Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving the Perturbed Quantization steganography by Modified Matrix Encoding., , , and . WCNIS, page 437-440. IEEE, (2010)Reliable JPEG steganalysis based on multi-directional correlations., , , and . Signal Process. Image Commun., 25 (8): 577-587 (2010)Generalization of the ZZW embedding construction for steganography., and . IEEE Trans. Inf. Forensics Secur., 4 (3): 564-569 (2009)Prescribed performance based model-free adaptive sliding mode constrained control for a class of nonlinear systems., , , and . Inf. Sci., (2021)A pooling-based feature pyramid network for salient object detection., , , and . Image Vis. Comput., (2021)Improving UNIWARD distortion function via isotropic construction and hierarchical merging., , , and . J. Vis. Commun. Image Represent., (2021)Optimal structural similarity constraint for reversible data hiding., , , , and . Multim. Tools Appl., 76 (14): 15491-15511 (2017)Model-Free Cooperative Adaptive Sliding-Mode-Constrained-Control for Multiple Linear Induction Traction Systems., , , and . IEEE Trans. Cybern., 50 (9): 4076-4086 (2020)Real-time attacks on robust watermarking tools in the wild by CNN., , , , and . J. Real Time Image Process., 17 (3): 631-641 (2020)Reversible Data Hiding in Color Image With Grayscale Invariance., , , , and . IEEE Trans. Circuits Syst. Video Technol., 29 (2): 363-374 (2019)