Author of the publication

Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes.

, , , , , , and . Multim. Tools Appl., 75 (21): 13557-13583 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of perturbed quantization class stego images based on possible change modes., , , , and . J. Electronic Imaging, 24 (6): 063005 (2015)Steganalysis of content-adaptive JPEG steganography based on Gauss partial derivative filter bank., , , , , and . J. Electronic Imaging, 26 (1): 13011 (2017)Improving Scanned Binary Image Watermarking Based On Additive Model and Sampling., , , and . Int. J. Digit. Crime Forensics, 8 (2): 36-47 (2016)Pixel Group Trace Model-Based Quantitative Steganalysis for Multiple Least-Significant Bits Steganography., , , and . IEEE Trans. Inf. Forensics Secur., 8 (1): 216-228 (2013)Thresholding binary coding for image forensics of weak sharpening., , and . Signal Process. Image Commun., (2020)Extracting hidden messages of MLSB steganography based on optimal stego subset., , , and . Sci. China Inf. Sci., 61 (11): 119103:1-119103:3 (2018)A Security-Sensitive Function Mining Framework for Source Code., , , , and . ICAIS (4), volume 11635 of Lecture Notes in Computer Science, page 421-432. Springer, (2019)Invariances of JPEG-quantized DCT coefficients and their application in robust image steganography., , , , and . Signal Process., (2021)Research on a Control Strategy of the Symmetrical Four-Roller Bending Process Based on Experiment and Numerical Simulation., , , and . Symmetry, 13 (6): 940 (2021)On F5 Steganography in Images., , , , and . Comput. J., 55 (4): 447-456 (2012)