From post

A Bandwidth Efficiency of Lempel-Ziv Scheme for Data Authentication.

, , и . KES (4), том 3684 из Lecture Notes in Computer Science, стр. 249-256. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Effective Maximum Distortion Controlling Technology in the Dual-Image-Based Reversible Data Hiding Scheme., , и . IEEE Access, (2020)Data Compressor for VQ Index Tables., и . Fundam. Informaticae, 65 (4): 353-371 (2005)Integrated Health Check Report Analysis and Tracking Platform., , , , , , и . IIH-MSP (1), том 81 из Smart Innovation, Systems and Technologies, стр. 44-52. Springer, (2017)A difference expansion oriented data hiding scheme for restoring the original host images., и . J. Syst. Softw., 79 (12): 1754-1766 (2006)Dual-image-based reversible data hiding method using center folding strategy., , и . Signal Process., (2015)Rise and Rise of Blockchain: A Patent Statistics Approach to Identify the Underlying Technologies., , , , и . ACIIDS (Companion), том 1178 из Communications in Computer and Information Science, стр. 456-466. Springer, (2020)High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting., , и . Multimedia Tools Appl., 72 (1): 417-435 (2014)A high payload data embedding scheme using dual stego-images with reversibility., , , , и . ICICS, стр. 1-5. IEEE, (2013)Identifying Firm Significance and Positions in the Patent Innovation Based on Centrality Measures' Clustering Approach., и . IEEE Access, (2023)Multiple predictors hiding scheme using asymmetric histograms., , , и . Multimedia Tools Appl., 76 (3): 3361-3382 (2017)