Author of the publication

Meta Security Metric Learning for Secure Deep Image Hiding.

, , , , , and . IEEE Trans. Dependable Secur. Comput., 21 (5): 4907-4920 (September 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Edge Perpendicular Binary Coding for USM Sharpening Detection., , , , and . IEEE Signal Process. Lett., 22 (3): 327-331 (2015)An efficient JPEG steganographic scheme using uniform embedding., , and . WIFS, page 169-174. IEEE, (2012)Image Steganalysis Based on Statistical Moments of Wavelet Subband Histograms in DFT Domain., , , and . MMSP, page 1-4. IEEE, (2005)A Feature Selection Based on Minimum Upper Bound of Bayes Error., , , , and . MMSP, page 1-4. IEEE, (2005)Using RZL Coding to Enhance Histogram-Pair Based Image Reversible Data Hiding., , , , and . IWDW, volume 8389 of Lecture Notes in Computer Science, page 153-166. Springer, (2013)Image Quality Assessment in Reversible Data Hiding with Contrast Enhancement., , and . IWDW, volume 10431 of Lecture Notes in Computer Science, page 290-302. Springer, (2017)New JPEG Steganographic Scheme with High Security Performance., , and . IWDW, volume 6526 of Lecture Notes in Computer Science, page 189-201. Springer, (2010)Comparison of DCT and Gabor Filters in Residual Extraction of CNN Based JPEG Steganalysis., , , , and . IWDW, volume 11378 of Lecture Notes in Computer Science, page 29-39. Springer, (2018)Constant-quality constrained-rate allocation for FGS video coded bitstreams., , , and . VCIP, volume 4671 of Proceedings of SPIE, page 817-827. SPIE, (2002)Smoothing identification for digital image forensics., , , and . Multim. Tools Appl., 78 (7): 8225-8245 (2019)