Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CREAMS: Copyrighted Cloud Media Sharing., , , , and . CoRR, (2021)Detecting Recolored Image by Spatial Correlation., , , , and . CoRR, (2022)A Survey of Orthogonal Moments for Image Representation: Theory, Implementation, and Evaluation., , , , and . ACM Comput. Surv., 55 (2): 1:1-1:35 (2023)A robust and secure image sharing scheme with personal identity information embedded., , , , and . Comput. Secur., (2019)Perturbation meets key-based interval splitting arithmetic coding: security enhancement and chaos generalization., , , , , and . Secur. Commun. Networks, 9 (1): 43-53 (2016)Secure and Efficient Outsourcing of PCA-Based Face Recognition., , , , and . IEEE Trans. Inf. Forensics Secur., (2020)Compression-resistant backdoor attack against deep neural networks., , , , , and . Appl. Intell., 53 (17): 20402-20417 (September 2023)TPE-ISE: approximate thumbnail preserving encryption based on multilevel DWT information self-embedding., , , , , and . Appl. Intell., 53 (4): 4027-4046 (February 2023)Default Matters in Trust and Reciprocity., , , and . Games, 14 (1): 8 (February 2023)On the security of a class of diffusion mechanisms for image encryption., , , , , , and . CoRR, (2015)