Author of the publication

Achieve Thumbnail Preserving Encryption by Sum Preserving Approaches for Images.

, , , , and . ICFET, page 125-129. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Capacity-raising reversible data hiding scheme using quinary secrets square in dual-images., , , and . Multim. Tools Appl., 82 (27): 42699-42716 (November 2023)High-fidelity reversible data hiding based on PVO and median preserving., , and . J. Supercomput., 78 (6): 8367-8388 (2022)Cloud evidence tracks of storage service linking with iOS systems., , , , and . J. Supercomput., 77 (1): 77-94 (2021)Steganography of Data Embedding in Multimedia Images Using Interpolation and Histogram Shifting., , , and . IIH-MSP, page 387-390. IEEE, (2013)Raw reversibility of information hiding on the basis of VQ systems., , , , and . J. Supercomput., 74 (8): 3748-3777 (2018)Image interpolating based data hiding in conjunction with pixel-shifting of histogram., , , and . J. Supercomput., 66 (2): 1093-1110 (2013)Steganographic Greedy Algorithms for Data Hiding Based on Differences Under SMVQ., , , and . IWDW, volume 9023 of Lecture Notes in Computer Science, page 599-612. Springer, (2014)Mutual authentications to parties with QR-code applications in mobile systems., , , , and . Int. J. Inf. Sec., 16 (5): 525-540 (2017)Dynamic Information-Hiding Method with High Capacity Based on Image Interpolating and Bit Flipping., , and . Entropy, 25 (5): 744 (2023)Reversible data hiding using neighboring block in VQ-compressed images., , and . ICUIMC, page 47. ACM, (2010)