Author of the publication

A Heuristic Method for Extracting Enhanced Watermarks from Digital Images.

, , and . IIH-MSP, page 453-456. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Survey of Reversible Data Hiding Schemes Based on Two-Dimensional Histogram Modification., , and . IIH-MSP (1), volume 81 of Smart Innovation, Systems and Technologies, page 3-11. Springer, (2017)Steganographic Image Hiding Schemes Based on Edge Detection., , and . IIH-MSP (1), volume 81 of Smart Innovation, Systems and Technologies, page 12-20. Springer, (2017)A Compact Patricia Trie for a Large Set of Keys., , and . ISDB, page 31-36. Acta Press, (2002)An Improved Lossless Information Hiding in SMVQ Compressed Images., , , and . ICFET, page 119-124. ACM, (2020)High-Capacity Reversible Data Hiding Based on Star-Shaped PVO Method., , and . IIH-MSP (1), volume 109 of Smart Innovation, Systems and Technologies, page 280-288. Springer, (2018)The First Robust Image Tamper Detection Scheme under Brightness., and . ICGEC, page 200-203. IEEE Computer Society, (2011)A Heuristic Method for Extracting Enhanced Watermarks from Digital Images., , and . IIH-MSP, page 453-456. IEEE Computer Society, (2006)A New Approach of Image Compression Based on Difference Vector Quantization., and . IIH-MSP, page 137-140. IEEE Computer Society, (2011)A Recycle Technique of Association Rule for Missing Value Completion., and . AINA, page 526-529. IEEE Computer Society, (2003)Complete Double Layered Embedding Scheme for Information Hiding., , and . ISDA (3), page 525-528. IEEE Computer Society, (2008)