Author of the publication

Generalized PVO-K Embedding Technique for Reversible Data Hiding.

, , , and . Int. J. Netw. Secur., 20 (1): 65-77 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of the Improved User Efficient Blind Signatures., and . ICICS, volume 2229 of Lecture Notes in Computer Science, page 42-46. Springer, (2001)An Efficient Convertible Authenticated Encryption Scheme and Its Variant., and . ICICS, volume 2836 of Lecture Notes in Computer Science, page 382-392. Springer, (2003)Towards the Forgery of a Group Signature without Knowing the Group Center's Secret., and . ICICS, volume 2229 of Lecture Notes in Computer Science, page 47-51. Springer, (2001)A Novel Key Agreement Scheme in a Multiple Server Environment., and . WISA, volume 4298 of Lecture Notes in Computer Science, page 187-197. Springer, (2006)Parallel computation of the multi-exponentiation for cryptosystems., and . Int. J. Comput. Math., 63 (1-2): 9-26 (1997)Arithmetic operations on encrypted data., and . Int. J. Comput. Math., 56 (1-2): 1-10 (1995)A group-oriented (t, n) undeniable signature scheme without trusted center., , and . ACISP, volume 1172 of Lecture Notes in Computer Science, page 266-274. Springer, (1996)Image Tamper Detection and Recovery Based on Dual Watermarks Sharing Strategy., and . J. Digit. Inf. Manag., 10 (1): 39-49 (2012)A Grayscale Image Steganography Based upon Discrete Cosine Transformation., , and . J. Digit. Inf. Manag., 8 (2): 88-94 (2010)Path Planning for Racing Games., , , and . Int. J. Artif. Intell. Tools, 19 (5): 679-702 (2010)