Author of the publication

A general attack method for steganography removal using Pseudo-CFA re-interpolation.

, , , , and . ICITST, page 454-459. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance Study of a Mobile Multi-hop 802.11a/b Railway Network Using Passive Measurement., , , , , and . MONET, 14 (6): 782-797 (2009)A study of critical baseline performance characteristics for IEEE 802.16d., , , , and . IJAACS, 2 (1): 58-69 (2009)A Novel Adaptive Distributed Cooperative Relaying MAC Protocol for Vehicular Networks., , , , , and . IEEE Journal on Selected Areas in Communications, 29 (1): 72-82 (2011)Quantitative analysis of propagation characteristics for Mobile WiMAX., , , , and . WTS, page 1-5. IEEE, (2011)Propagation Path Loss Estimation Using Nonlinear Multi-Regression Approach., , , , , and . ICC, page 1-5. IEEE, (2010)Data fusion utilization for optimizing large-scale Wireless Sensor Networks., , and . ICC, page 367-372. IEEE, (2014)Automated Covert Channel Modeling over a real network platform., , , and . IWCMC, page 559-564. IEEE, (2014)Utilization of convex optimization for data fusion-driven sensor management in WSNs., , and . IWCMC, page 1224-1229. IEEE, (2015)Performance modeling of a multi-tier multi-hop hybrid sensor network protocol., , , , , and . WCNC, page 2345-2350. IEEE, (2013)Index-Based Selective Audio Encryption for Wireless Multimedia Sensor Networks., , , , , and . IEEE Trans. Multimedia, 12 (3): 215-223 (2010)