Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Achieving Stronger Compaction for DCT-Based Steganography: A Region-Growing Approach., , and . WorldCIST (2), volume 1160 of Advances in Intelligent Systems and Computing, page 251-261. Springer, (2020)A Survey on Using Blockchain in Trade Supply Chain Solutions., , and . IEEE Access, (2019)Customs-Based Distributed Risk Assessment Method., , and . PAAP, volume 1163 of Communications in Computer and Information Science, page 417-429. Springer, (2019)NILE-PDT: A Phenomenon Detection and Tracking Framework for Data Stream Management Systems., , , , , , and . VLDB, page 1295-1298. ACM, (2005)Toward optimal embedding capacity for transform domain steganography: a quad-tree adaptive-region approach., and . Multimedia Tools Appl., 76 (6): 8627-8650 (2017)Hiding Information in Reversible English Transforms for a Blind Receiver., and . Applied Comp. Int. Soft Computing, (2015)Providing Interactive Functions through Active Client-Buffer Management in Partitioned Video Multicast VoD Systems., , , and . Networked Group Communication, volume 1736 of Lecture Notes in Computer Science, page 152-169. Springer, (1999)On protecting the integrity of sensor data., , and . ICECS, page 902-905. IEEE, (2008)Voronoi-based Secure kNN Queries over Spatial Data at the Cloud., , , and . IIT, page 13-17. IEEE, (2018)Extending steganography payload capacity using the L*a*b* color space., , and . IIT, page 1-6. IEEE, (2018)