Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-factor cheating prevention in visual secret sharing by hybrid codebooks., , , , and . J. Vis. Commun. Image Represent., 25 (7): 1543-1557 (2014)A random grid-based cyclic access structure VSS scheme for multiple secret images., , and . Displays, 34 (5): 380-387 (2013)Noise-Resistant Joint Fingerprinting and Decryption Based on Vector Quantization., , and . BWCCA, page 463-468. IEEE Computer Society, (2010)Dynamic range optimization by flexible local contrast enhancement using luminance map., , and . ICDIP, volume 8878 of SPIE Proceedings, page 88780O. SPIE, (2013)On the difficulty of aligning VSS random grids., , and . Signal Process. Image Commun., (2016)Encryption in High Dynamic Range Images for RGBE Format., , and . IIH-MSP, page 493-496. IEEE, (2013)A Patient-Centric Key Management Protocol for Healthcare Information System based on Blockchain., and . DSC, page 1-5. IEEE, (2021)Efficient Compression-Jointed Quality Controllable Scrambling Method for H.264/SVC., , and . Int. J. Netw. Secur., 17 (3): 282-289 (2015)Medical cooperative authenticated key agreement schemes with involvement of personal care assistant in telemedicine., , and . Comput. Methods Programs Biomed., (2022)Distortion-Aware Multimedia Authentication using an Enhanced Hash Function., , and . MMSP, page 1-4. IEEE, (2005)