Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identity Authentication Protection for "Spatial Watermarking + QR Code" Paper-cutting Digital Image., , and . ICNCC, page 34-37. ACM, (2017)A zero-watermarking image authentication scheme using Zernike moment and extreme learning machine., and . WCSP, page 1-5. IEEE, (2011)High-performance reversible data hiding in encrypted images with adaptive Huffman code., , , , and . Digit. Signal Process., (March 2023)Efficient Robust Reversible Watermarking Based on ZMs and Integer Wavelet Transform., , and . IEEE Trans. Ind. Informatics, 20 (3): 4115-4123 (March 2024)Improved Method of Prediction Error-based Reversible Watermarking for Copyright Protection., , and . ICIMCS, page 395. ACM, (2014)Reversible Data Hiding-Based Contrast Enhancement With Multi-Group Stretching for ROI of Medical Image., , , , and . IEEE Trans. Multim., (2024)A hue preservation lossless contrast enhancement method with RDH for color images., , , , and . Digit. Signal Process., (May 2023)A Data Integrity Authentication Scheme in WSNs Based on Double Watermark., , , , and . IEEE Internet Things J., 10 (9, May 1): 8245-8256 (2023)An Independent Individual Certification Scheme Based on Digital Watermark in WSNs., and . SmartIoT, page 474-478. IEEE, (2019)Efficient Key Management for IOT Owner in the Cloud., , , , and . BDCloud, page 56-61. IEEE Computer Society, (2015)