Author of the publication

A High Embedding Capacity Data Hiding Scheme Based upon Permutation Vectors.

, , , and . IWDW, volume 10082 of Lecture Notes in Computer Science, page 578-587. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Impossibility Results on Weakly Black-Box Hardness Amplification., , and . FCT, volume 4639 of Lecture Notes in Computer Science, page 400-411. Springer, (2007)Grayscale-Invariant Reversible Data Hiding Based on Multiple Histograms Modification., and . IEEE Trans. Circuits Syst. Video Technol., 32 (9): 5888-5901 (2022)On Constant-Time-Identification and Privacy-Preserving RFID Protocols: Trade-Off between Time and Memory., , and . UIC/ATC, page 613-618. IEEE Computer Society, (2013)On Reversible Data Hiding Schemes for JPEG Images from the Modified Quantization Table., , and . ICS, volume 274 of Frontiers in Artificial Intelligence and Applications, page 944-953. IOS Press, (2014)Compression-Efficient Reversible Data Hiding in Zero Quantized Coefficients of JPEG Images., , and . IIH-MSP (1), volume 81 of Smart Innovation, Systems and Technologies, page 153-160. Springer, (2017)Efficient decoding algorithm for constant composition codes., , and . ISITA, page 278-281. IEEE, (2010)An Efficient Fragile Watermarking Scheme for Pixel-Wise Tamper Detection., , , and . ICGEC, page 149-152. IEEE, (2012)Distance-increasing mappings from binary vectors to constant composition vectors., and . ISIT, page 2542-2546. IEEE, (2009)Reversible Data Hiding in Pairwisely Encrypted Images., , , and . CMCSN, page 60-63. IEEE Computer Society, (2016)On the Jensen-Shannon Divergence and Variational Distance., , and . IEEE Trans. Inf. Theory, 51 (9): 3333-3336 (2005)