Author of the publication

A Novel Robust Reversible Watermarking Scheme Based on IWT.

, , and . ICCCS (1), volume 10602 of Lecture Notes in Computer Science, page 39-48. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A chaotic stream cipher and the usage in video protection, , , and . Chaos, Solitons & Fractals, 34 (3): 851--859 (November 2007)A Novel Robust Reversible Watermarking Scheme Based on IWT., , and . ICCCS (1), volume 10602 of Lecture Notes in Computer Science, page 39-48. Springer, (2017)Content distribution and copyright authentication based on combined indexing and watermarking., , and . Multimedia Tools Appl., 57 (1): 49-66 (2012)An accurate soft diagnosis method of breast cancer using the operative fusion of derived features and classification approaches., , and . Expert Syst. J. Knowl. Eng., (2022)Efficient large payloads ternary matrix embedding., , , and . Multimedia Tools Appl., 77 (2): 1605-1622 (2018)Identifying Computer Generated Images Based on Quaternion Central Moments in Color Quaternion Wavelet Domain., , , , and . IEEE Trans. Circuits Syst. Video Techn., 29 (9): 2775-2785 (2019)SmsNet: A New Deep Convolutional Neural Network Model for Adversarial Example Detection., , , , , , and . IEEE Trans. Multim., (2022)Time Series Data Cleaning Method Based on Optimized ELM Prediction Constraints., , , , , and . J. Inf. Process. Syst., 19 (2): 149-163 (April 2023)Graph-guided deep hashing networks for similar patient retrieval., , , , , , , , , and . Comput. Biol. Medicine, (February 2024)A semantic element representation model for malicious domain name detection., , , , and . J. Inf. Secur. Appl., (2022)