Author of the publication

Secure content sharing for social network using fingerprinting and encryption in the TSH transform domain.

, , , and . ACM Multimedia, page 1117-1120. ACM, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Feature Fusion based Hashing for Large Scale Image Copy Detection., , , , , and . Int. J. Comput. Intell. Syst., 8 (4): 725-734 (2015)A Novel JFE Scheme for Social Multimedia Distribution in Compressed Domain Using SVD and CA., , , , , and . IWDW, volume 7809 of Lecture Notes in Computer Science, page 507-519. Springer, (2012)Multi-Object Tracking Via Multi-Attention., , , and . IJCNN, page 1-8. IEEE, (2020)Spermatogonium image recognition using Zernike moments., , , , and . Comput. Methods Programs Biomed., 95 (1): 10-22 (2009)Saliency prediction by Mahalanobis distance of topological feature on deep color components., , , , , , and . J. Vis. Commun. Image Represent., (2019)Real-Time Compressed- Domain Video Watermarking Resistance to Geometric Distortions., , , and . IEEE Multim., 19 (1): 70-79 (2012)No-Reference Perceptual Quality Assessment of JPEG Images Using General Regression Neural Network., , , and . ISNN (2), volume 3972 of Lecture Notes in Computer Science, page 638-645. Springer, (2006)Optimal collusion attack for digital fingerprinting., , , , and . ACM Multimedia, page 767-770. ACM, (2010)A collusion attack optimization framework toward spread-spectrum fingerprinting., , , , , and . Appl. Soft Comput., 13 (8): 3482-3493 (2013)Self Residual Attention Network for Deep Face Recognition., , , , , and . IEEE Access, (2019)