Author of the publication

Self-verifying visual secret sharing using error diffusion and interpolation techniques.

, , , and . IEEE Trans. Inf. Forensics Secur., 4 (4): 790-801 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Self-verifying visual secret sharing using error diffusion and interpolation techniques., , , and . IEEE Trans. Inf. Forensics Secur., 4 (4): 790-801 (2009)GPU Implementation of Extended Gaussian Mixture Model for Background Subtraction., , , and . RIVF, page 1-4. IEEE, (2010)Robust eye localization in video by combining eye detector and eye tracker., , , , , , and . ICPR, page 242-245. IEEE Computer Society, (2012)Multi-scale Sparse Representation for Robust Face Recognition., , , , and . KSE, page 195-199. IEEE Computer Society, (2011)A Probabilistic Visual Secret Sharing Scheme for Grayscale Images with Voting Strategy., , , and . ISECS, page 184-188. IEEE Computer Society, (2008)Structures of frequent itemsets and classifying structures of association rule set by order relations., , and . Int. J. Intell. Inf. Database Syst., 8 (4): 295-323 (2014)The GA_NN_FL Associated Model for Authentication Fingerprints., and . KES, volume 3214 of Lecture Notes in Computer Science, page 708-715. Springer, (2004)A high quality and small shadow size visual secret sharing scheme based on hybrid strategy for grayscale images., , , and . Digit. Signal Process., 21 (6): 734-745 (2011)Keystroke Dynamics Extraction by Independent Component Analysis and Bio-matrix for User Authentication., , and . PRICAI, volume 6230 of Lecture Notes in Computer Science, page 477-486. Springer, (2010)Water Level Estimation Using Sentinel-1 Synthetic Aperture Radar Imagery And Digital Elevation Models., , , and . CoRR, (2020)