From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An encryption algorithm of JPEG2000 streams for supporting ciphertext-based transcoding., , , и . MFI, стр. 1-7. IEEE, (2014)An Adaptive Double-Layered Embedding Scheme for MP3 Steganography., , , и . IEEE Signal Process. Lett., (2020)Efficient authentication of scalable media streams over wireless networks., , , , и . Multimedia Tools Appl., 71 (3): 1913-1935 (2014)CNN-based Steganalysis of MP3 Steganography in the Entropy Code Domain., , , , и . IH&MMSec, стр. 55-65. ACM, (2018)Fake Speech Detection Using Residual Network with Transformer Encoder., , и . IH&MMSec, стр. 13-22. ACM, (2021)Recurrent Convolutional Neural Networks for AMR Steganalysis Based on Pulse Position., , , и . IH&MMSec, стр. 2-13. ACM, (2019)Inversion Image Pairs for Anti-forensics in the Frequency Domain., , , , и . IWDW, том 14511 из Lecture Notes in Computer Science, стр. 180-193. Springer, (2023)MP3 steganalysis based on joint point-wise and block-wise correlations., , и . Inf. Sci., (2020)An AAC steganography scheme for adaptive embedding with distortion minimization model., , и . Multim. Tools Appl., 79 (37-38): 27777-27790 (2020)Content-Aware Robust JPEG Steganography for Lossy Channels Using LPCNet., , , и . IEEE Signal Process. Lett., (2022)