Author of the publication

Steganalysis Frameworks of Embedding in Multiple Least-Significant Bits.

, , , and . IEEE Trans. Inf. Forensics Secur., 3 (4): 662-672 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Video Quality Assessment Algorithm Based on Persistence-of-Vision Effect., , and . ICCCS (2), volume 11064 of Lecture Notes in Computer Science, page 366-376. Springer, (2018)Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods., , and . Communications and Multimedia Security, volume 4237 of Lecture Notes in Computer Science, page 161-172. Springer, (2006)Steganalysis Based on Difference Image., , , and . IWDW, volume 5450 of Lecture Notes in Computer Science, page 184-198. Springer, (2008)LTSB Steganalysis Based on Quartic Equation., , , and . Trans. Data Hiding Multim. Secur., (2007)Enhanced branch obfuscation based on exception handling and encrypted mapping table., , , and . ACM TUR-C, page 140:1-140:9. ACM, (2019)A City-Level Boundary Nodes Identification Algorithm Based on Bidirectional Approaching., , , and . KSII Trans. Internet Inf. Syst., 15 (8): 2764-2782 (2021)A JPEG-Compression Resistant Adaptive Steganography Based on Relative Relationship between DCT Coefficients., , , , and . ARES, page 461-466. IEEE Computer Society, (2015)City-Level Geolocation Based on Routing Feature., , , , , and . AINA, page 414-419. IEEE Computer Society, (2015)Improved RS Method for Detection of LSB Steganography., , and . ICCSA (2), volume 3481 of Lecture Notes in Computer Science, page 508-516. Springer, (2005)A landmark calibration-based IP geolocation approach., , , , and . EURASIP J. Inf. Secur., (2016)