Author of the publication

Adaptive Steganography Based on Image Edge Enhancement and Automatic Distortion Learning.

, , and . ICIG (3), volume 12890 of Lecture Notes in Computer Science, page 155-167. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Time and Energy Saving-Based Frame Adjustment Strategy (TES-FAS) Tag Identification Algorithm for UHF RFID Systems., , , , and . IEEE Trans. Wirel. Commun., 19 (5): 2974-2986 (2020)Key-aggregate searchable encryption under multi-owner setting for group data sharing in the cloud., , , , and . IJWGS, 14 (1): 21-43 (2018)Achieving Lightweight Image Steganalysis with Content-Adaptive in Spatial Domain., , , and . ICIG (1), volume 12888 of Lecture Notes in Computer Science, page 641-653. Springer, (2021)(t, n) Threshold secret image sharing scheme with adversary structure., , , , and . Multim. Tools Appl., 76 (20): 21193-21210 (2017)Multi-keyword ranked search supporting synonym query over encrypted data in cloud computing., , , , and . IPCCC, page 1-8. IEEE Computer Society, (2013)Spatial-frequency gradient fusion based model augmentation for high transferability adversarial attack., , , , and . Knowl. Based Syst., (2024)Robust Mixed-Rate Region-of-Interest-Aware Video Compressive Sensing for Transmission Line Surveillance Video., , , , , and . Inf., 15 (9): 555 (September 2024)Achieving Efficient and Privacy-Preserving Location-Based Task Recommendation in Spatial Crowdsourcing., , , , , and . IEEE Trans. Dependable Secur. Comput., 21 (4): 4006-4023 (2024)Writing in the Air with WiFi Signals for Virtual Reality Devices., , , , and . IEEE Trans. Mob. Comput., 18 (2): 473-484 (2019)New Forensic Methods for OOXML Format Documents., , , and . IWDW, volume 8389 of Lecture Notes in Computer Science, page 503-513. Springer, (2013)