.- Digital Forensics and Security.
.- Image Encryption Scheme Based on New 1D Chaotic System and Blockchain.
.- High quality PRNU Anonymous Algorithm for JPEG Images.
.- Limiting Factors in Smartphone Based Cross Sensor Microstructure Material Classification.
.- From Deconstruction to Reconstruction A Plug in Module for Diffusion Based Purification of Adversarial Examples.
.- Privacy Preserving Image Scaling using Bicubic Interpolation and Homomorphic Encryption.
.- PDMTT A Plagiarism Detection Model Towards Multi turn Text Back Translation.
.- An Image Perceptual Hashing Algorithm Based on Convolutional Neural Networks.
.- Finger Vein Spoof GANs Can we Supersede the Production of Presentation Attack Artefacts.
.- Generalizable Deep Video Inpainting Detection Based on Constrained Convolutional Neural Networks.
.- 3DPS 3D Printing Signature for Authentication based on Equipment Distortion Model.
.- Multi Scale Enhanced Dual Stream Network for Facial Attribute Editing Localization.
.- Data Hiding.
.- Neural Network Steganography Using Extractor Matching.
.- Inversion Image Pairs for Anti forensics in the Frequency Domain.
.- Cross channel Image Steganography Based on Generative Adversarial Network.
.- A Reversible Data Hiding Algorithm for JPEG Image Based on Paillier Homomorphic Encryption.
.- Convolutional neural network prediction error algorithm based on block classification enhanced.
.- Dual Domain Learning Network for Polyp Segmentation.
.- Two round Private Set Intersection Mechanism and Algorithm Based on Blockchain.
.- Novel quaternion orthogonal Fourier Mell in moments using optimized factorial calculation.
.- DNA Steg analysis Based on Multi dimensional Feature Extraction and Fusion.
.- VStego800K Large scale Steg analysis Dataset for Streaming Voice.
.- Linguistic Steganalysis based on Clustering and Ensemble Learning in Imbalanced Scenario.