Author of the publication

Image-into-Image Steganography Using Deep Convolutional Network.

, , and . PCM (2), volume 11165 of Lecture Notes in Computer Science, page 792-802. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Image-into-Image Steganography Using Deep Convolutional Network., , and . PCM (2), volume 11165 of Lecture Notes in Computer Science, page 792-802. Springer, (2018)A Deterministic Communication Technique in the 5G-Adv/6G Access Network Systems., , , , and . WCSP, page 955-960. IEEE, (2022)Handhold Object Detection and Event Analysis Using Visual Interaction Clues., , , , and . DMS, page 48-53. Knowledge Systems Institute, (2011)Human Smoking Event Detection Using Visual Interaction Clues., , , , and . ICPR, page 4344-4347. IEEE Computer Society, (2010)A Domain Decomposition Reduced Order Model with Data Assimilation (DD-RODA)., , , , , , , and . PARCO, volume 36 of Advances in Parallel Computing, page 189-198. IOS Press, (2019)Learning Segmentation Masks with the Independence Prior., , , , , and . AAAI, page 3429-3436. AAAI Press, (2019)EPT: A data-driven transformer model for earthquake prediction., , , , and . Eng. Appl. Artif. Intell., 123 (Part A): 106176 (2023)Efficient image matching using concentric sampling features and boosting process., and . ICIP, page 2004-2007. IEEE, (2008)Parallel accelerated matting method based on local learning., , , , and . Neurocomputing, (2019)Semi-Supervised Semantic Segmentation Constrained by Consistency Regularization., , , , and . ICME, page 1-6. IEEE, (2020)