Author of the publication

Steganalysis of MP3Stego with low embedding-rate using Markov feature.

, , and . Multimedia Tools Appl., 76 (5): 6143-6158 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semi-Supervised Semantic Segmentation with Cross Teacher Training., , , , , , and . CoRR, (2022)Iteratively Generated Adversarial Perturbation for Audio Stego Post-processing., , and . WIFS, page 1-6. IEEE, (2021)Targeted Speech Adversarial Example Generation With Generative Adversarial Network., , , , and . IEEE Access, (2020)Quantization Step Parity-based Steganography for MP3 Audio., , and . Fundam. Informaticae, 97 (1-2): 1-14 (2009)Identification of Synthetic Spoofed Speech with Deep Capsule Network., , , and . FCS, volume 1558 of Communications in Computer and Information Science, page 257-265. Springer, (2021)Robust Document Image Forgery Localization Against Image Blending., , , , and . TrustCom, page 810-817. IEEE, (2022)Source Cell-Phone Identification Using Spectral Features of Device Self-noise., , , , , and . IWDW, volume 10082 of Lecture Notes in Computer Science, page 29-45. (2016)Reversible Data Hiding for Audio Based on Prediction Error Expansion., and . IIH-MSP, page 249-252. IEEE Computer Society, (2008)Facial Data Minimization: Shallow Model as Your Privacy Filter., , , , , , and . CoRR, (2023)NLPC: A nimble low-priority congestion control algorithm for high-speed and lossy networks., , , , and . J. King Saud Univ. Comput. Inf. Sci., 34 (10 Part B): 9052-9059 (November 2022)