Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Steganalysis of F5-like steganography based on selection of joint distribution features., , , and . ICIMCS, page 71-75. ACM, (2013)Multi-class steganalysis for Jpeg stego algorithms., , , , and . ICIP, page 2076-2079. IEEE, (2008)Deep neural network-based image copyright protection scheme., , , , and . J. Electronic Imaging, 28 (2): 023021 (2019)A code protection method against function call analysis in P2P network., , , and . Peer-to-Peer Netw. Appl., 12 (6): 1799-1809 (2019)基于多层次属性加权的代码混淆有效性量化评估 (Quantitative Evaluation for Effectiveness of Code Obfuscation Based on Multi-level Weighted Attributes)., , , and . 计算机科学, 42 (3): 167-173 (2015)An Authentication Watermark Algorithm for JPEG images., , , and . ARES, page 584-588. IEEE Computer Society, (2009)Affine invariant image watermarking scheme based on ASIFT and Delaunay tessellation., , , and . Multimedia Tools Appl., 78 (7): 8133-8149 (2019)Video Quality Assessment Algorithm Based on Persistence-of-Vision Effect., , and . ICCCS (2), volume 11064 of Lecture Notes in Computer Science, page 366-376. Springer, (2018)Clustering and Routing Optimization Algorithm for Heterogeneous Wireless Sensor Networks., , , and . IWCMC, page 407-411. IEEE, (2020)Image Fragile Watermarking Algorithm Based on Deneighborhood Mapping., , , , and . CoRR, (2022)