Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure multi-group data hiding based on gemd map., , , and . Multimedia Tools Appl., 76 (2): 1901-1919 (2017)On the Security of a Privacy Authentication Scheme Based on Cloud for Medical Environment., , and . ICISA, volume 424 of Lecture Notes in Electrical Engineering, page 241-248. Springer, (2017)A Blockchain Based Data Aggregation and Group Authentication Scheme for Electronic Medical System., , , , and . IEEE Access, (2020)Verifiable data hiding scheme with tamper detection., , , and . J. Intell. Fuzzy Syst., 36 (2): 1311-1321 (2019)A high capacity data hiding scheme based on re-adjusted GEMD., , , and . Multimedia Tools Appl., 77 (5): 6327-6341 (2018)A W-band CMOS Receiver Chipset for Millimeter-Wave Radiometer Systems., , , and . IEEE J. Solid State Circuits, 46 (2): 378-391 (2011)A CMOS 210-GHz Fundamental Transceiver With OOK Modulation., , , , , and . IEEE J. Solid State Circuits, 49 (3): 564-580 (2014)A Formula Diamond Encoding Data Hiding Scheme., , , and . J. Inf. Hiding Multim. Signal Process., 6 (6): 1167-1176 (2015)A Low-Power Fullband 802.11a/b/g WLAN Transceiver With On-Chip PA., , , , , , , , , and 4 other author(s). IEEE J. Solid State Circuits, 42 (5): 983-991 (2007)Signed digit data hiding scheme., , and . Inf. Process. Lett., 116 (2): 183-191 (2016)