Author of the publication

Reversibility of image with balanced fidelity and capacity upon pixels differencing expansion.

, , , and . J. Supercomput., 66 (2): 812-828 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Digital Forensics Security Analysis on iOS Devices., , and . J. Web Eng., 20 (3): 775-794 (2021)Reversible data hiding using side-match predictions on steganographic images., , and . Multimedia Tools Appl., 67 (3): 571-591 (2013)Dual-Watermarking by QR-code Applications in Image Processing., , and . UIC/ATC, page 638-643. IEEE Computer Society, (2012)Visible watermarking with reversibility of multimedia images for ownership declarations., , , and . J. Supercomput., 70 (1): 247-268 (2014)Reversibility of image with balanced fidelity and capacity upon pixels differencing expansion., , , and . J. Supercomput., 66 (2): 812-828 (2013)Web security in a windows system as PrivacyDefender in private browsing mode., , , and . Multimedia Tools Appl., 74 (5): 1667-1688 (2015)Steganalysis to Data Hiding of VQ Watermarking Upon Grouping Strategy., , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 633-642. Springer, (2014)Data concealments with high privacy in new technology file system., , , and . J. Supercomput., 72 (1): 120-140 (2016)Defending IoT Devices against Bluetooth Worms with Bluetooth OBEX Proxy., , , , , , and . Inf., 14 (10): 525 (2023)Reversible Watermarking Scheme with Visibility Using Randomize Distance., , , and . ICGEC, page 204-207. IEEE Computer Society, (2011)