Author of the publication

A novel evaluation method for perceptual hash algorithm in authentication mode.

, , , and . ICDIP, volume 8334 of SPIE Proceedings, page 833444. SPIE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Garbage Collection Aware Stripping method for Solid-State Drives., , , , and . ASP-DAC, page 334-339. IEEE, (2015)A novel evaluation method for perceptual hash algorithm in authentication mode., , , and . ICDIP, volume 8334 of SPIE Proceedings, page 833444. SPIE, (2012)Analysis and Problems on Fuzzy Vault Scheme., , and . IIH-MSP, page 244-250. IEEE Computer Society, (2006)Implicit Programming: A Fast Programming Strategy for nand Flash Memory Storage Systems Adopting Redundancy Methods., , , , and . IEEE Embed. Syst. Lett., 9 (2): 37-40 (2017)A Robust Watermarking Algorithm Based on Differential Energy and QIM for Uncompressed Video., , , and . IIH-MSP, page 382-385. IEEE Computer Society, (2009)An Empirical Study of Fuzzy Decision Tree for Gradient Boosting Ensemble., , , and . AI, volume 13151 of Lecture Notes in Computer Science, page 716-727. Springer, (2022)An Image Structure Information Based Robust Hash for Tamper Detection and Localization., , , and . IIH-MSP, page 430-433. IEEE Computer Society, (2010)An Endurance-Aware Metadata Allocation Strategy for MLC NAND Flash Memory Storage Systems., , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 35 (4): 691-694 (2016)A Multi-sensor Demarcation Method Oriented to Non-contact Train Obstacle Detection., , , , , and . AAIA, page 269-276. ACM, (2023)