Author of the publication

Reversible Data Hiding Scheme Based on Image Inpainting.

, , , and . Fundam. Informaticae, 120 (1): 59-70 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A distributed algorithm for computing Connected Dominating Set in ad hoc networks., , and . Int. J. Wirel. Mob. Comput., 1 (2): 148-155 (2006)A New High Capacity Image Steganography Method Combined With Image Elliptic Curve Cryptography and Deep Neural Network., , , , , and . IEEE Access, (2020)EPFNet: Edge-Prototype Fusion Network Toward Few-Shot Semantic Segmentation for Aerial Remote-Sensing Images., , , and . IEEE Geosci. Remote. Sens. Lett., (2023)Novel Occlusion Object Removal with Inter-frame Editing and Texture Synthesis., , , and . J. Inf. Hiding Multim. Signal Process., 7 (2): 386-398 (2016)Movement strategies for intelligent mobile routers., , , and . ACM SIGMOBILE Mob. Comput. Commun. Rev., 14 (2): 19-21 (2010)Guided filtering based color image reversible data hiding., , , and . J. Vis. Commun. Image Represent., (2017)Recaptured screen image identification based on vision transformer., , , and . J. Vis. Commun. Image Represent., (February 2023)GAN-based spatial image steganography with cross feedback mechanism., , and . Signal Process., (2022)On the fault-tolerant performance for a class of robust image steganography., , , , and . Signal Process., (2018)Efficient image noise estimation based on skewness invariance and adaptive noise injection., , , , and . IET Image Process., 14 (7): 1393-1401 (2020)