Author of the publication

An Image Encryption Scheme of Logistic Modulation Using Computer-Generated Hologram and Chaotic Map.

, , and . J. Electr. Comput. Eng., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling of SSIM-based end-to-end distortion for error-resilient video coding., , , and . EURASIP J. Image Video Process., (2014)Large Margin Dimensionality Reduction for Action Similarity Labeling., , , and . IEEE Signal Process. Lett., 21 (8): 1022-1025 (2014)Guideline-Driven Medical Decision Support Methods for Family Healthcare., and . IEEE Access, (2021)Improvement of recommendation algorithm based on Collaborative Deep Learning and its Parallelization on Spark., , and . J. Parallel Distributed Comput., (2021)An Image Encryption Scheme of Logistic Modulation Using Computer-Generated Hologram and Chaotic Map., , and . J. Electr. Comput. Eng., (2018)Two-Step Integral Imaging Coding Based Three-Dimensional Information Encryption Approach., , , and . Secur. Commun. Networks, (2018)The Meaningful Use of EMR in Chinese Hospitals: A Case Study on Curbing Antibiotic Abuse., , , , , and . J. Medical Syst., 37 (2): 9937 (2013)Modified integral imaging reconstruction and encryption using an improved SR reconstruction algorithm., , , , and . CoRR, (2018)Creating hospital-specific customized clinical pathways by applying semantic reasoning to clinical data., , , , and . J. Biomed. Informatics, (2014)Deep Learning for Improving the Robustness of Image Encryption., , and . IEEE Access, (2019)