Author of the publication

Lossless data hiding algorithm for encrypted images with high capacity.

, , , , , and . Multimedia Tools Appl., 75 (21): 13765-13778 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient large payloads ternary matrix embedding., , , and . Multimedia Tools Appl., 77 (2): 1605-1622 (2018)A Novel Robust Reversible Watermarking Scheme Based on IWT., , and . ICCCS (1), volume 10602 of Lecture Notes in Computer Science, page 39-48. Springer, (2017)Content distribution and copyright authentication based on combined indexing and watermarking., , and . Multimedia Tools Appl., 57 (1): 49-66 (2012)Optimum Decoder for Barni's Multiplicative Watermarking Based on Minimum Bayesian Risk Criterion., , and . ICNSC, page 911-915. IEEE, (2008)Identifying Computer Generated Images Based on Quaternion Central Moments in Color Quaternion Wavelet Domain., , , , and . IEEE Trans. Circuits Syst. Video Techn., 29 (9): 2775-2785 (2019)A chaotic stream cipher and the usage in video protection, , , and . Chaos, Solitons & Fractals, 34 (3): 851--859 (November 2007)Improved PVO-based reversible data hiding: A new implementation based on multiple histograms modification., , and . J. Vis. Commun. Image Represent., (2016)Forgery detection using polynomial fitting in recompressed JPEG images., , , , and . Signal Image Video Process., 18 (3): 2439-2451 (April 2024)A Siamese Inverted Residuals Network Image Steganalysis Scheme based on Deep Learning., , , , , and . ACM Trans. Multim. Comput. Commun. Appl., 19 (6): 214:1-214:23 (November 2023)A semantic element representation model for malicious domain name detection., , , , and . J. Inf. Secur. Appl., (2022)