Among steganalysis techniques, detection against motion vector (MV)
doma...
With the popularization and application of privacy protection technologi...
Cost assignment in the motion vector domain remains a research focus in ...
Reversible data hiding in encrypted domain (RDH-ED) schemes based on
sym...
In the past few years, the Generative Adversarial Network (GAN) which
pr...
In order to keep the data secret, various techniques have been implement...
In order to keep the data secret, various techniques have been implement...
In this paper, a new framework for construction of Cardan grille for
inf...
The distortion in steganography that usually comes from the modification...