1,439 results on '"Yun Q"'
Search Results
52. Color Plates
53. Optical Flow
54. Non-uniform Quantization in Breaking HUGO.
55. Textural Features for Steganalysis
56. Textural Features for Steganalysis.
57. Automatic classification of analog modulation schemes.
58. An Enhanced EM algorithm using maximum entropy distribution as initial condition.
59. A Novel Mapping Scheme for Steganalysis.
60. Anti-Forensics of Double JPEG Compression Detection
61. A Drift Compensation Algorithm for H.264/AVC Video Robust Watermarking Scheme
62. A Drift Compensation Algorithm for H.264/AVC Video Robust Watermarking Scheme.
63. Anti-Forensics of Double JPEG Compression Detection.
64. Passive Detection of Paint-Doctored JPEG Images
65. Rake transform and edge statistics for image forgery detection.
66. A high-performance YASS-like scheme using randomized big-blocks.
67. Hiding Data in Multimedia Streaming over Networks.
68. Double-threshold reversible data hiding.
69. A Novel Multi-size Block Benford's Law Scheme for Printer Identification.
70. A phase-space reconstruction approach to detect covert channels in TCP/IP protocols.
71. Passive Detection of Paint-Doctored JPEG Images.
72. A Novel Multi-size Block Benford’s Law Scheme for Printer Identification
73. An improved reversible data hiding-based approach for intra-frame error concealment in H.264/AVC
74. Mp3 bit rate quality detection through frequency spectrum analysis.
75. Image forensics using generalised Benford's Law for accurate detection of unknown JPEG compression in watermarked images.
76. An Enhanced Statistical Approach to Identifying Photorealistic Images.
77. Run-Length and Edge Statistics Based Approach for Image Splicing Detection
78. First Digit Law and Its Application to Digital Forensics : (Invited Paper)
79. Detection of Double MPEG Compression Based on First Digit Statistics
80. JPEG image steganalysis utilizing both intrablock and interblock correlations.
81. Steganalysis of YASS.
82. Reversible binary image data hiding by run-length histogram modification.
83. A machine learning based scheme for double JPEG compression detection.
84. Computer graphics identification using genetic algorithm.
85. Data Mining of Modulation Types Using Cyclostationarity-Based Decision Tree.
86. A study on security performance of YASS.
87. Detecting doubly compressed JPEG images by using Mode Based First Digit Features.
88. Run-Length and Edge Statistics Based Approach for Image Splicing Detection.
89. First Digit Law and Its Application to Digital Forensics.
90. Detection of Double MPEG Compression Based on First Digit Statistics.
91. Robust multi-read reconstruction from noisy clusters using deep neural network for DNA storage
92. Identifying Computer Graphics using HSV Color Model and Statistical Moments of Characteristic Functions.
93. JPEG Steganalysis Based on Classwise Non-Principal Components Analysis and Multi-Directional Markov Model.
94. Effect of Recompression on Attacking JPEG Steganographic Schemes An Experimental Study.
95. A natural image model approach to splicing detection.
96. A Novel Bayesian Classifier with Smaller Eigenvalues Reset by Threshold Based on Given Database.
97. Reversible Data Hiding for JPEG Images Based on Histogram Pairs.
98. Steganalyzing Texture Images.
99. Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis.
100. Optimum Histogram Pair Based Image Lossless Data Embedding.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.