Author of the publication

Secure hybrid multibit multiplicative watermarking for media distribution over mobile Internet.

, , , and . Secur. Commun. Networks, 9 (4): 357-365 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimum Decoder for Barni's Multiplicative Watermarking Based on Minimum Bayesian Risk Criterion., , and . ICNSC, page 911-915. IEEE, (2008)A Novel Robust Reversible Watermarking Scheme Based on IWT., , and . ICCCS (1), volume 10602 of Lecture Notes in Computer Science, page 39-48. Springer, (2017)Efficient large payloads ternary matrix embedding., , , and . Multimedia Tools Appl., 77 (2): 1605-1622 (2018)Content distribution and copyright authentication based on combined indexing and watermarking., , and . Multimedia Tools Appl., 57 (1): 49-66 (2012)Identifying Computer Generated Images Based on Quaternion Central Moments in Color Quaternion Wavelet Domain., , , , and . IEEE Trans. Circuits Syst. Video Techn., 29 (9): 2775-2785 (2019)A semantic element representation model for malicious domain name detection., , , , and . J. Inf. Secur. Appl., (2022)Fast3DS: A real-time full-convolutional malicious domain name detection system., , , , , and . J. Inf. Secur. Appl., (2021)Assessing economic losses of haze with uncertain probabilistic linguistic analytic hierarchy process., , and . J. Intell. Fuzzy Syst., 39 (5): 7547-7569 (2020)A Siamese Inverted Residuals Network Image Steganalysis Scheme based on Deep Learning., , , , , and . ACM Trans. Multim. Comput. Commun. Appl., 19 (6): 214:1-214:23 (November 2023)Improved PVO-based reversible data hiding: A new implementation based on multiple histograms modification., , and . J. Vis. Commun. Image Represent., (2016)