Author of the publication

Halftone Image Steganography Based on Maximizing Visual Similarity of Block Units.

, , , , and . ICAIS (2), volume 12737 of Lecture Notes in Computer Science, page 388-399. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive cosine transform coding using marginal analysis., and . Visual Information Processing, volume 2488 of SPIE Proceedings, page 162-167. SPIE, (1995)A smart telemetry compression system for a space instrument: MARS-96 ELISMA instrument complex., , , , and . Microprocess. Microsystems, 20 (1): 17-30 (1996)Adaptive cosine transform coding for compression of Mars-96 ELISMA instrument data., and . Microprocess. Microsystems, 19 (5): 277-282 (1995)A fast-adaptive Huffman coding algorithm., and . IEEE Trans. Commun., 41 (4): 535-538 (1993)Data compression for space applications.. University of Sussex, Falmer, East Sussex, UK, (1992)British Library, EThOS.A parallel feature selection method study for text classification., , , and . Neural Comput. Appl., 28 (S-1): 513-524 (2017)Research on Innovation Model of Sharing Economy based on Blockchain Technology.. ICITEE, page 3:1-3:6. ACM, (2019)Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture., , and . IEEE Trans. Inf. Forensics Secur., 10 (2): 243-255 (2015)Building Grid Services for User Portals, , , , , , , , , and 1 other author(s). Workshop on Designing and Building Grid Services (DBGS), Chicago, IL, USA, GGF, (2003)Copy-move detection of digital audio based on multi-feature decision., , , , and . J. Inf. Secur. Appl., (2018)