Author of the publication

Low-Computation-Cost Data Hiding Scheme Based on Turtle Shell.

, , , and . Int. J. Netw. Secur., 22 (2): 296-305 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tamper detection and image recovery for BTC-compressed images., , and . Multimedia Tools Appl., 76 (14): 15435-15463 (2017)An implantable 128-channel wireless neural-sensing microsystem using TSV-embedded dissolvable μ-needle array and flexible interposer., , , , , , , , , and 7 other author(s). ISCAS, page 1-4. IEEE, (2017)CloudTSS: A TagSNP Selection Approach on Cloud Computing., , , and . FGIT-GDC, volume 261 of Communications in Computer and Information Science, page 525-534. Springer, (2011)Probability-based reversible image authentication scheme for image demosaicking., , and . Future Gener. Comput. Syst., (2016)Using set partitioning in hierarchical trees to authenticate digital images., , and . Signal Process. Image Commun., 18 (9): 813-822 (2003)Low Bit-rate Image Compression Schemes Based on Vector Quantization.. Int. J. Image Graph., 5 (4): 745-764 (2005)Low-complexity progressive image transmission scheme based on quadtree segmentation., and . Real Time Imaging, 11 (1): 59-70 (2005)Probability-based image authentication scheme for indexed color images., , , and . J. Electronic Imaging, 23 (3): 033003 (2014)Joint Resource Allocation, User Association, and Power Control for 5G LTE-Based Heterogeneous Networks., , and . IEEE Access, (2020)Spatial Domain Image Hiding Scheme Using Pixel-Values Differencing., , and . Fundam. Informaticae, 70 (3): 171-184 (2006)