Author of the publication

A Sudoku-based Secret Image Sharing Scheme with Reversibility (Invited Paper).

, , , and . J. Commun., 5 (1): 5-12 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Graph-Based Method for Parallel Mining Problems., , and . J. Inf. Knowl. Manag., 3 (2): 143-154 (2004)Verifiable and Lossless Distributed Media Content Sharing.. UIC, volume 6905 of Lecture Notes in Computer Science, page 79-93. Springer, (2011)Imperceptible Visible Watermarking Scheme Using Color Distribution Modulation., and . UIC/ATC, page 1002-1005. IEEE Computer Society, (2012)Significance-Preserving Codebook Using Generic Algorithm., and . FSKD (3), page 660-664. IEEE Computer Society, (2007)0-7695-2874-0.Dual Digital Watermarking for Internet Media Based on Hybrid Strategies., , and . IEEE Trans. Circuits Syst. Video Technol., 19 (8): 1169-1177 (2009)Efficient and accurate document image classification algorithms for low-end copy pipelines., , , , and . EURASIP J. Image Video Process., (2016)Lightweight Secure Roaming Mechanism Between GPRS/UMTS and Wireless LANs., , and . Wirel. Pers. Commun., 53 (4): 569-580 (2010)Blind QR Code Steganographic Approach Based upon Error Correction Capability., , , and . KSII Trans. Internet Inf. Syst., 7 (10): 2527-2543 (2013)Embedding information on search-order codes of VQ indices by rearranging the indicators., , , , and . ICCE-TW, page 504-505. IEEE, (2015)Analyze the Digital Watermarking Security Demands for the Facebook Website., and . ICGEC, page 31-34. IEEE, (2012)