Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Revaluation of Error Correcting Coding in Watermarking Channel., , and . CANS, volume 3810 of Lecture Notes in Computer Science, page 274-287. Springer, (2005)Image watermarking algorithm applying CDMA., , and . ISCAS (2), page 948-951. IEEE, (2003)Deliberate Multi-Attention Network for Image Captioning., and . PRCV (1), volume 13534 of Lecture Notes in Computer Science, page 475-487. Springer, (2022)Binary image steganalysis based on local texture pattern., , , , , and . J. Vis. Commun. Image Represent., (2018)CDMA-based watermarking resisting to cropping., , and . ISCAS (2), page 25-28. IEEE, (2004)Spatial Steganalysis Based on Gradient-Based Neural Architecture Search., , and . ProvSec, volume 13059 of Lecture Notes in Computer Science, page 365-375. Springer, (2021)Source class identification for DSLR and compact cameras., , , and . MMSP, page 1-5. IEEE, (2009)Imperceptible backdoor watermarks for speech recognition model copyright protection., , , , , and . Vis. Intell., 2 (1): 23 (2024)Enhancing Adversarial Transferability on Vision Transformer by Permutation-Invariant Attacks., , and . ICME, page 1-6. IEEE, (2024)The M-band wavelets in image watermarking., , , and . ICIP (1), page 245-248. IEEE, (2005)