Author of the publication

An efficient content authentication scheme in encrypted speech based on integer wavelet transform.

, , , and . APSIPA, page 1-8. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Risk-Based Determination of the Prenium Rate of Construction Work Safety Liability Insurance., , and . Modeling Risk Management in Sustainable Construction, Springer, (2011)Centroid-based semi-fragile audio watermarking in hybrid domain., and . Sci. China Inf. Sci., 53 (3): 619-633 (2010)Stabilisation of Timoshenko beam system with delay in the boundary control., and . Int. J. Control, 86 (6): 1165-1178 (2013)Urban information integration for advanced e-Planning in Europe., , , and . Gov. Inf. Q., 24 (4): 736-754 (2007)Phase retrieval via Sparse Wirtinger Flow., , and . J. Comput. Appl. Math., (2019)Self-Embedding Watermarking Scheme Based on MDS Codes., , , and . IWDW, volume 9569 of Lecture Notes in Computer Science, page 250-258. Springer, (2015)Cross correlation feature mining for steganalysis of hash based least significant bit substitution video steganography., , , and . Telecommun. Syst., 63 (4): 523-529 (2016)Watermarking-Based Blind QoS Assessment for Wireless Image Communication., and . J. Commun., 8 (3): 207-215 (2013)Multiscale convolutional recurrent neural network for residential building electricity consumption prediction., , , and . J. Intell. Fuzzy Syst., 43 (3): 3479-3491 (2022)The incremental learning algorithm with support vector machine based on hyperplane-distance., , and . Appl. Intell., 34 (1): 19-27 (2011)