Author of the publication

Image robust adaptive steganography adapted to lossy channels in open social networks.

, , , , and . Inf. Sci., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantitative steganalysis of JPEG additive steganography based on boundary effect., , , and . J. Electronic Imaging, 27 (2): 023004 (2018)An Improved Sample Pairs Method for Detection of LSB Embedding., , , and . Information Hiding, volume 3200 of Lecture Notes in Computer Science, page 116-127. Springer, (2004)Steganalysis of homogeneous-representation based steganography for high dynamic range images., , , , , and . Multim. Tools Appl., 79 (27-28): 20079-20105 (2020)Fusion of Two Typical Quantitative Steganalysis Based on SVR., , , and . J. Softw., 8 (3): 731-736 (2013)A Survey on Breaking Technique of Text-Based CAPTCHA., , , , and . Secur. Commun. Networks, (2017)Access Control Based on Ciphertext Attribute Authentication and Threshold Policy for the Internet of Things., , , , , and . Sensors, 19 (23): 5237 (2019)Software Watermarking Through Obfuscated Interpretation: Implementation and Analysis., , , and . J. Multim., 6 (4): 329-340 (2011)On the fault-tolerant performance for a class of robust image steganography., , , , and . Signal Process., (2018)LandmarkMiner: Street-level Network Landmarks Mining Method for IP Geolocation., , , and . ACM Trans. Internet Things, 2 (3): 21:1-21:22 (2021)SNENet: An adaptive stego noise extraction network using parallel dilated convolution for JPEG image steganalysis., , , , and . IET Image Process., 17 (10): 2894-2906 (2023)