Author of the publication

The credit card visual authentication scheme based on GF(28) field.

, , and . Multimedia Tools Appl., 74 (24): 11451-11465 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Image Compression Method Based on Block Truncation Coding and Linear Regression., and . J. Inf. Hiding Multim. Signal Process., 7 (1): 198-215 (2016)A novel terraced field block based scheme for data hiding., and . BMEI, page 757-761. IEEE, (2015)Hybrid Color Image Steganography Method Used for Copyright Protection and Content Authentication., , , and . J. Inf. Hiding Multim. Signal Process., 6 (4): 686-696 (2015)Reversible data hiding based on automatic contrast enhancement using histogram expansion., , and . J. Vis. Commun. Image Represent., (April 2023)High-capacity reversible data hiding in encrypted 3D mesh models based on multi-MSB prediction., , and . Signal Process., (2022)Robust image authentication scheme with self-repair capability for greyscale source document images via PNG format., , and . IET Image Process., 10 (12): 971-978 (2016)The credit card visual authentication scheme based on GF(28) field., , and . Multimedia Tools Appl., 74 (24): 11451-11465 (2015)Image Authentication and Self-Recovery Scheme Based on The Rehashing Model., , and . J. Inf. Hiding Multim. Signal Process., 7 (3): 460-474 (2016)High-Capacity Reversible Data Hiding Method for JPEG Images., , , and . J. Softw., 13 (1): 1-17 (2018)A High-Capacity Image Data Hiding Based on Extended EMD-2 Reference Matrix., , and . IGTA, volume 634 of Communications in Computer and Information Science, page 51-61. Springer, (2016)