Author of the publication

Distortion Design for Secure Adaptive 3-D Mesh Steganography.

, , , , and . IEEE Trans. Multim., 21 (6): 1384-1398 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Content-adaptive reversible visible watermarking in encrypted images., , , , and . Signal Process., (2019)Trends in Forest Greening and Its Spatial Correlation with Bioclimatic and Environmental Factors in the Greater Mekong Subregion from 2001 to 2020., , , , , and . Remote. Sens., 14 (23): 5982 (December 2022)RIS-assisted secure UAV communications with resource allocation and cooperative jamming., , , , , , and . IET Commun., 16 (13): 1582-1592 (2022)Privacy-preserving Collaborative Learning with Scalable Image Transformation and Autoencoder., , , and . GLOBECOM, page 1031-1036. IEEE, (2022)Fuzzy Keyword Search over Encrypted Cloud Data with Dynamic Fine-grained Access Control., , , , and . TrustCom, page 1340-1347. IEEE, (2022)Cryptanalysis of the RSA variant based on cubic Pell equation., , and . Theor. Comput. Sci., (2021)Distortion Design for Secure Adaptive 3-D Mesh Steganography., , , , and . IEEE Trans. Multim., 21 (6): 1384-1398 (2019)Defining embedding distortion for motion vector-based video steganography., , , and . Multim. Tools Appl., 74 (24): 11163-11186 (2015)Image Translation-Based Deniable Encryption against Model Extraction Attack., , and . ICIP, page 1330-1334. IEEE, (2023)ATDD: Fine-Grained Assured Time-Sensitive Data Deletion Scheme in Cloud Storage., , , and . ICC, page 3448-3453. IEEE, (2022)