Author of the publication

Self-Authentication Mechanism with Recovery Ability for Digital Images.

, , and . CISIS, page 299-304. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Classify Blog Articles Using Queried Keywords., , , and . ICS, volume 274 of Frontiers in Artificial Intelligence and Applications, page 1062-1068. IOS Press, (2014)A flexible delegation processor for web-based information systems., and . Comput. Stand. Interfaces, 27 (3): 241-256 (2005)Ontology-based Dynamic Semantic Annotation for Social Image Retrieval., , and . MDM, page 337-341. IEEE, (2020)Automatically Categorizing Blog Articles Using Ontology Tree Built by DBpedia., , and . ICS, volume 274 of Frontiers in Artificial Intelligence and Applications, page 1229-1238. IOS Press, (2014)Hybrid secret hiding schemes based on absolute moment block truncation coding., , and . Multimedia Tools Appl., 76 (5): 6159-6174 (2017)Self-verifiable Secret Sharing Scheme with Locatability for Halftone Images., , and . Int. J. Netw. Secur., 17 (3): 238-242 (2015)Blind QR Code Steganographic Approach Based upon Error Correction Capability., , , and . KSII Trans. Internet Inf. Syst., 7 (10): 2527-2543 (2013)Embedding information on search-order codes of VQ indices by rearranging the indicators., , , , and . ICCE-TW, page 504-505. IEEE, (2015)Tagged visual cryptography with access control., , , and . ICME Workshops, page 1-5. IEEE Computer Society, (2014)Exploiting Semantic Connectivity in Redefined Data Representation for Image Retrieval., , and . BigMM, page 322-325. IEEE Computer Society, (2016)