Author of the publication

Lossless Data Hiding Based on Histogram Modification for Image Authentication.

, , and . EUC (1), page 506-511. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reversible Data Hiding Based on Histogram Modification of Pixel Differences., , and . IEEE Trans. Circuits Syst. Video Techn., 19 (6): 906-910 (2009)Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery., , and . Pattern Recognit., 41 (2): 654-661 (2008)A Secure Mobility Network Authentication Scheme Ensuring User Anonymity., , and . Symmetry, 9 (12): 307 (2017)A High-Payload Data Hiding Scheme Based on Absolute Moment Block Truncation Coding for Minimizing Hiding Impact., , , , and . Symmetry, 16 (1): 64 (2024)A Fast-Handover-Supported Authentication Protocol for Vehicular Ad Hoc Networks., , and . J. Inf. Hiding Multim. Signal Process., 7 (5): 960-969 (2016)Reversible hiding in DCT-based compressed images., , , and . Inf. Sci., 177 (13): 2768-2786 (2007)A High-Quality Image Authentication Scheme for AMBTC-compressed Images., , and . KSII Trans. Internet Inf. Syst., 8 (12): 4588-4603 (2014)A Reversible Data Hiding Scheme Based on Side Match Vector Quantization., , and . IEEE Trans. Circuits Syst. Video Technol., 16 (10): 1301-1308 (2006)An Interpolative AMBTC-based high-payload RDH scheme for encrypted images., , , , and . Signal Process. Image Commun., (2019)Improvements of EMD Embedding for Large Payloads., , and . IIH-MSP, page 473-476. IEEE Computer Society, (2007)