Author of the publication

Modify the Quantization Table in the JPEG Header File for Forensics and Anti-forensics.

, , , , , and . IWDW, volume 13180 of Lecture Notes in Computer Science, page 72-86. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A chaotic stream cipher and the usage in video protection, , , and . Chaos, Solitons & Fractals, 34 (3): 851--859 (November 2007)Optimum Decoder for Barni's Multiplicative Watermarking Based on Minimum Bayesian Risk Criterion., , and . ICNSC, page 911-915. IEEE, (2008)SmsNet: A New Deep Convolutional Neural Network Model for Adversarial Example Detection., , , , , , and . IEEE Trans. Multim., (2022)Graph-guided deep hashing networks for similar patient retrieval., , , , , , , , , and . Comput. Biol. Medicine, (February 2024)A semantic element representation model for malicious domain name detection., , , , and . J. Inf. Secur. Appl., (2022)Fast3DS: A real-time full-convolutional malicious domain name detection system., , , , , and . J. Inf. Secur. Appl., (2021)A Siamese Inverted Residuals Network Image Steganalysis Scheme based on Deep Learning., , , , , and . ACM Trans. Multim. Comput. Commun. Appl., 19 (6): 214:1-214:23 (November 2023)Assessing economic losses of haze with uncertain probabilistic linguistic analytic hierarchy process., , and . J. Intell. Fuzzy Syst., 39 (5): 7547-7569 (2020)Forgery detection using polynomial fitting in recompressed JPEG images., , , , and . Signal Image Video Process., 18 (3): 2439-2451 (April 2024)Improved PVO-based reversible data hiding: A new implementation based on multiple histograms modification., , and . J. Vis. Commun. Image Represent., (2016)