Author of the publication

Coverless Image Steganography Without Embedding.

, , , , and . ICCCS, volume 9483 of Lecture Notes in Computer Science, page 123-132. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Smooth Formation Switching of the Multiple Robots in Bilateral Teleoperation Systems., , , and . ROBIO, page 2428-2433. IEEE, (2018)Bilateral teleoperation of an unmanned aerial vehicle for forest fire detection., , , , and . ICIA, page 586-591. IEEE, (2017)A High-Dynamic Invocation Load Balancing Algorithm for Distributed Servers in the Cloud., , , , and . ICIC (1), volume 8588 of Lecture Notes in Computer Science, page 560-571. Springer, (2014)Step-climbing maneuver for transleg in the wheeled mode., , , , , and . ICAR, page 444-449. IEEE, (2017)Bilateral teleoperation of multiple UAVs with low-energy coordinated formation control., , , , and . ICAR, page 385-390. IEEE, (2017)Turning strategies for the bounding quadruped robot with an active spine., , , , , and . Ind. Robot, 45 (5): 657-668 (2018)P-like controllers with collision avoidance for passive bilateral teleoperation of a UAV., , , and . Ind. Robot, 45 (1): 152-166 (2017)Detection of in-progress phone calls using smartphone proximity and orientation sensors., , and . Int. J. Sens. Networks, 25 (2): 104-114 (2017)Lexicalized Dependency Paths Based Supervised Learning for Relation Extraction., and . Comput. Syst. Sci. Eng., 43 (3): 861-870 (2022)Coverless Information Hiding Method Based on the Chinese Mathematical Expression., , , , and . ICCCS, volume 9483 of Lecture Notes in Computer Science, page 133-143. Springer, (2015)