Author of the publication

Color image chaos encryption algorithm combining CRC and nine palace map.

, , , , and . Multim. Tools Appl., 78 (22): 31035-31055 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new fingerprinting scheme using social network analysis for majority attack., , , and . Telecommun. Syst., 54 (3): 315-331 (2013)A secure social multimedia sharing scheme in the TSHWT_SVD domain based on neural network., , , , and . Multim. Tools Appl., 82 (10): 15395-15414 (April 2023)A Diversity-based Selfish Node Detection Algorithm for Socially Aware Networking., , , , , , , and . J. Signal Process. Syst., 93 (7): 811-825 (2021)Secure Multimedia Big Data Sharing in Social Networks Using Fingerprinting and Encryption in the JPEG2000 Compressed Domain., , , , , , and . TrustCom, page 616-621. IEEE Computer Society, (2014)The Research How to Judge Social Vehicles Driving into ART., , , , and . SmartCom, volume 10699 of Lecture Notes in Computer Science, page 239-248. Springer, (2017)An Equivalent Exchange Based Data Forwarding Incentive Scheme for Socially Aware Networks., , , , , , and . J. Signal Process. Syst., 93 (2-3): 249-263 (2021)Secure content sharing for social network using fingerprinting and encryption in the TSH transform domain., , , and . ACM Multimedia, page 1117-1120. ACM, (2012)A trust-based cloud computing access control model., , , and . KES Journal, 20 (4): 197-203 (2016)Secure Social Multimedia Big Data Sharing Using Scalable JFE in the TSHWT Domain., , , , , and . ACM Trans. Multim. Comput. Commun. Appl., 12 (4s): 61:1-61:23 (2016)Secure social multimedia content distribution based on social network analysis., , , , , , and . Int. J. Reason. based Intell. Syst., 8 (1/2): 69-75 (2016)