Author of the publication

Fragile image watermarking scheme based on VQ index sharing and self-embedding.

, , , and . Multim. Tools Appl., 76 (2): 2267-2287 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reversibility-oriented secret image sharing mechanism with steganography and authentication based on code division multiplexing., , and . IET Image Processing, 13 (9): 1411-1420 (2019)Cryptanalysis of the Improved User Efficient Blind Signatures., and . ICICS, volume 2229 of Lecture Notes in Computer Science, page 42-46. Springer, (2001)Towards the Forgery of a Group Signature without Knowing the Group Center's Secret., and . ICICS, volume 2229 of Lecture Notes in Computer Science, page 47-51. Springer, (2001)Optimal Bit Lengths of Direction Signatures for Spatial Match Accessing Using Basic Linear Hashing Scheme., and . CODAS, page 526-529. World Scientific, (1996)Extended squared magic matrix for embedding secret information with large payload., , and . Multimedia Tools Appl., 78 (14): 19045-19059 (2019)A real-time dual-image-based reversible data hiding scheme using turtle shells., , and . J. Real-Time Image Processing, 16 (3): 673-684 (2019)Reversible Data Hiding Scheme for VQ Indices Based on Absolute Difference Trees., , and . TIIS, 8 (7): 2572-2589 (2014)A reversible compression code hiding using SOC and SMVQ indices., , and . Inf. Sci., (2015)Content-Based Color Image Retrieval Using Block Truncation Coding Based on Binary Ant Colony Optimization., , , and . Symmetry, 11 (1): 21 (2019)Digital watermarking of images using neural networks., , and . J. Electronic Imaging, 9 (4): 548-555 (2000)