Author of the publication

Reversible Audio Information Hiding Based on Integer DCT Coefficients with Adaptive Hiding Locations.

, , , and . IWDW, volume 8389 of Lecture Notes in Computer Science, page 376-389. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Implementation of Synchronized Audio-to-Audio Steganography Scheme., , , and . IIH-MSP, page 331-334. IEEE Computer Society, (2008)A Fast and Low-Distortion Capacity Adaptive Synchronized Acoustic-to-Acoustic Steganography Scheme., , and . Recent Advances in Information Hiding and Applications, volume 40 of Intelligent Systems Reference Library, Springer, (2013)Watermarking Based Data Spoofing Detection Against Speech Synthesis and Impersonation with Spectral Noise Perturbation.. IEEE BigData, page 4600-4604. IEEE, (2018)Mitigate: Toward Comprehensive Research and Development for Analyzing and Combating IoT Malware., , , , , , , , , and 5 other author(s). IEICE Trans. Inf. Syst., 106 (9): 1302-1315 (September 2023)Connection Type Identification and Uplink Speed Estimation of Malware Infected Hosts., , and . J. Inf. Process., (2022)Reversible Audio Information Hiding Based on Integer DCT Coefficients with Adaptive Hiding Locations., , , and . IWDW, volume 8389 of Lecture Notes in Computer Science, page 376-389. Springer, (2013)Design and implementation of real-time acoustic steganography., , , and . ICME, page 917-920. IEEE Computer Society, (2008)A Reversible Acoustic Steganography for Integrity Verification., , and . IWDW, volume 6526 of Lecture Notes in Computer Science, page 305-316. Springer, (2010)Privacy-Preserving Hypothesis Testing for Reduced Cancer Risk on Daily Physical Activity., , , and . J. Medical Systems, 42 (5): 90:1-90:12 (2018)A New Approach of Reversible Acoustic Steganography for Tampering Detection., , and . IIH-MSP, page 538-542. IEEE Computer Society, (2010)