Author of the publication

Visually secure image encryption using adaptive-thresholding sparsification and parallel compressive sensing.

, , , and . Signal Process., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Image copy-move forgery detection using hierarchical feature point matching., and . APSIPA, page 1-4. IEEE, (2016)Robust Matrix Factorization via Minimum Weighted Error Entropy Criterion., , , , , and . IEEE Trans. Comput. Soc. Syst., 9 (6): 1830-1841 (2022)A Simple Yet Effective Layered Loss for Pre-Training of Network Embedding., , , , , , , , and . IEEE Trans. Netw. Sci. Eng., 9 (3): 1827-1837 (2022)Fast and Effective Image Copy-Move Forgery Detection via Hierarchical Feature Point Matching., and . IEEE Trans. Inf. Forensics Secur., 14 (5): 1307-1322 (2019)An Edge-Aware Transformer Framework for Image Inpainting Detection., , , , and . ICAIS (2), volume 13339 of Lecture Notes in Computer Science, page 648-660. Springer, (2022)Multi-scale Target-Aware Framework for Constrained Splicing Detection and Localization., , , , , and . ACM Multimedia, page 8790-8798. ACM, (2023)Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain., , , and . AAAI, page 9877-9885. AAAI Press, (2021)Trajectory Forecasting Based on Prior-Aware Directed Graph Convolutional Neural Network., , , , , , and . IEEE Trans. Intell. Transp. Syst., 23 (9): 16773-16785 (2022)Privacy-preserving and verifiable deep learning inference based on secret sharing., , , and . Neurocomputing, (2022)Image Operation Chain Detection with Machine Translation Framework., , , , , and . IEEE Trans. Multim., (2023)