Author of the publication

Tamper Detection and Recovery for Medical Images Using Near-lossless Information Hiding Technique.

, , , , , , and . J. Digit. Imaging, 21 (1): 59-76 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Continuation-Based Language Embedded in Scheme.. Comput. Lang., 17 (1): 19-37 (1992)The image multiple secret sharing schemes without pixel expansion., , and . ICMLC, page 1838-1844. IEEE, (2011)Dog nose-print recognition based on the shape and spatial features of scales., , , , , , and . Expert Syst. Appl., (2024)Obtaining Lazy Evaluation with Continuations in Scheme.. Inf. Process. Lett., 35 (2): 93-97 (1990)Using Procedural Parameters and Continuations in Combinatorial Searches., and . Softw. Pract. Exp., 24 (4): 377-386 (1994)Tamper Detection and Recovery for Medical Images Using Near-lossless Information Hiding Technique., , , , , , and . J. Digit. Imaging, 21 (1): 59-76 (2008)Automatic band Segmentation and Detection of 1D-gel Images with Different Exposures., , , , , , and . Int. J. Pattern Recognit. Artif. Intell., (2014)A high-efficiency DC-DC buck converter for sub-2×VDD power supply., , , and . Microelectron. J., 42 (5): 709-717 (2011)Automatic Brain Cancer Segmentation on PET Image., , , , , , , and . Int. J. Pattern Recognit. Artif. Intell., 35 (3): 2150008:1-2150008:22 (2021)An image compression method based on multiple models for the probabilities of patterns., and . Int. J. Imaging Syst. Technol., 19 (4): 362-368 (2009)