From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Analysis of a new Ultra-lightweight RFID Protocol and Its Improvement., , , и . J. Inf. Hiding Multim. Signal Process., 4 (3): 166-177 (2013)An Adaptable (n, n) Secret Image Sharing Mechanism Based on Boolean Operation., , , и . Int. J. Netw. Secur., 16 (6): 487-493 (2014)A Robust and Removable Watermarking Scheme Using Singular Value Decomposition., , , , и . KSII Trans. Internet Inf. Syst., 10 (12): 5268-5285 (2016)A Simple Image Encoding Method with Data Lossless Information Hiding., , , и . J. Networks, 6 (3): 400-407 (2011)Efficient Pixel Prediction Algorithm for Reversible Data Hiding., , , и . Int. J. Netw. Secur., 18 (4): 750-757 (2016)A Two-Layer Steganography Scheme Using Sudoku for Digital Images., , и . UIC, том 6905 из Lecture Notes in Computer Science, стр. 529-535. Springer, (2011)Reversible Steganography for VQ Indices Using the Modified State Codebook., , , и . IIH-MSP, стр. 320-323. IEEE Computer Society, (2009)A simple image encoding method with data lossless information hiding., , , и . ICUIMC, стр. 44. ACM, (2010)An Image Data Hiding Scheme Based on Vector Quantization and Graph Coloring., , и . Recent Advances in Information Hiding and Applications, том 40 из Intelligent Systems Reference Library, Springer, (2013)Granularity Considering in a Trust Model for P2P Networks., , , , и . AINA Workshops, стр. 307-312. IEEE Computer Society, (2008)