Author of the publication

A Novel Data Hiding Algorithm Using Normal Vectors of 3D Model.

, , , and . Computer Graphics International, volume 4035 of Lecture Notes in Computer Science, page 231-241. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward Optimal Embedding Capacity for Permutation Steganography., , and . IEEE Signal Process. Lett., 16 (9): 802-805 (2009)A Stratified Sampling Technique for an Ellipse., and . J. Graphics, GPU, & Game Tools, 9 (1): 13-22 (2004)Exploring pixel-value differencing and base decomposition for low distortion data embedding., , and . Appl. Soft Comput., 12 (2): 942-960 (2012)An Improved Color Mood Blending Between Images Via Fuzzy Relationship., , and . MIRAGE, volume 4418 of Lecture Notes in Computer Science, page 1-11. Springer, (2007)An implementation of the efficient huge amount of pseudo-random unique numbers generator and the acceleration analysis of parallelization., , , , , , , and . DSAA, page 600-606. IEEE, (2014)Data Hiding Approach for Point-Sampled Geometry., and . IEICE Trans. Commun., 88-B (1): 190-194 (2005)A distortion-free data hiding scheme for high dynamic range images., , and . Displays, 32 (5): 225-236 (2011)Steganography on 3D Models Using a Spatial Subdivision Technique., , , , and . Computer Graphics International, volume 4035 of Lecture Notes in Computer Science, page 469-476. Springer, (2006)An Efficient Steganography Scheme for M-Commerce., , and . IIH-MSP, page 122-125. IEEE Computer Society, (2007)Tunable Bounding Volumes for Monte Carlo Applications., , , and . ICCSA (1), volume 3980 of Lecture Notes in Computer Science, page 171-180. Springer, (2006)