Author of the publication

QR code steganography with secret payload enhancement.

, and . ICME Workshops, page 1-5. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Image Tamper Detection and Recovery Based on Dual Watermarks Sharing Strategy., and . J. Digit. Inf. Manag., 10 (1): 39-49 (2012)Diverse augmented reality exhibitions for differential users based upon private quick response code., , and . APSIPA, page 1121-1125. IEEE, (2015)Secret sharing mechanism with cheater detection., , , and . APSIPA, page 1-4. IEEE, (2013)A Privacy Reinforcement Approach against De-identified Dataset., , , , , and . ICEBE, page 370-375. IEEE Computer Society, (2011)A (n, n)-threshold Secret Sharing Scheme for Barcode Application., , and . ICS, volume 274 of Frontiers in Artificial Intelligence and Applications, page 1023-1028. IOS Press, (2014)D-Box: DMA-enabled Compartmentalization for Embedded Applications., , , , and . NDSS, The Internet Society, (2022)A New Two-objective Single Machine Scheduling Problem Considers a Past-sequence-dependent Setup Time and Learning Effect., and . ICKII, page 309-312. IEEE, (2018)Design of Halftone-Based AR Markers under Infrared Detection., , , and . CSSE (6), page 97-100. IEEE Computer Society, (2008)978-0-7695-3336-0.Modified YOLOv4-DenseNet Algorithm for Detection of Ventricular Septal Defects in Ultrasound Images., , , , , and . Int. J. Interact. Multim. Artif. Intell., 6 (7): 101 (2021)Tuning applications for efficient GPU offloading to in-memory processing., , , and . ICS, page 37:1-37:12. ACM, (2020)