Author of the publication

IEEE Access Special Section Editorial: Information Security Solutions for Telemedicine Applications.

, , , , , and . IEEE Access, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient adaptive arithmetic coding based on updated probability distribution for lossless image compression., , and . J. Electronic Imaging, 19 (2): 023014 (2010)3D Object Watermarking from Data Hiding in the Homomorphic Encrypted Domain., , , and . ACM Trans. Multim. Comput. Commun. Appl., 19 (5s): 175:1-175:20 (2023)Analysis of digitized 3D mesh curvature histograms for reverse engineering., , , and . Comput. Ind., (2017)Rebuttal: On the Security of Reversible Data Hiding in Encrypted Images by MSB Prediction., and . IEEE Trans. Inf. Forensics Secur., (2021)Sparsity in an artificial neural network predicts beauty: Towards a model of processing-based aesthetics., , , , and . PLoS Comput. Biol., (December 2023)A Format Compliant Encryption Method for 3D Objects Allowing Hierarchical Decryption., , and . IEEE Trans. Multim., (2023)A Joint Secret Image Sharing and Jpeg Compression Scheme., , and . ICIP, page 581-585. IEEE, (2022)Experimental study of Print-and-Scan impact as random process., , , and . Media Watermarking, Security, and Forensics, page 1-11. Society for Imaging Science and Technology, (2016)Orientation Beautification of Reverse Engineered Models., , , and . VISIGRAPP (1: GRAPP), page 91-100. SciTePress, (2018)An adaptive spread spectrum (SS) synchronous data hiding strategy for scalable 3D terrain visualization., , and . VDA, volume 7243 of SPIE Proceedings, page 724308. SPIE, (2009)