Author of the publication

A high capacity data hiding scheme based on re-adjusted GEMD.

, , , and . Multimedia Tools Appl., 77 (5): 6327-6341 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A high capacity data hiding scheme based on re-adjusted GEMD., , , and . Multimedia Tools Appl., 77 (5): 6327-6341 (2018)Verifiable data hiding scheme with tamper detection., , , and . J. Intell. Fuzzy Syst., 36 (2): 1311-1321 (2019)A W-band CMOS Receiver Chipset for Millimeter-Wave Radiometer Systems., , , and . IEEE J. Solid State Circuits, 46 (2): 378-391 (2011)Secure multi-group data hiding based on gemd map., , , and . Multimedia Tools Appl., 76 (2): 1901-1919 (2017)On the Security of a Privacy Authentication Scheme Based on Cloud for Medical Environment., , and . ICISA, volume 424 of Lecture Notes in Electrical Engineering, page 241-248. Springer, (2017)A Blockchain Based Data Aggregation and Group Authentication Scheme for Electronic Medical System., , , , and . IEEE Access, (2020)A BiCMOS W-Band 2×2 Focal-Plane Array With On-Chip Antenna., , , and . IEEE J. Solid State Circuits, 47 (10): 2355-2371 (2012)Reversible Shared Data Hiding Based on Modified Signed Digit EMD., , , and . IWDW, volume 9023 of Lecture Notes in Computer Science, page 266-275. Springer, (2014)3D-Playfair Encrypted Message Verification Technology based on MD5., , , and . AsiaJCIS, page 110-114. IEEE, (2020)Secure User Authentication and User Anonymity Scheme based on Quadratic Residues for the Integrated EPRIS., , , and . ANT/SEIT, volume 52 of Procedia Computer Science, page 21-28. Elsevier, (2015)