Author of the publication

A New Watermark Attacking Method Based on Eigen-Image Energy.

, , and . IIH-MSP, page 29-32. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Probabilistic packet marking with non-preemptive compensation., , and . IEEE Communications Letters, 8 (6): 359-361 (2004)Secure Access Control Method for Wireless Sensor Networks., , , , and . IJDSN, (2015)Mining Regression Rules and Regression Trees., , and . PAKDD, volume 1394 of Lecture Notes in Computer Science, page 271-282. Springer, (1998)A Fast Algorithm of Cubic Convolution Spline Interpolation for Image Compression., and . IMSA, page 1-5. IASTED/ACTA Press, (1999)An Image Authentication and Recovery Method Using Optimal Selection of Block Types., , and . ISM, page 151-154. IEEE Computer Society, (2014)Error Rate-Based Dynamic Weighted Fair Queuing In Wireless Networks., , , and . LCN, page 546-553. IEEE Computer Society, (2005)A PTC Scheme for Internet of Things: Private-Trust-Confidentiality., , , and . AINA Workshops, page 969-974. IEEE Computer Society, (2016)Image Authentication Scheme for Resisting JPEG, JPEG2000 Compression and Scaling., and . IEICE Trans. Inf. Syst., 90-D (1): 126-136 (2007)Print-and-Scan Resilient Watermarking through Polarizing DCT Coefficients., , and . IEICE Trans. Inf. Syst., 96-D (10): 2208-2214 (2013)Image Authentication and Recovery through Optimal Selection of Block Types., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 98-A (5): 1126-1129 (2015)