Author of the publication

Controversial 'pixel' prior rule for JPEG adaptive steganography.

, , , , , and . IET Image Process., 13 (1): 24-33 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Triangle Mesh Watermarking and Steganography, , , , and . Springer, (2023)Patch Steganalysis: A Sampling Based Defense Against Adversarial Steganography., , , and . ICASSP, page 3079-3083. IEEE, (2022)DFGC-VRA: DeepFake Game Competition on Visual Realism Assessment., , , , , , , , , and 15 other author(s). IJCB, page 1-9. IEEE, (2023)Improving Adversarial Robustness of Masked Autoencoders via Test-time Frequency-domain Prompting., , , , , , , and . ICCV, page 1600-1610. IEEE, (2023)Flow-Based Robust Watermarking with Invertible Noise Layer for Black-Box Distortions., , , , , and . AAAI, page 5054-5061. AAAI Press, (2023)AutoStegaFont: Synthesizing Vector Fonts for Hiding Information in Documents., , , , , , and . AAAI, page 3198-3205. AAAI Press, (2023)BiFPro: A Bidirectional Facial-data Protection Framework against DeepFake., , , , , , , , , and 1 other author(s). ACM Multimedia, page 7075-7084. ACM, (2023)A Knowledge-Based Ant Colony Optimization for a Grid Workflow Scheduling Problem., , , , and . ICSI (1), volume 6145 of Lecture Notes in Computer Science, page 241-248. Springer, (2010)Tracing Text Provenance via Context-Aware Lexical Substitution., , , , , , and . AAAI, page 11613-11621. AAAI Press, (2022)Optimality of Polar Codes in Additive Steganography under Constant Distortion Profile., , and . WCSP, page 404-408. IEEE, (2022)