Author of the publication

Image Tampering Detection and Recovery Using Dual Watermarks and Cyclic Redundancy Checks.

, , , , , and . ACN, volume 77 of Communications in Computer and Information Science, page 134-143. (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multimedia Internet Rekeying for secure session mobility in ubiquitous mobile networks., , and . J. Syst. Softw., 82 (9): 1526-1539 (2009)Reducing Signaling Traffic for the Authentication and Key Agreement Procedure in an IP Multimedia Subsystem., and . Wireless Personal Communications, 51 (1): 95-107 (2009)Efficient and Provably Secure IP Multimedia Subsystem Authentication for UMTS., and . Comput. J., 50 (6): 739-757 (2007)Simple Generalized Group-Oriented Cryptosystems Using ElGamal Cryptosystem., , , and . Informatica, 14 (1): 111-120 (2003)A Novel Mobile IP Registration Scheme for Hierarchical Mobility Management., , and . ICPP Workshops, page 367-374. IEEE Computer Society, (2003)Multimedia Synchronization on IP Multimedia Subsystem to Support Collaborative Learning., , and . IIAI-AAI, page 1182-1183. IEEE Computer Society, (2016)Design and application of real-time attitude estimation system for unstable object., , and . ICAL, page 596-600. IEEE, (2012)Multimedia push system based on a wellness slot machine., , , and . Int. J. Embed. Syst., 12 (3): 277-285 (2020)A new mutual authentication and key exchange protocol with balanced computational power for wireless settings., , and . Eur. Trans. Telecommun., 15 (2): 91-99 (2004)An Integrated Indoor Positioning System with Web Internet of Things., , , and . IIAI-AAI, page 56-59. IEEE, (2019)