Author of the publication

Noise-level estimation based detection of motion-compensated frame interpolation in video sequences.

, , , , and . Multimedia Tools Appl., 77 (1): 663-688 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Forensic Methods for OOXML Format Documents., , , and . IWDW, volume 8389 of Lecture Notes in Computer Science, page 503-513. Springer, (2013)Confusing-Keyword Based Secure Search over Encrypted Cloud Data., , , , and . Mob. Networks Appl., 25 (1): 125-132 (2020)HGA: Hierarchical Feature Extraction With Graph and Attention Mechanism for Linguistic Steganalysis., , , and . IEEE Signal Process. Lett., (2022)WolfPath: Accelerating Iterative Traversing-Based Graph Processing Algorithms on GPU., , , , , , , and . Int. J. Parallel Program., 47 (4): 644-667 (2019)An Efficient Protocol With Bidirectional Verification for Storage Security in Cloud Computing., , , , , and . IEEE Access, (2016)Writing in the Air with WiFi Signals for Virtual Reality Devices., , , , and . IEEE Trans. Mob. Comput., 18 (2): 473-484 (2019)Forward-Secure Identity-Based Signature Scheme in Untrusted Update Environments., , , , , and . Wirel. Pers. Commun., 86 (3): 1467-1491 (2016)Adaptive Steganography Based on Image Edge Enhancement and Automatic Distortion Learning., , and . ICIG (3), volume 12890 of Lecture Notes in Computer Science, page 155-167. Springer, (2021)Coverless information hiding method based on the keyword., and . IJHPCN, 14 (1): 1-7 (2019)A Steganography Algorithm Based on CycleGAN for Covert Communication in the Internet of Things., , , , and . IEEE Access, (2019)