Author of the publication

Combination of SIFT Feature and Convex Region-Based Global Context Feature for Image Copy Detection.

, , , , and . IWDW, volume 9023 of Lecture Notes in Computer Science, page 60-71. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Multiple Linear Regression Based High-Accuracy Error Prediction Algorithm for Reversible Data Hiding., , , and . IWDW, volume 11378 of Lecture Notes in Computer Science, page 195-205. Springer, (2018)LinL: Lost in n-best List., , , , , and . Information Hiding, volume 6958 of Lecture Notes in Computer Science, page 329-341. Springer, (2011)Rate allocation for FGS coded video using composite R-D analysis., , , , and . ICME, page 41-44. IEEE Computer Society, (2003)A content-based image authentication system with lossless data hiding., , , and . ICME, page 213-216. IEEE Computer Society, (2003)An integer wavelet transform based scheme for reversible data hiding in encrypted images., , and . Multidim. Syst. Sign. Process., 29 (3): 1191-1202 (2018)Separable Data-Hiding Scheme for Encrypted Image to Protect Privacy of User in Cloud., , , and . Symmetry, 11 (1): 82 (2019)Prediction-error of Prediction Error (PPE)-based Reversible Data Hiding., , and . CoRR, (2016)Steganalysis of YASS., , and . IEEE Trans. Information Forensics and Security, 4 (3): 369-382 (2009)A Novel Difference Expansion Transform for Reversible Data Embedding., , , , and . IEEE Trans. Information Forensics and Security, 3 (3): 456-465 (2008)Detecting Double JPEG Compression With the Same Quantization Matrix., , and . IEEE Trans. Information Forensics and Security, 5 (4): 848-856 (2010)