Author of the publication

Reversible data hiding based on multilevel histogram modification and pixel value grouping.

, , , and . J. Vis. Commun. Image Represent., (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Improved Decoding Algorithm for Generalized RDP Codes., , and . IEEE Communications Letters, 20 (4): 632-635 (2016)Transparency-Orientated Encoding Strategies for Voice-over-IP Steganography., , , and . Comput. J., 55 (6): 702-716 (2012)Dynamic and Public Auditing with Fair Arbitration for Cloud Data., , and . IEEE Trans. Cloud Computing, 6 (3): 680-693 (2018)Learning binary codes for collaborative filtering., and . KDD, page 498-506. ACM, (2012)Uncovering Bias in Ad Feedback Data Analyses & Applications✱., , , and . WWW (Companion Volume), page 614-623. ACM, (2019)CrowdTiles: presenting crowd-based information for event-driven information needs., , , , and . CIKM, page 2698-2700. ACM, (2012)Reversible data hiding based on multilevel histogram modification and pixel value grouping., , , and . J. Vis. Commun. Image Represent., (2016)Learning Social Infectivity in Sparse Low-rank Networks Using Multi-dimensional Hawkes Processes., , and . AISTATS, volume 31 of JMLR Workshop and Conference Proceedings, page 641-649. JMLR.org, (2013)Totoro: A Scalable and Fault-Tolerant Data Center Network by Using Backup Port., , and . NPC, volume 8147 of Lecture Notes in Computer Science, page 94-105. Springer, (2013)A hash centroid construction method with Swin transformer for multi-label image retrieval., , , , , and . Neural Comput. Appl., 35 (15): 10891-10907 (May 2023)