Author of the publication

2-D Wilson spectral factorization.

, and . IEEE Trans. Acoust. Speech Signal Process., 36 (1): 125-128 (1988)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transportation Spherical Watermarking., , and . IEEE Trans. Image Process., 27 (4): 2063-2077 (2018)Detecting Covert Channels in Computer Networks Based on Chaos Theory., and . IEEE Trans. Inf. Forensics Secur., 8 (2): 273-282 (2013)Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited., , , , and . IEEE Trans. Inf. Forensics Secur., 10 (12): 2669-2680 (2015)New Channel Selection Rule for JPEG Steganography., , and . IEEE Trans. Inf. Forensics Secur., 7 (4): 1181-1191 (2012)Edge Perpendicular Binary Coding for USM Sharpening Detection., , , , and . IEEE Signal Process. Lett., 22 (3): 327-331 (2015)Binary Image Steganalysis Based on Histogram of Structuring Elements., , , , , and . IEEE Trans. Circuits Syst. Video Technol., 30 (9): 3081-3094 (2020)Histogram-pair based reversible data hiding via searching for optimal four thresholds., , and . J. Inf. Secur. Appl., (2018)Hybrid multiplicative multi-watermarking in DWT domain., , and . Multidimens. Syst. Signal Process., 28 (2): 617-636 (2017)Rate and Distortion Optimization for Reversible Data Hiding Using Multiple Histogram Shifting., , , and . IEEE Trans. Cybern., 47 (2): 315-326 (2017)Structural Design of Convolutional Neural Networks for Steganalysis., , and . IEEE Signal Process. Lett., 23 (5): 708-712 (2016)