From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Security-Sensitive Function Mining Framework for Source Code., , , , и . ICAIS (4), том 11635 из Lecture Notes in Computer Science, стр. 421-432. Springer, (2019)Parameter-estimation and algorithm-selection based United-Judgment for image steganalysis., , , и . Multimedia Tools Appl., 57 (1): 91-107 (2012)Detection of perturbed quantization class stego images based on possible change modes., , , , и . J. Electronic Imaging, 24 (6): 063005 (2015)Steganalysis of content-adaptive JPEG steganography based on Gauss partial derivative filter bank., , , , , и . J. Electronic Imaging, 26 (1): 13011 (2017)On F5 Steganography in Images., , , , и . Comput. J., 55 (4): 447-456 (2012)Extracting hidden messages of MLSB steganography based on optimal stego subset., , , и . Sci. China Inf. Sci., 61 (11): 119103:1-119103:3 (2018)Pixel Group Trace Model-Based Quantitative Steganalysis for Multiple Least-Significant Bits Steganography., , , и . IEEE Trans. Inf. Forensics Secur., 8 (1): 216-228 (2013)Improving Scanned Binary Image Watermarking Based On Additive Model and Sampling., , , и . Int. J. Digit. Crime Forensics, 8 (2): 36-47 (2016)Thresholding binary coding for image forensics of weak sharpening., , и . Signal Process. Image Commun., (2020)Research on a Control Strategy of the Symmetrical Four-Roller Bending Process Based on Experiment and Numerical Simulation., , , и . Symmetry, 13 (6): 940 (2021)