Author of the publication

A High Embedding Capacity Data Hiding Scheme Based upon Permutation Vectors.

, , , and . IWDW, volume 10082 of Lecture Notes in Computer Science, page 578-587. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distance-Preserving and Distance-Increasing Mappings From Ternary Vectors to Permutations., , , and . IEEE Trans. Inf. Theory, 54 (3): 1334-1339 (2008)Application-Layer Conference Trees for Multimedia Multipoint Conferences Using Megaco/H.248., and . ICME, IEEE Computer Society, (2001)On Constant-Time-Identification and Privacy-Preserving RFID Protocols: Trade-Off between Time and Memory., , and . UIC/ATC, page 613-618. IEEE Computer Society, (2013)Smart bird identification system based on a hybrid approach: Petri nets, convolutional neural and deep residual networks., , and . Multim. Tools Appl., 83 (12): 34795-34823 (April 2024)Compression-Efficient Reversible Data Hiding in Zero Quantized Coefficients of JPEG Images., , and . IIH-MSP (1), volume 81 of Smart Innovation, Systems and Technologies, page 153-160. Springer, (2017)New Constructions of Distance-Increasing Mappings and Permutation Arrays.. J. Inf. Sci. Eng., 23 (4): 1227-1239 (2007)An Efficient Algorithm for the Reliability of Consecutive-k-n Networks., , and . J. Inf. Sci. Eng., 19 (1): 159-166 (2003)An Efficient Fragile Watermarking Scheme for Pixel-Wise Tamper Detection., , , and . ICGEC, page 149-152. IEEE, (2012)On Reversible Data Hiding Schemes for JPEG Images from the Modified Quantization Table., , and . ICS, volume 274 of Frontiers in Artificial Intelligence and Applications, page 944-953. IOS Press, (2014)Reversible SMVQ Image Hiding Using Adaptive Search Order Coding., , , , and . DICTA, page 1-6. IEEE, (2016)