Author of the publication

Performing scalable lossy compression on pixel encrypted images.

, , , and . EURASIP J. Image Video Process., (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Discriminative Frequency Information Learning for End-to-End Speech Anti-Spoofing., , , and . IEEE Signal Process. Lett., (2023)Efficient general print-scanning resilient data hiding based on uniform log-polar mapping., , and . IEEE Trans. Inf. Forensics Secur., 5 (1): 1-12 (2010)A Multi-purpose Image Counter-anti-forensic Method Using Convolutional Neural Networks., , , and . IWDW, volume 10082 of Lecture Notes in Computer Science, page 3-15. (2016)Improve robustness of image watermarking via adaptive receiving., , and . ICIP, page 2343-2346. IEEE, (2004)Non-ambiguity of blind watermarking: a revisit with analytical resolution., , , and . Sci. China Ser. F Inf. Sci., 52 (2): 276-285 (2009)An Adaptive IPM-Based HEVC Video Steganography via Minimizing Non-Additive Distortion., , , , and . IEEE Trans. Dependable Secur. Comput., 20 (4): 2896-2912 (July 2023)Image Forensics Based on Transfer Learning and Convolutional Neural Network., , , and . IH&MMSec, page 165-170. ACM, (2017)Forensic sensor pattern noise extraction from large image data set., , , and . ICASSP, page 3023-3027. IEEE, (2013)Recognition of spoofed voice using convolutional neural networks., , , and . GlobalSIP, page 293-297. IEEE, (2017)Beyond the Prior Forgery Knowledge: Mining Critical Clues for General Face Forgery Detection., , , , , and . CoRR, (2023)