Author of the publication

Perceptual Video Hashing With Secure Anti-Noise Model for Social Video Retrieval.

, , and . IEEE Internet Things J., 11 (2): 2648-2664 (January 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-view coupled dictionary learning for person re-identification., , , , , and . Neurocomputing, (2019)GPU-Based MPEG-2 to Secure Scalable Video Transcoding., , , and . Int. J. Digit. Crime Forensics, 6 (2): 52-69 (2014)Recent advances in the Intelligence technology and Security applications Guest edited by Dengpan Ye.. Int. J. Comput. Intell. Syst., 5 (5): 913 (2012)A novel image hashing scheme with perceptual robustness using block truncation coding., , , , and . Inf. Sci., (2016)Guest Editorial: Information Hiding and Forensics for Multimedia Security., , and . Multim. Tools Appl., 75 (21): 13421-13429 (2016)Big Data Analytics for Information Security., , , and . Secur. Commun. Networks, (2018)Voice Guard: Protecting Voice Privacy with Strong and Imperceptible Adversarial Perturbation in the Time Domain., , , , and . IJCAI, page 4812-4820. ijcai.org, (2023)Detection defense against adversarial attacks with saliency map., , , , and . Int. J. Intell. Syst., 37 (12): 10193-10210 (December 2022)Dual Defense: Adversarial, Traceable, and Invisible Robust Watermarking Against Face Swapping., , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)Study on the interaction between the cover source mismatch and texture complexity in steganalysis., , , , , and . Multimedia Tools Appl., 78 (6): 7643-7666 (2019)