Author of the publication

A Steganalytic Algorithm to Detect DCT-based Data Hiding Methods for H.264/AVC Videos.

, , , and . IH&MMSec, page 123-133. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel data-driven seasonal multivariable grey model for seasonal time series forecasting., , , , and . Inf. Sci., (2023)Quality-Driven Design for Video Applications., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 85-A (12): 2568-2576 (2002)Generalized Fake Image Detection Method Based on Gated Hierarchical Multi-Task Learning., , , , and . IEEE Signal Process. Lett., (2023)Full-Duplex Radio for Uplink/Downlink Wireless Access with Spatially Random Nodes., , , , and . CoRR, (2015)A Steganalytic Approach to Detect Motion Vector Modification Using Near-Perfect Estimation for Local Optimality., , and . IEEE Trans. Inf. Forensics Secur., 12 (2): 465-478 (2017)Loitering Missile Environment Information analysis and application in Fuze S&A., , , , , and . NEMS, page 5-9. IEEE, (2023)Manipulated Face Detection and Localization Based on Semantic Segmentation., , , and . IWDW, volume 13825 of Lecture Notes in Computer Science, page 98-113. Springer, (2022)Real-World Super-Resolution via Kernel Estimation and Noise Injection., , , , , and . CVPR Workshops, page 1914-1923. Computer Vision Foundation / IEEE, (2020)Distributed beamforming and power allocation in two-way multi-relay networks with second-order channel statistics., and . WCSP, page 1-6. IEEE, (2013)A Practical Method to Determine Achievable Rates for Secure Steganography., , , and . HPCC/CSS/ICESS, page 1274-1281. IEEE, (2015)