Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving the Perturbed Quantization steganography by Modified Matrix Encoding., , , and . WCNIS, page 437-440. IEEE, (2010)Reliable JPEG steganalysis based on multi-directional correlations., , , and . Signal Process. Image Commun., 25 (8): 577-587 (2010)Generalization of the ZZW embedding construction for steganography., and . IEEE Trans. Inf. Forensics Secur., 4 (3): 564-569 (2009)A Secure and High Visual-Quality Framework for Medical Images by Contrast-Enhancement Reversible Data Hiding and Homomorphic Encryption., , , and . IEEE Access, (2019)A pooling-based feature pyramid network for salient object detection., , , and . Image Vis. Comput., (2021)Improving UNIWARD distortion function via isotropic construction and hierarchical merging., , , and . J. Vis. Commun. Image Represent., (2021)Prescribed performance based model-free adaptive sliding mode constrained control for a class of nonlinear systems., , , and . Inf. Sci., (2021)CFCG: Semi-Supervised Semantic Segmentation via Cross-Fusion and Contour Guidance Supervision., , , , , , , and . ICCV, page 16302-16312. IEEE, (2023)Recursive code construction for reversible data hiding in DCT domain., , , and . Multim. Tools Appl., 72 (2): 1985-2009 (2014)Optimal structural similarity constraint for reversible data hiding., , , , and . Multim. Tools Appl., 76 (14): 15491-15511 (2017)