Author of the publication

A Gradient Invariant DCT-Based Image Watermarking Scheme for Object Detection.

, , , , , , and . CSPS (2), volume 516 of Lecture Notes in Electrical Engineering, page 923-931. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal structural similarity constraint for reversible data hiding., , , , and . Multim. Tools Appl., 76 (14): 15491-15511 (2017)Massive graph triangulation., , and . SIGMOD Conference, page 325-336. ACM, (2013)Building an Optimal Point-Location Structure in O( sort (n)) I/Os., , and . Algorithmica, 81 (5): 1921-1937 (2019)Instance-level worst-case query bounds on R-trees., , , , and . VLDB J., 23 (4): 591-607 (2014)Output-sensitive Skyline Algorithms in External Memory., , , , and . SODA, page 887-900. SIAM, (2013)Survey of Big Data Application Technology on Multimedia Data of Public Security., , , , , , , and . CSPS (3), volume 517 of Lecture Notes in Electrical Engineering, page 105-112. Springer, (2018)Shortest Unique Queries on Strings., , and . SPIRE, volume 8799 of Lecture Notes in Computer Science, page 161-172. Springer, (2014)Optimizing Pixel Predictors Based on Self-Similarities for Reversible Data Hiding., , and . IIH-MSP, page 481-484. IEEE, (2014)Finding approximate partitions and splitters in external memory., , , and . SPAA, page 287-295. ACM, (2014)Chinese Lexical Substitution: Dataset and Method., , , , , , , and . EMNLP, page 29-42. Association for Computational Linguistics, (2023)