Author of the publication

Pixel Group Trace Model-Based Quantitative Steganalysis for Multiple Least-Significant Bits Steganography.

, , , and . IEEE Trans. Inf. Forensics Secur., 8 (1): 216-228 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods., , and . Communications and Multimedia Security, volume 4237 of Lecture Notes in Computer Science, page 161-172. Springer, (2006)Blind recognition of punctured convolutional codes., , , and . ISIT, page 459. IEEE, (2004)LTSB Steganalysis Based on Quartic Equation., , , and . Trans. Data Hiding Multim. Secur., (2007)Class-Aware Analysis Dictionary Learning for Pattern Classification., , , , and . IEEE Signal Process. Lett., 24 (12): 1822-1826 (2017)A JPEG-Compression Resistant Adaptive Steganography Based on Relative Relationship between DCT Coefficients., , , , and . ARES, page 461-466. IEEE Computer Society, (2015)City-Level Geolocation Based on Routing Feature., , , , , and . AINA, page 414-419. IEEE Computer Society, (2015)VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones., , , , , , and . INFOCOM, page 2062-2070. IEEE, (2019)Perceptual image hashing via dual-cross pattern encoding and salient structure detection., , , , and . Inf. Sci., (2018)A City-Level Boundary Nodes Identification Algorithm Based on Bidirectional Approaching., , , and . KSII Trans. Internet Inf. Syst., 15 (8): 2764-2782 (2021)Survive and Thrive: A Stochastic Game for DDoS Attacks in Bitcoin Mining Pools., , , , , and . IEEE/ACM Trans. Netw., 28 (2): 874-887 (2020)