Author of the publication

Steganographic Secret Sharing With GAN-Based Face Synthesis and Morphing for Trustworthy Authentication in IoT.

, , and . IEEE Access, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PC-Based Real-Time Video Watermark Embedding System Independent of Platform for Parallel Computing., , and . Trans. Data Hiding Multim. Secur., (2012)IR Hiding: Use of Specular Reflection for Short-Wavelength-Pass-Filter Detection to Prevent Re-recording of Screen Images., , and . Trans. Data Hiding Multim. Secur., (2015)IR Hiding: Method for Preventing Illegal Recording of Videos Based on Differences in Sensory Perception between Humans and Devices., , and . Trans. Data Hiding Multim. Secur., (2012)Reversible Audio Information Hiding Based on Integer DCT Coefficients with Adaptive Hiding Locations., , , and . IWDW, volume 8389 of Lecture Notes in Computer Science, page 376-389. Springer, (2013)Audio Watermarking Using Different Wavelet Filters., , , , and . IWDW, volume 9569 of Lecture Notes in Computer Science, page 312-320. Springer, (2015)Less is More: Reversible Steganography with Uncertainty-Aware Predictive Analytics., , , and . CoRR, (2022)Rethinking Invariance Regularization in Adversarial Training to Improve Robustness-Accuracy Trade-off., and . CoRR, (2024)On the Adversarial Transferability of ConvMixer Models., , , and . CoRR, (2022)How Can We Acquire the Most Common Query Types in Two-Tiered Wireless Sensor Networks?, , , and . NGMAST, page 111-115. IEEE, (2013)BiometricJammer: Use of Pseudo Fingerprint to Prevent Fingerprint Extraction from Camera Images without Inconveniencing Users., and . SMC, page 2825-2831. IEEE, (2018)