Author of the publication

Enhanced perceptual image authentication with tamper localization and self-restoration.

, , , , and . ICME, page 1-6. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A double inequality for an integral mean in terms of the exponential and logarithmic means., , , and . Period. Math. Hung., 75 (2): 180-189 (2017)Initial Development and Experiments on a Robotic Fish with a Novel Undulating Fin., , , and . RAM, page 1075-1078. IEEE, (2008)FedDBL: Communication and Data Efficient Federated Deep-Broad Learning for Histopathological Tissue Classification., , , , , , , , , and 6 other author(s). CoRR, (2023)Testing Conformance of BPEL Business Process Based on Model Checking., , , and . J. Softw., 5 (9): 1030-1037 (2010)A New Approach to Single Event Effect Tolerance Based on Asynchronous Circuit Technique., , , , and . J. Electron. Test., 24 (1-3): 57-65 (2008)Differentiated Services Oriented Auction Mechanism Design for NVM Based Edge Caching., , , , and . ICAIS (1), volume 12239 of Lecture Notes in Computer Science, page 95-106. Springer, (2020)Sequence-Based Unicast in Wireless Sensor Networks., , and . IEEE Trans. Commun., 68 (1): 429-444 (2020)Urbanization in China from the end of 1980s until 2010 - spatial dynamics and patterns of growth using EO-data., , , , and . Int. J. Digit. Earth, 12 (1): 78-94 (2019)Active contours driven by normalized local image fitting energy., , and . Concurr. Comput. Pract. Exp., 26 (5): 1200-1214 (2014)Deep Auxiliary Learning for Point Cloud Generation., , , , and . IEEE Access, (2020)