Author of the publication

A Novel Lossy Image-Hiding Scheme Based on Block Difference.

, , , and . IIH-MSP, page 275-278. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Wave Atom-Based Perceptual Image Hashing Against Content-Preserving and Content-Altering Attacks., and . Trans. Data Hiding Multim. Secur., (2015)Memoryless Hash-Based Perceptual Image Authentication., , and . IWDW, volume 7809 of Lecture Notes in Computer Science, page 425-434. Springer, (2012)Second-Generation RFID., , , , and . IEEE Secur. Priv., 6 (4): 21-27 (2008)Lightweight and Privacy-Preserving Template Generation for Palm-Vein-Based Human Recognition., , and . IEEE Trans. Inf. Forensics Secur., (2020)Image recognition using adaptive fuzzy neural network based on lifting scheme of wavelet., and . Artif. Life Robotics, 20 (4): 353-358 (2015)Parameter estimation of chaotic systems by a nonlinear time-varying evolution PSO method., , , and . Artif. Life Robotics, 15 (1): 33-36 (2010)Development and behavioral pattern analysis of a mobile guide system with augmented reality for painting appreciation instruction in an art museum., , , , , and . Comput. Educ., (2014)A forensic chip for secure digital video recording., and . ISCAS, page 3068-3071. IEEE, (2010)Short-term load forecasting using lifting scheme and ARIMA models., and . Expert Syst. Appl., 38 (5): 5902-5911 (2011)A novel client service quality measuring model and an eHealthcare mitigating approach., , and . Int. J. Medical Informatics, (2016)