Author of the publication

Blind forensics of image gamma transformation and its application in splicing detection.

, , , and . J. Vis. Commun. Image Represent., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Steganalysis of adaptive image steganography in multiple gray code bit-planes., , , , and . Multimedia Tools Appl., 57 (3): 651-667 (2012)Image universal steganalysis based on wavelet packet transform., , , and . MMSP, page 780-784. IEEE Signal Processing Society, (2008)Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes., , , , , , and . Multim. Tools Appl., 75 (21): 13557-13583 (2016)Image universal steganalysis based on best wavelet packet decomposition., , , and . Sci. China Inf. Sci., 53 (3): 634-647 (2010)Steganalysis Frameworks of Embedding in Multiple Least-Significant Bits., , , and . IEEE Trans. Inf. Forensics Secur., 3 (4): 662-672 (2008)RNBG: A Ranking Nodes Based IP Geolocation Method., , , and . INFOCOM Workshops, page 80-84. IEEE, (2020)Robust Image Watermarking Scheme with General Regression Neural Network and FCM Algorithm., , and . ICIC (1), volume 5226 of Lecture Notes in Computer Science, page 243-250. Springer, (2008)Optimal Gabor Filters for Steganalysis of Content-Adaptive JPEG Steganography., , , , and . KSII Trans. Internet Inf. Syst., 11 (1): 552-569 (2017)Extracting embedded messages using adaptive steganography based on optimal syndrome-trellis decoding paths., , , , , and . Digit. Commun. Networks, 8 (4): 455-465 (2022)An SDN based hopping multicast communication against DoS attack., , and . KSII Trans. Internet Inf. Syst., 11 (4): 2196-2218 (2017)