Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the difficulty of aligning VSS random grids., , and . Signal Process. Image Commun., (2016)Encryption in High Dynamic Range Images for RGBE Format., , and . IIH-MSP, page 493-496. IEEE, (2013)Dynamic range optimization by flexible local contrast enhancement using luminance map., , and . ICDIP, volume 8878 of SPIE Proceedings, page 88780O. SPIE, (2013)A Patient-Centric Key Management Protocol for Healthcare Information System based on Blockchain., and . DSC, page 1-5. IEEE, (2021)Multi-factor cheating prevention in visual secret sharing by hybrid codebooks., , , , and . J. Vis. Commun. Image Represent., 25 (7): 1543-1557 (2014)A random grid-based cyclic access structure VSS scheme for multiple secret images., , and . Displays, 34 (5): 380-387 (2013)Noise-Resistant Joint Fingerprinting and Decryption Based on Vector Quantization., , and . BWCCA, page 463-468. IEEE Computer Society, (2010)Efficient Compression-Jointed Quality Controllable Scrambling Method for H.264/SVC., , and . Int. J. Netw. Secur., 17 (3): 282-289 (2015)Robust Watermarking for Multiple Images and Users Based on Visual Cryptography., , , and . ICGEC, volume 238 of Advances in Intelligent Systems and Computing, page 175-182. Springer, (2013)Medical cooperative authenticated key agreement schemes with involvement of personal care assistant in telemedicine., , and . Comput. Methods Programs Biomed., (2022)