Author of the publication

Watermarking-Based Perceptual Hashing Search Over Encrypted Speech.

, , , and . IWDW, volume 8389 of Lecture Notes in Computer Science, page 423-434. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Technology of Network Storage Covert Channel Based on OPTICS Algorithm., , and . APSIPA, page 891-896. IEEE, (2018)Finite-time control of linear systems subject to time-varying disturbances., , and . IMA J. Math. Control. Inf., 34 (3): 765-777 (2017)Event-triggered H ∞ filtering for singularly perturbed systems with external disturbance., , , and . Int. J. Syst. Sci., 52 (2): 407-421 (2021)A Secure Steganographic Scheme in Binary Image., , , , and . KES (3), volume 3683 of Lecture Notes in Computer Science, page 1093-1100. Springer, (2005)Geometrically Invariant Image Watermarking using Connected Objects and Gravity Centers., , and . KSII Trans. Internet Inf. Syst., 7 (11): 2893-2912 (2013)A High Capacity Reversible Watermarking Algorithm Based on Block-Level Prediction Error Histogram Shifting., , , and . AIPR, page 133-139. ACM, (2020)Fixing Domain Bias for Generalized Deepfake Detection., , , and . ICME, page 2225-2230. IEEE, (2023)Reversible data hiding based on improved rhombus predictor and prediction error expansion., , , , and . TrustCom, page 13-21. IEEE, (2020)Algorithm of identifying opinion leaders in BBS., , , and . CCIS, page 1149-1152. IEEE, (2012)H∞ sampled-data control for T-S fuzzy singularly perturbed systems with actuator saturation., , , , and . J. Intell. Fuzzy Syst., 33 (2): 779-790 (2017)