Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Real-time adaptive visual secret sharing with reversibility and high capacity., , and . J. Real-Time Image Processing, 16 (4): 871-881 (2019)A Novel Page Replacement Algorithm for the Hybrid Memory Architecture Involving PCM and DRAM., , and . NPC, volume 8707 of Lecture Notes in Computer Science, page 108-119. Springer, (2014)High capacity reversible data hiding in encrypted images using SIBRW and GCC., , , and . J. Vis. Commun. Image Represent., (2021)Privacy-Preserving Reversible Information Hiding Based on Arithmetic of Quadratic Residues., , and . IEEE Access, (2019)Efficient Buffer Management for PCM-Enhanced Hybrid Memory Architecture., , and . APWeb, volume 9313 of Lecture Notes in Computer Science, page 29-40. Springer, (2015)Reversible Data Hiding Schemes in Encrypted Images Based on the Paillier Cryptosystem., , and . Int. J. Netw. Secur., 22 (3): 521-531 (2020)Error-free separable reversible data hiding in encrypted images using linear regression and prediction error map., and . Multim. Tools Appl., 78 (22): 31441-31465 (2019)Detecting Steganography in JPEG Images Recompressed With the Same Quantization Matrix., , , , and . IEEE Trans. Circuits Syst. Video Technol., 32 (9): 6002-6016 (2022)A High-Embedding Efficiency RDH in Encrypted Image Combining MSB Prediction and Matrix Encoding for Non-Volatile Memory-Based Cloud Service., , and . IEEE Access, (2020)Real-Time Error-Free Reversible Data Hiding in Encrypted Images Using (7, 4) Hamming Code and Most Significant Bit Prediction., and . Symmetry, 11 (1): 51 (2019)