Author of the publication

Multiple Watermarking Using Multilevel Quantization Index Modulation.

, , , and . IWDW, volume 10082 of Lecture Notes in Computer Science, page 312-326. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Steganography Based on High-Dimensional Reference Table., , , and . IWDW, volume 9023 of Lecture Notes in Computer Science, page 574-587. Springer, (2014)Blind Watermarking Based on Adaptive Lattice Quantization Index Modulation., , , , and . IWDW, volume 9569 of Lecture Notes in Computer Science, page 239-249. Springer, (2015)Visible Watermark Removal Based on Dual-input Network., , , , , and . ICEA, page 46-52. ACM, (2021)Steganalysis with CNN Using Multi-channels Filtered Residuals., , , and . ICCCS (1), volume 10602 of Lecture Notes in Computer Science, page 110-120. Springer, (2017)Content-Adaptive Residual for Steganalysis., , , and . IWDW, volume 9023 of Lecture Notes in Computer Science, page 389-398. Springer, (2014)Lattice-Based Minimum-Distortion Data Hiding., , , , and . IEEE Commun. Lett., 25 (9): 2839-2843 (2021)Robust image hiding network with Frequency and Spatial Attentions., , , , , and . Pattern Recognit., (2024)High Capacity Data Hiding Scheme for Binary Images Based on Minimizing Flipping Distortion., , and . IWDW, volume 8389 of Lecture Notes in Computer Science, page 514-528. Springer, (2013)Geometrically Invariant Image Watermarking Using Histogram Adjustment., , , , and . Int. J. Digit. Crime Forensics, 10 (1): 54-66 (2018)FePN: A robust feature purification network to defend against adversarial examples., , , , , and . Comput. Secur., (November 2023)