Author of the publication

Distortion Design for Secure Adaptive 3-D Mesh Steganography.

, , , , and . IEEE Trans. Multim., 21 (6): 1384-1398 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Perceptual Hashing of Deep Convolutional Neural Networks for Model Copy Detection., , , , , , , and . ACM Trans. Multim. Comput. Commun. Appl., 19 (3): 123:1-123:20 (2023)Controversial 'pixel' prior rule for JPEG adaptive steganography., , , , , and . IET Image Process., 13 (1): 24-33 (2019)A Brief Survey on Deep Learning Based Data Hiding, Steganography and Watermarking., , , , , and . CoRR, (2021)Cover Reproducible Steganography via Deep Generative Models., , , , , and . CoRR, (2022)Three-Dimensional Mesh Steganography and Steganalysis: A Review., , , , and . CoRR, (2021)Toward Secure and Robust Steganography for Black-Box Generated Images., , , , and . IEEE Trans. Inf. Forensics Secur., (2024)ICStega: Image Captioning-based Semantically Controllable Linguistic Steganography., , , , , and . ICASSP, page 1-5. IEEE, (2023)DeNoL: A Few-Shot-Sample-Based Decoupling Noise Layer for Cross-channel Watermarking Robustness., , , , , , , and . ACM Multimedia, page 7345-7353. ACM, (2023)ProTegO: Protect Text Content against OCR Extraction Attack., , , , , , , , , and . ACM Multimedia, page 7424-7434. ACM, (2023)Feature Fusion Based Adversarial Example Detection Against Second-Round Adversarial Attacks., , , , , , , and . IEEE Trans. Artif. Intell., 4 (5): 1029-1040 (October 2023)