Author of the publication

DSteganoM: Deep steganography for motion capture data.

, , , , , , , and . Expert Syst. Appl., 238 (Part C): 121955 (March 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Text Steganography Based on Ci-poetry Generation Using Markov Chain Model., , , and . KSII Trans. Internet Inf. Syst., 10 (9): 4568-4584 (2016)Optimization of CNN through Novel Training Strategy for Visual Classification Problems., , , , , and . Entropy, 20 (4): 290 (2018)Tracking areas planning based on spectral clustering in small cell networks., , , , and . IET Commun., 13 (13): 1921-1927 (2019)Security in Fog Computing: A Novel Technique to Tackle an Impersonation Attack., , , , , , and . IEEE Access, (2018)A novel method of speech information hiding based on 3D-Magic Matrix., , , and . CoRR, (2018)Plaintext aware encryption in the standard model under the linear Diffie-Hellman knowledge assumption., , and . Int. J. Comput. Sci. Eng., 22 (2/3): 270-279 (2020)Enhanced (n, n)-threshold QR code secret sharing scheme based on error correction mechanism., , , and . J. Inf. Secur. Appl., (2021)An Algorithm for Mining Association Rules with Weighted Minimum Supports., , and . AIAI, volume 187 of IFIP, page 291-300. Springer, (2005)An Efficient Data-Hiding Scheme Based on Multidimensional Mini-SuDoKu., , , and . Sensors, 20 (9): 2739 (2020)DSteganoM: Deep steganography for motion capture data., , , , , , , and . Expert Syst. Appl., 238 (Part C): 121955 (March 2024)