Author of the publication

Apply Run-length encoding on pixel differences to do image hiding.

, , and . ICICS, page 1-5. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Color Image Hiding Scheme Based on SMVQ and Modulo Operator., and . MMM (2), volume 4352 of Lecture Notes in Computer Science, page 461-470. Springer, (2007)An image authentication method by applying Hamming code on rearranged bits.. Pattern Recognit. Lett., 32 (14): 1679-1690 (2011)A Watermarking Scheme Based on Principal Component Analysis Technique., and . Informatica, 14 (4): 431-444 (2003)Automatic Brain Cancer Segmentation on PET Image., , , , , , , and . Int. J. Pattern Recognit. Artif. Intell., 35 (3): 2150008:1-2150008:22 (2021)An Image Hiding Method by Linking Multiple Pixels with XOR Operator., , , and . ICGEC, page 39-42. IEEE, (2012)Removing blocking effects using an artificial neural network, , and . Signal Processing, 86 (9): 2381--2387 (September 2006)A Novel Cluster-Based Difference Expansion Transform for Lossless Data Hiding., and . ICGEC, page 172-175. IEEE Computer Society, (2011)A Verifiable and Recoverable Secret Image Sharing Mechanism., and . ISPA, page 288-293. IEEE Computer Society, (2011)An Inverse Halftoning Technique Using Modified Look-Up Tables., and . Fundam. Informaticae, 68 (3): 207-220 (2005)An Inverse Halftoning Technique using Genetic Algorithm., , and . ISDB, page 184-189. Acta Press, (2002)