Author of the publication

Source Distinguishability Under Distortion-Limited Attack: An Optimal Transport Perspective.

, and . IEEE Trans. Inf. Forensics Secur., 11 (10): 2145-2159 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast vector median filter based on Euclidean norm approximation., , and . IEEE Signal Process. Lett., 1 (6): 92-94 (1994)Improving Cost Learning for JPEG Steganography by Exploiting JPEG Domain Knowledge., , , , and . IEEE Trans. Circuits Syst. Video Technol., 32 (6): 4081-4095 (2022)ArtShop: an art-oriented image-processing tool for cultural heritage applications., , , , and . Comput. Animat. Virtual Worlds, 14 (3): 149-158 (2003)On the implementation of the discrete Fourier transform in the encrypted domain., , and . IEEE Trans. Inf. Forensics Secur., 4 (1): 86-97 (2009)Identification of VoIP Speech With Multiple Domain Deep Features., , , and . IEEE Trans. Inf. Forensics Secur., (2020)CNN-Based Adversarial Embedding for Image Steganography., , , , and . IEEE Trans. Inf. Forensics Secur., 14 (8): 2074-2087 (2019)A Full-Reference Quality Metric for Geometrically Distorted Images., , and . IEEE Trans. Image Process., 19 (4): 867-881 (2010)Watermark-Based Authentication., , and . Intelligent Multimedia Analysis for Security Applications, volume 282 of Studies in Computational Intelligence, Springer, (2010)Which country is this picture from? New data and methods for DNN-based country recognition., , , , and . CoRR, (2022)ArtShop: a tool for art image processing., , , , and . DSP, page 103-106. IEEE, (2002)