From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security., и . Pattern Recognit. Lett., 25 (3): 331-339 (2004)Cyber warfare: steganography vs. steganalysis., и . Commun. ACM, 47 (10): 76-82 (2004)Improved modification direction methods., , , , и . Comput. Math. Appl., 60 (2): 319-325 (2010)Stego-Encoding with Error Correction Capability., и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 88-A (12): 3663-3667 (2005)Iterative Image Resolution Enhancement Using MAP Estimator., и . ICARCV, стр. 1-3. IEEE, (2006)Anonymous Hierarchical Identity-Based Encryption in Prime Order Groups., , и . ICDKE, том 7696 из Lecture Notes in Computer Science, стр. 230-242. Springer, (2012)Efficient Steganographic Embedding by Exploiting Modification Direction., и . IEEE Commun. Lett., 10 (11): 781-783 (2006)Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes., , и . Information Hiding, том 5284 из Lecture Notes in Computer Science, стр. 60-71. Springer, (2008)Replacement of Image Patches with Rugged Soft Boundary Using Texture Synthesis., , и . ICICIC (1), стр. 648-651. IEEE Computer Society, (2006)Fragile Watermarking With Error-Free Restoration Capability., и . IEEE Trans. Multim., 10 (8): 1490-1499 (2008)