Author of the publication

Steganalysis for Small-Scale Training Image Pairs with Cover-Stego Feature Difference Model.

, , , , , and . TrustCom, page 233-238. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verbal Predicates in Chinese Fictive Motion Expressions.. CLSW, volume 9332 of Lecture Notes in Computer Science, page 589-598. Springer, (2015)Fast and Secure Steganography Based on J-UNIWARD., , and . IEEE Signal Process. Lett., (2020)Blind Estimation of Spectral Standard Deviation from Room Impulse Response for Reverberation Level Recognition Based on Linear Prediction., and . IFTC, volume 685 of Communications in Computer and Information Science, page 231-241. Springer, (2016)Weakening the Detecting Capability of CNN-based Steganalysis., , , and . CoRR, (2018)Improving the Lateral Detection Performance of GPR Based on Beamforming., , , , , , , and . IEEE Geosci. Remote. Sens. Lett., (2023)A separable and dual data hiding algorithm based on adaptive ternary segmentation coding and ZN-shape space-filling curve., , , , and . Multim. Tools Appl., 82 (14): 21205-21241 (2023)A Priori knowledge based secure payload estimation., , , , and . Multim. Tools Appl., 77 (14): 17889-17911 (2018)Modulations of functional connectivity in the healthy and schizophrenia groups during task and rest., , , , and . NeuroImage, 62 (3): 1694-1704 (2012)Automatic Identification of Functional Clusters in fMRI Data Using Spatial Dependence., , , , , and . IEEE Trans. Biomed. Eng., 58 (12): 3406-3417 (2011)Generating JPEG Steganographic Adversarial Example via Segmented Adversarial Embedding., and . IWDW, volume 12617 of Lecture Notes in Computer Science, page 68-79. Springer, (2020)