From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Reversible Color Image Watermarking in the YCoCg-R Color Space., , и . ICISS, том 9478 из Lecture Notes in Computer Science, стр. 480-498. Springer, (2015)Design of low area-overhead ring oscillator PUF with large challenge space., , и . ReConFig, стр. 1-6. IEEE, (2013)A Technique to Evaluate Upper Bounds on Performance of Pixel-prediction Based Reversible Watermarking Algorithms., и . J. Signal Process. Syst., 82 (3): 373-389 (2016)Hardware Security - Design, Threats, and Safeguards., и . CRC Press, (2014)Reversible Watermarking Using Priority Embedding through Repeated Application of Integer Wavelet Transform., , и . InfoSecHiComNet, том 7011 из Lecture Notes in Computer Science, стр. 45-56. Springer, (2011)Discrete Cosine Transform Residual Feature Based Filtering Forgery and Splicing Detection in JPEG Images., , , и . CVPR Workshops, стр. 1552-1560. Computer Vision Foundation / IEEE Computer Society, (2018)Improved Test Pattern Generation for Hardware Trojan Detection Using Genetic Algorithm and Boolean Satisfiability., , , , и . CHES, том 9293 из Lecture Notes in Computer Science, стр. 577-596. Springer, (2015)ProTro: A Probabilistic Counter Based Hardware Trojan Attack on FPGA Based MACSec Enabled Ethernet Switch., , , , и . SPACE, том 11947 из Lecture Notes in Computer Science, стр. 159-175. Springer, (2019)An image forensic technique based on JPEG ghosts., , , и . Multim. Tools Appl., 82 (9): 14153-14169 (апреля 2023)Security Through Obscurity: An Approach for Protecting Register Transfer Level Hardware IP., и . HOST, стр. 96-99. IEEE Computer Society, (2009)