Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An image-sharing method with user-friendly shadow images., and . IEEE Trans. Circuits Syst. Video Techn., 13 (12): 1161-1169 (2003)WEB-VC: Visual Cryptography for Web Image., , and . ICIP, page 4055-4059. IEEE, (2019)Color quantization by preserving color distribution features., and . Signal Process., 78 (2): 201-214 (1999)Fast full search in motion estimation by hierarchical use of Minkowski's inequality (HUMI)., , and . Pattern Recognit., 31 (7): 945-952 (1998)The family of universal axes.. Pattern Recognit., 29 (3): 477-485 (1996)A 1 log N parallel algorithm for detecting convex hulls on image boards., and . IEEE Trans. Image Processing, 7 (6): 922-925 (1998)Color image compression by moment-preserving and block truncation coding techniques., , and . IEEE Trans. Commun., 45 (12): 1513-1516 (1997)Fragile watermarking for authenticating 3-D polygonal meshes., , , and . IEEE Trans. Multim., 7 (6): 997-1006 (2005)Reversible JPEG-Based Hiding Method with High Hiding-Ratio., , and . IJPRAI, 24 (3): 433-456 (2010)Visual cryptography with extra ability of hiding confidential data., and . J. Electronic Imaging, 15 (2): 023020 (2006)