Author of the publication

Blind Image Watermarking in Canonical and Cepstrum Domains Based on 4-Connected t-o'clock Scrambling.

, , , and . Symmetry, 12 (2): 266 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Almost-Fully Secured Fully Dynamic Group Signatures with Efficient Verifier-Local Revocation and Time-Bound Keys., and . IDCS, volume 11226 of Lecture Notes in Computer Science, page 134-147. Springer, (2018)Perfectly Secure Message Transmission against Rational Adversaries., , and . CoRR, (2020)Computational Indistinguishability Between Quantum States and Its Cryptographic Application., , , and . J. Cryptol., 25 (3): 528-555 (2012)Achieving Strong Security and Member Registration for Lattice-based Group Signature Scheme with Verifier-local Revocation., and . J. Internet Serv. Inf. Secur., 8 (4): 1-15 (2018)Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics., , , , and . CD-ARES Workshops, volume 8128 of Lecture Notes in Computer Science, page 55-74. Springer, (2013)Secure pattern matching using somewhat homomorphic encryption., , , , and . CCSW, page 65-76. ACM, (2013)Learning Deterministic even Linear Languages From Positive Examples., , and . Theor. Comput. Sci., 185 (1): 63-79 (1997)New packing method in somewhat homomorphic encryption and its applications., , , , and . Secur. Commun. Networks, 8 (13): 2194-2213 (2015)Perfectly Secure Message Transmission Scheme against Rational Adversaries., and . IACR Cryptology ePrint Archive, (2017)Theoretical Analysis of "Correlations in RC6"., , and . IACR Cryptology ePrint Archive, (2002)