Author of the publication

Print-Scan Resistant Two-Level QR Code.

, , , and . J. Inf. Hiding Multim. Signal Process., 10 (2): 300-312 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reversible watermarking resistant to cropping attack., , and . IET Inf. Secur., 1 (2): 91-95 (2007)A Criterion for Learning the Data-Dependent Kernel for Classification., , and . ADMA, volume 4632 of Lecture Notes in Computer Science, page 365-376. Springer, (2007)Image-matching framework based on region partitioning for target image location., , , , , and . Telecommun. Syst., 74 (3): 269-286 (2020)3-D Terrain Node Coverage of Wireless Sensor Network Using Enhanced Black Hole Algorithm., , , and . Sensors, 20 (8): 2411 (2020)Adaptive Kernel Discriminant Analysis and its Applications on Pattern Recognition., and . Int. J. Inf. Acquis., 3 (4): 329-337 (2006)A parallel compact cuckoo search algorithm for three-dimensional path planning., , and . Appl. Soft Comput., (2020)Guest Editorial., , , and . J. Networks, 5 (3): 265-266 (2010)A Real-time Action Detection System for Surveillance Videos Using Template Matching., and . J. Inf. Hiding Multim. Signal Process., 6 (6): 1088-1099 (2015)Multiple Viewpoints Based Overview for Face Recognition., , , and . J. Inf. Hiding Multim. Signal Process., 3 (4): 352-369 (2012)Improving Swarm Intelligence Accuracy with Cosine Functions for Evolved Bat Algorithm., , , , , and . J. Inf. Hiding Multim. Signal Process., 6 (6): 1194-1202 (2015)