Author of the publication

New Technique for Hiding Data Using Adaptively Generated Pseudorandom Sequences.

, , , and . ICTERI Workshops, volume 2732 of CEUR Workshop Proceedings, page 214-227. CEUR-WS.org, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information Hiding Using 3D-Printing Technology., , , , , and . IDAACS, page 701-706. IEEE, (2019)Techniques for Raising the Remainder to a Power in the System of Residual Classes., , , , and . DESSERT, page 145-150. IEEE, (2020)Hiding data in vector images: software implementation and experimental research., , and . Multim. Tools Appl., 82 (10): 14581-14607 (April 2023)Extrapolation to calculate the probability of a double spending attack., , , and . CMIS, volume 2608 of CEUR Workshop Proceedings, page 610-620. CEUR-WS.org, (2020)The data errors control in the modular number system based on the nullification procedure., , , and . CMIS, volume 2608 of CEUR Workshop Proceedings, page 580-593. CEUR-WS.org, (2020)Photon-Driven Neural Reconstruction for Path Guiding., , , , , , , and . ACM Trans. Graph., 41 (1): 7:1-7:15 (2022)Multiple Axis-Aligned Filters for Rendering of Combined Distribution Effects., , , and . Comput. Graph. Forum, 36 (4): 155-166 (2017)Convolutional Neural Networks to Protect Against Spoofing Attacks on Biometric Face Authentication., , and . PLAIS, volume 429 of Lecture Notes in Business Information Processing, page 123-146. Springer, (2021)New Technique for Hiding Data Using Adaptively Generated Pseudorandom Sequences., , , and . ICTERI Workshops, volume 2732 of CEUR Workshop Proceedings, page 214-227. CEUR-WS.org, (2020)New Approach to the Implementation of Post-Quantum Digital Signature Scheme., , , , , and . DESSERT, page 166-171. IEEE, (2020)