Author of the publication

A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system.

, , , , and . Des. Codes Cryptogr., 86 (11): 2587-2603 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distinguishing computer graphics from photographic images using a multiresolution approach based on local binary patterns., , and . Secur. Commun. Networks, 7 (11): 2153-2159 (2014)Secret-to-Image Reversible Transformation for Generative Steganography., , , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (5): 4118-4134 (September 2023)Adaptive error prediction method based on multiple linear regression for reversible data hiding., , , , , , and . J. Real Time Image Process., 16 (4): 821-834 (2019)Unconstraint Optimal Selection of Side Information for Histogram Shifting Based Reversible Data Hiding., , and . IEEE Access, (2019)Camera Source Identification with Limited Labeled Training Set., , , , , and . IWDW, volume 9569 of Lecture Notes in Computer Science, page 18-27. Springer, (2015)Multiple histograms based reversible data hiding by using FCM clustering., , , , , and . Signal Process., (2019)Secret-to-Image Reversible Transformation for Generative Steganography., , , , and . CoRR, (2022)CCCIH: Content-consistency Coverless Information Hiding Method Based on Generative Models., , , and . Neural Process. Lett., 53 (6): 4037-4046 (2021)Perceptual Enhancement for Autonomous Vehicles: Restoring Visually Degraded Images for Context Prediction via Adversarial Training., , , , and . IEEE Trans. Intell. Transp. Syst., 23 (7): 9430-9441 (2022)PROMISE: A QR Code PROjection Matrix Based Framework for Information Hiding Using Image SEgmentation., , , , and . KSII Trans. Internet Inf. Syst., 17 (2): 471-485 (February 2023)