Browse/Search Results: 1-6 of 6

Selected(0)Clear Items/Page:    Sort:
Public audit for operation behavior logs with error locating in cloud storage Journal article
Soft Computing,2019, volume: 23, issue: 11, pages: 3779-3792
Authors:  Tian, Hui;  Chen, Zhaoyi;  Chang, Chin Chen;  Huang, Yongfeng;  Wang, Tian
Favorite  |  View/Download:2/0  |  Submit date:2021/12/02
Steganalysis of inactive voice-over-IP frames based on poker test Journal article
Symmetry,2018, volume: 10, issue: 8
Authors:  Liu, Jie;  Tian, Hui;  Chang, Chin Chen;  Wang, Tian;  Chen, Yonghong
Favorite  |  View/Download:2/0  |  Submit date:2021/12/02
StegTab: Steganography in guitar tablatures Journal article
Journal of Information Hiding and Multimedia Signal Processing,2018, volume: 9, issue: 4, pages: 904-917
Authors:  Zhu, Zhaohua;  Tian, Hui;  Chang, Chin Chen;  Chen, Yonghong;  Wang, Tian
Favorite  |  View/Download:2/0  |  Submit date:2021/12/02
Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs Journal article
Signal Processing,2017, volume: 134, pages: 9-22
Authors:  Tian, Hui;  Wu, Yanpeng;  Chang, Chin Chen;  Huang, Yongfeng;  Chen, Yonghong
Favorite  |  View/Download:4/0  |  Submit date:2021/12/02
Enabling public auditability for operation behaviors in cloud storage Journal article
Soft Computing,2017, volume: 21, issue: 8, pages: 2175-2187
Authors:  Tian, Hui;  Chen, Zhaoyi;  Chang, Chin Chen;  Kuribayashi, Minoru;  Huang, Yongfeng
Favorite  |  View/Download:2/0  |  Submit date:2021/12/02
Steganalysis of analysis-by-synthesis speech exploiting pulse-position distribution characteristics Journal article
Security and Communication Networks,2016, volume: 9, issue: 15, pages: 2934-2944
Authors:  Tian, Hui;  Wu, Yanpeng;  Chang, Chin Chen;  Huang, Yongfeng;  Liu, Jin
Favorite  |  View/Download:3/0  |  Submit date:2021/12/02