Author of the publication

A Reversible Data Hiding Scheme to Inverse Halftoning.

, , and . SIGMAP, page 86-89. INSTICC Press, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data-Specific Adaptive Threshold for Face Recognition and Authentication., , , and . MIPR, page 153-156. IEEE, (2019)Merging Well-Trained Deep CNN Models for Efficient Inference., , , , and . APSIPA, page 1594-1600. IEEE, (2020)A hierarchical feature search method for wine label image recognition., , and . TSP, page 568-572. IEEE, (2015)A Method to Improve the Stego-Image Quality for Palette-Based Image Steganography., , and . IWDW, volume 2939 of Lecture Notes in Computer Science, page 483-496. Springer, (2003)Increasingly Packing Multiple Facial-Informatics Modules in A Unified Deep-Learning Model via Lifelong Learning., , , , , and . ICMR, page 339-343. ACM, (2019)Merging Deep Neural Networks for Mobile Devices., , , , and . CVPR Workshops, page 1686-1694. Computer Vision Foundation / IEEE Computer Society, (2018)A Data Hiding Scheme to Reconstruct Missing Blocks for JPEG Image Transmission., , and . KES (2), volume 3682 of Lecture Notes in Computer Science, page 554-559. Springer, (2005)Design of Smart Shopping Wall Using Hand Gesture and Facial Image Recognition, , , and . Proceedings of the 2nd International Conference on Biomedical Signal and Image Processing, page 13-17. New York, NY, USA, Association for Computing Machinery (ACM), (2017)Hierarchic texture classification using statistical steganography techniques., , and . DSP, page 1101-1104. IEEE, (2002)Unifying and Merging Well-trained Deep Neural Networks for Inference Stage., , , , and . IJCAI, page 2049-2056. ijcai.org, (2018)