Author of the publication

Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes.

, , , , , , and . Multim. Tools Appl., 75 (21): 13557-13583 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Influence of Bit Error Rate on the Performance of IEEE 802.11 MAC Protocol., and . WCNC, page 367-372. IEEE, (2007)A Real-time Driving Drowsiness Detection Algorithm With Individual Differences Consideration., , , , and . IEEE Access, (2019)Adaptive Service Rate and Vacation Length for Energy-Efficient HeNB Based on Queueing Analysis., , , and . IEEE Trans. Vehicular Technology, 65 (10): 8696-8709 (2016)Self-organized virtual small networking for energy saving and load balancing in cellular networks., , and . ICC Workshops, page 2874-2879. IEEE, (2015)General expansion-shifting model for reversible data hiding., and . APSIPA, page 1-4. IEEE, (2016)A new detector of LSB matching steganography based on likelihood ratio test for multivariate Gaussian covers., , , and . APSIPA, page 757-760. IEEE, (2015)Robust median filtering detection based on the difference of frequency residuals., , , and . Multimedia Tools Appl., 78 (7): 8363-8381 (2019)Detection of various image operations based on CNN., , , and . APSIPA, page 1479-1485. IEEE, (2017)Improved reversible data hiding based on two-dimensional difference-histogram modification., , , and . Multimedia Tools Appl., 76 (11): 13473-13491 (2017)Category-Level Articulated Object Pose Estimation., , , , , and . CoRR, (2019)