Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reference Sharing Mechanism for Watermark Self-Embedding., , , and . IEEE Trans. Image Process., 20 (2): 485-495 (2011)Computing in Covert Domain Using Data Hiding., , and . CoRR, (2020)JPEG encryption for image rescaling in the encrypted domain., , and . J. Vis. Commun. Image Represent., (2015)Reversible data hiding in encrypted images using adaptive reversible integer transformation., , , , and . Signal Process., (2020)Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server., , , , and . IEEE Trans. Cloud Comput., 9 (1): 145-154 (2021)Trojaning semi-supervised learning model via poisoning wild images on the web., , , and . CoRR, (2023)Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction., , , and . IEEE Trans. Inf. Forensics Secur., 6 (4): 1223-1232 (2011)Perceptual Robust Hashing for Color Images with Canonical Correlation Analysis., , , , and . CoRR, (2020)Bootstrapping Multi-View Representations for Fake News Detection., , , , , and . AAAI, page 5384-5392. AAAI Press, (2023)Robust Watermarking for Video Forgery Detection with Improved Imperceptibility and Robustness., , , , , and . MMSP, page 1-6. IEEE, (2022)