Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the embedding limits of the discrete cosine transform., and . Multimedia Tools Appl., 75 (10): 5939-5957 (2016)Toward optimal embedding capacity for transform domain steganography: a quad-tree adaptive-region approach., and . Multimedia Tools Appl., 76 (6): 8627-8650 (2017)Providing Interactive Functions through Active Client-Buffer Management in Partitioned Video Multicast VoD Systems., , , and . Networked Group Communication, volume 1736 of Lecture Notes in Computer Science, page 152-169. Springer, (1999)Customs-Based Distributed Risk Assessment Method., , and . PAAP, volume 1163 of Communications in Computer and Information Science, page 417-429. Springer, (2019)Hiding Information in Reversible English Transforms for a Blind Receiver., and . Applied Comp. Int. Soft Computing, (2015)Managing multi-priority services in ubiquitous computing applications., , and . Int. J. Internet Protoc. Technol., 5 (3): 154-165 (2010)Achieving Stronger Compaction for DCT-Based Steganography: A Region-Growing Approach., , and . WorldCIST (2), volume 1160 of Advances in Intelligent Systems and Computing, page 251-261. Springer, (2020)On protecting the integrity of sensor data., , and . ICECS, page 902-905. IEEE, (2008)Voronoi-based Secure kNN Queries over Spatial Data at the Cloud., , , and . IIT, page 13-17. IEEE, (2018)Extending steganography payload capacity using the L*a*b* color space., , and . IIT, page 1-6. IEEE, (2018)