Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Visual secret sharing for multiple secrets., , , , and . Pattern Recognit., 41 (12): 3572-3581 (2008)A new multi-secret images sharing scheme using Largrange's interpolation., , , and . J. Syst. Softw., 76 (3): 327-339 (2005)Embedding Invisible Watermarks into Digital Images Based on Side-Match Vector Quantization., and . Fundam. Informaticae, 63 (1): 89-106 (2004)Applying GMEI-GAN to Generate Meaningful Encrypted Images in Reversible Data Hiding Techniques., , , and . Symmetry, 13 (12): 2438 (2021)A Scheme for Key Management on Alternate Temporal Key Hash., , and . Int. J. Netw. Secur., 1 (1): 8-13 (2005)High-capacity reversible data hiding in binary images using pattern substitution., , , and . Comput. Stand. Interfaces, 31 (4): 787-794 (2009)GDPR-Aware Revocable P2P File-Sharing System Over Consortium Blockchain., , , , and . IEEE Syst. J., 16 (4): 5234-5245 (2022)Fragile Database Watermarking for Malicious Tamper Detection Using Support Vector Regression., , , and . IIH-MSP, page 493-496. IEEE Computer Society, (2007)Image segmentation by automatic histogram thresholding., , and . ICIS, volume 403 of ACM International Conference Proceeding Series, page 136-141. ACM, (2009)A Semi-fragile Watermarking Scheme Based on SVD and VQ Techniques., , and . ICCSA (3), volume 3982 of Lecture Notes in Computer Science, page 406-415. Springer, (2006)