Author of the publication

A steganographic scheme by fully exploiting modification directions.

, and . Expert Syst. Appl., 38 (8): 10648-10657 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Image Authentication Based on Discrete Fourier Transform., and . Fundam. Informaticae, 97 (4): 369-379 (2009)Rethinking the Combined and Individual Orders of Derivative of States for Differential Recurrent Neural Networks: Deep Differential Recurrent Neural Networks., , , and . ACM Trans. Multim. Comput. Commun. Appl., 15 (3): 83:1-83:21 (2019)A reversible steganographic scheme for VQ indices based on joint neighboring coding., and . Expert Syst. Appl., 42 (2): 713-722 (2015)A reversible data hiding scheme using complementary embedding strategy., and . Inf. Sci., 180 (16): 3045-3058 (2010)Reversible Data Embedding for Color Images., , and . J. Digit. Inf. Manag., 6 (2): 143-150 (2008)A lossless data embedding technique by joint neighboring coding., , and . Pattern Recognit., 42 (7): 1597-1603 (2009)A high stego-image quality steganographic scheme with reversibility and high payload using multiple embedding strategy., and . J. Syst. Softw., 82 (10): 1743-1752 (2009)Convolutional Nonlinear Differential Recurrent Neural Networks for Crowd Scene Understanding., , , and . Int. J. Semantic Comput., 12 (4): 480-500 (2018)High Capacity Data Hiding for Grayscale Images., , and . Fundam. Informaticae, 86 (4): 435-446 (2008)A Novel Information Concealing Method Based on Exploiting Modification Direction., , , and . J. Inf. Hiding Multim. Signal Process., 1 (1): 1-9 (2010)