Author of the publication

A proactive secret image sharing scheme with resistance to machine learning based steganalysis.

, , and . Multimedia Tools Appl., 77 (12): 15161-15179 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance analysis of adaptive widely linear beamformers., , , and . CCECE, page 1-6. IEEE, (2017)Movement Detection and Tracking Using Video Frames., , , and . CIARP, volume 5856 of Lecture Notes in Computer Science, page 1054-1061. Springer, (2009)Adaptive filtering and prediction based on Hopfield neural networks., and . ICNN, page 680-684. IEEE, (1997)Adaptive Watermarking Algorithm for Binary Image Watermarks., , and . AWIC, volume 3034 of Lecture Notes in Computer Science, page 207-216. Springer, (2004)Alaryngeal Speech Enhancement Using Pattern Recognition Techniques., , and . IEICE Trans. Inf. Syst., 88-D (7): 1618-1622 (2005)Color Watermarking based on DCT and YCbCr Color Space for Privacy Preservation in Smart Cities., , , and . ICDSP, page 119-123. ACM, (2019)Reconocimiento de Firmas Usando Extracción de Envolventes., , , and . Polibits, (2001)Performance of New Hope and CRYSTALS-Dilithium Postquantum Schemes in the Transport Layer Security Protocol., , , , , and . IEEE Access, (2020)Scheme fuzzy approach to classify skin tonalities through geographic distribution., , , , and . J. Ambient Intell. Humaniz. Comput., 11 (7): 2859-2870 (2020)Visual-based Real Time Driver Drowsiness Detection System Using CNN., , , and . CCE, page 1-5. IEEE, (2021)