Author of the publication

StealthPDF: Data hiding method for PDF file with no visual degradation.

, and . J. Inf. Secur. Appl., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficiently Decodable Non-Adaptive Threshold Group Testing., , , and . CoRR, (2017)A framework for generalized group testing with inhibitors and its potential application in neuroscience., , , and . CoRR, (2018)Near-Optimal Detection for Binary Tardos Code by Estimating Collusion Strategy., , , and . IEEE Trans. Inf. Forensics Secur., (2020)A Throughput Fairness Control Method for Concurrent Communications in Wireless Local-Area Network with Multiple Access-Points., , , , , and . J. Commun., 17 (8): 592-599 (2022)DeepFake Detection for Human Face Images and Videos: A Survey., , , and . IEEE Access, (2022)Survey on Decentralized Fingerprinting Solutions: Copyright Protection through Piracy Tracing., , and . Comput., 9 (2): 26 (2020)Image-Based Virtual Try-on System With Clothing-Size Adjustment., , and . CoRR, (2023)Efficient and error-tolerant schemes for non-adaptive complex group testing and its application in complex disease genetics., , , and . CoRR, (2019)Experimental Assessment of Probabilistic Fingerprinting Codes over AWGN Channel.. IWSEC, volume 6434 of Lecture Notes in Computer Science, page 117-132. Springer, (2010)Reversible Watermark with Large Capacity Based on the Prediction Error Expansion., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 91-A (7): 1780-1790 (2008)