Author of the publication

A novel image hashing scheme with perceptual robustness using block truncation coding.

, , , , and . Inf. Sci., (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimum Decoder for Barni's Multiplicative Watermarking Based on Minimum Bayesian Risk Criterion., , and . ICNSC, page 911-915. IEEE, (2008)Identifying Computer Generated Images Based on Quaternion Central Moments in Color Quaternion Wavelet Domain., , , , and . IEEE Trans. Circuits Syst. Video Techn., 29 (9): 2775-2785 (2019)A Novel Robust Reversible Watermarking Scheme Based on IWT., , and . ICCCS (1), volume 10602 of Lecture Notes in Computer Science, page 39-48. Springer, (2017)Content distribution and copyright authentication based on combined indexing and watermarking., , and . Multimedia Tools Appl., 57 (1): 49-66 (2012)Efficient large payloads ternary matrix embedding., , , and . Multimedia Tools Appl., 77 (2): 1605-1622 (2018)Improved PVO-based reversible data hiding: A new implementation based on multiple histograms modification., , and . J. Vis. Commun. Image Represent., (2016)A Siamese Inverted Residuals Network Image Steganalysis Scheme based on Deep Learning., , , , , and . ACM Trans. Multim. Comput. Commun. Appl., 19 (6): 214:1-214:23 (November 2023)Assessing economic losses of haze with uncertain probabilistic linguistic analytic hierarchy process., , and . J. Intell. Fuzzy Syst., 39 (5): 7547-7569 (2020)Forgery detection using polynomial fitting in recompressed JPEG images., , , , and . Signal Image Video Process., 18 (3): 2439-2451 (April 2024)A semantic element representation model for malicious domain name detection., , , , and . J. Inf. Secur. Appl., (2022)