Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Generation of Meaningfully Secured Images for Copyright- and Privacy-Protected Image Trading Systems Using Singular Component Interchange., and . ICAIP, page 72-77. ACM, (2017)Efficient data hiding in encrypted JPEG 2000 codestreams., , and . ISPACS, page 121-126. IEEE, (2014)A Higher-Accuracy Color- and Gray-Image Training Method for Road-Object Detection with YOLO., and . ICIEI, page 230-234. ACM, (2023)Encryption-then-Compression-Based Copyright- and Privacy-Protected Image Trading System., , and . ICAIP, page 66-71. ACM, (2017)An image trading system with JPEG 2000 using fingerprinting in visually protected domain., , and . ISPACS, page 32-37. IEEE, (2013)An Efficient Lossless Compression Method Using Histogram Packing for HDR Images in OpenEXR Format., , , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 97-A (11): 2181-2183 (2014)An Efficient Compression of Amplitude-Only Images for the Image Trading System., , , and . IEICE Trans. Inf. Syst., 97-D (2): 378-379 (2014)Effects of Random Sign Encryption in JPEG 2000-Based Data Hiding., , and . IIH-MSP, page 516-519. IEEE, (2014)Non-separable weighted median-cut quantization for images with sparse color histogram., , , and . ISPACS, page 473-478. IEEE, (2012)