Author of the publication

A reversible and lossless secret image sharing scheme with authentication for color images.

, , , , and . J. King Saud Univ. Comput. Inf. Sci., 35 (10): 101854 (December 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A risk adaptive access control model based on Markov for big data in the cloud., , , and . IJHPCN, 13 (4): 464-475 (2019)Secret Sharing Scheme with Fairness., , , and . TrustCom, page 494-500. IEEE Computer Society, (2011)A reversible and lossless secret image sharing scheme with authentication for color images., , , , and . J. King Saud Univ. Comput. Inf. Sci., 35 (10): 101854 (December 2023)Reduction of the semigroup-action problem on a module to the hidden-subgroup problem., , and . Quantum Inf. Process., 23 (8): 300 (August 2024)Rational Delegation Learning Outsourcing Scheme Based on Game Theory., , , , and . NaNA, page 130-135. IEEE, (2020)Adaptive Differential Privacy of Character and Its Application for Genome Data Sharing., , , , , and . NaNA, page 429-436. IEEE, (2019)Res2-Unet: An Enhanced Network for Generalized Nuclear Segmentation in Pathological Images., , , , and . MMM (2), volume 12573 of Lecture Notes in Computer Science, page 87-98. Springer, (2021)User Identity Authentication and Identification Based on Multi-Factor Behavior Features., , , , , and . GLOBECOM Workshops, page 1-6. IEEE, (2019)A Blockchain-Based Machine Learning Framework for Edge Services in IIoT., , , , , and . IEEE Trans. Ind. Informatics, 18 (3): 1918-1929 (2022)Non-interactive verifiable privacy-preserving federated learning., , , , , and . Future Gener. Comput. Syst., (2022)