Author of the publication

Reversible Data Hiding in Encrypted Image via Secret Sharing Based on GF(p) and GF(2⁸).

, , , , and . IEEE Trans. Circuits Syst. Video Technol., 32 (4): 1928-1941 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New High Capacity Image Steganography Method Combined With Image Elliptic Curve Cryptography and Deep Neural Network., , , , , and . IEEE Access, (2020)An Enhanced Neural Network Approach to Person-Job Fit in Talent Recruitment, , , , , , and . ACM Transactions on Information Systems, 38 (2): 1--33 (February 2020)Image Manipulation Localization Using Spatial-Channel Fusion Excitation and Fine-Grained Feature Enhancement., , , and . IEEE Trans. Instrum. Meas., (2024)Guided filtering based color image reversible data hiding., , , and . J. Vis. Commun. Image Represent., (2017)Efficient image noise estimation based on skewness invariance and adaptive noise injection., , , , and . IET Image Process., 14 (7): 1393-1401 (2020)A hierarchical threshold secret image sharing., , and . Pattern Recognit. Lett., 33 (1): 83-91 (2012)Unified Performance Evaluation Method for Perceptual Image Hashing., , , , and . IEEE Trans. Inf. Forensics Secur., (2022)Graph-based Robust Model Hashing., and . WIFS, page 1-6. IEEE, (2022)Angle-of-Arrival Acquisition and Tracking via Virtual Subarrays in an Analog Array., , , and . VTC Fall, page 1-5. IEEE, (2019)Large-Scale Talent Flow Embedding for Company Competitive Analysis., , , , , , and . WWW, page 2354-2364. ACM / IW3C2, (2020)