Author of the publication

Data embedding in image-media using weight-function on modulo operations.

, , , and . ACM Trans. Embed. Comput. Syst., 12 (2): 21:1-21:12 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Achieve Thumbnail Preserving Encryption by Sum Preserving Approaches for Images., , , , and . ICFET, page 125-129. ACM, (2020)Capacity-Raising Steganography Using Multi-Pixel Differencing and Pixel-Value Shifting Operations., , and . Fundam. Informaticae, 98 (2-3): 321-336 (2010)An Optimal Parallel Algorithm for the Domatic Partition Problem on Interval Graphs., and . ICPP (3), page 146-152. CRC Press, (1992)Efficient routability check algorithms for segmented channel routing., , , and . ACM Trans. Design Autom. Electr. Syst., 5 (3): 735-747 (2000)Grouping strategies for promoting image quality of watermarking on the basis of vector quantization., , , and . J. Vis. Commun. Image Represent., 21 (1): 49-55 (2010)Varied PVD + LSB evading detection programs to spatial domain in data embedding systems., , , and . J. Syst. Softw., 83 (10): 1635-1643 (2010)Huffman-code strategies to improve MFCVQ-based reversible data hiding for VQ indexes., , , and . J. Syst. Softw., 84 (3): 388-396 (2011)Transforming LSB Substitution for Image-based Steganography in Matching Algorithms., and . J. Inf. Sci. Eng., 26 (4): 1199-1212 (2010)An Optimal Parallel Algorithm for the Domatic Partition Problem on an Interval Graph Given its Sorted Model., and . Inf. Process. Lett., 44 (1): 15-22 (1992)High-Quality Reversible Data Hiding Approach Based on Evaluating Multiple Prediction Methods., , , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 622-632. Springer, (2014)