Author of the publication

An Image Authentication Based on Discrete Fourier Transform.

, and . Fundam. Informaticae, 97 (4): 369-379 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Digital watermarking of images using neural networks., , and . J. Electronic Imaging, 9 (4): 548-555 (2000)A new image coding algorithm using variable-rate side-match finite-state vector quantization., and . IEEE Trans. Image Processing, 6 (8): 1185-1187 (1997)The design of e-traveler's check with efficiency and mutual authentication., and . ICUIMC, page 309-316. ACM, (2009)A Progressive Image Transmission Scheme Based on Block Truncation Coding., , and . Human.Society@Internet, volume 2105 of Lecture Notes in Computer Science, page 383-397. Springer, (2001)Application of a Reciprocal Confluence Tree Unit to Similar-Picture Retrieval., and . SSD, volume 692 of Lecture Notes in Computer Science, page 437-442. Springer, (1993)A Remediable Image Authentication Scheme Based on Feature Extraction and Clustered VQ., , and . PCM, volume 4810 of Lecture Notes in Computer Science, page 446-449. Springer, (2007)Extended squared magic matrix for embedding secret information with large payload., , and . Multimedia Tools Appl., 78 (14): 19045-19059 (2019)Optimal Bit Lengths of Direction Signatures for Spatial Match Accessing Using Basic Linear Hashing Scheme., and . CODAS, page 526-529. World Scientific, (1996)Parallel computation of the multi-exponentiation for cryptosystems., and . Int. J. Comput. Math., 63 (1-2): 9-26 (1997)Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control., , and . Inscrypt, volume 4990 of Lecture Notes in Computer Science, page 457-462. Springer, (2007)