Author of the publication

Reversible data hiding using side-match predictions on steganographic images.

, , and . Multimedia Tools Appl., 67 (3): 571-591 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Web security in a windows system as PrivacyDefender in private browsing mode., , , and . Multimedia Tools Appl., 74 (5): 1667-1688 (2015)A client-side detection mechanism for evil twins., , , , and . Comput. Electr. Eng., (2017)A solution to detect the existence of a malicious rogue AP., , and . Comput. Commun., (2019)BrowserGuard: A Behavior-Based Solution to Drive-by-Download Attacks., , , , and . IEEE J. Sel. Areas Commun., 29 (7): 1461-1468 (2011)Data concealments with high privacy in new technology file system., , , and . J. Supercomput., 72 (1): 120-140 (2016)Detecting Web-Based Botnets Using Bot Communication Traffic Features., , , , and . Secur. Commun. Networks, (2017)SMS Observer: A dynamic mechanism to analyze the behavior of SMS-based malware., , , , , and . J. Parallel Distributed Comput., (2021)ARMORY: An automatic security testing tool for buffer overflow defect detection., , , , , and . Comput. Electr. Eng., 39 (7): 2233-2242 (2013)Defending IoT Devices against Bluetooth Worms with Bluetooth OBEX Proxy., , , , , , and . Inf., 14 (10): 525 (2023)Reversible Watermarking Scheme with Visibility Using Randomize Distance., , , and . ICGEC, page 204-207. IEEE Computer Society, (2011)