Autor der Publikation

The A Priori Knowledge Based Secure Payload Estimation for Additive Model.

, , , and . Media Watermarking, Security, and Forensics, page 16-21. Society for Imaging Science and Technology, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Application of Ad-Hoc Network in Smart Container Tracking System., , , , and . Trustcom/BigDataSE/ISPA, page 2068-2072. IEEE, (2016)Research on Key Technologies and Standard Framework of Secure and Smart Container., , , , and . Trustcom/BigDataSE/ISPA, page 2063-2067. IEEE, (2016)Novel cover selection criterion for spatial steganography using linear pixel prediction error., and . Sci. China Inf. Sci., 59 (5): 059103:1-059103:3 (2016)Detection of Deepfake Videos Using Long Distance Attention., , , , , and . CoRR, (2021)Maintaining Rate-Distortion Optimization for IPM-Based Video Steganography by Constructing Isolated Channels in HEVC., , , , and . IH&MMSec, page 97-107. ACM, (2018)A Novel Embedding Distortion for Motion Vector-Based Steganography Considering Motion Characteristic, Local Optimality and Statistical Distribution., , , and . IH&MMSec, page 127-137. ACM, (2016)Constructing Near-optimal Double-layered Syndrome-Trellis Codes for Spatial Steganography., , and . IH&MMSec, page 139-148. ACM, (2016)Image Forgery Localization based on Multi-Scale Convolutional Neural Networks., , , and . IH&MMSec, page 85-90. ACM, (2018)Pitch Delay Based Adaptive Steganography for AMR Speech Stream., , and . IWDW, volume 11378 of Lecture Notes in Computer Science, page 275-289. Springer, (2018)Steganography Based on Adaptive Pixel-Value Differencing Scheme Revisited., , and . IWDW, volume 8389 of Lecture Notes in Computer Science, page 32-47. Springer, (2013)