Author of the publication

Image Tampering Detection and Recovery Using Dual Watermarks and Cyclic Redundancy Checks.

, , , , , and . ACN, volume 77 of Communications in Computer and Information Science, page 134-143. (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Counteract SYN flooding using second chance packet filtering., , , , and . ICUIMC, page 216-220. ACM, (2009)A Group-Oriented (t, n) Threshold Signature Scheme Against Replay Attacks., , , and . UIC, volume 4159 of Lecture Notes in Computer Science, page 816-825. Springer, (2006)Hierarchical key assignment without public-key cryptography.. Comput. Secur., 20 (7): 612-619 (2001)Algorithms for promoting anonymity of BS and for prolonging network lifetime of WSN., and . Peer-to-Peer Netw. Appl., 7 (4): 710-722 (2014)Generalized secure hash algorithm: SHA-X., , , , and . EUROCON, page 1-4. IEEE, (2011)Routing Protocols with Power Saving and Data Salvation for Wireless Sensor Networks., , and . BWCCA, page 468-471. IEEE, (2012)Energy efficiency measurement for multimedia audio decoding on embedded systems., , , , and . ICUIMC, page 404-408. ACM, (2008)Threshold signature schemes with traceable signers in group communications., , and . Comput. Commun., 21 (8): 771-776 (1998)Binary Document Images Authentication by Thinning Digital Patterns., , , and . IIH-MSP, page 485-488. IEEE Computer Society, (2007)An Effective Priority Queue-Based Scheme to Alleviate Malicious Packet Flows from Distributed DoS Attacks., , , and . IIH-MSP, page 1371-1374. IEEE Computer Society, (2008)