Author of the publication

Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters.

, , , , and . IH&MMSec, page 15-23. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parameter-estimation and algorithm-selection based United-Judgment for image steganalysis., , , and . Multimedia Tools Appl., 57 (1): 91-107 (2012)On F5 Steganography in Images., , , , and . Comput. J., 55 (4): 447-456 (2012)Pixel Group Trace Model-Based Quantitative Steganalysis for Multiple Least-Significant Bits Steganography., , , and . IEEE Trans. Information Forensics and Security, 8 (1): 216-228 (2013)Detection of perturbed quantization class stego images based on possible change modes., , , , and . J. Electronic Imaging, 24 (6): 063005 (2015)Extracting hidden messages of MLSB steganography based on optimal stego subset., , , and . SCIENCE CHINA Information Sciences, 61 (11): 119103:1-119103:3 (2018)Improving Scanned Binary Image Watermarking Based On Additive Model and Sampling., , , and . IJDCF, 8 (2): 36-47 (2016)A Security-Sensitive Function Mining Framework for Source Code., , , , and . ICAIS (4), volume 11635 of Lecture Notes in Computer Science, page 421-432. Springer, (2019)Image universal steganalysis based on best wavelet packet decomposition., , , and . SCIENCE CHINA Information Sciences, 53 (3): 634-647 (2010)Steganalysis of adaptive image steganography in multiple gray code bit-planes., , , , and . Multimedia Tools Appl., 57 (3): 651-667 (2012)Steganalysis Frameworks of Embedding in Multiple Least-Significant Bits., , , and . IEEE Trans. Information Forensics and Security, 3 (4): 662-672 (2008)