Author of the publication

Deep Residual Learning Using Data Augmentation for Median Filtering Forensics of Digital Images.

, , , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Discriminative Frequency Information Learning for End-to-End Speech Anti-Spoofing., , , and . IEEE Signal Process. Lett., (2023)Beyond the Prior Forgery Knowledge: Mining Critical Clues for General Face Forgery Detection., , , , , and . CoRR, (2023)ResNeXt+: Attention Mechanisms Based on ResNeXt for Malware Detection and Classification., , , and . IEEE Trans. Inf. Forensics Secur., (2024)An Adaptive IPM-Based HEVC Video Steganography via Minimizing Non-Additive Distortion., , , , and . IEEE Trans. Dependable Secur. Comput., 20 (4): 2896-2912 (July 2023)Non-ambiguity of blind watermarking: a revisit with analytical resolution., , , and . Sci. China Ser. F Inf. Sci., 52 (2): 276-285 (2009)Improve robustness of image watermarking via adaptive receiving., , and . ICIP, page 2343-2346. IEEE, (2004)A Multi-purpose Image Counter-anti-forensic Method Using Convolutional Neural Networks., , , and . IWDW, volume 10082 of Lecture Notes in Computer Science, page 3-15. (2016)New 5-Step Discrete-Time Zeroing Neuronet for Time-Dependent Matrix Square Root Finding., , , , , and . ICSAI, page 943-949. IEEE, (2019)Efficient general print-scanning resilient data hiding based on uniform log-polar mapping., , and . IEEE Trans. Inf. Forensics Secur., 5 (1): 1-12 (2010)Image Forensics Based on Transfer Learning and Convolutional Neural Network., , , and . IH&MMSec, page 165-170. ACM, (2017)