Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Luo, Xiangyang
add a person with the name Luo, Xiangyang
 

Other publications of authors with the same name

Software Watermarking Through Obfuscated Interpretation: Implementation and Analysis., , , and . Journal of Multimedia, 6 (4): 329-340 (2011)Recognizing F5-like Stego images from Multi-class JPEG Stego Images., , and . TIIS, 8 (11): 4153-4169 (2014)Fusion of Two Typical Quantitative Steganalysis Based on SVR., , , and . JSW, 8 (3): 731-736 (2013)Modification ratio estimation for a category of adaptive steganography., , , and . SCIENCE CHINA Information Sciences, 53 (12): 2472-2484 (2010)Equivalence of Punctured Convolutional Codes from Shift Equivalent Puncturing Patterns., , , and . ITCC (1), page 786-. IEEE Computer Society, (2004)Detecting LSB Steganography Based on Dynamic Masks., , and . ISDA, page 251-255. IEEE Computer Society, (2005)Searching and Detecting Spatial LSB Steganographic Images on the Internet., , and . Parallel and Distributed Computing and Networks, page 273-278. IASTED/ACTA Press, (2006)Guest Editorial: Information Hiding and Forensics for Multimedia Security., , and . Multimedia Tools Appl., 75 (21): 13421-13429 (2016)Blind forensics of image gamma transformation and its application in splicing detection., , , and . J. Visual Communication and Image Representation, (2018)Street-Level Geolocation Based on Router Multilevel Partitioning., , , , and . IEEE Access, (2019)