Author of the publication

Image Tamper Detection and Recovery Based on Dual Watermarks Sharing Strategy.

, and . J. Digit. Inf. Manag., 10 (1): 39-49 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Blog Clustering Approach Based on Queried Keywords., , and . ISBAST, page 1-9. IEEE, (2013)Self-Authentication Mechanism with Recovery Ability for Digital Images., , and . CISIS, page 299-304. IEEE Computer Society, (2013)Multilayered information encryption scheme with fine-grained authentication., , and . APSIPA, page 1126-1130. IEEE, (2015)Reliability and validity of Web-based portfolio peer assessment: A case study for a senior high school's students taking computer course., , , and . Comput. Educ., 57 (1): 1306-1316 (2011)Contrast-Adaptive Removable Visible Watermarking (CARVW) mechanism., , , and . Image Vis. Comput., 31 (4): 311-321 (2013)High payload secret hiding technology for QR codes., and . EURASIP J. Image Video Process., (2017)A Two-Layer Steganography Scheme Using Sudoku for Digital Images., , and . UIC, volume 6905 of Lecture Notes in Computer Science, page 529-535. Springer, (2011)A Self-Authentication Mechanism for a (3, 3)-threshold Secret Sharing Scheme., and . UIC/ATC, page 1006-1008. IEEE Computer Society, (2012)Data Augmentation for a Deep Learning Framework for Ventricular Septal Defect Ultrasound Image Classification., , , , and . ICPR Workshops (4), volume 12664 of Lecture Notes in Computer Science, page 310-322. Springer, (2020)Applying Fuzzy Model on the Evaluation of Library Service Quality., , and . HIS (1), page 73-77. IEEE Computer Society, (2009)