Author of the publication

A Steganography Algorithm Based on ±1 DCT Coefficients for H.264/AVC.

, , and . FCST, page 259-263. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A robust data hiding algorithm for H.264/AVC video streams., , , and . J. Syst. Softw., 86 (8): 2174-2183 (2013)A novel P2P IPTV system for IPv4/v6 networks., , , and . Multimedia Tools Appl., 72 (1): 967-986 (2014)The optimal integration strategy and authorization mechanism of AI chip with the architecture design capacity., , , and . Comput. Ind. Eng., (2022)Manufacturers' integrated strategies for emission reduction and recycling: The role of government regulations., , , and . Comput. Ind. Eng., (2022)Fault-Tolerant Routing for P2P System with Structured Topology., , , and . CSSE (3), page 102-105. IEEE Computer Society, (2008)978-0-7695-3336-0.Automatic attack plan recognition from intrusion alerts., , , , and . SNPD (3), page 1170-1175. IEEE Computer Society, (2007)An Image Hiding Algorithm Based on Bit Plane., , and . CIS (2), volume 3802 of Lecture Notes in Computer Science, page 611-616. Springer, (2005)Real-Time Correlation of Network Security Alerts., , , and . ICEBE, page 73-80. IEEE Computer Society, (2007)A Method for Spam Behavior Recognition Based on Fuzzy Decision Tree., , and . CIT (2), page 236-241. IEEE Computer Society, (2009)978-0-7695-3836-5.Forward or Ignore: User Behavior Analysis and Prediction on Microblogging., , and . IEA/AIE, volume 7345 of Lecture Notes in Computer Science, page 231-241. Springer, (2012)