Author of the publication

Data Computing in Covert Domain.

, , and . SPDE, volume 1268 of Communications in Computer and Information Science, page 535-545. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Single Actor Pooled Steganalysis., , and . ICGEC, volume 834 of Advances in Intelligent Systems and Computing, page 339-347. Springer, (2018)Lost in the Digital Wild: Hiding Information in Digital Activities., , , and . MPS@CCS, page 27-37. ACM, (2018)Multi-source Data Hiding in Neural Networks., , , and . MMSP, page 1-6. IEEE, (2022)Transferable adversarial attack based on sensitive perturbation analysis in frequency domain., , , , and . Inf. Sci., (2024)Unified Performance Evaluation Method for Perceptual Image Hashing., , , , and . IEEE Trans. Inf. Forensics Secur., (2022)Breaking CNN-Based Steganalysis., , , and . ICGEC, volume 834 of Advances in Intelligent Systems and Computing, page 483-491. Springer, (2018)Reversible Contrast Mapping based Reversible Data Hiding in Encrypted Images., , , , , and . WIFS, page 1-7. IEEE, (2018)Reversible visible watermark embedded in encrypted domain., , , and . ChinaSIP, page 826-830. IEEE, (2015)Distortion Function for Spatial Image Steganography Based on the Polarity of Embedding Change., , , and . IWDW, volume 10082 of Lecture Notes in Computer Science, page 487-493. (2016)Repeatable Data Hiding: Towards the Reusability of Digital Images., , and . IEEE Trans. Circuits Syst. Video Technol., 32 (1): 135-146 (2022)