From post

Image Watermarking Algorithm Based on the Code Division Multiple Access Technique.

, , , и . KES (2), том 4252 из Lecture Notes in Computer Science, стр. 204-211. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

DOA estimation of moving sound sources in the context of nonuniform spatial noise using acoustic vector sensor., , , , и . Multidimens. Syst. Signal Process., 26 (1): 321-336 (2015)Deep learning for named entity recognition: a survey., , и . Neural Comput. Appl., 36 (16): 8995-9022 (июня 2024)Image Watermarking Algorithm Based on the Code Division Multiple Access Technique., , , и . KES (2), том 4252 из Lecture Notes in Computer Science, стр. 204-211. Springer, (2006)Color image compression and encryption scheme based on compressive sensing and double random encryption strategy., , , , , и . Signal Process., (2020)Relay Selection Algorithm for Cognitive Relay Network., , , и . Wireless Personal Communications, 96 (4): 6183-6195 (2017)Medical Knowledge Graph Construction Based on Traceable Conversion., , , , , , , и . HIS, том 13705 из Lecture Notes in Computer Science, стр. 243-257. Springer, (2022)A Novel Adaptive Bandwidth Reservation Scheme for Multimedia Traffic in IP Networks, , и . стр. 2371-2380. (2005)Joint Probabilistic Constrained Robust Beamforming and Antenna Selection., , , и . Wireless Personal Communications, 84 (4): 2385-2396 (2015)Joint estimation of state and system biases in non-linear system., , , , и . IET Signal Process., 11 (1): 10-16 (2017)The Maximum Capacity and Minimum Detectable Capacity of Information Hiding in Digital Images., , , и . ICCSA (2), том 3981 из Lecture Notes in Computer Science, стр. 59-66. Springer, (2006)