Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semi-structured data protection scheme based on robust watermarking., , , , and . EURASIP J. Image Video Process., 2020 (1): 12 (2020)RetouchingFFHQ: A Large-scale Dataset for Fine-grained Face Retouching Detection., , , , , and . ACM Multimedia, page 737-746. ACM, (2023)Multimodal Fake News Detection via CLIP-Guided Learning., , , , and . ICME, page 2825-2830. IEEE, (2023)Learning to Immunize Images for Tamper Localization and Self-Recovery., , , , and . CoRR, (2022)StyleStegan: Leak-free Style Transfer Based on Feature Steganography., , , , and . CoRR, (2023)RWN: Robust Watermarking Network for Image Cropping Localization., , , , , and . ICIP, page 301-305. IEEE, (2022)High-Capacity Framework for Reversible Data Hiding in Encrypted Image Using Pixel Prediction and Entropy Encoding., , , , , and . IEEE Trans. Circuits Syst. Video Technol., 32 (9): 5874-5887 (2022)PROMPT-IML: Image Manipulation Localization with Pre-trained Foundation Models Through Prompt Tuning., , , , , and . CoRR, (2024)Hiding Images into Images with Real-world Robustness., , , , , and . CoRR, (2021)Hiding Images Into Images with Real-World Robustness., , , , , and . ICIP, page 111-115. IEEE, (2022)