Search

Your search keyword '"Zichi Wang"' showing total 51 results

Search Constraints

Start Over You searched for: Author "Zichi Wang" Remove constraint Author: "Zichi Wang" Language undetermined Remove constraint Language: undetermined
51 results on '"Zichi Wang"'

Search Results

5. Repeatable Data Hiding: Towards the Reusability of Digital Images

11. Data Hiding in Neural Networks for Multiple Receivers [Research Frontier]

15. Batch Steganography via Generative Network

16. Multichannel Steganography in Digital Images for Multiple Receivers

17. JPEG Steganography With Content Similarity Evaluation

18. A New Steganography Method for Dynamic GIF Images Based on Palette Sort

19. A Novel Location Privacy Protection Algorithm for Social Discovery Application

20. Steganography in Social Networks Based on Behavioral Correlation

21. Practical Cover Selection for Steganography

24. Privacy protection based on binary fingerprint compression

25. Towards Robust Image Steganography

26. Breaking Steganography

27. Asymmetric Distortion Function for JPEG Steganography Using Block Artifact Compensation

28. Secure Cover Selection for Steganography

29. Steganography in beautified mages

30. Research on remote visual operation and maintenance of substation GIS equipment based on digital modeling

31. Steganographic Distortion Function for Enhanced Images

32. Multisource Data Hiding in Digital Images

33. Data Computing in Covert Domain

34. Joint Cover-Selection and Payload-Allocation by Steganographic Distortion Optimization

35. On Improving Distortion Functions for JPEG Steganography

36. Distortion function based on residual blocks for JPEG steganography

37. Distortion Function for JPEG Steganography Based on Image Texture and Correlation in DCT Domain

38. Novel Simulation Model for Coil-Coil Type Electromagnetic Repulsion Actuator in Low Voltage DC Circuit Breaker

39. Research on Fault Characteristics of High-Voltage Side in Dual Active Bridge DC/DC Converter

40. An Improved Steganalysis Method Using Feature Combinations

41. Single Actor Pooled Steganalysis

42. Breaking CNN-Based Steganalysis

43. Lossless and Reversible Data Hiding in Encrypted Images With Public-Key Cryptography

44. Reversible Contrast Mapping based Reversible Data Hiding in Encrypted Images

45. Distortion Function for Steganography in Texture Synthesized Images

46. Distortion Function for Spatial Image Steganography Based on the Polarity of Embedding Change

47. Steganography in stylized images

48. Reversible visible watermark embedded in encrypted domain

50. Pipeline inwall 3D measurement system based on the cross structured light

Catalog

Books, media, physical & digital resources