Author of the publication

Lossless Data Hiding Using Integer Wavelet Transform and Threshold Embedding Technique.

, , , , , and . ICME, page 1520-1523. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Xuan, Guorong
add a person with the name Xuan, Guorong
 

Other publications of authors with the same name

Identity Verification System Using Data Hiding and Fingerprint Recognition., , , , , , , and . MMSP, page 1-4. IEEE, (2005)High capacity lossless data hiding based on integer wavelet transform., , , , , , and . ISCAS (2), page 29-32. IEEE, (2004)EM algorithms of Gaussian mixture model and hidden Markov model., , and . ICIP (1), page 145-148. (2001)Lossless Data Hiding Using Integer Wavelet Transform and Threshold Embedding Technique., , , , , and . ICME, page 1520-1523. IEEE Computer Society, (2005)Steganalyzing Texture Images., , and . ICIP (2), page 153-156. IEEE, (2007)Effective Steganalysis Based on Statistical Moments of Wavelet Characteristic Function., , , , , , , , and . ITCC (1), page 768-773. IEEE Computer Society, (2005)Image Steganalysis Based on Statistical Moments of Wavelet Subband Histograms in DFT Domain., , , and . MMSP, page 1-4. IEEE, (2005)A Feature Selection Based on Minimum Upper Bound of Bayes Error., , , , and . MMSP, page 1-4. IEEE, (2005)A Secure Internet-Based Personal Identity Verification System Using Lossless Watermarking and Fingerprint Recognition., , , , , , and . IWDW, volume 3304 of Lecture Notes in Computer Science, page 55-65. Springer, (2004)Optimum Histogram Pair Based Image Lossless Data Embedding., , , , , and . IWDW, volume 5041 of Lecture Notes in Computer Science, page 264-278. Springer, (2007)