Author of the publication

Enhancing the Anti-steganalysis Ability of Image Steganography via Multiple Adversarial Networks.

, , , , , and . SciSec, volume 14299 of Lecture Notes in Computer Science, page 181-192. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data stream mining in fog computing environment with feature selection using ensemble of swarm search algorithms., , and . ICTAS, page 1-6. IEEE, (2018)Reversible PRNU anonymity for device privacy protection based on data hiding., , , , and . Expert Syst. Appl., (December 2023)CDRKD: An improved density peak algorithm based on kernel fuzzy measure in the overlapping community detection., , , and . J. Intell. Fuzzy Syst., 45 (2): 2513-2527 (2023)A screen-shooting resilient data-hiding algorithm based on two-level singular value decomposition., , , , , and . J. Inf. Secur. Appl., (November 2023)The similarity metric, , , , and . (Aug 5, 2004)Image Steganography in Color Conversion., , , , and . IEEE Trans. Circuits Syst. II Express Briefs, 71 (1): 106-110 (January 2024)Adjacent Y-Ion Ratio Distributions and Its Application in Peptide Sequencing., and . IEEE ACM Trans. Comput. Biol. Bioinform., 16 (1): 43-51 (2019)PRNU Anonymous Algorithm Used for Privacy Protection in Biometric Authentication Systems., , , , , , , and . Int. J. Semantic Web Inf. Syst., 19 (1): 1-19 (February 2023)Wetland landscape design based on 5 G network and FPGA system., and . Microprocess. Microsystems, (2021)Image Description With Polar Harmonic Fourier Moments., , , , and . IEEE Trans. Circuits Syst. Video Technol., 30 (12): 4440-4452 (2020)