Author of the publication

Learning to Immunize Images for Tamper Localization and Self-Recovery.

, , , , and . IEEE Trans. Pattern Anal. Mach. Intell., 45 (11): 13814-13830 (November 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server., , , , and . IEEE Trans. Cloud Comput., 9 (1): 145-154 (2021)JPEG encryption for image rescaling in the encrypted domain., , and . J. Vis. Commun. Image Represent., (2015)Reversible data hiding in encrypted images using adaptive reversible integer transformation., , , , and . Signal Process., (2020)Computing in Covert Domain Using Data Hiding., , and . CoRR, (2020)Trojaning semi-supervised learning model via poisoning wild images on the web., , , and . CoRR, (2023)Perceptual Robust Hashing for Color Images with Canonical Correlation Analysis., , , , and . CoRR, (2020)Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction., , , and . IEEE Trans. Inf. Forensics Secur., 6 (4): 1223-1232 (2011)Reference Sharing Mechanism for Watermark Self-Embedding., , , and . IEEE Trans. Image Process., 20 (2): 485-495 (2011)Undetectable Adversarial Examples Based on Microscopical Regularization., , and . ICME, page 1-6. IEEE, (2021)An Improved Steganalysis Method Using Feature Combinations., , , and . ICAIS (3), volume 11634 of Lecture Notes in Computer Science, page 115-127. Springer, (2019)