Author of the publication

An oblivious fragile watermarking scheme for images utilizing edge transitions in BTC bitmaps.

, , and . Sci. China Inf. Sci., 55 (11): 2570-2581 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Image Watermarking Method Based on Mean-Removed Vector Quantization for Multiple Purposes., and . MVA, page 558-561. (2005)An attentional spatial temporal graph convolutional network with co-occurrence feature learning for action recognition., , , and . Multimedia Tools Appl., 79 (17-18): 12679-12697 (2020)High Capacity Reversible Data Hiding for 3D Meshes in the PVQ Domain., and . IWDW, volume 5041 of Lecture Notes in Computer Science, page 233-243. Springer, (2007)Application of Dichotomy to Network Partition Based on Sub Network Exchange Gain., , , and . IIH-MSP, page 298-301. IEEE, (2015)Image Retrieval Based on Structured Local Binary Kirsch Pattern., , , , and . IEICE Trans. Inf. Syst., 96-D (5): 1230-1232 (2013)Hybrid Image Compression Scheme Based on PVQ and DCTVQ., and . IEICE Trans. Inf. Syst., 88-D (10): 2422-2426 (2005)The Structural Vulnerability Analysis of Power Grids Based on Second-Order Centrality., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 100-A (7): 1567-1570 (2017)Dynamically restricted codebook-based vector quantisation scheme for mesh geometry compression., and . Signal Image Video Process., 2 (3): 251-260 (2008)Reversible data hiding based on hybrid prediction and interleaving histogram modification with single seed pixel recovery., , , , and . Signal Image Video Process., 8 (5): 813-818 (2014)Acceleration of multi-task cascaded convolutional networks., , , and . IET Image Process., 14 (11): 2435-2441 (2020)