Author of the publication

A Compressive Sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud.

, , , , and . Inf. Sci., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Image Visually Meaningful Cryptography Based on Julia Set Generating and Information Hiding., , , and . IWDW, volume 12022 of Lecture Notes in Computer Science, page 393-406. Springer, (2019)High-payload completely reversible data hiding in encrypted images by an interpolation technique., , , and . Frontiers Inf. Technol. Electron. Eng., 18 (11): 1732-1743 (2017)Efficient receiver-based flooding in mobile ad hoc networks., , and . Wirel. Networks, 26 (1): 17-31 (2020)Minimum connected dominating sets in heterogeneous 3D wireless ad hoc networks., , , , , and . Ad Hoc Networks, (2020)A Compressive Sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud., , , , and . Inf. Sci., (2017)Understanding the Ecosystem and Addressing the Fundamental Concerns of Commercial MVNO., , , , , , , and . IEEE/ACM Trans. Netw., 28 (3): 1364-1377 (2020)Compressed Sensing by Using Measurement Completion for Robust Image Coding., , , and . HPCC/DSS/SmartCity/DependSys, page 523-529. IEEE, (2022)Flooding in 3-dimensional mobile ad hoc networks using 1-hop information., , and . Int. J. Sens. Networks, 26 (2): 69-80 (2018)Automated Segmentation of the Clinical Target Volume in the Planning CT for Breast Cancer Using Deep Neural Networks., , , , and . IEEE Trans. Cybern., 52 (5): 3446-3456 (2022)Steganography Integration Into a Low-Bit Rate Speech Codec., , , and . IEEE Trans. Inf. Forensics Secur., 7 (6): 1865-1875 (2012)