Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Letter-oriented Perfect Hashing Scheme Based upon Sparse Table Compression., and . Softw. Pract. Exp., 21 (1): 35-49 (1991)A Two-Staged Multi-level Reversible Data Hiding Exploiting Lagrange Interpolation., , and . IIH-MSP, page 485-488. IEEE, (2013)Similar Image Retrieval Based on Wavelet Transformation., , and . Int. J. Wavelets Multiresolution Inf. Process., 2 (2): 111-120 (2004)A momentum-based deformation system for granular material., , , , , and . Comput. Animat. Virtual Worlds, 18 (4-5): 289-300 (2007)Non-iterative privacy preservation for online lotteries., , and . IET Inf. Secur., 3 (4): 139-147 (2009)Image Tamper Detection and Recovery Based on Dual Watermarks Sharing Strategy., and . J. Digit. Inf. Manag., 10 (1): 39-49 (2012)A Grayscale Image Steganography Based upon Discrete Cosine Transformation., , and . J. Digit. Inf. Manag., 8 (2): 88-94 (2010)Path Planning for Racing Games., , , and . Int. J. Artif. Intell. Tools, 19 (5): 679-702 (2010)Density-Based Image Vector Quantization Using a Genetic Algorithm., and . MMM (1), volume 4351 of Lecture Notes in Computer Science, page 289-298. Springer, (2007)A High Payload VQ Steganographic Method for Binary Images., , and . IWDW, volume 5041 of Lecture Notes in Computer Science, page 467-481. Springer, (2007)