From post

A Huffman Table Index Based Approach to Detect Double MP3 Compression.

, , , и . IWDW, том 8389 из Lecture Notes in Computer Science, стр. 258-271. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Identification of Synthetic Spoofed Speech with Deep Capsule Network., , , и . FCS, том 1558 из Communications in Computer and Information Science, стр. 257-265. Springer, (2021)Robust Document Image Forgery Localization Against Image Blending., , , , и . TrustCom, стр. 810-817. IEEE, (2022)Quantization Step Parity-based Steganography for MP3 Audio., , и . Fundam. Informaticae, 97 (1-2): 1-14 (2009)Targeted Speech Adversarial Example Generation With Generative Adversarial Network., , , , и . IEEE Access, (2020)Semi-Supervised Semantic Segmentation with Cross Teacher Training., , , , , , и . CoRR, (2022)Iteratively Generated Adversarial Perturbation for Audio Stego Post-processing., , и . WIFS, стр. 1-6. IEEE, (2021)Reversible Data Hiding for Audio Based on Prediction Error Expansion., и . IIH-MSP, стр. 249-252. IEEE Computer Society, (2008)Source Cell-Phone Identification Using Spectral Features of Device Self-noise., , , , , и . IWDW, том 10082 из Lecture Notes in Computer Science, стр. 29-45. (2016)Non-intrusive speech quality assessment with attention-based ResNet-BiLSTM., , , , , , , и . Signal Image Video Process., 17 (7): 3377-3385 (октября 2023)NLPC: A nimble low-priority congestion control algorithm for high-speed and lossy networks., , , , и . J. King Saud Univ. Comput. Inf. Sci., 34 (10 Part B): 9052-9059 (ноября 2022)