Author of the publication

A real-time privacy-sensitive data hiding approach based on chaos cryptography.

, , , , and . ICME, page 72-77. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A trellis-coded chaotic modulation scheme., and . ICC, page 5010-5015. IEEE, (2006)On the Security of the RSA-Based Multisignature Scheme for Various Group Structures., , and . ACISP, volume 1841 of Lecture Notes in Computer Science, page 352-367. Springer, (2000)An Efficient Channel Estimation Scheme Using Walsh Pilots in Bi-directional Wireless OFDM Relay Systems with Analog Network Coding., and . IEICE Trans. Commun., 96-B (8): 2119-2130 (2013)Chaos-cryptography based privacy preservation technique for video surveillance., , , , and . Multim. Syst., 18 (2): 145-155 (2012)Fail-Stop Signatures for Multiple-Signers: Definitions, Constructions, and Their Extensions., , , , and . J. Inf. Process., 24 (2): 275-291 (2016)Particle swarm optimization-based low-complexity three-dimensional UWB localization scheme., , , , and . ICUFN, page 120-124. IEEE, (2014)Transformation-free proxy cryptosystems and their applications to electronic commerce., , , , and . InfoSecu, page 92-98. ACM, (2004)A Subject-Delegated Decryption Scheme with "Tightly" Limited Authority., , , and . IACR Cryptology ePrint Archive, (2006)Some Efficient Algorithms for the Final Exponentiation of ηT Pairing., , and . IACR Cryptology ePrint Archive, (2006)Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards., , , , , , , and . ProvSec, volume 9451 of Lecture Notes in Computer Science, page 127-146. Springer, (2015)