Author of the publication

Steganalysis of JPEG2000 Lazy-Mode Steganography using the Hilbert-Huang Transform Based Sequential Analysis.

, , , and . ICIP, page 101-104. IEEE, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Steganography for Spatial Color Images Based on Pixel Vector Cost., , , and . IEEE Access, (2019)One-Class Double Compression Detection of Advanced Videos Based on Simple Gaussian Distribution Model., , , , and . IEEE Trans. Circuits Syst. Video Technol., 32 (4): 2496-2500 (2022)Poster: Query-efficient Black-box Attack for Image Forgery Localization via Reinforcement Learning., , , and . CCS, page 3552-3554. ACM, (2023)Content-Adaptive Steganalysis via Augmented Utilization of Selection-Channel Information., , , and . IWDW, volume 11378 of Lecture Notes in Computer Science, page 261-274. Springer, (2018)Steganalysis of LSB Matching Revisited for Consecutive Pixels Using B-Spline Functions.. IWDW, volume 7128 of Lecture Notes in Computer Science, page 16-29. Springer, (2011)A New Steganographic Distortion Function with Explicit Considerations of Modification Interactions., , and . ICCCS (2), volume 11064 of Lecture Notes in Computer Science, page 460-471. Springer, (2018)An Optimization Strategy for Improving Security in Steganography., and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 1461-1466. IEEE, (2018)Fake Colorized Image Detection with Channel-wise Convolution based Deep-learning Framework., , , and . APSIPA, page 733-736. IEEE, (2018)VPCID - A VoIP Phone Call Identification Database., , , and . IWDW, volume 11378 of Lecture Notes in Computer Science, page 307-321. Springer, (2018)Steganalysis of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis., , and . IWDW, volume 5041 of Lecture Notes in Computer Science, page 112-126. Springer, (2007)