Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An image-based key agreement protocol using the morphing technique., , , and . Multimedia Tools Appl., 74 (9): 3207-3229 (2015)A Proxy User Authentication Protocol Using Source-Based Image Morphing., , and . Comput. J., 58 (7): 1573-1584 (2015)Multi-round dynamic swap optimisation for table-based steganography., , and . IET Image Processing, 9 (12): 1073-1082 (2015)A fast algorithm for matrix embedding steganography.. Digit. Signal Process., (2014)Novel Lossless Morphing Algorithm for Secret Sharing via Meaningful Images., , and . J. Inf. Hiding Multim. Signal Process., 7 (6): 1168-1184 (2016)Study of micro-channel shape and material property on cooling performance of high power LED chips., and . NEMS, page 498-501. IEEE, (2014)A New Scheme to Improve the Quality of Compressed Image Transmission by Turbo Unequal Error Protection Codes., , and . IIH-MSP, page 226-229. IEEE Computer Society, (2011)OCTMAC: A VLC based MAC protocol combining optical CDMA with TDMA for VANETs., , , , and . CITS, page 234-238. IEEE, (2017)A Reversible Data Hiding Scheme Based on IWT and the Sudoku Method., , and . Int. J. Netw. Secur., 18 (3): 410-419 (2016)A Meaningful Scheme for Sharing Secret Images Using Mosaic Images., , , and . Int. J. Netw. Secur., 17 (5): 643-649 (2015)