From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Optimization of rich model based on fisher criterion for image steganalysis., , , , и . ICACI, стр. 187-192. IEEE, (2018)Steganalysis Frameworks of Embedding in Multiple Least-Significant Bits., , , и . IEEE Trans. Inf. Forensics Secur., 3 (4): 662-672 (2008)Video steganography algorithm based on the relative relationship between DWT coefficients., , , и . ACM TUR-C, стр. 233-240. ACM, (2021)On the Sharing-Based Model of Steganography., , и . IWDW, том 12617 из Lecture Notes in Computer Science, стр. 94-105. Springer, (2020)Research on a Control Strategy of the Symmetrical Four-Roller Bending Process Based on Experiment and Numerical Simulation., , , и . Symmetry, 13 (6): 940 (2021)Pixel Group Trace Model-Based Quantitative Steganalysis for Multiple Least-Significant Bits Steganography., , , и . IEEE Trans. Inf. Forensics Secur., 8 (1): 216-228 (2013)Invariances of JPEG-quantized DCT coefficients and their application in robust image steganography., , , , и . Signal Process., (2021)A Security-Sensitive Function Mining Framework for Source Code., , , , и . ICAIS (4), том 11635 из Lecture Notes in Computer Science, стр. 421-432. Springer, (2019)Steganalysis of Adaptive Steganography Under the Known Cover Image., , , , , и . SPDE, том 1268 из Communications in Computer and Information Science, стр. 560-574. Springer, (2020)Steganalysis of Content-Adaptive Steganography Based on Massive Datasets Pre-Classification and Feature Selection., , , , и . IEEE Access, (2019)