Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High-payload completely reversible data hiding in encrypted images by an interpolation technique., , , and . Frontiers Inf. Technol. Electron. Eng., 18 (11): 1732-1743 (2017)Distributed privacy-preserving nested compressed sensing for multiclass data collection with identity authentication., , , and . Signal Process., (2023)An image coding scheme using parallel compressive sensing for simultaneous compression-encryption applications., , , and . J. Vis. Commun. Image Represent., (2017)On the security of symmetric ciphers based on DNA coding., , , and . Inf. Sci., (2014)A Compressive Sensing Based Image Encryption and Compression Algorithm With Identity Authentication and Blind Signcryption., , , , and . IEEE Access, (2020)Using time-stamp to improve the security of a chaotic maps-based key agreement protocol., , and . Inf. Sci., 178 (6): 1598-1602 (2008)A novel key agreement protocol based on chaotic maps., , and . Inf. Sci., 177 (4): 1136-1142 (2007)QKD-Based Quantum Private Query Protocol in the Single-Photon Interference Communication System., , , , , , and . IEEE Access, (2019)Commutative fragile zero-watermarking and encryption for image integrity protection., , , , and . Multim. Tools Appl., 78 (16): 22727-22742 (2019)CytoBrain: Cervical Cancer Screening System Based on Deep Learning Technology., , , , , , , and . J. Comput. Sci. Technol., 36 (2): 347-360 (2021)