Author of the publication

A technique of embedding digital data in an image compression code reversibly.

, , , and . ICUIMC, page 13. ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive sampling approach for volumetric shadows in dynamic scenes., , , , and . IET Image Processing, 7 (8): 762-767 (2013)Digital watermarking of images using neural networks., , and . J. Electronic Imaging, 9 (4): 548-555 (2000)An Effective Authentication Scheme Using DCT for Mobile Devices., , , and . Symmetry, 10 (1): 13 (2018)A new image coding algorithm using variable-rate side-match finite-state vector quantization., and . IEEE Trans. Image Processing, 6 (8): 1185-1187 (1997)The design of e-traveler's check with efficiency and mutual authentication., and . ICUIMC, page 309-316. ACM, (2009)Direct Candidates Generation: A Novel Algorithm for Discovering Complete Share-Frequent Itemsets., , and . FSKD (2), volume 3614 of Lecture Notes in Computer Science, page 551-560. Springer, (2005)Cryptanalysis of the Improved User Efficient Blind Signatures., and . ICICS, volume 2229 of Lecture Notes in Computer Science, page 42-46. Springer, (2001)An Efficient Convertible Authenticated Encryption Scheme and Its Variant., and . ICICS, volume 2836 of Lecture Notes in Computer Science, page 382-392. Springer, (2003)Towards the Forgery of a Group Signature without Knowing the Group Center's Secret., and . ICICS, volume 2229 of Lecture Notes in Computer Science, page 47-51. Springer, (2001)A Novel Key Agreement Scheme in a Multiple Server Environment., and . WISA, volume 4298 of Lecture Notes in Computer Science, page 187-197. Springer, (2006)