Author of the publication

Hiding Information in Reversible English Transforms for a Blind Receiver.

, and . Applied Comp. Int. Soft Computing, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Realistic team formation using navigation and homophily., , and . BigComp, page 197-203. IEEE Computer Society, (2014)On the embedding limits of the discrete cosine transform., and . Multimedia Tools Appl., 75 (10): 5939-5957 (2016)Scalability Management in Sensor-Network PhenomenaBases., , and . SSDBM, page 91-100. IEEE Computer Society, (2006)Toward optimal embedding capacity for transform domain steganography: a quad-tree adaptive-region approach., and . Multimedia Tools Appl., 76 (6): 8627-8650 (2017)Hiding Information in Reversible English Transforms for a Blind Receiver., and . Applied Comp. Int. Soft Computing, (2015)Parallel R-trees., and . SIGMOD Conference, page 195-204. ACM Press, (1992)SIGMOD Record 21(2), June 1992.Providing Interactive Functions through Active Client-Buffer Management in Partitioned Video Multicast VoD Systems., , , and . Networked Group Communication, volume 1736 of Lecture Notes in Computer Science, page 152-169. Springer, (1999)Voronoi-based Secure kNN Queries over Spatial Data at the Cloud., , , and . IIT, page 13-17. IEEE, (2018)Extending steganography payload capacity using the L*a*b* color space., , and . IIT, page 1-6. IEEE, (2018)On protecting the integrity of sensor data., , and . ICECS, page 902-905. IEEE, (2008)