Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semantic image compression based on data hiding., and . IET Image Processing, 9 (1): 54-61 (2015)On the Unicity Distance of Stego Key, and . CoRR, (2005)Face Swapping Consistency Transfer with Neural Identity Carrier., , , , , , , and . Future Internet, 13 (11): 298 (2021)A no-reference quality assessment for contrast-distorted image based on improved learning method., , , , and . Multim. Tools Appl., 78 (8): 10057-10076 (2019)Unified entropy-based sorting for reversible data hiding., , , and . Multim. Tools Appl., 76 (3): 3829-3850 (2017)A robust image watermarking scheme in DCT domain based on adaptive texture direction quantization., , , , and . Multim. Tools Appl., 78 (7): 8075-8089 (2019)A ROI-based high capacity reversible data hiding scheme with contrast enhancement for medical images., , , and . Multim. Tools Appl., 77 (14): 18043-18065 (2018)Directed-Graph-Observer-Based Model-Free Cooperative Sliding Mode Control for Distributed Energy Storage Systems in DC Microgrid., , , , and . IEEE Trans. Ind. Informatics, 16 (2): 1224-1235 (2020)A New Virtual Inductance Control Method for Frequency Stabilization of Grid-Forming Virtual Synchronous Generators., , , , , , and . IEEE Trans. Ind. Electron., 70 (1): 441-451 (2023)Paillier Cryptosystem based Mean Value Computation for Encrypted Domain Image Processing Operations., , , and . ACM Trans. Multim. Comput. Commun. Appl., 15 (3): 76:1-76:21 (2019)