Author of the publication

Efficient wet paper embedding for steganography with multilayer construction.

, , and . Annales des Télécommunications, 69 (7-8): 441-447 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Qin, Chuan
add a person with the name Qin, Chuan
 

Other publications of authors with the same name

A novel (n, t, n) secret image sharing scheme without a trusted third party., , and . Multimedia Tools Appl., 72 (3): 2195-2209 (2014)3D elastic optical networking in the temporal, spectral, and spatial domains., , , , , , , and . IEEE Communications Magazine, 53 (2): 79-87 (2015)A distributed algorithm for computing Connected Dominating Set in ad hoc networks., , and . IJWMC, 1 (2): 148-155 (2006)A hierarchical threshold secret image sharing., , and . Pattern Recognition Letters, 33 (1): 83-91 (2012)Image Editing without Color Inconsistency Using Modified Poisson Equation., , and . IIH-MSP, page 397-401. IEEE Computer Society, (2008)A novel image hashing scheme with perceptual robustness using block truncation coding., , , , and . Inf. Sci., (2016)Guest Editorial: Information Hiding and Forensics for Multimedia Security., , and . Multimedia Tools Appl., 75 (21): 13421-13429 (2016)Fragile Watermarking with Self-recovery Capability via Absolute Moment Block Truncation Coding., , and . ICCCS (1), volume 10039 of Lecture Notes in Computer Science, page 104-113. (2016)Movement strategies for intelligent mobile routers., , , and . Mobile Computing and Communications Review, 14 (2): 19-21 (2010)Reversible Image Steganography Scheme Based on a U-Net Structure., , , , , and . IEEE Access, (2019)