Author of the publication

Deep Residual Network for Steganalysis of Digital Images.

, , and . IEEE Trans. Inf. Forensics Secur., 14 (5): 1181-1193 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 595-606. SPIE, (2005)Camera identification from cropped and scaled images., and . Security, Forensics, Steganography, and Watermarking of Multimedia Contents, volume 6819 of SPIE Proceedings, page 68190E. SPIE, (2008)Practical steganalysis of digital images: state of the art., and . Security and Watermarking of Multimedia Contents, volume 4675 of SPIE Proceedings, page 1-13. SPIE, (2002)New methodology for breaking steganographic techniques for JPEGs., , and . Security and Watermarking of Multimedia Contents, volume 5020 of SPIE Proceedings, page 143-155. SPIE, (2003)Security of fragile authentication watermarks with localization.. Security and Watermarking of Multimedia Contents, volume 4675 of SPIE Proceedings, page 691-700. SPIE, (2002)The square root law of steganographic capacity for Markov covers., , and . Media Forensics and Security, volume 7254 of SPIE Proceedings, page 725408. SPIE, (2009)Ensemble Classifiers for Steganalysis of Digital Media., , and . IEEE Trans. Inf. Forensics Secur., 7 (2): 432-444 (2012)Detection of Double-Compression in JPEG Images for Applications in Steganography., and . IEEE Trans. Inf. Forensics Secur., 3 (2): 247-258 (2008)Minimizing additive distortion functions with non-binary embedding operation in steganography., and . WIFS, page 1-6. IEEE, (2010)Multivariate gaussian model for designing additive distortion for steganography., and . ICASSP, page 2949-2953. IEEE, (2013)