Author of the publication

Privacy-Aware Image Authentication from Cryptographic Primitives.

, , , and . Comput. J., 64 (8): 1178-1192 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

VILS: A Verifiable Image Licensing System., , , , and . IEEE Trans. Inf. Forensics Secur., (2022)Secrecy-Rate Balancing for Two-User MISO Interference Channels., , , , , , and . IEEE Wirel. Commun. Lett., 3 (1): 6-9 (2014)Orthogonally Rotational Transformation for Naive Bayes Learning., , , , and . CIS (1), volume 3801 of Lecture Notes in Computer Science, page 145-150. Springer, (2005)Verifiable image revision from chameleon hashes., , , , and . Cybersecur., 4 (1): 34 (2021)Fitness Approximation in Estimation of Distribution Algorithms for Feature Selection., , and . Australian Conference on Artificial Intelligence, volume 3809 of Lecture Notes in Computer Science, page 904-909. Springer, (2005)Efficient and secure image authentication with robustness and versatility., , , and . Sci. China Inf. Sci., (2020)Optimizing Transmitter-Receiver Collaborative-Relay Beamforming with Perfect CSI., , , , and . IEEE Communications Letters, 15 (3): 314-316 (2011)Research on innovation and entrepreneurship based on artificial intelligence system and neural network algorithm.. J. Intell. Fuzzy Syst., 40 (2): 2517-2528 (2021)Selective Neural Network Ensemble Based on Clustering., , and . ISNN (1), volume 3971 of Lecture Notes in Computer Science, page 545-550. Springer, (2006)Wrapper Approach for Learning Neural Network Ensemble by Feature Selection., , and . ISNN (1), volume 3496 of Lecture Notes in Computer Science, page 526-531. Springer, (2005)