Author of the publication

A Secure Steganographic Scheme in Binary Image.

, , , , and . KES (3), volume 3683 of Lecture Notes in Computer Science, page 1093-1100. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research of Spatial Domain Image Digital Watermarking Payload., , , , and . EURASIP J. Information Security, (2011)H∞ sampled-data control for T-S fuzzy singularly perturbed systems with actuator saturation., , , , and . J. Intell. Fuzzy Syst., 33 (2): 779-790 (2017)Unearthing Common Inconsistency for Generalisable Deepfake Detection., , , and . CoRR, (2023)Formation Control for Multiple Quadrotors Under DoS Attacks via Singular Perturbation., , , , , and . IEEE Trans. Aerosp. Electron. Syst., 59 (4): 4753-4762 (August 2023)A Novel Equivalent Input Disturbance-Based Adaptive Sliding Mode Control for Singularly Perturbed Systems., , , and . IEEE Access, (2021)Observer-Based Control for the Two-Time-Scale Cyber-Physical Systems: The Dual-Scale DoS Attacks Case., , , , , and . IEEE Trans. Netw. Sci. Eng., 8 (4): 3369-3379 (2021)Sampled-data H∞ filtering for Markovian jump singularly perturbed systems with time-varying delay and missing measurements., , , and . Int. J. Syst. Sci., 49 (3): 464-478 (2018)A dynamic online protection framework for Android applications., and . Comput. Syst. Sci. Eng., (2018)Sampled-data control for singularly perturbed systems with actuator saturation., , , , and . ACC, page 5756-5761. IEEE, (2017)Adaptive event-triggered synchronization of neural networks under stochastic cyber-attacks with application to Chua's circuit., , , , and . Neural Networks, (September 2023)