Author of the publication

Selective scalable secret image sharing with verification.

, and . Multimedia Tools Appl., 76 (1): 1-11 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A wide-adapted bantam protocol for roaming across wireless areas., and . Wireless Networks, 19 (6): 1423-1440 (2013)A Novel Illumination-Balance Technique for Improving the Quality of Degraded Text-Photo Images., , and . IEEE Trans. Circuits Syst. Video Techn., 19 (6): 900-905 (2009)Towards Accurate and Efficient Classification of Power System Contingencies and Cyber-Attacks Using Recurrent Neural Networks., , , and . IEEE Access, (2020)A Secure Multicast Framework in Large and High-Mobility Network Groups., and . IEICE Trans. Commun., 92-B (7): 2365-2373 (2009)Medical blockchain: Data sharing and privacy preserving of EHR based on smart contract., , , , and . J. Inf. Secur. Appl., (2022)Secure communications for cluster-based ad hoc networks using node identities., and . J. Netw. Comput. Appl., 30 (4): 1377-1396 (2007)Security design for three-party encrypted key exchange protocol using smart cards., , and . ICUIMC, page 329-333. ACM, (2008)Robust 3D mesh zero-watermarking based on spherical coordinate and Skewness measurement., , , , and . Multim. Tools Appl., 80 (17): 25757-25772 (2021)Provable Secure Brand-new Multi-auction Mechanism with Dynamic Identity., , , and . KSII Trans. Internet Inf. Syst., 10 (12): 5616-5642 (2016)Enhancing the Security of Credit Card Transaction based on Visual DSC., , and . KSII Trans. Internet Inf. Syst., 9 (3): 1231-1245 (2015)