Author of the publication

Cross correlation feature mining for steganalysis of hash based least significant bit substitution video steganography.

, , , and . Telecommun. Syst., 63 (4): 523-529 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A semi-fragile watermarking scheme for authenticating audio signal based on dual-tree complex wavelet transform and discrete cosine transform., , , and . Int. J. Comput. Math., 90 (12): 2588-2602 (2013)Natureness-preserving tone mapping operator based on improved guided filter and adaptive Gamma curve., , , and . IET Image Process., 18 (3): 694-706 (February 2024)Real-time layer height estimation during multi-layer directed energy deposition using domain adaptive neural networks., , , , , and . Comput. Ind., (June 2023)Design for a Communication Signal Modulation Pattern Recognition System Based on AP-SoC., , , , , and . ICCCS, page 97-102. IEEE, (2023)Application of CNN in EEG Image Classification of AD Patients., , , and . CONF-CDS, page 21:1-21:5. ACM, (2021)Intermittent demand forecasting for medical consumables with short life cycle using a dynamic neural network during the COVID-19 epidemic.. Health Informatics J., 26 (4): 3106-3122 (2020)Multi-granularity cross-modal representation learning for named entity recognition on social media., , , , , , and . Inf. Process. Manag., 61 (1): 103546 (January 2024)A Novel Framework for Multimodal Named Entity Recognition with Multi-level Alignments., , , , , , and . CoRR, (2023)Planar graphs without cycles of length 4 or 5 are (2, 0, 0)-colorable., , , and . Discret. Math., 339 (2): 886-905 (2016)Multi-Source Knowledge Reasoning for Data-Driven IoT Security., , , , , and . Sensors, 21 (22): 7579 (2021)