Author of the publication

Hardware Realization of Steganographic Techniques.

, , , and . IIH-MSP, page 279-282. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Wave Atom-Based Perceptual Image Hashing Against Content-Preserving and Content-Altering Attacks., and . Trans. Data Hiding Multim. Secur., (2015)Memoryless Hash-Based Perceptual Image Authentication., , and . IWDW, volume 7809 of Lecture Notes in Computer Science, page 425-434. Springer, (2012)A forensic chip for secure digital video recording., and . ISCAS, page 3068-3071. IEEE, (2010)Selective block assignment approach for robust digital image watermarking., and . Security and Watermarking of Multimedia Contents, volume 3657 of SPIE Proceedings, page 14-20. SPIE, (1999)Dynamic word based text compression., , and . ICDAR, page 412-416. IEEE Computer Society, (1997)Encryption System Based on Neutral Network., , and . Communications and Multimedia Security, volume 192 of IFIP Conference Proceedings, Kluwer, (2001)A Symmetric Probabilistic Encryption Scheme Based On CHNN Without Data Expansion., , , and . Neural Processing Letters, 24 (2): 93-105 (2006)The CHNN nonlinear combination generator., and . ICECS, page 257-260. IEEE, (1998)Robust Facial Landmark Localization Based on Two-Stage Cascaded Pose Regression., , , and . AAAI, page 10055-10056. AAAI Press, (2019)Hardware Realization of Steganographic Techniques., , , and . IIH-MSP, page 279-282. IEEE Computer Society, (2007)