Author of the publication

Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery.

, , and . Pattern Recognit., 41 (2): 654-661 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reversible Steganography for BTC-compressed Images., , and . Fundam. Informaticae, 109 (2): 121-134 (2011)Lossless data hiding for color images based on block truncation coding., , and . Pattern Recognit., 41 (7): 2347-2357 (2008)Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels., , and . Pattern Recognit., 39 (6): 1155-1167 (2006)A Bit-Level Visual Secret Sharing Scheme for Multi-Secret Images Using Rotation and Reversion Operatations., , and . Intelligent Multimedia Data Hiding: New Directions, volume 58 of Studies in Computational Intelligence, Springer, (2007)A Secret Image Sharing Scheme Based on Vector Quantization Mechanism., , and . EUC, volume 4096 of Lecture Notes in Computer Science, page 469-478. Springer, (2006)Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery., , and . Pattern Recognit., 41 (2): 654-661 (2008)