Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust Secret Image Sharing Scheme Against Noise in Shadow Images., , , , and . IEEE Access, (2021)A General Steganalysis Method of QR Codes., , , , and . ICDF2C, volume 508 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 472-483. Springer, (2022)Meaningful secret image sharing resist to typical image processing of shadows., , , , and . Multim. Tools Appl., 81 (11): 16097-16115 (2022)A Support Vector Machine Based Prediction on Sensitivity to Coal Ash Blast for Different Degrees of Deterioration., , , and . J. Sensors, (2022)Evaluation of Deep Learning Segmentation Models for Detection of Pine Wilt Disease in Unmanned Aerial Vehicle Images., , , , , , , and . Remote. Sens., 13 (18): 3594 (2021)Data Hiding Based on Mini Program Code., , , , and . Secur. Commun. Networks, (2021)CTTGAN: Traffic Data Synthesizing Scheme Based on Conditional GAN., , , , and . Sensors, 22 (14): 5243 (2022)A Novel General (n, n)-Threshold Multiple Secret Images Sharing Scheme Based on Information Hiding in the Sharing Domain., , , and . Entropy, 24 (3): 318 (2022)Visual secret sharing scheme with (n, n) threshold for selective secret content based on QR codes., , , , , and . Multimedia Tools Appl., 79 (3-4): 2789-2811 (2020)Visual secret sharing scheme with (n, n) threshold based on WeChat Mini Program codes., , , , and . J. Vis. Commun. Image Represent., (2022)