Author of the publication

An Efficient Method to Improve the Quality of Watermarked Cover Image.

, , , , and . ICDCS Workshops, page 267-271. IEEE Computer Society, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Probabilistic packet marking with non-preemptive compensation., , and . IEEE Communications Letters, 8 (6): 359-361 (2004)A Fast Algorithm of Cubic Convolution Spline Interpolation for Image Compression., and . IMSA, page 1-5. IASTED/ACTA Press, (1999)Secure Access Control Method for Wireless Sensor Networks., , , , and . IJDSN, (2015)Mining Regression Rules and Regression Trees., , and . PAKDD, volume 1394 of Lecture Notes in Computer Science, page 271-282. Springer, (1998)A PTC Scheme for Internet of Things: Private-Trust-Confidentiality., , , and . AINA Workshops, page 969-974. IEEE Computer Society, (2016)An Image Authentication and Recovery Method Using Optimal Selection of Block Types., , and . ISM, page 151-154. IEEE Computer Society, (2014)Error Rate-Based Dynamic Weighted Fair Queuing In Wireless Networks., , , and . LCN, page 546-553. IEEE Computer Society, (2005)Applying projection and B-spline to image authentication and remedy., and . IEEE Trans. Consumer Electronics, 49 (4): 1234-1239 (2003)Digital watermarking using zerotree of DCT., and . IEEE Trans. Consumer Electronics, 46 (1): 87-94 (2000)A robust watermarking technique based on the polarity relationship between blocks., , and . ICNSC, page 340-343. IEEE, (2015)