Author of the publication

JPEG Steganography With Content Similarity Evaluation.

, , , and . IEEE Trans. Cybern., 53 (8): 5082-5093 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Colour filter array interpolation based self recovery with anti-cropping capability., , , and . Int. J. Multim. Intell. Secur., 1 (2): 191-203 (2010)Adaptive Reversible Data Hiding by Extending the Generalized Integer Transformation., , and . IEEE Signal Process. Lett., 23 (1): 130-134 (2016)Fragile Watermarking for Color Image Recovery Based on Color Filter Array Interpolation., , and . WAIM, volume 6184 of Lecture Notes in Computer Science, page 537-543. Springer, (2010)Reversible watermarking via extreme learning machine prediction., , and . Neurocomputing, (2012)Exploring Stable Coefficients on Joint Sub-Bands for Robust Video Watermarking in DT CWT Domain., , , and . IEEE Trans. Circuits Syst. Video Technol., 32 (4): 1955-1965 (2022)Semi-structured data protection scheme based on robust watermarking., , , , and . EURASIP J. Image Video Process., 2020 (1): 12 (2020)SNIS: A Signal Noise Separation-Based Network for Post-Processed Image Forgery Detection., , , , , and . IEEE Trans. Circuits Syst. Video Technol., 33 (2): 935-951 (February 2023)Unified Performance Evaluation Method for Perceptual Image Hashing., , , , and . IEEE Trans. Inf. Forensics Secur., (2022)Reversible Data Hiding in Encrypted JPEG Bitstream., , and . IEEE Trans. Multim., 16 (5): 1486-1491 (2014)Breaking CNN-Based Steganalysis., , , and . ICGEC, volume 834 of Advances in Intelligent Systems and Computing, page 483-491. Springer, (2018)