Author of the publication

Improving the Embedding Strategy for Batch Adaptive Steganography.

, , , , and . IWDW, volume 11378 of Lecture Notes in Computer Science, page 248-260. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DUP-Net: Denoiser and Upsampler Network for 3D Adversarial Point Clouds Defense., , , , , and . ICCV, page 1961-1970. IEEE, (2019)ICStega: Image Captioning-based Semantically Controllable Linguistic Steganography., , , , , and . ICASSP, page 1-5. IEEE, (2023)Natias: Neuron Attribution-Based Transferable Image Adversarial Steganography., , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)DeNoL: A Few-Shot-Sample-Based Decoupling Noise Layer for Cross-channel Watermarking Robustness., , , , , , , and . ACM Multimedia, page 7345-7353. ACM, (2023)ProTegO: Protect Text Content against OCR Extraction Attack., , , , , , , , , and . ACM Multimedia, page 7424-7434. ACM, (2023)Three-Dimensional Mesh Steganography and Steganalysis: A Review., , , , and . IEEE Trans. Vis. Comput. Graph., 28 (12): 5006-5025 (2022)Defining Cost Functions for Adaptive JPEG Steganography at the Microscale., , , , and . IEEE Trans. Inf. Forensics Secur., 14 (4): 1052-1066 (2019)An Effective Steganalysis for Robust Steganography with Repetitive JPEG Compression., , , , and . ICASSP, page 3084-3088. IEEE, (2022)Adversarial Examples Against Deep Neural Network based Steganalysis., , , , , and . IH&MMSec, page 67-72. ACM, (2018)FunctionMarker: Watermarking Language Datasets via Knowledge Injection., , , , , , and . CoRR, (2023)