Author of the publication

Reversible data hiding in binary images based on image magnification.

, , , , and . Multimedia Tools Appl., 78 (15): 21891-21915 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of Intelligent Technology in Animal Husbandry and Aquaculture Industry., , , , and . ICCSE, page 335-339. IEEE, (2019)A Hybrid Watermarking Scheme for Video Authentication., , and . ICIP, page 2569-2572. IEEE, (2006)Image authentication using content based watermark., , and . ISCAS (4), page 4014-4017. IEEE, (2005)Dwt-Based Video Data Hiding Robust To Mpeg Compression And Frame Loss., , and . Int. J. Image Graph., 5 (1): 111-134 (2005)Three Novel Algorithms for Hiding Data in PDF Files Based on Incremental Updates., , , and . IWDW, volume 7128 of Lecture Notes in Computer Science, page 167-180. Springer, (2011)A Robust Watermarking for MPEG-2., , and . IWDW, volume 5703 of Lecture Notes in Computer Science, page 69-80. Springer, (2009)Balancing codification and personalization for knowledge reuse: a Markov decision process approach., , and . J. Knowl. Manag., 17 (5): 755-772 (2013)Characterization of Conductivity Changes During High-Frequency Irreversible Electroporation for Treatment Planning., , , , , , , and . IEEE Trans. Biomed. Eng., 65 (8): 1810-1819 (2018)A General Purpose Adaptive Fault Detection and Diagnosis Scheme for Information Systems with Superheterodyne Receivers., , , and . Complex., (2018)Using online self-assessment tool to improve conjoint analysis: Application in choices of wildlife excursions., , , and . Internet Res., 26 (3): 644-660 (2016)