , and . IWSSIP, page 1-5. IEEE, (2017)Hue modification estimation using sensor pattern noise., , and . ICIP, page 5287-5291. IEEE, (2014)Blind 3D mesh watermarking based on cropping-resilient synchronization., , , and . Multimedia Tools Appl., 76 (24): 26695-26721 (2017)DeepPore: Fingerprint Pore Extraction Using Deep Convolutional Neural Networks., , , , and . IEEE Signal Process. Lett., 24 (12): 1808-1812 (2017)Cropping-resilient 3D mesh watermarking based on consistent segmentation and mesh steganalysis., , , , , , and . Multim. Tools Appl., 77 (5): 5685-5712 (2018)Perceptual 3D Watermarking Using Mesh Saliency., , , , and . ICISA, volume 424 of Lecture Notes in Electrical Engineering, page 315-322. Springer, (2017)Fingerprint Spoof Detection Using Contrast Enhancement and Convolutional Neural Networks., , , , and . ICISA, volume 424 of Lecture Notes in Electrical Engineering, page 331-338. Springer, (2017)