Author of the publication

A HEVC Video Steganalysis Against DCT/DST-Based Steganography.

, , , , and . Int. J. Digit. Crime Forensics, 13 (3): 19-33 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Crowd counting estimation in video surveillance based on linear regression function., , , and . CISP-BMEI, page 60-65. IEEE, (2016)A High Capacity HEVC Steganographic Algorithm Using Intra Prediction Modes in Multi-sized Prediction Blocks., , and . IWDW, volume 11378 of Lecture Notes in Computer Science, page 233-247. Springer, (2018)A Robust Image Classification Scheme with Sparse Coding and Multiple Kernel Learning., , and . IWDW, volume 7809 of Lecture Notes in Computer Science, page 520-529. Springer, (2012)Detection of HEVC Double Compression With the Same Coding Parameters Based on Analysis of Intra Coding Quality Degradation Process., , , , and . IEEE Trans. Inf. Forensics Secur., (2020)Combined features for steganalysis against PU partition mode-based steganography in HEVC., , , , and . Multim. Tools Appl., 79 (41-42): 31147-31164 (2020)Double H.264 Compression Detection Scheme Based on Prediction Residual of Background Regions., , , and . ICIC (1), volume 10361 of Lecture Notes in Computer Science, page 471-482. Springer, (2017)Research on Technology of Chaos Secrecy Communications in Digital Watermarking., , and . IEEE Pacific Rim Conference on Multimedia, volume 2532 of Lecture Notes in Computer Science, page 105-111. Springer, (2002)Exposing video forgeries by detecting MPEG double compression., , and . ICASSP, page 1389-1392. IEEE, (2012)A Novel Video Content Understanding Scheme Based on Feature Combination Strategy., , , , and . J. Comput., 4 (7): 615-622 (2009)An Intra-Prediction Mode-Based Video Steganography With Secure Strategy., , , , and . Int. J. Digit. Crime Forensics, 13 (4): 1-15 (2021)