Author of the publication

Robust FMO algorithm and adaptive redundant slice allocation for wireless video transmission.

, , , and . Telecommunication Systems, 59 (3): 357-363 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting the Intrinsic Irreversibility of Adaptive Technologies to Enhance the Security of Digital Watermarking., , and . WAIM, volume 2419 of Lecture Notes in Computer Science, page 430-440. Springer, (2002)On the spectral singularities of watermarked audio., , and . WEDELMUSIC, page 67-70. IEEE Computer Society, (2003)Novel cover selection criterion for spatial steganography using linear pixel prediction error., and . SCIENCE CHINA Information Sciences, 59 (5): 059103:1-059103:3 (2016)Further Study on GFR Features for JPEG Steganalysis., , and . CoRR, (2017)Steganography Based on Adaptive Pixel-Value Differencing Scheme Revisited., , and . IWDW, volume 8389 of Lecture Notes in Computer Science, page 32-47. Springer, (2013)Pitch Delay Based Adaptive Steganography for AMR Speech Stream., , and . IWDW, volume 11378 of Lecture Notes in Computer Science, page 275-289. Springer, (2018)Maintaining Rate-Distortion Optimization for IPM-Based Video Steganography by Constructing Isolated Channels in HEVC., , , , and . IH&MMSec, page 97-107. ACM, (2018)Image Forgery Localization based on Multi-Scale Convolutional Neural Networks., , , and . IH&MMSec, page 85-90. ACM, (2018)A Novel Embedding Distortion for Motion Vector-Based Steganography Considering Motion Characteristic, Local Optimality and Statistical Distribution., , , and . IH&MMSec, page 127-137. ACM, (2016)Constructing Near-optimal Double-layered Syndrome-Trellis Codes for Spatial Steganography., , and . IH&MMSec, page 139-148. ACM, (2016)