Author of the publication

Steganalysis of F5-like steganography based on selection of joint distribution features.

, , , and . ICIMCS, page 71-75. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Selection of image features for steganalysis based on the Fisher criterion., , and . Digital Investigation, 11 (1): 57-66 (2014)Improving side-informed JPEG steganography using two-dimensional decomposition embedding method., , , , and . Multimedia Tools Appl., 76 (12): 14345-14374 (2017)On the probability density function and characteristic function moments of image steganalysis in the log prediction error wavelet subband., , and . J. Electronic Imaging, 26 (1): 13025 (2017)2D Gabor filters-based steganalysis of content-adaptive JPEG steganography., , , , , and . Multimedia Tools Appl., 76 (24): 26391-26419 (2017)Joint JPEG compression and detection resistant performance enhancement for adaptive steganography using feature regions selection., , , and . Multimedia Tools Appl., 76 (3): 3649-3668 (2017)Steganalysis aided by fragile detection of image manipulations., , , and . Multimedia Tools Appl., 78 (16): 23309-23328 (2019)Selection of Rich Model Steganalysis Features Based on Decision Rough Set α-Positive Region Reduction., , , , and . IEEE Trans. Circuits Syst. Video Techn., 29 (2): 336-350 (2019)Blind recognition of punctured convolutional codes., , , and . ISIT, page 459. IEEE, (2004)Steganalysis of a PVD-based content adaptive image steganography., , , , and . Signal Process., 93 (9): 2529-2538 (2013)Anti-steganalysis for image on convolutional neural networks., , , , , and . Multimedia Tools Appl., 79 (7-8): 4315-4331 (2020)